Pete Gerr, Dell EMC | RSAC USA 2020
>> Announcer: Live from San Francisco, it's theCUBE covering RSA Conference 2020 San Francisco, brought to you by SiliconANGLE Media. >> Okay, welcome back, everyone, to CUBE's coverage here in San Francisco at RSA Conference 2020. I'm John Furrier, your host. You know, cybersecurity industry's changing. Enterprises are now awake to the fact that it's now a bigger picture around securing the enterprise, 'cause it's not only the data center. It's cloud, it's the edge, a lot of great stuff. We've got a great guest here from Dell EMC. Peter Gerr's a consultant, cyber resilience solutions and services marketing at Dell EMC. Great to see you. >> You too, John. >> Thanks for coming on. >> Good to see you again, thank you. >> So, you know, I was joking with Dave Volante just this morning around the three waves of cloud, public cloud, hybrid cloud, multicloud. And we see obviously the progression. Hybrid cloud is where everyone spends most of their time. That's from ground to cloud, on-premises to cloud. So pretty much everyone knows-- >> Peter: On-ramp, kind of. >> That on-prem is not going away. Validated by all the big cloud players. but you got to nail the equation down for on-premises to the cloud, whether it's, I'm Amazon-Amazon, Azure-Azure, whatever, all those clouds. But the multicloud will be a next generation wave. That as an industry backdrop is very, very key. Plus AI and data are huge inputs into solving a lot of what is going to be new gaps, blind spots, whatever insecurity. So I got to, you know, Dell has a history with huge client base, traditional enterprises transforming. You're in the middle of all this, so you got the airplane at 30,000 feet and the companies have to swap out their engines and reboot their teams, and it's a huge task. What's going on with cyber and the enterprises? What are some of the key things? >> Well, so I like to keep it pretty simple. I've been in this industry over 20 years and I've really consistently talked about data as the global currency, right? So it's beautifully simple. Whatever industry you're in, whatever size company you're in, enterprise or even now small to medium businesses, their businesses are driven by data. Connectivity to that data, availability of the data, integrity of the data, and confidentiality of the data. And so sort of the area of the world that I focus upon is protecting customers' most valuable data assets, now, whether those are on-prem, in the cloud, or in a variety of modalities, and ensuring that those assets are protected and isolated from the attack surface, and then ability to recover those critical assets quickly so they can resume business operations. That's really the area that I work in. Now, that data, as you pointed out, it could start on-prem. It could live in multicloud. It can live in a hybrid environment. The key is really to understand that not all data is created equally. If you were to have a widespread cyber attack, really the key is to bring up those critical applications systems and data sets first to return to business operations. >> Yeah, it's funny-- >> Peter: It's really challenging >> You know, it's not funny, it's actually just ironic, but it's really kind of indicative of the society now is that EMC was bought by Dell Storage and the idea of disruption has always been a storage concept. We don't want a lot of disruption when we're doing things, right? >> Peter: None, we can't, yeah. >> So whether it's backup and recovery or cyber ransomware, whatever it is, the idea of non-disruptive operations-- >> Absolutely. >> Has been a core tenant. Now, that's obviously the same for cyber, as you can tell. So I got to ask you, what is your definition and view of cyber resilience? Because, well, that's what we're talking about here, cyber resilience. What's your view on that? >> So when we started developing our cyber recovery solution about five years ago, we used the NIST cybersecurity framework, which is a very well-known standard that defines really five pillars of how organizations can think about building a cyber resilience strategy. A cyber resilience strategy really encompasses everything from perimeter threat detection and response all the way through incident response after an attack and everything that happens in between, protecting the data and recovering the data, right? And critical systems. So I think of cyber resilience as that holistic strategy of protecting an organization and its data from a cyber attack. >> That's great insight. I want to get your thoughts on how that translates into the ecosystem, because this is an ecosystem around cyber resilience. >> Peter: Absolutely. >> And let's just say, and you may or may not be able to comment on this, but RSA is now being sold. >> Peter: Yeah, no, that's fair. >> So that's going out of the Dell family. But you guys have obviously VMware and Secureworks. But it's not just you guys. It's an ecosystem. >> It really is. >> How does Dell now without, with and without RSA, fit into the ecosystem? >> So as I mentioned, cyber resilience is really thought of as a holistic strategy. RSA and other Dell assets like Carbon Black fit in somewhere in that continuum, right? So RSA is really more on threat detection and response, perimeter protection. The area of the business that I work on, data protection and cyber recovery, really doesn't address the prevention of attacks. We really start with the premise that preventing a cyber attack is not 100% possible. If you believe that, then you need to look at protecting and recovering your assets, right? And so whether it's RSA, whether it's Carbon Black, whether it's Secureworks, which is about cyber incident and response, we really work across those groups. It's about technology, processes, and people. It's not any one thing. We also work outside of the Dell technologies umbrella. So we integrate, our cyber recovery solution is integrated with Unisys Stealth. So there's an example of how we're expanding and extending the cyber recovery solution to bring in other industry standards. >> You know, it's interesting. I talk to a lot of people, like, I'm on theCube here at RSA. Everyone wants better technology, but there's also a shift back to best-of-breed, 'cause you want to have the best new technology, but at the same time, you got to have proven solutions. >> Peter: That's the key. >> So what are you guys selling, what is the best-of-breed from Dell that you guys are delivering to customers? What are some of the areas? >> So I'm old EMC guy myself, right? And back from the days of disaster recovery and business continuity, right? More traditional data protection and backup. The reality is that the modern threats of cyber hackers, breaches, insider attacks, whatever you like, those traditional data protection strategies weren't built to address those types of threats. So along with transformation and modernization, we need to modernize our data protection. That's what cyber recovery is. It's a modern solution to the modern threat. And what it does is it augments your data, excuse me, your disaster recovery and your backup environment with a purpose-built isolated air gap digital vault which is built around our proven Data Domain and PowerProtect DD platforms that have been around for over a decade. But what we've done is added intelligence, analytics, we've hardened that system, and we isolate it so customers can protect really their most valuable assets in that kind of a vault. >> So one of things I've been doing some research on and digging into is cyber resilience, which you just talked about, cyber security, which is the industry trend, and you're getting at cyber recovery, okay? >> Peter: Correct. >> Can you talk about some examples of how this all threads together? What are some real recent wins or examples? >> Sure, sure. So think of cyber recovery as a purpose-built digital vault to secure your most valuable assets. Let me give you an example. One of our customers is a global paint manufacturer, okay? And when we worked with them to try to decide what of their apps and data sets should go into this cyber recovery vault, we said, "What is the most critical intellectual property "that you have?" So in their case, and, you know, some customers might say my Oracle financials or my Office 365 environment. For this customer it was their proprietary paint matching system. So they generate $80 to $100 million every day based upon this proprietary paint matching system which they've developed and which they use every day to run their business. If that application, if those algorithms were destroyed, contaminated, or posted on the public internet somewhere, that would fundamentally change that company. So that's really what we're talking about. We're working with customers to help them identify their most critical assets, data, systems, applications, and isolate those from the threat vector. >> Obviously all verticals are impacted by cyber security. >> Every vertical is data-driven, that's right. >> And so obviously the low-hanging fruit, are they the normal suspects, financial services? Is there a particular one that's hotter than, obviously financial services has got fraud and all that stuff on it, but is that still number one, or-- >> So I think there's two sides to the coin. One, if you look at the traditional enterprise environments, absolutely financial services and healthcare 'cause they're both heavily regulated, therefore that data has very high value and is a very attractive target to the would-be hackers. If you look on the other end of the spectrum, though, the small to medium businesses that all rely on the internet for their business to run, they're the ones that are most susceptible because they don't have the budgets, the infrastructure, or the expertise to protect themselves from a sophisticated hacker. So we work across all verticals. Obviously the government is also very susceptible to cyber threats. But it's every industry, any business that's data-driven. I mean, everyone's been breached so many times, no one even knows how many times. I got to ask you about some cool trends we're reporting on here. Homomorphic encryption is getting a lot of traction here because financial services and healthcare are two-- >> Peter: Homomorphic? >> Homomorphic, yeah. Did I say that right? >> It's the first time I've ever heard that term, John. >> It's encryption at in use. So you have data at rest, data in flight, and data in use. So it's encryption when you're doing all your, protecting all your transactional data. So it's full implementation with Discovery. Intel's promoting it. We discovered a startup that's doing that, as well. >> Peter: Yeah, that's new for me, yeah. >> But it allows for more use cases. But data in use, not just motion, or in-flight, whatever they call it. >> Peter: I get it, yeah, static. >> So that's opening up these other thing. But it brings up the why, why that's important, and the reason is that financial services and healthcare, because they're regulated, have systems that were built many moons ago or generations ago. >> Absolutely. >> So there was none of these problems that you were mentioning earlier, like, they weren't built for that. >> Correct. >> But now you need more data. AI needs sharing of data. Sharing is a huge deal. >> Real-time sharing, too, right? >> Real-time sharing. >> And I think that's where the homomorphic encryption comes in. >> That's exactly right. So you mentioned that. So these industries, how can they maintain their existing operations and then get more data sharing? Do you have any insight into how you see that? Because that's one of those areas that's becoming like, okay, HIPAA, we know why that was built, but it's also restrictive. How do you maintain the purity of a process-- >> If your infrastructure is old? That is a challenge, healthcare especially, because, I mean, if I'm running a health system, every dollar that I have should really go into improving patient care, not necessarily into my IT infrastructure. But the more that every industry moves towards a real-time data-driven model for how we give care, right, the more that companies need to realize that data drives their business. They need to do everything they can to protect it and also ensure that they can recover it when and if a cyber attack happens. >> Well, I really appreciate the insight, and it's going to be great to see Dell Technologies World coming up. We'll dig into a lot of that stuff. While we're here and talking us about some of these financial services, banking, I want to get your thoughts. I've been hearing this term Sheltered Harbor being kicked around. What is that about? What does that mean? >> Sheltered Harbor, you're right, I think you'll hear a lot more about it. So Sheltered Harbor is a financial industries group and it's also a set of best practices and specifications. And really, the purpose of Sheltered Harbor is to protect consumer and financial institutions' data and public confidence in the US financial system. So the use case is this. You can imagine that a bank having a cyber attack and being unable to produce transactions could cause problems for customers of that bank. But just like we were talking about, the interconnectedness of the banking system means that one financial institution failing because of a cyber attack, it could trigger a cascade and a panic and a run on the US financial banks and therefore the global financial system. Sheltered Harbor was developed to really protect public confidence in the financial system by ensuring that banks, brokerages, credit unions are protecting their customer data, their account records, their most valuable assets from cyber attack, and that they can recover them and resume banking operations quickly. >> So this is an industry group? >> It's an industry group. >> Or is it a Dell group or-- >> No, Sheltered Harbor is a US financial industry group. It's a non-profit. You can learn more about it at shelteredharbor.org. The interesting thing for Dell Technologies is we're actually the first member of the Sheltered Harbor solution provider program, and we'll be announcing that shortly, in fact, this week, and we'll have a cyber recovery for Sheltered Harbor solution in the market very shortly. >> Cyber resilience, great topic, and you know, it just goes to show storage is never going away. The basic concepts of IT, recovery, continuous operations, non-disruptive operations. Cloud scale changes the game. >> Peter: It's all about the data. >> It's all about the data. >> Still, yes, sir. >> Thanks for coming on and sharing your insights. >> Thank you, John. >> RSA coverage here, CUBE, day two of three days of coverage. I'm John Furrier here on the ground floor in Moscone in San Francisco. Thanks for watching (electronic music)
SUMMARY :
brought to you by SiliconANGLE Media. It's cloud, it's the edge, the three waves of cloud, and the companies have and confidentiality of the data. and the idea of disruption Now, that's obviously the same and everything that happens in between, into the ecosystem, and you may or may not be So that's going out of the Dell family. and extending the cyber recovery solution but at the same time, The reality is that the modern threats So in their case, and, you know, Obviously all verticals are data-driven, that's right. or the expertise to protect themselves Did I say that right? It's the first time I've So you have data at rest, data But data in use, not just motion, and the reason is that financial that you were mentioning earlier, But now you need more data. the homomorphic encryption comes in. So you mentioned that. the more that companies need to realize and it's going to be great to see So the use case is this. of the Sheltered Harbor and you know, it just goes to show and sharing your insights. I'm John Furrier here on the ground floor
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Pete Gerr | PERSON | 0.99+ |
Peter Gerr | PERSON | 0.99+ |
$80 | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
two sides | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
$100 million | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
30,000 feet | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
shelteredharbor.org | OTHER | 0.99+ |
Unisys Stealth | ORGANIZATION | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
RSA Conference 2020 | EVENT | 0.99+ |
this week | DATE | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
five pillars | QUANTITY | 0.98+ |
Office 365 | TITLE | 0.98+ |
EMC | ORGANIZATION | 0.98+ |
over 20 years | QUANTITY | 0.98+ |
Secureworks | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.97+ |
first time | QUANTITY | 0.97+ |
US | LOCATION | 0.97+ |
Dell Technologies World | ORGANIZATION | 0.97+ |
one | QUANTITY | 0.96+ |
Dell Storage | ORGANIZATION | 0.95+ |
HIPAA | TITLE | 0.95+ |
NIST | ORGANIZATION | 0.95+ |
RSA Conference 2020 San | EVENT | 0.94+ |
this morning | DATE | 0.91+ |
over a decade | QUANTITY | 0.9+ |
one thing | QUANTITY | 0.9+ |
Azure | ORGANIZATION | 0.89+ |
RSAC | ORGANIZATION | 0.84+ |
first member | QUANTITY | 0.84+ |
Black | OTHER | 0.84+ |
first | QUANTITY | 0.83+ |
five years ago | DATE | 0.81+ |
day two | QUANTITY | 0.79+ |
Carbon Black | ORGANIZATION | 0.78+ |
Intel | ORGANIZATION | 0.76+ |
three waves | EVENT | 0.71+ |
Discovery | ORGANIZATION | 0.7+ |
RSA | TITLE | 0.7+ |
Sheltered Harbor | OTHER | 0.68+ |
PowerProtect | ORGANIZATION | 0.65+ |
many moons | DATE | 0.64+ |
Vittorio Viarengo, McAfee | RSAC USA 2020
>> Announcer: Live from San Francisco, it's theCUBE covering RSA Conference 2020, San Francisco. Brought to you by SiliconANGLE Media. >> Welcome back everybody, Jeff Frick with theCUBE. We're at RSA 2020. It's day four, it's Thursday. This is a crazy long conference, 40,000 people. Even with the challenges presented by coronavirus, and there's a lot of weird stuff going on, the team pulled it together, they went forward. And even though there was drops out here and there, I think all in all, most people will tell you, it's been a pretty successful conference. And we're excited to be joined by really one of the top level sponsors here, that's still here and still doing good things. It's Vittorio Viare... Viarengo, sorry, the new interim CMO of McAfee. >> Yeah. >> Vittorio, I just call you Vittorio all the time. I never look past your first name. Great to see you. >> Likewise. It's always a pleasure to be here with an institution of Silicon Valley-- >> Oh thank you, thank you. So interim CMO, I always think of like interim football coaches that they get pulled in halfway through the season, so the good news is you kind of got the job and all the responsibilities. The bad news is, you still have that interim thing, but you don't care, you just go to work, right? >> Now whenever you have an interim job, you have to just do the job and then that's the best way to operate. >> Yeah, so again, I couldn't help but go back and look at that conversation that we had at Xerox Parc, which is interesting. That's pretty foundational, everything that happens in Silicon Valley, and so many discoveries up there. And you touched on some really key themes in the way you manage your teams, but I think they're really much more valuable, and worth bringing back up again. And the context was using scrum as a way to manage people, but more importantly, what you said is it forced you as a leader to set first priorities and have great communication; and to continually do that on this two week pace, to keep everybody moving down the road. I think that is so powerful and so lacking unfortunately, in a lot of organizations today. >> Yeah, look, I think that when you hire smart people, if you just make sure that they understand what their priorities are, and then remove the obstacle and get out of the way, magical things happen. And I give you example that is very close to your heart. When I took over a great team at Skyhigh, that got bought by McAfee, they had content marketing down to a science, but they were lacking videos. So I brought that in. I said, "Guys, people watch videos, "people engage with videos, "we need to start telling the story through videos." And I started pushing, pushing, pushing, and then I pulled back, and these guys took it to a whole new level. And then they're doing videos, they're very creative, they are crisp. And I'm like, "Yeah, my job is done." >> It is really wild how video has become such an important way for education. I mean it used to be... I remember the first time I ever saw an engineer use Google to answer a question on writing code. I had never seen that before. I'm not a coder. Wow, I thought it was just for finding my local store or whatever. And now to see what really... I think YouTube has pushed people to expect that the answer to any question should be in a video. >> So, yesterday literally, somebody from a company I don't even know stopped me and said, "I watch you to videos on container. "Thank you very much." I was like, "What, you?" And the genesis of that was the sales people ask me, "Hey, we're selling container security and all that," but I don't even understand what containers are. Okay, sure. So I shot a video and I'm the CMO, I was the vice president. I think you have to put your face on your content. It doesn't matter how senior you are, you're not in a corner office, you're down there with the team. So I got into the studio, based on my background at VMware, I knew virtual machine, and I said, "Okay, how do you explain this "to somebody who's not technical?" And next thing you know, it makes its way out there, not just to our sales force, but to the market at large. That's fantastic. >> Right, and let me ask you to follow up on that because it seems like the world is very divergent as to those who kind of want their face, and more their personality to be part of their business culture and their business messaging, and those that don't. And you know, as part of our process, we always are looking at people's LinkedIn, and looking at people's Twitter. I get when people don't have Twitter, but it really surprises me when professionals, senior professionals within the industry aren't on LinkedIn. And is just like, wow! That is such a different kind of world. >> LinkedIn right now is... and I'm stealing this from Gary on the Chuck, as a big believer in this. LinkedIn right now is like Facebook 10 years ago. You get amazing organic distribution, and it's a crime not to use it. And the other thing is if you don't use it, how are you going to inspire your team to do the right thing? Modern marketing is all about organic distribution with a great content. If you're not doing it yourself... I grew up in a bakery. I used to look at my mom, we have a big bakery. We had eight people working, and I said, "Ma, why are you workin' so hard? "Your first day, last hour?" And she said, "Look, you cannot ask your people, "to work harder than you do." That was an amazing lesson. So it's not just about working hard, and harder than your team, it's about are you walking the walk? Are you doing the content? Are you doing the modern marketing things that work today, if you expect your people to also do it? >> Yeah, it's just funny 'cause, when we talk to them, I'm like, "If you don't even have a LinkedIn account, "we shouldn't even be talking to you "because you just won't get what we do. "You won't see the value, you won't understand it "and if you're not engaging at least "a little bit in the world then..." And then you look at people say like Michael Dell, I'll pick on or Pat Gelsinger who use social media, and put their personalities out there. And I think it's, people want to know who these people are, they want to do business with people that they they like, right? >> Absolutely. You know what's the worst to me? I can tell when an executive as somebody else manages their account, I can tell from a mile away. That's the other thing. You have to be genuine. You have to be who you are on your social and all your communication because people resonate with that, right? >> Right. All right, so what are you doing now? You got your new title, you've got some new power, you've got a great brand, leading brand in the industry, been around for a while, what are some of your new priorities? What's some of the energy that you're bringing in and where you want to to go with this thing? >> Well, my biggest priority right now is to get the brand and our marketing to catch up with what the products and the customers are already which is, Cloud, Cloud, Cloud. So when we spun off from Intel two years ago, we had this amazing heritage in the endpoint security. And then we bought Skyhigh, and Skyhigh was transformational for us because it became the foundation for us to move to become a cloud-first organization. And is in the process of becoming a cloud-first organization, and creating a business that is growing really fast. We also brought along the endpoint, which now is all delivered from the Cloud, to the cloud-first open unified approach, which is exciting. >> And we see Edge is just an extension of endpoints, I would assume. It just changes the game. >> Yeah, so if you think about today modern work gets done with the backend in the Cloud, and accessing those backends from the device, right? >> Right. >> And so, our strategy is to secure data where modern work gets done, and it's in the device, in the Cloud, and on the edge. Because data moves in and out of the Cloud, and that's kind of the edge of the Cloud. That's what we launched this week at RSA we launched Unified Cloud Edge, which is our kind of a, Gartner call's it SaaS-y, so that we are kind of the security. We believe we have the most complete and unified security part of the SaaS-y world. >> Okay, I just laugh at Gartner and the trough of disillusion men and Jeff and I always go back to a Mars law. Mar does not get enough credit for a Mars law. We've got a lot of laws, but Mars law, we tend to overestimate in the short term, the impact of these technologies, and they completely underestimate really the long tail of this technology improvements, and we see it here. So let's shift gears a little bit. When you have your customers coming in here, and they walk into RSA for the first time, how do you tell people to navigate this crazy show and the 5,000 vendors and the more kind of solutions and spin vocabulary, then is probably save for anyone to consume over three days? >> Look, security is tough because you look around and say, "You have six, 700 vendors here." It's hard to stand out from the crowd. So what I tell our customers is use this as a way to meet with your strategic vendors in the booth upstairs. That's where you conduct business and all that. And I walk around to see from the ground up, send your more junior team out there to see what's happening because some of these smaller companies that are out here will be the big transformational companies or the future like Skyhigh was three four years ago, and now we're part of McAfee, and leading the charge there. >> Yeah, just how do you find the diamond in the rough, right? >> Yeah. >> 'Cause there's just so much. But it's still the little guys that are often on the leading edge and the bleeding edge, of the innovation so you want to know what's going on so that you're kind of walking into the back corners of the floor as well. >> That's why I am lifelong learner, so I go around to see what people do from a marketing perspective because, the last thing I want to do, I want to become obsolete. (Jeff laughs) And the way you don't become obsolete is to see what the new kids on the block do and steal their ideas, steal their tactics take them to the next level. >> Right, so I want to ask you a sensitive question about the conference itself and the coronavirus thing and we all saw what happened in Mobile World Congress. I guess it just got announced today that Facebook pulled F8, their developer conference. We're in the conference business. You go to a lot of conferences. Did you have some thought process? There were some big sponsors that pulled out of this thing. How did you guys kind of approach the situation? >> It's a tough one. >> It's a really tough one. >> It's a very tough one 'cause last thing you want to do is to put your employees and your customers at risk. But the way we looked at it was there were zero cases of coronavirus in San Francisco. And we saw what the rest of the industry was doing, and we made the call to come here, give good advice to our employees, wash their hands, and usual and this too will pass. >> Yeah, yeah. Well Vittorio, it's always great to catch up with you. >> Likewise. >> I just loved the energy, and congratulations. I know you'll do good things, and I wouldn't be at all surprised if that interim title fades away like we see with most great coaches. >> Good. >> So thanks for stopping by. >> My pleasure. >> All right, he's Vittorio, I'm Jeff. You're watching theCUBE, we're at RSA 2020 in San Francisco. Thanks for watching, we'll see you next time. (upbeat music)
SUMMARY :
Brought to you by SiliconANGLE Media. and there's a lot of weird stuff going on, Vittorio, I just call you It's always a pleasure to be here so the good news is you kind of got the job you have to just do the job in the way you manage your teams, And I give you example that is very close to your heart. that the answer to any question should be in a video. I think you have to put your face on your content. Right, and let me ask you to follow up on that And the other thing is if you don't use it, "we shouldn't even be talking to you You have to be who you are and where you want to to go with this thing? and our marketing to catch up with what the products It just changes the game. and it's in the device, in the Cloud, and on the edge. security part of the SaaS-y world. and the 5,000 vendors and the more kind of solutions That's where you conduct business and all that. and the bleeding edge, of the innovation And the way you don't become obsolete is to see and we all saw what happened in Mobile World Congress. 'cause last thing you want to do Well Vittorio, it's always great to catch up with you. I just loved the energy, Thanks for watching, we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Frick | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
YouTube | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
Vittorio | PERSON | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Skyhigh | ORGANIZATION | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Thursday | DATE | 0.99+ |
Vittorio Viarengo | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
Gary | PERSON | 0.99+ |
two week | QUANTITY | 0.99+ |
40,000 people | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
RSA Conference 2020 | EVENT | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
eight people | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
Mobile World Congress | EVENT | 0.99+ |
six, 700 vendors | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
SiliconANGLE Media | ORGANIZATION | 0.98+ |
RSA 2020 | EVENT | 0.98+ |
first day | QUANTITY | 0.98+ |
10 years ago | DATE | 0.98+ |
5,000 vendors | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
over three days | QUANTITY | 0.97+ |
coronavirus | OTHER | 0.97+ |
Viarengo | PERSON | 0.97+ |
one | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
two years ago | DATE | 0.96+ |
VMware | ORGANIZATION | 0.96+ |
ORGANIZATION | 0.95+ | |
ORGANIZATION | 0.94+ | |
theCUBE | ORGANIZATION | 0.93+ |
three four years ago | DATE | 0.91+ |
Mar | ORGANIZATION | 0.91+ |
zero cases | QUANTITY | 0.89+ |
Xerox Parc | ORGANIZATION | 0.84+ |
first name | QUANTITY | 0.83+ |
Mars | LOCATION | 0.79+ |
Vittorio Viare | PERSON | 0.79+ |
RSAC USA 2020 | ORGANIZATION | 0.78+ |
Cloud Edge | TITLE | 0.77+ |
day four | QUANTITY | 0.76+ |
first organization | QUANTITY | 0.72+ |
a mile | QUANTITY | 0.64+ |
RSA | TITLE | 0.63+ |
F8 | COMMERCIAL_ITEM | 0.62+ |
Chuck | PERSON | 0.54+ |
level | QUANTITY | 0.52+ |
McAfee | PERSON | 0.49+ |
Edge | TITLE | 0.44+ |
Mars | TITLE | 0.43+ |
Stephen Chin, JFrog | RSAC USA 2020
>> Narrator: Live from San Francisco, it's theCube covering RSA Conference 2020 San Francisco brought to you by Silicon Angle Media. >> Hey welcome back here ready Jeff Frick here with theCube. We're at the RSA Conference downtown San Francisco, about 40,000 people In the year we're going to know everything with the benefit of fine sight. It's not really working out that way. So we're still going out to the events, getting the smartest people we can find, bringing them to you. We're excited to have our very next guest. He's Steve Chin, the senior director of developer relations for JFrog. Steve, great to meet you. >> Thanks very much for having me here at the conference. >> Absolutely so for people that don't know JFrog, give him kind of the one on one. >> So I think the simplest way to describe our company is where the database of DevOps >> The database of DevOps. (laughs) I don't know that that would be the simplest way, >> But basically when companies want to deliver software faster, when they're looking at how to speed up their feature development, how to respond quicker to security, we provide a end-to-end DevOps platform, the JFrog platform, which accomplishes this for companies. >> Okay so a lot of people know about DevOps. A lot of people have experienced with rapid iteration on their apps. I don't know why they have to keep uploading updates all the time. There's a ton of great benefits to that and this really revolutionize the software industry. That said, the other kind of theme here at RSA and a lot of the security conferences is you can no longer bolt security on. It can no longer be a moat around the castle. It can no longer be a firewall on the edge of the network that it has to be baked in all the way through the product. And that goes right back to kind of what you guys do. And on the DevOps, how do devs who didn't necessarily get trained on security don't necessarily want to know about security and probably would prefer not to have to deal they probably liked the better when they could just push it off, but kind of like they used to push it off to prod. That's not the way anymore they have to bake it in. So how do you help them do that? What do you kind of see in terms of trends in the space? >> Yeah, so I think what we're seeing in the industry is that companies want to deliver, they need to deliver software more quickly and more rapidly. Just based on user requirements. So if you think about your phone, your car, like pretty much everything is updating constantly and it's not even a choice anymore. Updates get pushed to you because you need new features. You also need security fixes for things. And this is happening weekly, daily, hourly. As new threats are exposed and for companies, the standard processes which might have been used in the past to type security or reviews to run a complicated scanners to have like different checkpoints that doesn't work in an environment where you're continuously deploying. And really if you think about it, the only way you can accomplish rapid iteration, high security is to be doing security scanning as a part of your workflow. As a part of your DevOps workflow and shifting left. So going towards the developers and giving them more tools, which give them information about potential security risks. So as an example, developers code and an IDE or some sort of visual environment. And if you can present the information up front right there and tell them, "Hey, this open source library "you're using it has a security vulnerability, "there's a new version you should upgrade." Or "Hey this component that has an incompatible license. "Like this doesn't meet our security requirements." Those sort of things if they're caught while you're developing new features, it saves time and money there. But it delays potential slippage, risks, pushback from the security team at the other end. The next step is when they check in code or when they're executing a build. You want to be scanning up front scan the bills, scan the binary's really far up the chain. And that way you're catching security vulnerabilities during the iterative development process. By the time you get to like QA to stage to production, security vulnerabilities shouldn't be a surprise. They should be something which the teams up front know about. They're addressing and you're using tools which are designed in that workflow to really give early, often feedback to the teams up the chain and see it's the only way like all the large companies doing continuous deployments. This is how you have to approach it. You use multiple techniques, you use binary scatters, you use source code scanners even runtime scanners and you make sure you shift as much left as possible, which is exactly what the JFrog platform enables development teams to do. >> So what percentage roughly is just making sure you've got the first thing that you described that you've got the right libraries that you're using the right tools that have already gone through some security protocol check versus just writing in a bad sequence of steps or that API call or opening up some hole via just bad code choices. Yeah so I think increasingly as companies depends more on third party libraries, open source libraries. if you think about your average application, you're bundling in hundreds of different components and libraries which you have relatively little control over. And a simple way to look at this as if you created a Docker container today, you loaded up with a bunch of DB and packages, maybe a few application bundles within a few days, at the end of a month, that will be full of security vulnerabilities. So that container you build one month ago, it will be full which is outdated. You'll have hundreds of security vulnerabilities >> Just because validated patches or because people see it in attacking? >> Well the thing is you constantly have folks releasing new software, identifying vulnerability risks, patching those risks. And if you don't stay current, if you're not constantly updating your software to stay up with the latest security patches, you're putting your customers and your own business at risk. So I think today that is the number one issue with software is we all depend on open source libraries and components which are used by a lot of companies are constantly being improved and then patched. And the most important thing is knowing when their security vulnerability is identifying the risk of how those impact your customers and then patching as quickly as possible. >> And then the other piece of it is just API is to lots of other people, software that I don't necessarily have access to rights to. So the fact that so much of this stuff is all tied together. Now an attendant just opens up kind of a whole another layer of a potential attack surface. So have you seen things change in kind of IOT as kind of OT and IT come together with IOT and a lot of those OT devices, we're not necessarily set up for patching, they weren't necessarily set up with easy to get into operating systems or maybe too easy to get into operating systems. How are you seeing kind of all the growth that's happening there impact this conversation? >> Yeah, so I think especially with edge devices, I think what we've realized is that edge devices which aren't being updated or insecurity devices. So if you don't have a plan for how you update a new patch and you address security vulnerabilities in your edge devices, they're subject to the same risks. If they're running a variant of Linux, then they're running open source software. They're running a bunch of libraries. If they're on the network, they're open to network attacks. And we have even more complicated edge devices rolling around the roads now. There were some critical security patches and several of the self driving cars with braking systems, with obstacle avoidance systems. So if you don't have an aggressive plan on how you're patching your edge devices you reached the same sort of challenge. And what that involves again is identifying what libraries and components you depend upon, assessing the security risks, which those pose and then having a distribution plan. How do you go from your systems through builds, through deployments and then do the edge distribution to all the devices to get critical security updates to your end users as quickly as possible. >> I'm just curious who do you see on the teams that ultimately has responsibility that this is ready to go or not go. 'Cause we've seen too many instances of stuff that gets shipped that's not ready to go. I can certainly see the pressure to get stuff shipped and somebody says, well, that's okay, we'll just get that patch out. We'll get that patch out next week or we'll get that patch out sometime down the road. And we've seen a ton of things go out that are super easily hacked children's toys and some of these things that have all kinds of really bad implications to it. Is there somebody usually on the team that's, that needs to give the stamp of approval? Is it more of kind of a broad? >> Yes I think the traditional approach is having somebody within the company responsible for security, but increasingly to effectively address security, it needs to be the ownership of the whole team from end to end to make it successful. So the more the security team can be an ally of the QA team of the development team, of the DevOps team rather than being the gatekeeper, they want to be the ally of those teams. Then the more successful it is. So arming the other teams in your company with knowledge about security risks, arming with tools which provide visibility into different security vulnerabilities. That's the way which you have a end-to-end secure product because when you get to the release, if the security team holds up the release, you're either making a bad decision or a bad decision. Catching it up front. When you're building features, then you actually can address it and build the right security into your product, which is much better for your customers and your company. >> Well, Steve, interesting conversation, interesting times. The DevOps and the rapid deploy is certainly the way it is that we're here. So being able to effectively bake that security is only a good thing, but really a necessary thing. >> Well, this was great chatting with you and the conference here is great to see all of these folks focused on improving security and taking us to the next generation with more secure edge devices. >> I don't think there'll be any shortage of need for security professionals anytime soon. All right well thanks again Steve. >> All right, thank you. All right Steve, I'm Jeff Frick. You're watching theCube. We're at the RSA Conference in downtown San Francisco. Thanks for watching. We'll see you next time. (upbeat music)
SUMMARY :
brought to you by Silicon Angle Media. We're at the RSA Conference downtown San Francisco, give him kind of the one on one. I don't know that that would be the simplest way, the JFrog platform, which accomplishes this for companies. and a lot of the security conferences is you can no longer By the time you get to like QA to stage to production, So that container you build one month ago, Well the thing is you constantly have folks releasing So the fact that so much of this stuff is all tied together. So if you don't have a plan for how you update a new patch I can certainly see the pressure to get stuff shipped That's the way which you have a end-to-end secure product The DevOps and the rapid deploy is certainly the way and the conference here is great to see all of these folks I don't think there'll be any shortage of need We're at the RSA Conference in downtown San Francisco.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Steve Chin | PERSON | 0.99+ |
Steve | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Stephen Chin | PERSON | 0.99+ |
Silicon Angle Media | ORGANIZATION | 0.99+ |
next week | DATE | 0.99+ |
Linux | TITLE | 0.99+ |
one month ago | DATE | 0.98+ |
San Francisco | LOCATION | 0.98+ |
hundreds | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
RSA | ORGANIZATION | 0.98+ |
JFrog | PERSON | 0.97+ |
JFrog | TITLE | 0.96+ |
about 40,000 people | QUANTITY | 0.96+ |
RSA Conference | EVENT | 0.95+ |
Francisco | LOCATION | 0.95+ |
USA | LOCATION | 0.94+ |
DevOps | TITLE | 0.94+ |
RSAC | ORGANIZATION | 0.93+ |
theCube | ORGANIZATION | 0.89+ |
JFrog | ORGANIZATION | 0.85+ |
RSA Conference 2020 San | EVENT | 0.85+ |
DevOps | ORGANIZATION | 0.83+ |
hundreds of security vulnerabilities | QUANTITY | 0.82+ |
different components | QUANTITY | 0.66+ |
number one issue | QUANTITY | 0.65+ |
a month | QUANTITY | 0.65+ |
days | QUANTITY | 0.63+ |
2020 | DATE | 0.59+ |
Narrator | TITLE | 0.51+ |
ton | QUANTITY | 0.5+ |
Rose Ross, Tech Trailblazer | RSAC USA 2020
>> Narrator: Live from San Francisco. It's theCUBE. Covering RSA conference 2020 San Francisco. Brought to you by SiliconANGLE Media. (upbeat music) >> Hey, welcome back, everybody. Jeff Rick here with theCUBE. We're at RSA 2020, Moscone and beautiful San Francisco's day four I think Thursday already. This is a crazy conference Monday, Tuesday, Wednesday, Thursday, and Friday. I don't think we'll be here for tomorrow. It's been a pretty full slate. As it is, we're excited to have our next guest. She is Rose Ross, the founder and chief trailblazer, for Tech Trailblazers. Rose. Great to meet you. >> It's great to be here too. >> Absolutely. So what are the Tech Trailblazers? >> So the Tech Trailblazers are an awards lead platform, which recognizes the creme de la creme of the enterprise Tech startup landscape. >> Jeff: Okay. >> So we cover the categories from AI through to storage, but obviously security is a big part of that and we find that security and cloud are usually our most popular awards to be entered into. >> Okay, and I assume you're, really recognizing the individuals more than the companies, >> We do both. >> Or is it more of the companies? You do both. >> We do the Tech category so they can compare like for like apples with apples, pears with pears, security startups with security startups. And then we also acknowledge and recognize some of the key players in those startups. So we have a female trailblazers and a male trailblazer each year . >> Okay, and how long have you been doing this? >> This is our eighth edition. >> The eighth edition. >> Started for a while. 2012 was our first outing. >> Okay, And you said you just gave out this year's Awards on Monday? >> That's right. We announced it. Yeah, day one of RSA. >> Right, so give us some of the highlights. Who were some of the special people that you called out this year? >> Some of the special people, I actually sat down with one of the special people just now interviewed CEO of Shift-left who is our security trailblazer this year. Manish Gupta and yeah, we spent some time chatting about his journey and his challenges and his successes. And finding out more about the technology itself. So. >> And so what are the criteria to win? >> So we kind of look at a number of elements. We have an independent body of judges who are from the analyst community, from the blogger community from industry itself. So we have CSOs, CIOs, and just people who understand the Technology really, at both the technical level and what is needed by the marketplace. So we look at a number of things. One is obviously innovation. If you're looking at the startup world, you want to look at people who are bringing new and exciting things that are needed by companies, to either secure them or store their data or analyze their data. But we also look at how they're doing in the market. So, we'll be looking at what their go to market strategy is, how they're engaging with the end user community, that type of stuff. >> Okay. And at what stage in their growth are they generally you know, kind of coming into your radar? >> So we sort of do the cutoff for a start up as being having not celebrated their sixth birthday yet. >> Six birthday okay. >> Right, so and have not gone beyond Series C funding. >> Okay. >> So you wanted to keep it on the the newer end of the startup spectrum. We also have a special award for those that have not received any VC funding whatsoever. So they're either growing organically or privately funded. That could be seed capital, you know, crowdfunding, whatever that might be. And they have to be two years or younger, and they are all fire starters. >> And those are fire starters. So those are probably it's just really a function of life, 'cause I would imagine the vast majority of the companies that you recognize, eventually get VC funding if you're playing in this crazy technology space. >> It certainly helps to get to where you want to go. Accelerate, put a bit more fuel in the tank. >> So you also announced in your press release the incredible amount of money (laughs) your award winners have raised over time. Do you tell us a little bit more about that? >> Well, yeah, with RSA this week, we thought it'd be a great time to reflect back on what our security trailblazers had done over these eight editions. And obviously, it's a little bit early for expecting additional fundraising from Shift-left, 'cause they literally got the award on Monday. >> Great. >> But hopefully, if you look at the history of it all, we look at the people who've received the accolade over the last eight editions, nearly all of them have been within their first two years. Most of them have done at least one round of funding, but have usually gone on to do another significant round of funding within 12 months of having one, we'd love to take all the credit for that, but I think you really need to put that on the team. >> Jeff: Right. >> And acquisitions have also been quite prevalent. So we looked at the numbers just before RSA, and it was 72 722 million of the disclosed raised, and just in the security, >> Right. >> Space. Unfortunately, or very fortunately for one of our winners, ZeroFOX, they just peeped in with raising 74 million last Friday, which we didn't include. So if we put the undisclosed it would definitely over 800 million now. So well done to the ZeroFOX guys. >> Right, so how did you get involved in this? >> It was an idea that I had. My my other life is a Tech PR person. And we were working on a campaign for a show somewhat like RSA in the UK. And we thought it would be a great idea to run a startup competition to highlight some new entrants to the market. Unfortunately, they didn't think it was a fit for what they wanted to do, but it was such a compelling idea. I've worked with startups all my life and one of the challenges was always with them, particularly in the early stages to get recognition and to get coverage. So we thought we can do something about this. And I thought, well, nobody's going to listen to a PR person. They aren't interested in what I think. I'm not an expert on who's great in this space. So I spoke to Joe Bagley, who's the CTO of Amir for VMware, who's somebody I've worked with a lot over the years. And I said, Look, Joe, if I run something like this, would you come on board as a judge? And he said, Absolutely, I think it's a brilliant idea. And luckily, many other amazing judges has followed in his footsteps. So it's thanks to them, so. >> How many judges are there? >> We have around 40. I mean, we have a number of what a number of categories. So we want a specialist in those areas. Some cover multiple light cloud and security or Cloud and Storage. But obviously, when you look at AI and blockchain and all these other categories, you need people who really understand that space. >> And what's the process kind of how big is the top of the funnel when he started? And then how do you kind of whittle it down to the end when you said 1212 categories, so 12 winners per year about? >> Yeah. So we started off as obviously people enter usually through their PR team or their marketing team, or pull together the information that we request, which is quite a lengthy process, it's a big commitment of time. But not huge, but we do want to get to a certain amount of detail, to make a decision and give the judges something to work with. Then for that period, we then put out the judges to create the shortlist. So they will come back they will score on a number of elements, which are things like innovation and the maturity of the technology, then go to market attractiveness and their own personal view of how exciting and it is intuitive and how trailblazing it actually is. >> Right. >> Then we put it out to a public vote, but also the judges then take the shortlist and take another look at everybody. >> And it gets a public vote too? >> Yes, it does. >> It so does. Do the judges ever meet with the the nominees or is it all done based on the application the application packet that you put together and any other independent information they find on their own? >> Well, we still would encourage. I know the judges do like to reach out to people. And I know that obviously there are relationships because of the nature of the types of judges. >> Jeff: Sure. >> Obviously, we've got people in industry within the vendor community, analysts and bloggers, so they will have people that they know. So I always encourage people, if they say, you know, what would you do? I said, Well, if I was you, I would also reach out to the judges in your area, and just make them aware of who you are. And if they have other questions that they should you know, set up a briefing or something. >> Right. So it's really interesting concept to get the pub into the startup world because it's really, as you know, being in PR, you know, it's really hard to get elevated above the noise, if you will. And you know, we're sitting here surrounded by I don't even know how many thousands of vendors are in this hall. >> The early stage has 51 just as a starter. >> 51 in the early stage expo. >> Yes. >> Which hall is that? >> It's up on the second floor. >> On the second floor. Then there's little like corners of cubbies have of not even 10 by 10s. But you know the kind of the classic kiosks. So, when you're talking to two small companies, regardless of whether they go for the word, what do you tell them as a PR pro? What do you tell them as someone who's, you know, kind of seeing the challenges of trying to raise your profile as a small company? Do you stick to your knitting? Do you in a try to get a high profile? When you know, what are some of the tips and tricks that help little companies rise above the den, if you will, in this great space. >> Validation is always very important. Talk to the influencers in your space, talk to the analysts in your space, the bloggers in your space, and get that feedback and integrate it into your plan of how you create your message. And I think that's one of the hard things, a lot of startups particularly in the technology space, particularly enterprise Tech, they really in the weeds with what's amazing about their products and why they put it together. But you really have to put that into very simple terms. >> Jeff: Right. >> I mean, if you look at someone like RSA, we have got, you know, a lot of buzzwords kicking around here. You do have to try and put that into the deeds and requirements of the end user community. That's always got to be your lens on things >> Right. >> really. >> And you also you always have the vendor viability issues, you know, with your top and even if your Tech relatively inexpensive, maybe as a PLC or this or that, it still takes an investment from your potential customers to put it in and take that risk. And, you know, that's a much bigger hurdle to overcome often than simply the pricing or the structure of the deal. Not a easy, not an easy path. >> It has to be a partnership. I mean, one of the things we were advocating a couple years ago is that the bigger organizations really should have somebody who has a role of being a Chief Collaboration Officer for those smaller companies to engage with them. Because even the procurement process can obviously kill you. >> A little kill a little company, right? Even the pre sales, just having meetings and meetings and meetings and meetings and meetings and meetings to talk about the meetings that you're going to have to maybe eventually (laughs) get to somebody who can make a decision. >> Yeah, Its tough. >> Very cool. >> So, any kind of significant changes in the programme over time? Are you pretty much at the same place you were eight years ago? Or do you see this expanding into different categories? How do you see, you know, kind of the evolution of the Trailblazer? >> Well, we like to review everything and we listened to our judges, we listened to people in the marketplace. I mean, I had a great meeting yesterday with somebody in banking, who works with an awful lot of startups. And there is some really good news coming through that. The enterprise Tech VC community, there's a lot more of an appetite. They're starting to see the value more and more of investing in that type of longer longer term, because you can actually scale beyond where you can do sometimes with a consumer Technology. >> Right >> The potential unicorn sometimes don't quite make it. Those horses aren't always that reliable in the race. >> (laughs) Sometimes too much money is not a good thing that is for sure. >> Yeah. >> Or is good for you? It's a great way I know, I think the kind of the award format is a great way to shine a little bit of extra light on some of these companies that are really struggling to get noticed. It's a really difficult process for a startup, especially in such a deep Technology field. Something is so mission critical that people it's just not that easy for people to give you a try and give you a trial. Takes a lot of investment. So good work and look forward >> Thank you. to continuing to see the winners, raise lots of money and have success. >> Right, absolutely. Thank you, Jeff. >> All right Rose thanks again. She's Rose, I'm Jeff. You're watching theCUBE. We're at RSA 2020. Thanks for watching, we'll see you next time. (upbeat music)
SUMMARY :
Brought to you by SiliconANGLE Media. She is Rose Ross, the founder and chief trailblazer, So what are the Tech Trailblazers? So the Tech Trailblazers are an awards lead platform, So we cover the categories from AI through to storage, Or is it more of the companies? We do the Tech category so they can compare Started for a while. Yeah, day one of RSA. that you called out this year? Some of the special people, I actually sat down So we look at a number of things. are they generally you know, So we sort of do the cutoff for a start up as being having So you wanted to keep it on the the newer end that you recognize, eventually get VC funding It certainly helps to get to where you want to go. So you also announced in your press release we thought it'd be a great time to reflect back on what but I think you really need to put that on the team. and just in the security, So if we put the undisclosed and one of the challenges was always with them, But obviously, when you look at AI and blockchain innovation and the maturity of the technology, but also the judges then take the shortlist the application packet that you put together I know the judges do like to reach out to people. and just make them aware of who you are. into the startup world because it's really, as you know, kind of seeing the challenges of trying to raise your profile of how you create your message. we have got, you know, And you also you always have the vendor viability issues, I mean, one of the things we were advocating Even the pre sales, just having meetings and meetings and we listened to our judges, Those horses aren't always that reliable in the race. that is for sure. it's just not that easy for people to give you a try to continuing to see the winners, Right, absolutely. Thanks for watching, we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rose | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jeff Rick | PERSON | 0.99+ |
Joe Bagley | PERSON | 0.99+ |
Rose Ross | PERSON | 0.99+ |
second floor | QUANTITY | 0.99+ |
12 winners | QUANTITY | 0.99+ |
two years | QUANTITY | 0.99+ |
UK | LOCATION | 0.99+ |
Monday | DATE | 0.99+ |
72 722 million | QUANTITY | 0.99+ |
Joe | PERSON | 0.99+ |
1212 categories | QUANTITY | 0.99+ |
ZeroFOX | ORGANIZATION | 0.99+ |
eighth edition | QUANTITY | 0.99+ |
Friday | DATE | 0.99+ |
74 million | QUANTITY | 0.99+ |
Manish Gupta | PERSON | 0.99+ |
tomorrow | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
first two years | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
sixth birthday | QUANTITY | 0.99+ |
each year | QUANTITY | 0.99+ |
Wednesday | DATE | 0.99+ |
Tuesday | DATE | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
2012 | DATE | 0.99+ |
over 800 million | QUANTITY | 0.99+ |
eight years ago | DATE | 0.99+ |
Thursday | DATE | 0.99+ |
eight editions | QUANTITY | 0.99+ |
last Friday | DATE | 0.99+ |
this year | DATE | 0.98+ |
Tech Trailblazers | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
10s | QUANTITY | 0.98+ |
RSA 2020 | EVENT | 0.98+ |
12 months | QUANTITY | 0.97+ |
Six birthday | QUANTITY | 0.97+ |
RSA | ORGANIZATION | 0.97+ |
Amir | ORGANIZATION | 0.97+ |
thousands | QUANTITY | 0.96+ |
first outing | QUANTITY | 0.96+ |
this week | DATE | 0.96+ |
10 | QUANTITY | 0.95+ |
RSAC | ORGANIZATION | 0.95+ |
Shift | ORGANIZATION | 0.94+ |
two small companies | QUANTITY | 0.94+ |
around 40 | QUANTITY | 0.93+ |
couple years ago | DATE | 0.91+ |
Moscone | LOCATION | 0.91+ |
Series C | OTHER | 0.91+ |
Tech Trailblazer | ORGANIZATION | 0.87+ |
RSA conference 2020 | EVENT | 0.87+ |
left | ORGANIZATION | 0.78+ |
theCUBE | ORGANIZATION | 0.76+ |
one round | QUANTITY | 0.72+ |
51 | QUANTITY | 0.72+ |
2020 | ORGANIZATION | 0.71+ |
CEO | PERSON | 0.69+ |
Trailblazer | ORGANIZATION | 0.64+ |
day one | QUANTITY | 0.61+ |
Oliver Schuermann, Juniper Networks | RSAC USA 2020
>> Announcer: Live from San Francisco, it's theCUBE, covering RSA Conference 2020 San Francisco, brought to you by SiliconANGLE Media. >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We are Thursday, day four of the RSA Show here in Moscone in San Francisco. It's a beautiful day outside, but the show is still going, 40,000-plus people. A couple of challenges with the coronavirus, and some other things going on, but everybody's here, everybody's staying the course, and I think it's really a good message going forward as to what's going to happen in the show season. We go to a lot of shows. Is 2020 the year we're going to know everything with the benefit of hindsight? It's not quite working out so far that way, but we're bringing in the experts to share the knowledge, and we're excited for our next guest, who's going to help us get to know what the answers are. He's Oliver Sherman, senior director, Enterprise Product Marketing for Juniper Networks. Oliver, great to see you. >> Thanks for having me. >> Absolutely, so first off, just general impressions of the show. I'm sure you've been coming here for a little while. >> We have, and I think the show's going very well, as you pointed out, there's a couple of challenges that are around, but I think everybody's staying strong, and pushing through, and really driving the agenda of security. >> So I've got some interesting quotes from you doing a little research for this segment. You said 2019 was the year of enforcement, but 2020 is the year of intelligence. What did you mean by that? >> Specifically, it's around Juniper. We have a Juniper connected security message and strategy that we proved last year by increasing the ability to enforce on all of your infrastructure without having to rip and replace technologies. For instance, on our widely rolled out MX routing platform, we offer second tell to block things like command and control traffic, or on our switching line for campus and data centers, we prevent lateral threat propagation with second tell, allowing you to block hosts as they're infected, and as we rounded that out, and it's a little bit in 2020 we were able to now deliver that on our Mist, or our wireless acquistion that we did last year around this time, so showing the integration of that product portfolio. >> Yeah, we met Bob Friday from Mist. >> Oliver: Excellent. >> He, doing the AI, some of the ethics around AI. >> Oliver: Sure. >> At your guys conference last year. It was pretty interesting conversation. Let's break down what you said a little bit deeper. So you're talking about inside your own product suite, and managing threats across once they get to that level to keep things clean across that first layer of defense. >> Right, well, I mean, whether you're a good packet or a bad packet, you have to traverse the network to be interesting. We've all put our phones in airplane mode at Black Hat or events like that because we don't want anybody on it, but they're really boring when they're offline, but they're also really boring to attackers when they're offline. As soon as you turn them on, you have a problem, or could have a problem, but as things traverse the network, what better place to see who and what's on your network than on the gears, and at the end of the day, we're able to provide that visibility, we're able to provide that enforcement, so as you mentioned, 2020 is now the year of an awareness for us, so the Threat Aware Network. We're able to do things like look at encrypted traffic, do heuristics and analysis to figure out should that even be on my network because as you bring it into a network, and you have to decrypt it, a, there's privacy concerns with that in these times, but also, it's computationally expensive to do that, so it becomes a challenge from both a financial perspective, as well as a compliance perspective, so we're helping solve that so you can offset that traffic, and be able to ensure your network's secure. >> So is that relatively new, and I apologize. I'm not deep into the weeds of feature functionality, but that sounds pretty interesting that you can actually start to do the analysis without encrypting the data, and get some meaningful, insightful information. >> Absolutely, we actually announced it on Monday at 4:45 a.m. Pacific, so it is new. >> Brand new. >> Yes. >> And what's the secret sauce to be able to do that because one would think just by rule encryption would eliminate the ability to really do the analysis, so what analysis can you still do while still keeping the data encrypted? >> You're absolutely right. We're seeing 70 to 80% of internet traffic is now encrypted. Furthermore, bad actors are using that to obfuscate themselves, right, obviously, and then, the magic to that, though, to look at it without having to crack open the package is using things like heuristics that look at connections per second, or connection patterns, or looking at significant exchanges, or even IP addresses to know this is not something you want to let in, and we're seeing a very high rate of success to block things like IoT botnets, for instance, so you'll be seeing more and more of that from us throughout the year, but this is the initial step that we're taking. >> Right, that's great because so much of it it sounds like, a, a lot of it's being generated by machines, but two, it sounds like the profile of the attacks keeps changing quite a bit from a concentrated attacks to more, it sounds like now, everyone's doing the slow creeper to try to get it under the covers. >> Right, and really, you're using your network to your full extent. I mean, a lot of things that we're doing including encrypted traffic analysis is an additional feature on our platform, so that comes with what you already have, so rather than walking in and saying, "Buy my suite of products, this will all" "solve all your problems," as we've done for the past, or as other vendors have done for the past 10, 20 years, and it's never worked. So you why not add things that you already have so you're allowed to amortize your assets, build your best of breed security, and do it within a multi-vendor environment, but also, do it with your infrastructure. >> Right, so I want to shift gears a little bit. Doing some research before you got on, you've always been technical lead. You've been doing technical lead roles. You had a whole bunch of them, and we don't have internet, unfortunately, here, so I can't read them off. >> Oliver: That's fine. >> But now, you've switched over. You've put the marketing hat on. I'm just curious the different, softer, squishy challenge of trying to take the talent that you have, the technical definitions that you have, the detailed compute and stuff you're doing around things like you just described, and now, putting the marketing hat, and trying to get that message out to the market, help people understand what you're trying to do, and break through, quite frankly, some crazy noise that we're sitting here surrounded by hundreds, if not thousands of vendors. >> I think that's really the key, and yes, I've been technical leads. I've run architecture teams. I've run development teams, and really, from a marketing perspective, it's to ensure that we're delivering a message that is, that the market will consume that is actually based in reality. I think a lot of times you see a lot of products that are put together with duct tape, baling twine, et cetera, but then, also have a great Powerpoint that makes it look good, but from a go to market perspective, from whether it's your sellers, meaning the sellers that work for Juniper, whether it's our partners, whether it's our customers, they have to believe in what's out there, and if it's tried and true, and we understand it from an engineering perspective, and we can say it's not a marketing texture, it's a strategy. >> Right. >> That really makes a difference, and we're really seeing that if you look at our year over year growth in security, if you look at what analysts are saying, if you look at what testing houses are saying about our product, that Juniper's back, and that's why I'm in this spot. >> And it really begs to have a deeper relationship with the customer, that you're not selling them a one-off market texture slide. You're not having a quick point solution that's suddenly put together, but really, have this trusted, ongoing relationship that's going to evolve over time. The products are going to evolve over time because the threats are evolving over time, right? >> Absolutely, and to help them get more out of what they already have, and from a go to market perspective, our partners have an addressful market that's naturally through the install base that we have, we're able to provide additional value and services to those customers that may want to lean on a partner to actually build some of these solutions for them. >> All right, well, Oliver, well thanks for stopping by. I'm glad I'm not too late on the encrypted analysis game, so just a couple of days. >> Absolutely. >> Thanks for stopping by. Best to you, and good luck with 2020, the year we'll know everything. >> Absolutely, thanks for having me. >> All right, he's Oliver, I'm Jeff, you're watching theCUBE. We're at RSA 2020 here in Moscone. Thanks for watching. We'll see you next time. (gentle electronic music)
SUMMARY :
brought to you by SiliconANGLE Media. to share the knowledge, and we're excited of the show. as you pointed out, there's a couple of challenges but 2020 is the year of intelligence. by increasing the ability to enforce and managing threats across once they get to that level and be able to ensure your network's secure. but that sounds pretty interesting that you can Absolutely, we actually announced it on Monday to know this is not something you want to let in, from a concentrated attacks to more, it sounds like now, so that comes with what you already have, Doing some research before you got on, the technical definitions that you have, that makes it look good, but from a go to market seeing that if you look at our year over year And it really begs to have a deeper relationship Absolutely, and to help them get more so just a couple of days. Best to you, and good luck with 2020, We'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Frick | PERSON | 0.99+ |
Oliver | PERSON | 0.99+ |
70 | QUANTITY | 0.99+ |
Jeff | PERSON | 0.99+ |
Oliver Sherman | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
last year | DATE | 0.99+ |
Thursday | DATE | 0.99+ |
hundreds | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
Juniper | ORGANIZATION | 0.99+ |
Juniper Networks | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
Black Hat | EVENT | 0.99+ |
San Francisco | LOCATION | 0.98+ |
Bob Friday | PERSON | 0.98+ |
second tell | QUANTITY | 0.98+ |
40,000-plus people | QUANTITY | 0.98+ |
80% | QUANTITY | 0.98+ |
Oliver Schuermann | PERSON | 0.98+ |
both | QUANTITY | 0.97+ |
two | QUANTITY | 0.96+ |
first layer | QUANTITY | 0.96+ |
Monday at 4:45 a.m. Pacific | DATE | 0.96+ |
theCUBE | ORGANIZATION | 0.95+ |
RSA Show | EVENT | 0.94+ |
first | QUANTITY | 0.93+ |
Mist | ORGANIZATION | 0.92+ |
RSA Conference 2020 San Francisco | EVENT | 0.91+ |
day four | QUANTITY | 0.89+ |
Powerpoint | TITLE | 0.87+ |
vendors | QUANTITY | 0.77+ |
20 years | QUANTITY | 0.73+ |
RSAC USA 2020 | ORGANIZATION | 0.73+ |
coronavirus | OTHER | 0.69+ |
second | QUANTITY | 0.65+ |
10 | QUANTITY | 0.63+ |
RSA 2020 | EVENT | 0.52+ |
couple | QUANTITY | 0.5+ |
Oliver Friedrichs, Splunk | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Hey, welcome back everybody. Jeff, Rick here with the cube. We're at the RSA conference in downtown San Francisco at Moscone. It's the fourth day of the show, 40,000 some odd people here. It's all about security. It's the biggest security show in the world despite the fact that there were some challenges with the coronavirus this year and you know, people were kind of wondering how that was going to shake out. There's been a lot of kind of weird stuff going on in the conference scene, but a lot of people got here, a lot of conversations around security and we're really happy to have really a seasoned vet. He's been through this cycle of security a couple of times that you said he's done four different startups. We're happy to have him as all of our Fredericks, the VP security product. That's blown. Good to see all of her. >>Thank you. Great to be here. Absolutely. So let's take a step back. You've been coming to this show for a little while. What's kind of your, your impression of the show? Well, it's really interesting this year, you know, I think it's a, I'd say the energy level is somewhat flat and I think it's a sign of our industry maturing and getting to the point where, you know, you used to see, uh, some pretty big disruption every few years when compute changes the threats or attack surface moves and the threats change with it. But things have been relatively stable. You know, the cloud is really the biggest, most recent, uh, innovation. And so there really hasn't been, I think any massive disruption in our industry for a little bit, but a lot of just continuous iteration and improvement on existing technologies. Right? There's some big ones coming down the pike though, right? >>One of the big ones that's going to have a huge impact is five G and IOT. Uh, suddenly now that you know these things, people think five GC can talk to your mom faster on the phone. That's not what it's about at all, right? It's a speed of machines and the speed in which these transactions are going to be happening. Not to mention all those connected devices, all those new attack surfaces, very, very revolutionary. And yet the theme here is the human elements. So when you think about speed of machines and, and increasing, uh, the kind of frequency of bot attacks, this and that, and yet there's still people that gotta be on the hook and responsible for this stuff. How do you think about it and has you actually use things like AI to help the people fight the machines? Yeah, I know it's a really good question. >>So typically over the years, right, attackers have targeted compute, uh, operating systems, applications, servers, and so on. But we've, we've done a really good job of starting to lock those down, finding those vulnerabilities, patching them, fixing them, you know, that's, it's not a panel, it's, it hasn't been solved, right? That's, it's an ongoing issue. But attackers have moved onto the weakest link, which is people, right? If I can convince you to send me your, you know, your bank account information or that access to your account and wire money out of your account, right? It's a lot easier than having to find a vulnerability in Microsoft windows these days, which used to be pretty easy back 20 years ago. Used to, they're there, they're by the dozens. Right. But, but now they're getting better on the fishing too. And now spear fishing. Right. I, I had a friend in commercial real estate who, who told me this email that he got like from his banker, you know, talking about a transaction with a business associate using vocabulary words that that would normally be used in their exchange to the point where he called the guy and said, did you send this to me? >>Um, so you know, the, the, the, the bad English bad grammar and, and kind of funky word selection isn't necessarily that red flag that it used to be that don't click on here and we're still getting, you know, this, this attacking is happening. So how do, how do people get more sophisticated in light of kind of these more sophisticated attacks on the people? >>Yeah, so I think there's two things. One is, you know, it hidden in there is, and that type of an attack is typically wire instructions, right? If it's, if I'm buying a house, my escrow company or title company is going to send me wire instructions to send the money for the down payment on that house for example. You know, that's, that's been a very, very common attack where, you know, title companies may not be the most sophisticated, like many of the organizations that are here today. Uh, so definitely fall victims. So that's, that's definitely a growing problem and a growing attack surface. We also see, uh, you know, the need for new technologies like natural language understanding, actually understanding the context of the data. Uh, for example, what's the intent behind it? What's the meaning? Sure, it's not going to be misspelled. But can I find other relevant factors or attributes of that email that, uh, point out at red flag or something that I need to be concerned about before I actually click on it or open it or, or act on it? >>Right. So the company that you, uh, led before spunk acquired you, Phantom, you talked a lot about they're trying to help, help to see Sox do a better job, help them kind of filter, filter what they don't need to respond to, prioritize what they need to respond to and then respond quicker when they do. That's right. A little bit more about how that works and what's kind of the impact of having that technology on the front line. >>Yeah, so five years ago, automation and security really didn't exist. Uh, we created a new category called soar security, orchestration, automation and response. And, uh, it's a technology that allows you to automate what a SOC analyst would typically do by hand. So typically, you know, if an analyst is looking at an event, uh, it would take them 10 minutes, best best-case, 11 hours, worst-case, to analyze that and do all the work that they need to do to triage it. By automating, we're able to reduce that down to a best case of one second, worst case of 10 minutes using automated playbooks. So we're able to get a, uh, a massive performance improvement by automating, by creating a playbook of those rout routine things that an analyst would do by hand. And that frees up the analyst to do more proactive, higher order activities, things that actually require the human thought versus the repetitive work which we're very happy about. >>And are most of those types of, of of uh, processes that you automated? Just check, just to get, you know, kind of checking boxes if you will, almost like a pre-flight to make sure that you kind of have the simple things covered or you know, what are some of the activities that you've been able to automate? >>Yeah, so it's interesting these, these platforms have become very flexible and multipurpose. So today we integrate with over 300 different security vendors that are on the showroom floor here today to let you automate in those products. So the typical large enterprise has maybe 60 70 security products that they're all managing from a browser tab or a different login. What soar platforms do is they tie those together and allow you to manage those products very rapidly. In the case of an event. So for example, you know, if I have a, a, a phishing email, I can take the attachment detonated in a sandbox from any of the sandbox vendors here on the showroom floor. Look it up in my reputation service like my virus total reversing labs for example, look it up on my EDR product on the endpoint to see do any of my endpoints actually have this file. And then I could take remediate, remediate of action and actually block the user, take the endpoint off the network using a Nack product that's here, uh, and so on, or block it on the firewall. So there's many different types of scenarios. >>It's that whole chain that you just described potentially would be something that you build into this playbook and have that happen automatically. Yes. Oh, that's a huge time saver. Huge time saver. So as you look forward, kind of at the power of AI, right? It's good news, bad news, right? Good news. You're going to have a lot more horsepower and computational wizardry at your fingertips. Bad news is the bad guys are also going to have a lot more computational power and wizardry at the end of their fingertips. So how do you, you know, kind of see the battle continuing to play out? Where do you really see great opportunities with, with this evolving AI to do things that you just couldn't do before? >>Yeah, look, I at attackers have been using automation and AI against us for, for many years now. So we're just starting to catch up and use it effectively to defend ourselves. Uh, you know, it'll be very interesting to see where this goes. I don't know if I can predict, but imagine machines fighting machines just like in real life and robotics and so on. In real physical kinetic warfare. Imagine the same thing happening in cyber here is entirely conceivable, but I don't think we're quite there yet. I mean, we obviously see botnets and other automated attacks that are already very rampant and then automated countermeasures that are there as well. So it'd be very interesting to even have, you know, maybe one year here we'll have uh, you know, robot Wars for cyber and have, you know, technologies battle each other to see who your >>wins. But what's crazy is as much as the bots are fighting the bots, you know, we have, uh, people in like Rachel tow back, we fed on a couple of times. She's, she does social hacking and uh, and she's basically a hundred percent, uh, successful in just calling people on the phone and giving them to provide her the details. So it still is going to keep the people in the loop. We're still going to have to, you know, make sure that they're not the weakest link. Absolutely. Yeah. All right, good. So final thoughts as you ahead into 20, 20 the year, we're going to know everything with the benefit of hindsight. Well, look, I think one thing we're seeing, there's so many vendors here, uh, things are coming together. Again, our customers are looking to consolidate, they're looking to reduce. And one thing that we're very heavily focused on at Splunk is creating a single work surface for analysts. So they don't have to deal with dozens of different consoles. Right. We're very, very focused on that. Working 70 tabs to work process is not a, not very efficient. So ideal. No. All right. All over. Well, thanks for, uh, for taking a few minutes to stop and buy and a continued success for you and Splunk. Thank you. Alrighty. He's all around. Jeff, you're watching the cube. We're an RSA 2020 and downtown San Francisco. Thanks for watching. See you next time.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon this year and you know, people were kind of wondering how that was going to shake out. maturing and getting to the point where, you know, you used to see, uh, some pretty big disruption every few years One of the big ones that's going to have a huge impact is five G and IOT. fixing them, you know, that's, it's not a panel, it's, it hasn't been solved, right? click on here and we're still getting, you know, this, this attacking is happening. We also see, uh, you know, the need for new technologies like natural language understanding, So the company that you, uh, led before spunk acquired you, Phantom, you know, if an analyst is looking at an event, uh, it would take them 10 minutes, best best-case, So for example, you know, if I have a, a, a phishing email, I can take the attachment detonated So as you look forward, kind of at the power of AI, right? you know, technologies battle each other to see who your We're still going to have to, you know, make sure that they're not the weakest link.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
10 minutes | QUANTITY | 0.99+ |
11 hours | QUANTITY | 0.99+ |
Oliver Friedrichs | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
two things | QUANTITY | 0.99+ |
Rick | PERSON | 0.99+ |
70 tabs | QUANTITY | 0.99+ |
fourth day | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
one second | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
dozens | QUANTITY | 0.99+ |
one year | QUANTITY | 0.99+ |
Rachel | PERSON | 0.99+ |
Splunk | ORGANIZATION | 0.98+ |
Sox | ORGANIZATION | 0.98+ |
Moscone | LOCATION | 0.98+ |
20 | QUANTITY | 0.98+ |
this year | DATE | 0.97+ |
20 years ago | DATE | 0.96+ |
one | QUANTITY | 0.96+ |
over 300 different security vendors | QUANTITY | 0.96+ |
five years ago | DATE | 0.96+ |
RSAC | ORGANIZATION | 0.95+ |
one thing | QUANTITY | 0.93+ |
English | OTHER | 0.93+ |
Silicon angle | ORGANIZATION | 0.92+ |
coronavirus | OTHER | 0.9+ |
hundred percent | QUANTITY | 0.9+ |
60 70 security products | QUANTITY | 0.88+ |
four different startups | QUANTITY | 0.87+ |
SOC | ORGANIZATION | 0.85+ |
Phantom | ORGANIZATION | 0.84+ |
Splunk | PERSON | 0.84+ |
RSA conference | EVENT | 0.79+ |
single work | QUANTITY | 0.78+ |
USA | LOCATION | 0.75+ |
RSA 2020 | COMMERCIAL_ITEM | 0.74+ |
times | QUANTITY | 0.73+ |
windows | TITLE | 0.66+ |
five G | ORGANIZATION | 0.65+ |
40,000 some | QUANTITY | 0.65+ |
lot of people | QUANTITY | 0.6+ |
people | QUANTITY | 0.59+ |
Fredericks | PERSON | 0.54+ |
2020 | DATE | 0.52+ |
consoles | QUANTITY | 0.5+ |
couple | QUANTITY | 0.41+ |
2020 | ORGANIZATION | 0.31+ |
Laurence Pitt, Juniper Networks | RSAC USA 2020
>> Announcer: Live from San Francisco, it's theCUBE, covering RSA conference 2020 San Francisco, brought to you by SiliconANGLE Media. >> Hey, welcome back, everybody. Jeff Frick here with theCUBE. We're at the RSA 2020 show, here in Moscone in San Francisco, it's Thursday, we've been going wall to wall, we're really excited for our next guest. We've been talking about some kind of interesting topics, getting a little bit into the weeds, not on the technology, but some of the philosophical things that are happening in this industry that you should be thinking about. And we're excited welcome, Laurence Pitt, he is the cyber security strategist at Juniper Networks. Laurence, great to meet you. >> Thank you very much, hi. >> Yeah, so before we turn the cameras off, we've been talking about all kinds of fancy things, so let's just jump into it. One of the topics that gets a lot of news is deepfakes, and there's a lot of cute funny things out there of people's voices and things that they're saying not necessarily being where you expect them to be, but there's a real threat here, and a real kind of scary situation that just barely beginning to scratch the surface, I want you to get share some of your thoughts on deepfakes. >> I'm going to think you made a good point at the start. There's a lot of cute and funny stuff out there, there's a lot of fake political stuff you see. So is it seen as being humorous some people are sharing it a lot. But there is a darker side that's going to happen to deepfakes, because a lot of the things that you see today that go out on video, the reason that it is what it is, is because you're very familiar with the person that you're seeing in that video. Is a famous politician, is a movie star, and they're saying something that's out of character or funny and that's it. But what if that was actually the Chief Financial Officer of a major company, where the company appears to have launched a video, very close to the bell ringing on the stock market, that makes some kind of announcement about product or delay or something to do with their quarterly figures or something like that? You know that one minute video, could do a huge amount of damage to that organization. It could that somebody's looking to take advantage of a dip at that point, video goes out, their stocks going to dip, buy it out, then they could profit, but it all could also be much darker. It could be somebody who's trying to do that to actually damage their business. >> So, would you define a very good text base phishing spear phishing as a deepfake, where they've got enough data, where they're, the relevance of the topic is so spot on, the names that are involved in the text are so spot on 'cause they've done their homework, and the transactions that they're suggesting, are really spot on and consistent with the behavior of the things that their target does each and every day. >> So I'm not sure I defined that as a deepfake yet, obviously you've got two types of a phish, you've got a spear phish, which is the the perfected version, the work has gone into target, you as a specific, high value individual for some reason in your organization, but what we are seeing is in the same way that deepfakes are leveraging technology to be able to manipulate somebody, things like the fact that we're all on Instagram, we're all on Facebook, we're all on Twitter, means that social manipulation is a lot easier for the bad guys to be able to create, phishing campaigns that appear to be very much more targeted, they can create emails because they know you've got a dog. They know roughly where you live, because you're this information is coming up in pictures and it's a metro on the internet. And so they can generate automated messaging and emails and things that are going to go out. That will appear to be from whomever you expect to receive it from, using words that you think that only they would know about to make that appear to be more realistic. >> Right. >> And that's actually something, we sort of seen the start of that, but still the thing to spot is that the grammar is very often not very good in these if they haven't perfected the language side of it. >> But that's coming right, but that's coming right. >> But they all getting much more accurate yeah. >> We is an automated transcription service to do all the transcription on these videos. And you know, It's funny you can you can pay for the machine or you can pay for the human, we do both. But it's amazing, even only in the last six months to see the Delta shrink between the machine generated and the person generated. And this is even in, you know, pretty technical stuff that we get in very specific kind of vocabulary around the tech conferences that we cover. And the machines are catching up very, very fast. >> They very much are. but then if you think about, this is not new. What's happened, it's been happening in the background for a while things like quite a lot of legal work is done. If you look at a state agency, for example, conveyancing it's not uncommon for the conveyancing to be done using machine learning and using computer generated documentation because it's within a framework. But of course, the more it does that, the more that it learns. And then that software can more easily be applied to other other areas to be able to do that accurately. >> Right. So another big topic that gets a lot of conversation is passwords. You know, it's been going on forever, and now we're starting to get The two factor authentication, you know, the new Apple phones, you can look at it and identify it, you say now you have kind of biometrics. But that can all be hacked, too, right? It's just a slightly different, a slightly different method. But, you know, even those, the biometric is not at all. >> Well. >> That's secure. >> I think the thing is, you see that when you're logging into something, there's two pieces of information you need. There's there's what you are you as a person and then there's the thing that you know, a lot of people confuse biometrics, thinking of biometric authentication is their password, we're actually the biometric is is the them. And so you still should back things with strong passwords, you still should have that behind it. Because if somebody does get through the biometric that shouldn't automatically just give them access to absolutely everything. It's you know, these are technologies that are provided to make things easier to make it so that you can have less strong passwords so that so that you do know where you're storing information. But People over people tend to rely on them too much, it is still very, very important to use strong passwords to think about the process for how you want to do that. Taking statements and then turning those statements into strange sentences that only you understand maybe having your own code to do that conversion. So that you have a very strong password that nobody's ever going to pick up, right? We know that common passwords, unfortunately, are still 1234567 password, its horrific. >> I know, i saw some article that you're quoted in and it had the worst 25 passwords for 2018 and 2019. And it's basically just pick and pick a string. >> They just don't change. >> But you know, but it's interesting cause, you know, having a hard Prat, you know, it's easy to make, take the time and go ahead and create that, that that strong password. But then, you know, three months later. Salesforce keeps making me do a new one or the bank keeps making me do a new one. What's your opinion in some of these kind of password managers? Because to me, it seems like okay, well, I might be doing a great job creating some crazy passwords for the specific accounts. But what if I could hacked on that thing right now they have everything in the same a single place. >> Yeah. So this is where things like two factor authentication become really, really important. So I use passwords manager. And I've been I'm very, very careful with the how my passwords are created and what goes in there so that i know where certain passwords are created for certain types of account and certain complexities. But I also turned on two factor. And if somebody does try to go into my online password account, I will get an alert to say that they've tried to do that a single failed authentication and I will get an alert to say that they've done it an authentication that happens where I'm not I you know, then I will get a note say I've done that. So this is where there's that second factor actually becomes very important. If you have something that gives you the option to use two factor authentication. Use it. >> Use it. >> You know, it may, you know, we it is a pain when you're trying to do something with your credit card and you have to do One time text. But it'd be more of a pain if you didn't and somebody else was to use it. And to fill it up nicely for you wouldn't right. >> Right. You know, it's funny part of the keynote from Rowan was talking about, you know, as a profession, spending way too much time thinking about the most kind of crazy bizarre, sophisticated attacks. At the at the fault of, you know, not necessarily paying attention to the basics and the basics is where still a lot of the damage was done right. >> You know what? This is the thing and then there's, you know, there's a, there's a few things in our industry. So exactly what you just said. Everybody seems to believe that they're going to be the target of the next really big complex, major attack. The reality is they aren't. And the reality is that they've been hit by the basic slight ransomware, phishing spearphishing credential stuffing all these attacks are hitting them all the time. And so they need to have those foundational elements in place against those understanding what those are and not worry about the big stuff because the reality is if your organization is going to be hit by a nation state level complex attack. Or you can do fight against that as well, it's going to happen. And that's the thing with a lot of the buzzwords that we see in in cyber today as Matt. >> And and with smaller companies SMB's, I mean is really their only solution to go with, you know, cloud providers and other types of organizations and have the resources to get the people and the systems and the processes to really protect them because you can't expect you to just flowers down down off fourth street to be have any type of sophistication needed. But as soon as you plug that server in with a website, you're instantly going to get, get attacked , right. >> So the thing is, you can expect that, that guy to be an expert. He's not going to be an expert in cybersecurity and the cost of hiring someone is going to outweigh the value who's getting back. My recommendation that case is to look for organizations that can actually help you to become more cyber resilience. So an organization that I work with, it's actually UK and US basis, the global cyber alliance. They actually produce a small business toolkit. So it's a set of tools which are not chargeable is put together. And some of it might be a white paper, a set of recommendations, it might actually be a vendor developed tool that they can use to download to check the vulnerabilities or something like that. But what it does is it provides a framework for them. So they go through and say, Okay, yeah, I get this. This is English, simple language. And it helps to protect me as a small business owner, not a massive enterprise where actually none of those solutions fits what i one's to. So that's my recommendation to small businesses, look for these types of organization, work with someone like that, listen to what they're doing and learn cyber from them. >> Yeah, that's good tip. I want to, kind of of double click on that. So that makes sense when it's easy to measure your ROI on a small business. I just can't afford the security pros. >> Yeah. >> For bigger companies when they're doing their budgeting for security. To me, it's always a really interesting as i can, it's insurance at some point, you know, wouldn't be great if i could ensure 100% coverage, but we can't. And there's other needs in the business beyond just investing in, in cyber security, how should people think about the budgets relative to, as you just said, the value that they're trying to protect? How do you help people think about their cyber security budgets and allocations. >> So then there needs to be and this is happening, a change in how the conversation works between the security team and the board who own those budgets. What tends to happen today is that there's a cyber team wants to provide the right information to the board that's going to make them see how good what they're doing is and how successful they are and justifies the spend that they've made and also justifies the future investments that they're going to need to make. But very often, that falls back on reporting on big numbers, statistics, we blocked billions of threats. We turned away millions of pieces of malware. Actually, that conversation needs to narrow down and the team should be saying, Okay, so in the last two months, we had Five attacks that came in, we actually dealt with them by doing this, this is the changes that we've made, this is what we've learned. However, if we had had this additional or this switched on, then we would have been more successful or we'd have been faster or we could have turned down the time on doing that. Having that risk and compliance type conversation is actually adding value to the security solutions they've got and the board understand that they get that conversation, you're going to be happy to engage. This is happening, this is something that is happening. And it will, it's going to get better and better. But that's that's where things need to go. >> Right. Cause the other hard thing is it's kind of like we've joked earlier, it's kind of like an offensive lineman, they do a great job for 69 plays. And on the seventh seventh play, they get a holding call. That's all anybody sees . And you know, there's, again, that was part of robots, keynote that we can't necessarily brag about all the DDoS taxes that we stopped cause we can't let the bad guys kind of know where we're, we're being successful. So it's a little bit of a challenge in tryna show the ROI. Show the value when you can't necessarily raise your hand and say, hey, we stopped the 87. Tax. >> Yeah, >> Cause it's only the 88. That really is the one that that showed up in the Wall Street Journal. >> I think the thing with that is when organizations are looking at security solutions, specifically, we're very aware of that. As you know, organizations struggle to get customer references, you'll see a lot of the references are major financial, large manufacturing organization, because companies don't want to step up and say, I implemented security, they did this because the reverse of that is, she didn't have it before then >> Right right, or we'll go in that door not that door. >> Yeah and so, but there are a lot of good testing organizations out there that actually do take the security solutions, and run them through very, very stringent tests and then report back on the success of those tests. So you know, we work closely with NSX labs, for example, we've had some very good reports that have come out from there, where they do a drill down into how fast how much, how many, and then that's the kind of You can then take to the board. That's the kind of thing that you can publicize to say, the reason that we're using Juniper X or x firewalls is because in this report, this is what it said, this is how good that product was. And then you're not admitting a weakness. You're actually saying we're strong because we did this work in this research background. >> Right, very different kind of different approach. >> Yeah, yeah. >> Yeah well, Lawrence really enjoyed the conversation. We'll have to leave it here. But I think you have no shortage of job security, even though we will know everything in 2020 with the benefit of hindsight. >> Really, yeah thank you very much for that. >> All right. Thanks a lot. Alright, he's Lawrence. I'm Jeff. You're watching the cube. We're at RSA 2020 in Moscone. Thanks for watching. We'll see you next time.
SUMMARY :
brought to you by SiliconANGLE Media. that you should be thinking about. I want you to get share some of your thoughts on deepfakes. because a lot of the things that you see today of the things that their target does each and every day. for the bad guys to be able to create, but still the thing to spot But it's amazing, even only in the last six months to see But of course, the more it does that, to get The two factor authentication, you know, the new make things easier to make it so that you can have less I know, i saw some article that you're quoted in and it But you know, but it's interesting cause, you know, having where I'm not I you know, And to fill it up nicely for you wouldn't right. At the at the fault of, you know, not necessarily paying This is the thing and then there's, you know, their only solution to go with, you know, cloud providers So the thing is, you can expect that, I just can't afford the security pros. about the budgets relative to, as you just said, the value that they're going to need to make. Show the value when you can't necessarily raise your hand Cause it's only the 88. As you know, organizations struggle to get customer That's the kind of thing that you can publicize to say, But I think you have no shortage of job security, even We'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Laurence Pitt | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Lawrence | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Laurence | PERSON | 0.99+ |
Moscone | LOCATION | 0.99+ |
second factor | QUANTITY | 0.99+ |
one minute | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
Juniper Networks | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Rowan | PERSON | 0.99+ |
69 plays | QUANTITY | 0.99+ |
Thursday | DATE | 0.99+ |
NSX | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
25 passwords | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
One time | QUANTITY | 0.99+ |
US | LOCATION | 0.99+ |
UK | LOCATION | 0.99+ |
two pieces | QUANTITY | 0.99+ |
two types | QUANTITY | 0.99+ |
RSA 2020 | EVENT | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
three months later | DATE | 0.99+ |
today | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
ORGANIZATION | 0.98+ | |
Wall Street Journal | TITLE | 0.98+ |
ORGANIZATION | 0.97+ | |
seventh seventh play | QUANTITY | 0.97+ |
Five attacks | QUANTITY | 0.97+ |
Matt | PERSON | 0.97+ |
millions of pieces | QUANTITY | 0.96+ |
One | QUANTITY | 0.96+ |
two factor | QUANTITY | 0.96+ |
single | QUANTITY | 0.95+ |
RSAC | ORGANIZATION | 0.95+ |
1234567 | OTHER | 0.94+ |
88 | QUANTITY | 0.94+ |
English | OTHER | 0.93+ |
RSA conference 2020 | EVENT | 0.92+ |
ORGANIZATION | 0.91+ | |
theCUBE | ORGANIZATION | 0.89+ |
last six months | DATE | 0.86+ |
last two months | DATE | 0.86+ |
billions of threats | QUANTITY | 0.85+ |
Salesforce | ORGANIZATION | 0.85+ |
each | QUANTITY | 0.85+ |
100% coverage | QUANTITY | 0.85+ |
2020 | ORGANIZATION | 0.81+ |
fourth street | QUANTITY | 0.74+ |
Juniper X | ORGANIZATION | 0.72+ |
USA | LOCATION | 0.68+ |
double | QUANTITY | 0.66+ |
deepfakes | TITLE | 0.63+ |
things | QUANTITY | 0.61+ |
Financial | PERSON | 0.58+ |
87 | OTHER | 0.57+ |
deepfakes | ORGANIZATION | 0.49+ |
Delta | TITLE | 0.46+ |
Jonathan Nguyen-Duy, Fortinet | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Welcome back everybody. Jeffrey here with the cube. We're at RSA 2020, downtown San Francisco and Moscone center, 40,000 professionals in the security industries, the biggest security event in the world. I'm pretty sure, certainly the biggest one in the U S we're excited to have somebody who's been running around taking care of these problems and talking to customers for a very long time. It's got a great longterm perspective. We're happy to have him. Jonathan, new wind, the VP global field say-so team for fortunate. Jonathan, great to see you. So you said you've been coming to this show for a long, long time. Love to get kind of your impressions that the human element is the theme. Yeah, well, sheer, you know, I, I think, uh, it's changing. It's uh, the attendance is broken out by very senior people who've been here for, you know, multiple events and then a whole new slew of people are coming into the industry, right. >>And there's a lot of excitement. It's, um, there's a little bit less of a buzz. It just seems it's a little bit less people here this year because of the virus scare. Um, but overall I think that the themes are pretty consistent, which is kind of tragic that the themes are consistent year after year because this suggests that not a lot has changed despite the $130 billion and it works with purity span. You know, absolutely complexity. Uh, everyone is telling me about how to solve complexity, how to do more with less, uh, how to do more with less and fewer people and how to get their arms around this vast volume of data that's being generated. And there's a lot of talk about automation and AI, uh, but much more practical, less buzzwords and more practical solutions. And yet still tons of new vendors, right? Tons of new opportunities. >>You know, I don't know what the final count is on the vendor side, but it's a really large number and you go off into the corners to the EDBD little, little, a little mini boost is still a time of innovation. So I think that people trying to move the ball. So I think when the first show first started, there were less than a less than 500 vendors, I think in the industry back in 2007 I think today we're North of of 5,000 and it's probably 8,000 or about 5,000 vendors in the immediate vicinity here. But just go around the corner and there are dozens of others having their own events and the neighboring hotels and restaurants. It's astounding the number of different point products are still coming into the industry and, and, and that really suggests that we haven't gotten our arms around integrating all of this technology. >>And it's just another level of complexity. So what do you tell your friends on the buy side, right? Who know you and say, say Jonathan, I'm going, I'm going to RSA. How in the heck am I supposed to navigate not only the show specifically, but kind of this vendor landscape and then make sense of it all? I'm telling him to look for vendors that are partners that have a longterm perspective and that do the integration for you. You know, one of the things coming from an operational background, as I talked to other CSOs, like our job is to operate technology. It really isn't about integrating technology. It really isn't about OAA and product. I want to focus my budget and my resources on operating technologies and manage risk. So I look for partners and mentors like, like Fordanet that has a fabric with 258 plus different products and vendors that are already integrated out of the box. >>I'm looking for someone that solves complexity rather than a specific problem or specific threat vector. And I'm really looking for some of that helps me understand and manage risk because that's the object of the exercise in cybersecurity today. It's not about compliance, it's about compliance, it's about security, it's about resilience, but a reasonable level of care in managing risk. Right. And yeah, it's, it's a great topic cause I was thinking that kind of in terms of insurance. Yeah. In terms of, you know, how much do you spend and you can't insure everything to 100% right. So it's going to be some number less than that. Everybody else needs a piece of the pie. But how do you make those kinds of trade offs, investment versus risk? Because you can't absolutely protect everything. It makes no sense. So I think that value of it comes back to the CSO and his or her team. >>It's a very human decision. Uh, there is no prescriptive definition of what reasonable care is. You know, outside of one statement by Kamala Harrison, she was the state's attorney in California here, which is the CIS 20 is the minimum level of reasonable care. And so now we have to understand how do we define what is reasonable, what is the risk appetite or tolerance for a company? And once you identify those things, what are the controls and mitigation measures that you're gonna have in place to mitigate those risks? And then what's left is residual risk. And that's a hard decision. How much will you absorb? How much will you transfer, uh, and how much will you just tolerate? Um, but it's really no longer just about compliance, uh, and it's no longer just about having a security or continuity or resilience about all of those things. At a reasonable level. >>Right. It's interesting as pulling up Winnie Naylor from, from Cisco gave one of the early ketos and she talked about, you know, really this security profession, embracing those pesky people that keep clicking on links because really they're the people that can, that have the data around the specific, um, applications and specific assets that the company has to kinda have that informed decision as to what is it worth to protect and do we need to protect it? Do we need to protect them more? Can we let this thing go a little bit? Yeah. I think the human element is the hardest part, you know, in mind at this conference and its theme, that human element. The hardest part about this job is that it's not just mechanical issues on routing issues and networking issues, but it's about dealing with all types of humans, innocent humans that do strange and bad things unknowingly. >>And then malicious people who do very bad things that by design. And so the research suggests that no matter what we do in security awareness training, some 4% of our employee base will continually fail security awareness tests. Well, we fished actively. And so one of the things that we need to do is use automation and intelligence so that you could comb through all of that data and make a better informed decision about what risks you're going to mitigate, right? And for this 4% that are habitually abusing the system and can't be retrained while you can isolate them, right, and make sure that they're, they're separated and they're not able to, uh, to do things that may harm the organization. Right. The other human element is the people on the security teams, right. And it's a tough resource. There aren't enough of them. And, and, and historically, they'd been the ones that, that integration point between all these different systems and it's a highly stressful job. >>You know, there was a Forbes article that said 17% of all CSOs are functional alcoholics. I mean, I mean, and they met as a 17 for 17%. One of every six CSOs medicates himself or herself with alcohol. And medicate is a very specific term of art. It doesn't mean recreational drinking means you are a functional alcoholic and that tells you about the level of stress and complexity. You know, in this job, our research suggests that the average CSO lifespan is somewhere on the low end of about 12 months on the high end, somewhere about 24. You know, in their role or in their profession, their role and their current job, their current gig, they're not lasting more than than two years. Uh, the sheer complexity and stress of the job and you know, and, and those, of course, 24 months, three of those months are just orientation cause that gives you an idea. >>It's a level of stress and complexity that the average CSO is going to face here. Right. So really begs for a lot more automation, a lot more automation on the defense side. It does, it, it makes for a lot more automation. And how do you help those teams cope with a massive levels of complexity and data that's coming out of these digitized and digitally transformed enterprises, right? And when you think about each person's going to generate three to five terabytes of data per person per day, uh, and that computing is going to change in the next three to five years. Right now 85% of computing and data generated comes from traditional it functions as you move into 5g and edge based computing, the vast majority of data generating computing will be done on the edge. So the level of complexity, the number of technologies and devices that we're going to have to monitor is only going to expand, right? >>Right, right. And the speed of those transactions and the speed of the potential harm. So marry that against the research data says that 99% of the attacks could have been mitigated through simple intermediate controls and that the patches, the signatures were readily available. And so the thing to contemplate as we go into this heightened level of complexity and expansion of our computing environment is we're missing the basics today, right? Right. If 99% of the successful attacks are based upon exploits that are known that the signatures are available in the patches available for then a year, what are we going to do when everything else becomes even more complex, more sophisticated. Yeah. That's funny. That was part of, of of raw heats keynote, uh, to kick off the whole thing is he said, you know, we as security professionals like to focus on the complex, we like to focus on the, the ornate and the, and the super sophisticated attacks on the reality is the vast majority and we're just coming right in the normal side door that they've been coming in all along. >>And one thing I decided during my time at the Verizon data breach investigations report was a 77% of all the breaches were not identified by the security team. They were identified by law enforcement. And so 77, 77% of the case. So let's, so let's say you've got a CIS admin that that goes out and accesses financial information before the earnings call and does insider trading. And it's the sec that calls the FBI. And then it's the FBI that calls you and said, by the way, your CIS admin is going to be charged with insider trading. And that's how they know that there's been a compromise out. And in many cases, what does that tell you? Despite $130 billion of network security spend this year alone, that's seven out of 10 data breaches will be identified by law enforcement and not the security team. Yeah. So that tells you that not the security law enforcement team, either it's the FBI or the sec hires the cl service and it just says that security is so complex that until we find ways like the FORNAS security fabric to automate and to manage complexity in an integrated way, you know, that's the, that's the leading edge indicator that I look for is that at what point do security teams identify more data breaches then law enforcement and the victims and they're way behind at this point? >>I think so, unfortunately. Yes. That's crazy. So, um, but there's a lot more AI now that you guys can use to write on the good guys side. But how does that really square the circle when you're saying so many of it just comes through the simple approaches because of lack of visibility. Uh, SOC teams are overwhelmed by the volume of data. And so the way to address the volume and variety and velocity of data is to use artificial intelligence to use a machine to make human decisions and behavior at machine speed. And so when we launched our 40 AI product offering and the virtual security analysts, you know, the research that we did suggest that is he pivoted a five SOC analysts. And so that's one way of helping SOC teams that are overwhelmed by the volume of data that are understaffed, to use artificial intelligence to distill out from all of that, that data, that useful patterns, and to marry that with our Florida guard intelligence, say, okay, this is the techniques, tactics and procedures most likely associated with this threat vector right now, escalate that to a human to make a decision on whether you want to mitigate that. >>And once you decide to mitigate that, use the automated and integrated capabilities of the fabric to make an efficient and effective, uh, mitigation, uh, of that incident. Right? Yeah. Yeah. That's interesting. You bring up the sec case. We had a conversation earlier today where we were talking about deep fakes. Yeah. If somebody had the use case that, you know, what, if you just had a pretty straight forward, deep fake of some executive from some companies saying something to move the market and you drop that into the, uh, into the social stream three minutes before the close on a Friday, you get a play off the off the margin leverage. Nobody gets to really investigate the thing until the four minutes are over. Markets are closed, right? You get a significant financials damage in a situation like that, not even really directly impacting the company system. Right. >>So you're, you're hitting on the fact that we are more interconnected than ever and that the traditional compensating controls that we would have used to mitigate that type of risk is not, not as effective. And so, you know, that's going to be a challenge moving forward. Everything is going to be more interconnected, accelerated and decisions will be driven by data. So it's all of those things will drive complexity. So maybe next year when we talk again, we'll see it and see that. But I'm a little, one of the reasons I'm, you know, I have a credit freeze personally is that I'm aware of things like, like deep fakes, uh, impersonations moving my identities. So having a credit freeze allows, allows me to know that no one can leverage my credit even if they have my data. Right. Interesting. So thanks. Question. We sit down here a year from now, uh, without the benefit of 20, 20 hindsight. >>Yeah. You know, what do you think the themes are going to be? What, what do you see as kind of this kind of short term move in the market based on some of these factors that you've identified? I think, uh, more automation, more uh, artificial intelligence ways of automating the traditional process was insecurity. The secondarily, I think there's going to be the rising awareness of edge based computing and smart systems, autonomous level five vehicles that are networked and rather than a sensory based awareness, smart homes, smart industrial applications, uh, that computing will be done on the edge increasingly and those industrial applications, that 85% of the data computer will be done there. And that increasingly the cloud will become a repository for, for, uh, for storage and correlation. But the actual computing and actuation will be done on the edge. And so as 5g takes hold, you're going to see tremendous transformations in our society and our economy and how we conduct commerce, how we communicate. >>Uh, and that leads some more complexity. That's why, that's why I'm so focused on helping organizations getting security right now before that next onslaught of complexity hits us. It's coming. It is the five G IOT thing is, is just around the corner. The look at the telcos, there is a very specific reason why they're investing literally hundreds of billions of dollars into five G and the tremendous societal and economic changes that that will bring in infrastructure, communications and security will have to stay pace with that. One of the things that we're going to see moving forward is that the digital infrastructure is only successful only as successful as a security is. And I think we'll, we should see a breakdown in the traditional operational silos in network operations and security operations as Michelle Dennett. He said earlier on the air, if you cannot protect, you should not connect. But unfortunately people are still connecting before they're ready to. Absolutely. Well, hopefully there'll be a little bit more circumspect going forward. We'll try Jonathan, thanks for, uh, for taking a few minutes and sharing your perspective. Really appreciate it. Always a fun time. Alright, Jonathan, I'm Jeff. You're watching the cube where at RSA 2020 from downtown San Francisco. Thanks for watching. We'll see you next time.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon the attendance is broken out by very senior people who've been here for, you know, multiple events and then because of the virus scare. off into the corners to the EDBD little, little, a little mini boost is still a time of innovation. You know, one of the things coming from an operational background, as I talked to other of the exercise in cybersecurity today. And once you identify those things, what are the controls and mitigation measures that you're gonna have in place I think the human element is the hardest part, you know, And so one of the things that of the job and you know, and, and those, of course, 24 months, three of those months It's a level of stress and complexity that the average CSO is going to face here. And so the thing to contemplate as we go into this heightened And it's the sec that calls the FBI. And so the way to address the volume and variety and velocity of data is to use artificial intelligence If somebody had the use case that, you know, what, if you just had a pretty straight forward, But I'm a little, one of the reasons I'm, you know, I have a credit freeze personally is And that increasingly the cloud He said earlier on the air, if you cannot protect, you should not connect.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michelle Dennett | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Kamala Harrison | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Jonathan | PERSON | 0.99+ |
$130 billion | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
2007 | DATE | 0.99+ |
85% | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
99% | QUANTITY | 0.99+ |
Jeffrey | PERSON | 0.99+ |
seven | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
4% | QUANTITY | 0.99+ |
Jonathan Nguyen-Duy | PERSON | 0.99+ |
17% | QUANTITY | 0.99+ |
77, 77% | QUANTITY | 0.99+ |
24 months | QUANTITY | 0.99+ |
20 | QUANTITY | 0.99+ |
17 | QUANTITY | 0.99+ |
8,000 | QUANTITY | 0.99+ |
five terabytes | QUANTITY | 0.99+ |
77% | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
40,000 professionals | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Fordanet | ORGANIZATION | 0.98+ |
four minutes | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
RSA | EVENT | 0.98+ |
10 data breaches | QUANTITY | 0.98+ |
FORNAS | ORGANIZATION | 0.98+ |
Moscone | LOCATION | 0.98+ |
dozens | QUANTITY | 0.97+ |
each person | QUANTITY | 0.97+ |
about 5,000 vendors | QUANTITY | 0.97+ |
about 12 months | QUANTITY | 0.97+ |
Fortinet | ORGANIZATION | 0.97+ |
more than than two years | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
five SOC | QUANTITY | 0.96+ |
40 AI | QUANTITY | 0.96+ |
one statement | QUANTITY | 0.96+ |
this year | DATE | 0.95+ |
hundreds of billions of dollars | QUANTITY | 0.95+ |
Friday | DATE | 0.95+ |
RSAC | ORGANIZATION | 0.95+ |
one way | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.94+ |
Winnie Naylor | PERSON | 0.94+ |
level five vehicles | QUANTITY | 0.93+ |
Florida | LOCATION | 0.92+ |
Tons of new opportunities | QUANTITY | 0.91+ |
less than 500 vendors | QUANTITY | 0.91+ |
about 24 | QUANTITY | 0.9+ |
a year | QUANTITY | 0.9+ |
earlier today | DATE | 0.9+ |
258 plus | QUANTITY | 0.9+ |
less than a | QUANTITY | 0.9+ |
RSA 2020 | EVENT | 0.9+ |
first show | QUANTITY | 0.9+ |
five years | QUANTITY | 0.88+ |
EDBD | ORGANIZATION | 0.87+ |
RSA | ORGANIZATION | 0.86+ |
Silicon angle | ORGANIZATION | 0.83+ |
5,000 | QUANTITY | 0.82+ |
Forbes | ORGANIZATION | 0.8+ |
USA | LOCATION | 0.79+ |
three minutes | QUANTITY | 0.79+ |
U S | LOCATION | 0.77+ |
2020 | EVENT | 0.74+ |
CIS | ORGANIZATION | 0.72+ |
Andy Smith, Centrify | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media >>and welcome back. You're ready Jeffrey here with the cube. We are a day four here at the RSA conference in Moscone Thursday. We've been going all day Monday, Tuesday, Wednesday, Thursday. It's a huge conference over 40,000 people, you know, kind of the first big us conference after the mobile world Congress thing with a coronavirus. So we were all kind of curious to see how it would work out. There was some companies that pulled out but you know Rohit and the team stayed the course, they got the support they needed from the city and it's turned out to be quite a show. So I'm sure there's a lot of people all over the industry kind of watching this as an indicator of how do you execute a conference and these kinds of crazy times. So we're excited for our next guest. He's Andy Smith, the senior vice president of marketing for Centrify. >>Andy, great to see you. Good to be here, Jeff. Doing great. So you said you've been coming to this show for a while, you're a seasoned veteran of the industry. First off kind of general impressions of this show versus versus other kinds of RSAs you've been doing in the past. It's super interesting to watch. It ebbs and flows of the security industry, right? I mean I've been 15 years over the past 25 I've been at this show and you've seen it be big and then shrink down, you know, to one hall and then the two halls again. I mean what's interesting the last couple of years is it's, it's big again, like security is hot. We know budgets are going up, a breach, cultures out there. And so, you know, the IC, the RSA show is a reflection of what's happening with the industry when you look at the size and number of attendees. >>Right. The other kind of theme this year was the human centric, uh, boat. And we had row head guy on just a little bit earlier in his keynote. I thought it was really interesting. It was not about security per se. It was not about threats and detection. It was really about stories and narratives and peoples and kind of taking that back as an industry. I wonder, you know, kinda your impression as this kind of human centric theme as we're surrounded by tech tech and more tech. It is, if you think about human centric, it's a, it's a big piece of your, your security strategy, right? I mean, uh, what, there was just this morning, uh, one of the sharks got fished, right? Lost $400,000. One of the, yeah. And so, uh, you know, educating people about looking out for fishing attacks, right? Uh, uh, looking at insiders who are one of our biggest threats and you know, they're, they're a huge piece of this is not technology at all. >>Right? I thought Wendy's keynote was great too from Cisco. Talking about everything we do on computers is about clicking. And yet we tell people, you know, click the download the patch, but don't click on anything else. And really, you know, kind of taken an approach that people need to be part of the solution. They're not these horrible people that keep clicking on the wrong things, but you really need to integrate them into your strategy. Yeah, absolutely. I mean, it's about educating your workforce. It's about educating consumers, right? Whether you're talking B to C security or whether you're talking to me to be that human element and educating to be diligent right to you, you got to know a little bit about how to look for something that might be suspicious and know what is, what you should be clicking on, what you shouldn't. There's, there's not a lot of technology that can solve that for you. >>It's getting out and, and, and making sure people are educated. And unfortunately, the bad guys have been working hard on their grammar and, uh, and doing all the AI on the background. So, you know, it's not, a lot of things today are not easily identifiable like they used to. They've gotten, that's no longer really kind of a baseline, a hope not to click that thing. They've gotten way better. Right? So rather than these attacks that are spray and pray, they're going after, you know, just going after anybody. They can, they're targeted now. Right? So spear fishing, right. And uh, and so specific individuals. And that's why one of the things that, that is a little bit coming up at this show and something that we talk about is identity centric security. So that you've got a tie, that kind of human element to your security. >>You know, there's network centric, but getting identity centric and tying that human element to your security aspect, making sure the security, the identity technologies and the security technologies are working together. That is brings that human element into your own security strategy. And when you, when you talk about identity, how should people be thinking about identity? Because clearly we see the kind of the rise in multi-factor now, right? We have to do, we have to go to the, our phones all the time with the code. Now we're hearing people, you know, can spoof identity, they can Smoove faces. I guess identity is not a face, but you know, some of these indicators of identity. So when you help people think about identity, what are some of the factors they should think about? What are the things they don't but they should be thinking about? Yeah, yeah. >>I mean some of the things that we talked a lot about is multifactor authentication. So although yes, right, real sophisticated people can have ways of getting around that, but most attackers and hackers are lazy, right? They're going to go for somebody who's got no multi-factor in place, like even doing the basics is way better than doing nothing. I mean, the statistics bear out that you do a little something right? And then you can always step it up and get more sophisticated where you've got tokens that you have to put your finger on, right? And you know, you can get smart cards and all those kinds of things. You can get much more sophisticated, but multi-factor in general works. I mean, you're just going to take it a far bit above. But what's interesting about identity, because we always think of humans, right? But when we talk identity, where this market is going is identity is machines. >>You have to give a machine an identity, you have to give a service account, an identity, you have to give a microservice identity. And these more and more, this is just completely automated world. This isn't humans logging into things anymore. This is microservices talking to each other. Each of those needs an identity needs an authorization cause they have accounts that can be hacked also. Right? So the you need protect those just as much as needed to protect those human accounts. It's funny cause we, we cover a lot of RPA shows, right? And the whole talk of, of of people that do RPA, right, is that they're, they're, they treat them as people, right? They treat them as kind of like your little assistance, your own little bot to do little tasks that you assigned them to do. So treating them with kind of an identity protocol. >>Then that gives all the authorizations and you kind of leverage all that back end is the way to integrate them into the workforce. Absolutely. It's all about access controls, authentication, authorization. Those are the controls that have been there forever. You're supplying these two new types of identities and you know, the, we're in the privileged access management space, so it used to always be a windows admin or a Unix Linux admin logging into a physical box, right? And so it was about protecting those accounts. But more and more it's about giving a machine and identity and a microservice and identity and how are those things talking to each other? We're protecting, that's all completely automated with dev ops. You think about if I have a, as I moved to the cloud, I want to be able to scale out dynamically, right? Uh, horizontally, vertically. So all of a sudden new servers, virtual servers or containers just popping up automatically. >>You have to be able to control the access to all those automatically, dynamically on the spot, and then they shrink back down. You need to get rid of all that, right? So the automation that's come into our space, although the same, I'm still trying to do authentication, authorization, same type of privilege access controls we've been doing for 30 years, but how they're applied in this new world is much different right now. What about then you layer you layer on top of that zero trust, so I definitely want to identify, but I have zero trust and I'm presuming at some point in time you might end up either being a bad guy or some bad guy's going to come in via your credential. How does the zero trust piece fit on top of the identity kind of management? It's really why we're talking about identity centric security now is because you can't, you, you have to assume somebody on your network. >>You can't trust all those perimeter controls that are there. The reality is they're going to get in and so that identity centric security starts at that access layer and not not trusting just because you got onto the network that, Oh, sure, here you go. You can, you can do whatever you want. That's where zero trust comes in. I don't, every time I want to get access to a piece of data or a system, et cetera, I need to do that F indication that authorization apply, that multi-factor. Those are all identity centric controls that result in this, this journey towards the zero trust world. It's, it's funny, uh, I've sat down with Mike and Caesar, uh, for scout and you know, he talks about when they do the little sniff on all the little devices that are plugged into the networks and it's usually multiples back of what people think are on the network, especially remote location. >>People are plugging stuff in. But then too, you know, like you said in the machine, identify, you know, what should a logic cam do and how should it act. And as soon as it starts acting and asking for things in accounts payable, maybe that's not necessarily what a lot to take camera wants do or should be doing. Yeah. Yeah. And so first there's like knowing what that device is giving you an identity so he know what it is, know what it should be doing. It has a role, it has specific access and authorization rights that are granted to it. So the logic camera, if I know what that camera is, you have an identity. I know what it's supposed to be doing. I should be able to restrict the access it has to just what it needs to do. Right. Rather than it's got root account to do whatever or some God account to create, you know, like those are the kinds of controls we have in place. >>And it's just logical identity management controls that have been there forever. But you're a, once you can identify those devices connected, you can, you can give them those, you know, limited. There's talk about least privilege, right? That's again, a 30 year old control, but giving at least privilege on just what it should do and nothing more. And do you see in the future just more and more kind of multifactor, uh, validation points that we'll have to get added to the, to the process as we move from single factor to factor, however many factors is going to take? For sure. Yeah. I mean, so the multi-factor, cause there's one thing are you authenticate yourself at the front door, right? So that's what most authentication is, but there's this concept of continuous authentication. You're the trust in that, uh, that initial authentication degrades as your session goes on. >>Right? So the longer I've had a session open, you know, is that still that same person or that same service that is clicking away at the keyboard there? There's cool stuff, wrong continuous authentication where there they can tell it's still the same person based on the cadence. They click on the keyboard, other biometric methods, the swiping I do on my phone and stuff like that. So there's ways to have continuous concepts now called continuous authentication. Right? And so I absolutely see that those behavior based, uh, types of, uh, of authentication. You're going out through a user's entire session. So I want to shift gears a little bit. One of the things that amazes me about this show, and I don't know when it was small, but it's been big ever since I've been coming. It's right, there's so many vendors here, there's so many companies in this and there's so many kinds of stories that a lot of really enthusiastic people work in booths that are screaming at you to come over and tell you all the great things they do. >>From a marketing point of view, you're, you're the SVP marketing. How do you, you know, kind of package your messaging, how do you kind of break through the clutter? What advice do you give to, to buyers, um, to help them kind of navigate what is a, a very large, loud and complex system? Yeah, it's a, it's a complex battle, right? So you have to be able to, because there are so many different technologies here, uh, in, in the security arena, uh, we're all fighting for the same share of wallet in a sense. Right? And so first you have to identify yourself with something people recognize a market that people recognize like identity, privilege, access management, endpoint security, you know, et cetera. But then you have to differentiate yourself within that market, right? So you've got to add something to the market space I'm in to that gives a little twist. >>So for us, it's identity centric, privilege access management and that, you know, we suppose that against Balt centric or you know, something else that we've tried to put the other bets. So you try to, in your message, you got to categorize what's the space I'm in and how do I differentiate? And in something as short and brand-able as possible. And then you got to have this kind of ongoing solutions, partnership relationship with, with your clients, right? Because this is not something you're going to be switching things out that frequently and, and, and, and the landscape and the threats evolve and change so rapidly. I think we've had a number of people come on to publish this report or that report, his report, he's come out every six months and there's actually the online version so he can keep up with what happened today or what happens tomorrow. >>So not an easy, uh, not an easy kind of marketing challenge to stay relevant, stay connected and state stay really in people's mind. Well, and you know, there's, there's awareness aspects to it and it is really just what really helps is you just create as many happy customers as you can. Right? I mean, you're amazed at the how connected this industry actually is. I mean, the attendees that are coming to this conference, they know each other. They've been coming here from here. It's just like we have. Right, right. And a word of mouth between people who have used your technology, they share that with something else. I mean the security industry as big as it is, it's, it's super interconnected. One person goes from one company to the other and so tons of business just comes from word of mouth, referral, etc. So the happier you can keep your customers, the more uh, you know, mind share. >>You can get up there. Okay. Last question before I let you go. We just like to say we just had row hit on one of the topics was they just got bought by a symphony. I think it's symphony, a private equity firm. Um, we met the other night at a, at a cocktail party put on by Tom Thoma Bravo and you were at Centrify before they came in. And after, you know, I think some people are kind of confused, you know, what is private equity, how does it impact the company? So wonder if you can kind of share, you know, how that transition has come along and you know, kind of give us an update on what's going on at Centrify and where you guys are going next. Yeah, so we were acquired about a year and a half ago now, uh, by private equity and you know, they basically, they take later stage companies and uh, help them get, uh, profitable, uh, they increased value and then they look for going, taking that company IPO or selling it off, et cetera. >>Right? But it's really about looking for opportunities, uh, in existing market with larger companies, the venture capitalists will go after smaller, much larger risks. These are bigger dollar amounts, right? Larger companies. But then they, they look about how to optimize. They're very sophisticated on how to run a B to B business. Tama Bravo happens to have a huge investment in security and it comes like eight or 10 companies there the other night. Yeah. So they, they realize that this is a hot space right now. So they've, if they can take a company and create value that they realize that there's more stuff popping up. There's probably money being invested in. And one of the things that, but not all private equities created equal. Yes, they are about all about kind of optimizing, increasing value. But what we really found with Tom or Bravo is they're interested in investing in that company, looking at other folds and acquisitions, et cetera. >>And that's a part of a strategy for me as a, as a manager and an I'm part of the executive team. When you're backed, they don't have the money to go after acquisitions. Uh, like that they, you know, they make these smaller investments. We're talking about Bravo actually does have the capital to look at other things that can be immediately accretive and add to your value. And that's a, a real part of our strategy now that didn't exist before we were owned by PE. I think they spun out a whole nother, another company out of what your technology say. Correct. Exactly. So one of the unique things about our particular acquisition is Centrify was both a privileged access management. And a identity as a service. And I Daz a company and they looked at what we were doing and they said, geez, you're really selling to two different markets and it's two different sales cycles and two different business models. >>We could actually create more value if we split these up and each of you focused on your individual markets. And so that there's a, there's an MQ and a market segment and a wave for IDASS and there's an MQ and a wave, you know, et cetera for Pam. But there's not anything that does both. And that's what Centrify was. So they actually, we, we completely divested of our IDASS capabilities spun off in an entirely separate company called adaptive. And so over the last year, that's was a lot of the work that was going on. It was, was splitting this company, uh, uh, into two. But it really provided us a much more focused to go after the market that we were going after. Well, they wouldn't come in if they didn't see some opportunity to, uh, to pull some more value out that wasn't really being unlocked. Absolutely. Right. Andy, we'll thank for taking a few minutes and uh, and great to catch up and best you for the rest of the show. Awesome. Thanks a lot, Jay. He's Andy. I'm Jeff. You're watching the cube where? At the RSA show in San Francisco. Thanks for watching. We'll see you next time.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon It's a huge conference over 40,000 people, you know, kind of the first big us conference after the mobile And so, you know, I wonder, you know, kinda your impression as this kind of human centric theme as we're And really, you know, kind of taken an approach that people need to you know, it's not, a lot of things today are not easily identifiable like they used to. a face, but you know, some of these indicators of identity. And you know, you can get smart cards and all those kinds of things. So the you need protect those just as much as needed to protect those human Then that gives all the authorizations and you kind of leverage all that back end is the way to you have to assume somebody on your network. uh, for scout and you know, he talks about when they do the little sniff on all the little devices that So the logic camera, if I know what that camera is, you have an identity. I mean, so the multi-factor, cause there's one thing are you authenticate yourself at the front door, So the longer I've had a session open, you know, is that still that same person or that same And so first you have to identify yourself with something people recognize And then you got to have this kind of ongoing the more uh, you know, mind share. how that transition has come along and you know, kind of give us an update on what's going on at Centrify and where you guys And one of the things that, but not all private equities created equal. like that they, you know, they make these smaller investments. We could actually create more value if we split these up and each of you focused on your individual markets.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andy Smith | PERSON | 0.99+ |
Andy | PERSON | 0.99+ |
Jay | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Mike | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
eight | QUANTITY | 0.99+ |
$400,000 | QUANTITY | 0.99+ |
Moscone | LOCATION | 0.99+ |
Centrify | ORGANIZATION | 0.99+ |
30 years | QUANTITY | 0.99+ |
two halls | QUANTITY | 0.99+ |
15 years | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
Monday | DATE | 0.99+ |
Jeffrey | PERSON | 0.99+ |
10 companies | QUANTITY | 0.99+ |
Caesar | PERSON | 0.99+ |
two different business models | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
one hall | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Bravo | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
last year | DATE | 0.98+ |
today | DATE | 0.98+ |
RSA | EVENT | 0.98+ |
over 40,000 people | QUANTITY | 0.98+ |
Each | QUANTITY | 0.98+ |
One person | QUANTITY | 0.98+ |
Tuesday | DATE | 0.98+ |
RSAC | ORGANIZATION | 0.98+ |
one company | QUANTITY | 0.98+ |
Rohit | PERSON | 0.98+ |
two different markets | QUANTITY | 0.98+ |
single factor | QUANTITY | 0.97+ |
zero trust | QUANTITY | 0.97+ |
Thursday | DATE | 0.97+ |
each | QUANTITY | 0.97+ |
Wednesday | DATE | 0.97+ |
this year | DATE | 0.97+ |
first | QUANTITY | 0.97+ |
zero | QUANTITY | 0.97+ |
one thing | QUANTITY | 0.96+ |
Tom Thoma Bravo | PERSON | 0.96+ |
two different sales cycles | QUANTITY | 0.96+ |
RSA | ORGANIZATION | 0.96+ |
First | QUANTITY | 0.95+ |
One | QUANTITY | 0.95+ |
Wendy | PERSON | 0.94+ |
a year and a half ago | DATE | 0.91+ |
Pam | PERSON | 0.9+ |
about | DATE | 0.89+ |
this morning | DATE | 0.88+ |
Silicon angle | ORGANIZATION | 0.88+ |
30 year old | QUANTITY | 0.87+ |
day four | QUANTITY | 0.87+ |
first big | QUANTITY | 0.84+ |
windows | TITLE | 0.83+ |
two new types | QUANTITY | 0.82+ |
Unix Linux | TITLE | 0.82+ |
USA | LOCATION | 0.78+ |
one of the sharks | QUANTITY | 0.76+ |
God | PERSON | 0.75+ |
coronavirus | OTHER | 0.74+ |
2020 | ORGANIZATION | 0.73+ |
2020 | DATE | 0.72+ |
six months | QUANTITY | 0.72+ |
tons | QUANTITY | 0.7+ |
last couple | DATE | 0.69+ |
years | DATE | 0.69+ |
business | QUANTITY | 0.67+ |
Tama Bravo | PERSON | 0.67+ |
Rohit Ghai, RSA | RSAC USA 2020
>> Narrator: Live from San Francisco it's theCUBE covering RSA Conference 2020 San Francisco brought to you by SiliconANGLE media. >> Welcome back, everybody. Jeff Frick here with theCUBE. We are at the RSA 2020, a really special segment. As you can tell it's really quiet here, it's not like normal CUBE action, we are here before the expo hall even opens on Thursday morning with a very special guest, we pulled them away from a crazy busy week if not more, it's Rohit Ghai the president of RSA, Rohit great to see you again. >> Always a pleasure, thanks Jeff. >> Absolutely, so I was really looking forward to this, I was really impressed by the opening keynotes, first it rolled out George Takei, that's a pretty bold move even more bold is to try to follow him up. >> Totally (laughing) >> So congratulations, and you know, that was pretty brave. >> I appreciate it, thank you. That was quite a, you know, quite a hurdle to got to follow George Takei. >> Right, and I just want to get kind of these other things that were kind of bubbling above the surface out of the way you know, a big piece of news, I think a week it came out before the show is that RSA was sold to Symphony I believe? >> Rohit: Symphony Technology Group. >> Right, so give us a little bit of the story there. >> Absolutely, so you know we entered into a definitive agreement, Symphony Technology Group acquiring RSA from Dell Technologies. What this does is this it basically clarifies the swim lanes for Dell Technologies to focus on intrinsic security and RSA can focus on managing digital and cyber risk, and you know, we are excited about the opportunity to become agile and independent and you know, kind of play in a smaller company setting to pursue our future, so we are super excited to be part of Symphony. >> Yeah, that's great, and the other thing that's kind of a pall, I mean just to put it out there is the corona virus thing. And you know, Mobile World Congress, a completely different show but a big show, probably the first big show of our industry this year was canceled. A hundred thousand plus people, so I just am just wondering if you can share kind of what were some of your thoughts and the team's thoughts 'cause we were all curious to see well how is this going to happen, there was a couple of drop outs but I think it's been a very good week. >> It has been a great week, you know what I'll say is it was a demonstration of resilience on part of the attendees, you know when we analyzed the situation what we noted was about 82 plus percent of our attendees are from the Americas right, so there was a core set of attendees that were perhaps not as impacted in terms of travel, et cetera, so we decided to move forward, we've been in close collaboration with the CDC and the mayor's office right here, Major London Breed's office right here is SF to make sure it's going to be a safe event for everyone and you know, the team put together a great kind of set of measures to make sure everyone has hand sanitizer. >> Great, great. >> And you know, we made sure we did what was needed to manage the risk and ensure resilience through this sort of you know very global risk that is playing out, so very proud of the team, and we garnered 40 thousand plus attendees despite you know, despite the coronavirus issue. >> You know, good job I am sure it was touch and go and a real sensitive situation and I can tell you a lot of other people and event organizers you know, were getting ready to head into a very busy event season, it's what we do and so, you know nice kind of lead indicator from you to execute with caution. >> I appreciate it, thank you. >> So let's jump into the fun stuff. So your key note was not really talking that much about bad guys and technology and this and that, you talked about story telling and you got very much into kind of the human element, which is the theme this year, but really the role of stories, the importance of stories, and most importantly for the security industry to take back their story and not let it get away from them. >> You summed it up really well Jeff, and you know what I said is hey if the theme of the conference is the human element, let's explore what intrinsically makes us human and the point, you know you've all know that it is stories that makes us human and I feel we've lost control of the narrative as an industry and as such we need to take that back and make sure we clarify the role of all the human characters in our story because until we do that, until we change our story we have no shot at changing our reality. >> Right, but you're kind of in a weird spot right, it's the classic spy dilemma. You can't necessarily tell people what you know because then they'll know that you know it and you might not be able to get more or better information down the road, so as you said in you keynote you don't necessarily have the ability to celebrate your wins, and a DDoS attack thwarted doesn't make the news. I keep thinking it's like ref in a game or like a offensive lineman in football you only hear about them on that one play when they get the holding call, not the 70 other plays were they did their job. >> Rohit: Totally, totally. >> So it's a unique challenge though >> It is, it is a challenge, it is not an easy problem and you know, there is a couple of recipes that I put out there for us to consider as an industry is you know, recipe one is we can celebrate our successes at a collective level right so, just like we put out breach reports, et cetera, in terms of what the statistics are, where the breaches are animating from we can talk about defensive strategies that are working at a collective level as an industry and share that sort of best practices recipes to win, that would be a fine start. I think another area, another point that I made was that we don't have to win for the hacker to lose. 71% of the breaches were motivated by financial gains, right, and as such if we, despite breaches, which is not a win for us, if we deny financial gain to the hackers we make them lose and they are subject to the same laws of economics, they have a profit and loss statement, they are spending resources for gain and when we deny them gain we make them lose, so those are a couple of ideas on how we can begin to change the narrative. >> Right. So the other piece of the human part is the rise of the bots, right, and the raise of AI and the rise of these increasingly smart and sophisticated machines. I think I saw one of those reports that we talk about on air was you know that people are an increasingly targeted group we hear it all the time, we hear about social engineering. As that gets more complicated, how does the role of people change? 'Cause clearly they can't monitor tens and tens and hundreds of thousands of concurrent attacks all the time. >> Absolutely, so you know the bad guys are using AI you know I cited the example of a deep fake audio clip that actually duped the CEO into initiating a wire transfer so they are using all these sophisticated attacks so to your point, we cannot rely on the end user to discern through these very sophisticates. It's unfair for us to think of them as the first line of defense, we have to on the IT side, we have to bring in technology, make the technology more usable, so you don't have to pay attention to this one millimeter by one millimeter lock at the corner of the browser to realize whether a web interaction is safe or not. We need to make more usable software, we need to do a better job of managing and reducing vulnerabilities to reduce the attack surface so IT has to step up in that regard, and then on the security teams I think they have to step up to use AI to detect bot initiated attacks so we are not leaning on the human to discern what is an anomalous interaction and what could be a phishing or a smishing attack, et cetera, you know we need to bring AI to fight the good fight on our behalf. >> Right. So the other kind of angle on that I thought was really interesting, Wendy's keynote, a couple of keynotes after yours from Cisco talked about, you know, a theme we see over and over in tech which is really kind of the democratization of security and get it out of just the hallowed halls of the super billion CSOCs and technologists that are just security and open it up to everybody so make them part of the solution and not those pesky people that keep clicking on links that they are not supposed to. >> Absolutely. She did a great job of kind of making that point and you know the way I think about it is again we need to move from a culture of elitism to a culture of inclusion. Until we really get the steaming going, not just within the security professionals which we are doing a better job of certainly in the industry, but we have to team with the user, the IT and the business teams in order to have a shot at tipping the balance in our favor. >> Yeah, it's really funny 'cause that kind of democratization theme is something that we see kind of across many levels of technology, whether it's in big data, can get away from the data scientists, in doing your own reports, in having access to your own marketing material and you know, so it's kind of funny that now we are just hearing it here I guess the last bastion of we're the smartest people in the room, no no, you need to use all the brain power. >> All the brain power. I use the phrase let's stop being STEM snobs and let's be more inclusive, and you know garner the entire spectrum of the diverse talent pool that we have available and you know making the point, perhaps a provocative point, that the cyber talent gap, a bit of it might be actually self-inflicted because we have been in this sort of elitism mindset. >> Right, and I think one of the themes that you talked about in you keynote was because of kind of the elite mindset we only want to focus on the elite challenges and in fact it's not the hardest challenges that are necessarily the most dangerous or the ones that are more frequently used, it doesn't have to be the craziest hardest way in. >> It absolutely does not. The point I made was preparing for the worse does not prepare you for the likely and the statistics are overwhelming. 60% of the breaches were on the back of six stolen credentials. That's a pretty table stakes basic issue that ought to be just taken off the table, and if we take care of the basics then we can focus our energy on the corner cases but let's first prepare for the likely before we get to the worst situations. >> Right. So Rohit I'm just curious to get your take as you have been here for the last couple of days, you know you did a whole lot of work getting into that keynote and getting this thing up and off the ground but you've had a couple of days to be here walked around, talked to a lot of customers and clients, partners, I wonder if there is anything that's kind of come up as a theme that you either didn't expect or kind of reinforced some of thoughts that you had coming into this week. >> Absolutely. I think if I would've net it out Jeff what I'm sensing is there is a whole movement to shift security left, which is this whole idea of IT stepping up as the first line of defense, reduce cyber exposure, take care of patching, multi-factor authentication, reduce the attack surface intrinsic security right so DevOps and SecDevOps take care of it right up front before the apps even get built right, then there is another movement to shift things right which is take care of the new aspects of the attack surface right, what the hacker always take advantage of are the areas where they sense we are unprepared and for a long time they've seen us being unprepared in terms of reducing the attack surface and then they go after the new aspects of the attack surface and what are those? IT, IoT, OT, data as an attack surface and the Edge right, so these are areas were there is a lot of activity, a lot of innovation, you know, on the floor here if you walk the corners shifting left shifting right as in all the new aspects of the attack surface. I am seeing a lot of conversations, a lot of innovation is that area. >> Yeah. Well, there's certainly no shortage of innovation in the companies here and in fact I think it's probably one of the biggest challenges that I think of from a virus perspective is to walk this floor and to figure it all out 'cause I don't know how many thousand of vendors there are but there's really big ones and there is lot's of little ones like you said tucked in the corner in kind of the cutting edge of the innovation. What advice do you give to people who is their first time coming to RSA? >> Yes, I think you know, it's a huge challenge for customers, there's 14 of every category. I think the customers what they have to see is they have to think about the recipe rather they have to focus not on the tool but the concept behind the tool, and think about the architecture right and they should seek out vendors that take this platform approach. It is, you know, the market hasn't consolidated that much where they can just go to a few vendors but when they build that architecture they should choose vendors that behave well as a puzzle piece in the jigsaw puzzle that our customers are having to assemble together right, that they are investing in the API integrations on the edges so they can slot in and be part of a broader solution. That's a key, key criteria that customers should utilize in their selection of the vendors. >> Yes, that's good. That's good advice, and they should be listening. So Rohit, thanks again for your time. Congratulations on a week and I hope you get that weekend of absolutely nothing coming up in just a couple of days that you talked about. >> I absolutely do. The joke I made was, you know, the only time I'm okay being labeled as useless is the weekend after RSA conference. So, I fully look forward to being useless over this weekend, it's been a great week and thank you again for having me. >> All right, two more days, 48 hours. All right, thanks again. He's Rohit, I'm Jeff, you're watching theCUBE. We're at RSA 2020, the year we're going to know everything with the benefit of hindsight. We're not quite there yet but we're trying yo get a little closer. Thanks for watching, we'll see you next time. (upbeat music)
SUMMARY :
brought to you by SiliconANGLE media. Rohit great to see you again. even more bold is to try to follow him up. That was quite a, you know, and you know, we are excited about the opportunity And you know, Mobile World Congress, and you know, the team put together a great kind of you know, despite the coronavirus issue. and so, you know nice kind of lead indicator from you and you got very much into kind of the human element, and the point, you know you've all know down the road, so as you said in you keynote and they are subject to the same laws of economics, and the rise of these increasingly smart at the corner of the browser to realize of just the hallowed halls of the super billion CSOCs and the business teams in order to have a shot at and you know, so it's kind of funny and you know making the point, and in fact it's not the hardest challenges and the statistics are overwhelming. that you either didn't expect a lot of innovation, you know, on the floor here in kind of the cutting edge of the innovation. It is, you know, the market hasn't consolidated that much and I hope you get that weekend of absolutely nothing and thank you again for having me. We're at RSA 2020, the year we're going to know everything
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Rohit | PERSON | 0.99+ |
George Takei | PERSON | 0.99+ |
14 | QUANTITY | 0.99+ |
Rohit Ghai | PERSON | 0.99+ |
CDC | ORGANIZATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Symphony Technology Group | ORGANIZATION | 0.99+ |
Symphony | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
tens | QUANTITY | 0.99+ |
48 hours | QUANTITY | 0.99+ |
60% | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
RSAC | ORGANIZATION | 0.99+ |
Thursday morning | DATE | 0.99+ |
one millimeter | QUANTITY | 0.99+ |
71% | QUANTITY | 0.99+ |
SF | LOCATION | 0.99+ |
Americas | LOCATION | 0.99+ |
first | QUANTITY | 0.99+ |
Wendy | PERSON | 0.99+ |
Mobile World Congress | EVENT | 0.98+ |
two more days | QUANTITY | 0.98+ |
RSA | ORGANIZATION | 0.98+ |
first time | QUANTITY | 0.98+ |
RSA Conference 2020 | EVENT | 0.98+ |
one | QUANTITY | 0.98+ |
first line | QUANTITY | 0.98+ |
this year | DATE | 0.97+ |
RSA 2020 | EVENT | 0.97+ |
70 other plays | QUANTITY | 0.97+ |
40 thousand plus attendees | QUANTITY | 0.96+ |
San Francisco | LOCATION | 0.95+ |
six stolen credentials | QUANTITY | 0.95+ |
A hundred thousand plus people | QUANTITY | 0.91+ |
theCUBE | ORGANIZATION | 0.91+ |
one play | QUANTITY | 0.9+ |
CUBE | ORGANIZATION | 0.88+ |
about 82 plus percent | QUANTITY | 0.87+ |
DevOps | TITLE | 0.86+ |
RSA | TITLE | 0.86+ |
a week | QUANTITY | 0.83+ |
this week | DATE | 0.82+ |
USA | LOCATION | 0.82+ |
first big show | QUANTITY | 0.81+ |
SiliconANGLE media | ORGANIZATION | 0.78+ |
DDoS | TITLE | 0.78+ |
hundreds of thousands of concurrent attacks | QUANTITY | 0.78+ |
Major London Breed | ORGANIZATION | 0.77+ |
every category | QUANTITY | 0.75+ |
SecDevOps | TITLE | 0.74+ |
thousand of vendors | QUANTITY | 0.71+ |
one of those | QUANTITY | 0.67+ |
themes | QUANTITY | 0.67+ |
corona virus | OTHER | 0.65+ |
coronavirus | OTHER | 0.64+ |
RSA conference | EVENT | 0.64+ |
Narrator: Live from | TITLE | 0.62+ |
2020 | ORGANIZATION | 0.61+ |
couple | QUANTITY | 0.59+ |
couple of days | QUANTITY | 0.58+ |
days | DATE | 0.54+ |
week | QUANTITY | 0.53+ |
last couple | DATE | 0.51+ |
2020 | DATE | 0.27+ |
Kelly Herrell, Hazelcast | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Hey, welcome back everyone. Cubes coverage here in San Francisco, the Moscone South. We're here at the RSA conference. I'm John, your host and the cube. You know, cybersecurity is now a global phenomenon, but cubbies have to move at the speed of business, which now is at the speed of the potential attacks. This is a new paradigm shift. New generation of problems that have to be solved and companies solving them. We have a hot startup here that's growing. Hazel cast, the CEO, Kelly Kelly Harrell is here. Cube alumni. Good to see you. Good to see you, John. Hey, so we know each other you've been on before. Um, you know, networking, you know, compute, you know the industry. You're now the CEO of Hazel cast. So first of all, what does Hazelcast do? And then we can get into some of the cool things. Hazel cast is an in memory compute platform. >>So we're a kind of a neutral platform. You write your applications to us. We sit in front of things like databases and stream, uh, streaming sources, uh, and we execute applications at microsecond speeds, which is really, really important as we move more and more towards digital and AI. Uh, so basically when, when time matters, when time is money people buy Hazelcast. So I've got to ask you your interest in better, you can do a lot of different things. You can run any companies you want. Why Hazelcast what attracted you to this company? What was unique about it that got your attention and what made you join the firm? Well, when I first started looking at it and realized that a hundred of the world's largest companies are their customers and this company really was kind of kind of a run silent run deep company. A lot of people didn't know about it. >>Um, I could not, I had this dissonance, like how can this possibly be the case? Well, it turns out, uh, if you go into the Java developer world, the name is like Kleenex. Everybody knows Hazelcast because of the open source adoption of it, which has gone viral a long, long time ago. So once I started realizing what they had and why people were buying it, and I looked at that, that problem statement and the problem statement is really increasing with digitalization. So the more things are speeding up, the more applications have to perform at really, really low latency. So there was this big big growth market opportunity and Hazel CAS clearly had the had the drop on the market. So I've got to ask you, so we're at RSA and I mentioned on my intro here the speed of business while he's been down the, it kind of cliche moving at the speed of business, but now business has to move as the speed of how to react to some of the large scale things, whether it's compute power, cloud computing, and obviously cyber is attacks and a response. >>How do you view that and how are you guys attacking that problem? Well, you know, it's funny. I think the first time I truly understood security was the day that I was shopping for a home safe. You know, because I realized that all of these safes, they all were competing on one of the common metric, which is the meantime to break in, right? Is that you had one job and all you can tell me is that it's going to happen eventually, you know? So the kind of the scales got peeled off my eyes and I realized that, that when it comes to security, the only common factor is elapsed time, you know, and uh, so the last time is what matters. And then the second thing is that time is relative. It's relative to the speed of the attack. You know, if I'm just trying to protect my goods in a safe, the last amount of time is how long it can take for the bad guy to break into the safe. >>But now we're working at digital speeds, you know, so, you know, you take a second break that down to a thousand, uh, that's uh, you know, milliseconds. It takes 300 milliseconds. The blink. Yeah. Now we're working at microsecond speeds. Uh, and we're finding that there are just a really rapidly growing number of transactions that have to perform at that scale and that, and that speed. Um, you know, it, it may have escaped people completely, but card processing, credit card, debit card processing, ever Dawn on you that that's an IOT application now. Yeah, because my phone is a terminal. Amazon's a giant terminal number of transactions go up. They have three milliseconds to decide whether or not they're going to approve that. And uh, now with using Hazel Cassady not just handle it within that three milliseconds, but they also are running multiple fraud detection algorithms in that same window. >>Okay. So I get it now. That's why the in-memory becomes critical. You can't gotta be in memory. Okay, so I got to ask the next logical question, which is okay, I get that it makes less sense and I want to dig into that in a second. But let's go to the application developer. Okay, I'm doing dev ops, I'm doing cloud. I'm cool. Right? So now you just wake me up and say, wait a minute, I'm not dealing with nanosecond latency. What do I do? Like what's I mean, who's, how to applications respond to that kind of attack velocity? Well, it's not a not a a an evolution. So the application is written to Hazel cast is very, very simple to do. Um, there are, uh, like 60 million Hazel cast cluster starts every month. So people out in the wild are doing this all day long and we're really big in the Java developer community, but not only Java. >>Um, and so it's very, very straightforward with how to write your application and pointed at Hazelcast instead of pointing at the database behind us. Uh, so that part is actually very, very simple. All right, so take me through, I get the market space you're going after. It makes total sense. You run the, I think the right wave in my opinion. Business model product, how you guys organize, how do people sign up for our development and the development side? Who's your buyer? What's the business look like? Share a Hazel. Cast a one-on-one. Yeah. So we're an open core model, meaning the core engine is open source and fully downloadable and you know, free to use, uh, the additional functionality is the commercial aspect of it, which are tend to be features that are used when you're really going into, into sensitive and large scale deployments. Um, so the developers have access to a, they just come to hazelcast.org and uh, and join the community that way. >>Um, the people that we engage with are everyone from the developer all the way up through the architect and then the a C level member who's charged with standing up whatever this new capability is. So we talk up and down that chain, um, where you're a very, very technical company. Uh, but we've got a very, very powerful RLM. What's the developer makeup look like? Is it a software developer? Is it an engineer? So what's the makeup of the, of the developer? They're core application developers. Um, a lot in Java, increasingly in.net, uh, as a MLM AR coming on, we're getting a lot of Python. Uh, so it's, it's developers with that skillset and they're basically, uh, writing an application that they're, um, uh, basically their division is specified. So we need this new application. It could be a new application for a customer engagement and application for fraud detection and an application for stock trading. >>Anything that's super, super time sensitive and, uh, they, they select us and they build on us. So you get the in-memory solution for developers. Take me through the monetization on the open core. Is it services? Is it, uh, it's a subscription. It's a subscription model. So, okay. Uh, w we are paid on a, on a annual basis, uh, for, for use of the software. And um, you know, however large the installation gets is a function that basically determines, uh, you know, what the price is and then it's just renewed annually. Awesome. We'll do good subscriptions. Good economics. It is. What about the secret sauce? What sun in the cut was on the covers? Can you share what the magic is or is it proprietary? Is that now what's, uh, it's, it's hardcore computer science. It really is what it is. And that is actually what is in the core engine. >>Um, but I mean, we've got PhDs on staff. We're tackling some really, really hard problems. You know, I can, I can build anything in memory. I can make a spreadsheet in memory, I can make a word processor and memory. But you know, the question is how good is it? How fast is it, how scalable, how resilient. So, um, you know, those, you're saying speed, resilience and scale are the foundation and it took the company years and years to be able to master this. That's an asymptotic attempt and you're never at the end of that. But we've got, you know, the most resilience, so something, it doesn't go down. It can't go down because our customers lose millions for every second that it's down. So it can't go down. It's got to scale. And it's gotta be low latency number of customers you guys have right now. Can you tell us about the public references and why they using Hazelcast and what did they say about it? >>Yeah, I mean we've got a hundred of the largest, uh, financial services, about 60% of our revenue. E-commerce is a, another 20% large telcos. Another job. There are a lot of IOPS type companies, right? Yeah. Basically it's, um, so you know, in the financial services, uh, it's all the names that you would know, uh, every logo in your wallet. It's probably one of our customers as an example. Um, massive banks, uh, card processors, uh, we don't get to talk about very many of them, but you know, something like national bank of Australia, uh, capital one, um, you know, you can, you can let your, your mind run there. Um, our largest customer has over a trillion dollar market cap. There's only a few that meet that criteria. So I'll let you on that one. One of the three. Um, all right, so what's next for you guys? >>Give the quick plug in. The company would appreciate the insights. I think he'd memory's hot. What do you guys are going to do? What's your growth strategy? Uh, what's, what do you, what's your priorities? The CEO? Yeah. Well, we just raised a $50 million round, which is a very, very significant round. Um, and we're putting that to work aggressively. We just came off the biggest quarter in the company's history. So we're really on fire right now. Uh, we've established a very strong technology partnership with Intel, uh, including specialty because of their AI initiatives. Because we power a lot of AI, uh, uh, applications. IBM has become a strategic partner. They're now reselling Hazelcast. Uh, so we've got a bunch of, uh, a bunch of wind in our sails right now coming into this year, what we're going to be doing is, uh, really delivering a full blown, uh, in memory compute platform that delivers, that can process stored and streaming data simultaneously. >>Nothing else on the planet can do that. We're finding some really innovative applications and, um, you know, we're just really, really working on market penetration right now. You know, when you see all these supply chain hacks out there, you're going to look at more in memory detection, prevention, counter strike, you know, all this provision things you got to take care of. Mean applications have to now respond. It's almost like a whole new SLA for application requirement. Yeah, it is. I mean, the bad guys are moving to digital speed, you know, if you have important apps that, uh, that are affected by that. Right. You know, you'd better get ahead of that. Well, actually you could be doing that, by the way. You can be doing that on your, on premise or you could be doing in the cloud with the managed service that we've also stood up while still we get the Cuban in, in memory Africa and when we were there, I will be happy. Kelly, congratulations on the funding. Looking forward to tracking you. We'll follow up and check in with you guys. All right. Congratulations. Awesome. Thanks John. I appreciate it. Okay. It's keep coverage here in San Francisco, the Moscone. I'm John furrier. Thanks for watching.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon Um, you know, to ask you your interest in better, you can do a lot of different things. it turns out, uh, if you go into the Java developer world, the name is like Kleenex. the only common factor is elapsed time, you know, and uh, But now we're working at digital speeds, you know, so, you know, you take a second break that down to a thousand, So now you just wake me up and say, wait a minute, Um, so the developers have access to a, they just come to hazelcast.org and uh, Um, the people that we engage with are everyone from the developer all the way up through the architect and then the determines, uh, you know, what the price is and then it's just renewed annually. But we've got, you know, the most resilience, so something, it doesn't go down. so you know, in the financial services, uh, it's all the names that you would know, uh, every logo in your wallet. What do you guys are going to do? I mean, the bad guys are moving to digital speed, you know, if you have important apps that,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Kelly | PERSON | 0.99+ |
John | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Kelly Herrell | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Kelly Kelly Harrell | PERSON | 0.99+ |
Kleenex | ORGANIZATION | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
$50 million | QUANTITY | 0.99+ |
300 milliseconds | QUANTITY | 0.99+ |
Hazelcast | ORGANIZATION | 0.99+ |
millions | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
hazelcast.org | OTHER | 0.99+ |
Python | TITLE | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
RSAC | ORGANIZATION | 0.99+ |
Java | TITLE | 0.99+ |
three | QUANTITY | 0.99+ |
60 million | QUANTITY | 0.99+ |
20% | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.98+ |
RSA | EVENT | 0.98+ |
three milliseconds | QUANTITY | 0.98+ |
about 60% | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
Africa | LOCATION | 0.97+ |
Moscone South | LOCATION | 0.97+ |
one job | QUANTITY | 0.97+ |
one | QUANTITY | 0.96+ |
first time | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
Silicon angle | ORGANIZATION | 0.93+ |
Hazel cast | TITLE | 0.92+ |
Hazel | TITLE | 0.9+ |
Moscone | LOCATION | 0.9+ |
Cuban | LOCATION | 0.86+ |
Australia | LOCATION | 0.85+ |
John furrier | PERSON | 0.85+ |
a second | QUANTITY | 0.81+ |
2020 | ORGANIZATION | 0.8+ |
every second | QUANTITY | 0.8+ |
hundred | QUANTITY | 0.8+ |
RSA conference | EVENT | 0.78+ |
Hazelcast | TITLE | 0.76+ |
over a trillion dollar | QUANTITY | 0.76+ |
2020 | DATE | 0.71+ |
one of | QUANTITY | 0.7+ |
second break | QUANTITY | 0.69+ |
USA | LOCATION | 0.67+ |
a thousand | QUANTITY | 0.65+ |
a minute | QUANTITY | 0.63+ |
Hazel Cassady | TITLE | 0.61+ |
Hazel cast | ORGANIZATION | 0.61+ |
CAS | ORGANIZATION | 0.54+ |
Hazel | PERSON | 0.53+ |
nanosecond | QUANTITY | 0.51+ |
Shira Rubinoff | RSAC USA 2020
>>Hi from San Francisco, it's the cube covering RSA conference, 2020 San Francisco, brought to you by Silicon angle media. >>You're welcome back. You're ready. Jeff Frick here with the cube. We are wrapping up Wednesday here at RSA 2020 Moscone center. It's the year we know everything. It's women in tech Wednesday and we're really excited that our next guest, she's been coming to the show for a very, very long time. She's really dialed into the community. She's an author. I got the whole as author, advisor, consultant, speaker. I could go on and on and on as you share. Rubinoff Shira, great to see you and welcome back to the cube. Oh, thank you so much. Pleasure to be here. Again, RSA 2020. A lot of kind of crazy stuff going on. The little coronavirus, you know, kind of impact, which is really interesting coming off of mobile world Congress, being in the event space and kind of seeing how this is gonna shake out. But the theme this year is the human element, which, uh, kind of plays right into your strengths. >>So just first get your kind of impressions of the show and really kind of that theme and kind of your take on why that's an important theme for RSA this year? >> Well, I think the human element has always been at the forefront. It's just now becoming accepted and put at the beginning of what people are really talking about. We talk about the people, the process and the technology all the time. When it comes to practice, everyone's really been focused on the security and the technology, but they forget the human elements and RSA this year is really focused on the human element being at the forefront. We have to realize there's a human creating the technology, a human at the end of the truck. Technology is trying to help and the glue between the process, how it all intersects together really depends on how people embrace it. And that was actually the premise for my book cyber Myers. >>So a plug for the book plug for the book cyber minds is a, a book is I view cybersecurity as the umbrella over all other technology. You need cybersecurity intersected in some way when you're dealing really with anything. But the human element really takes the forefront. So I really talk about cybersecurity and cyber hygiene and cyber elements within the book and cyber hygiene. I broke down into four categories which are training and that's ongoing training from the top down, being from the border and all the way down to the intern. Global awareness with an organization, keeping that culture going, a security and patching and digital transformation within the organization as well as zero trust. And I take that and I really continue with it throughout the book when we talk about blockchain, artificial intelligence, internet of things and cyber warfare and really showing how the human element is an integral part of everything we're doing in order to protect ourselves as a, as people, as an organization and just all support friends and sharing of information now is being, is completely critical. And it's being done because of that human element piece that's being embraced and understood >> lot a lot there. Right? So the human over the string, right? So it used to be per T E Z to identify a phishing attack. Right. You know, bad grammar and everything. A little bit of context and >>maybe the vocabulary wasn't quite right. That's not the way anymore. The sophistication of these attacks, the phishing attacks specifically at a friend in the, in the, in the real estate business, you know, and it was, it was an email from a banker that he does business with at a bank that he does business with around the transaction that he had knowledge about and doing a wire transfer. And it just was slightly mistimed where he, where he called the banker, his buddy and said, you know, did you, did you send this? So, you know, in the age of deep fakes, which is barely beginning in the age of this war, advanced AI for them to really put together these packages, um, and really infinite bandwidth, time and money. If you're really trying to pervade, I mean, how will the role of the human shift, you know, can we really expect them even with ongoing training to be sophisticated enough to keep up with these attacks? >>Well, I think it also boils down to real world examples and we have to really understand the demographics that we're working for. I think today it's the first time really in history that we have four generations working side by side in the workforce, so we have to understand that people learn differently. Training should be adjusted to the type of people that we're teaching, but fishing doesn't just boil down to clicking on links. Fishing teaches. Also, it boils down to tricking somebody, getting someone's trust, and it could come in many different forms. For example, think of social media. How do people connect? We're connecting for us social media on many different platforms. I'll give a very easy example. LinkedIn. LinkedIn is a business platform. We're all connected on LinkedIn. Why we connect on LinkedIn, because that's a social platform that people feel safe on because we're able to connect to each other in a business form. >>However, think of the person who's getting the first job with an organization, their first job in maybe their project manager and they're working for bank, a excited to be working for bank gay. Hey, I'm the list all the projects I'm working for. So here's now my resume on LinkedIn. I'm working on project a, B, C, D, and this is my manager I report to. Perfect. There's some information sitting there on LinkedIn. Now what else I will tell you is that you might have somebody who looking to get into that bank. What will they do? Let's look for the lowest hanging fruit. Ooh, this new project manager. Oh, I see. They're working on these projects and they're reporting into someone. Well, I'm not a project manager. I'm a senior project manager from a competing bank. I'm going to be friend them and tell them that I'm really excited about the work they're doing. So you're their social engineering your way into their friendship, into their good graces, into their trust. Once somebody becomes a trusted source, people share information freely. So people are putting too much information out there on social trusting to easily opening the door for more than a phishing attack. And things are just rapidly going out of control. Right. >>Well, it's funny. So one of my other favorite women in cyber is Rachel Tobik. Back, I don't know if you know Rachel, but she's famous for, you know, kind of live hacking at black hat, all social engineering, calling people up and just getting through and you know, she says she's basically undefeated. Um, this >>way if you're about the human elements, why do people act quickly? The biggest problem is people don't stop and pause. So if you think about, my background also is in psychology, psychology and business. So when you deal about the human element, it's panic. Let's set panic in. When you set panic in on a personal nature, people are quick to respond and quick over to give over information. If they feel it's pertinent to them, calling someone quickly, Hey your babysitter called, I need your social or anything like that. Set somebody into a spin. They're very quick to give over information cause they feel personal at risk when it comes to business and the business setting, it may not be as personal that way. That, so they kind of composite about the way people get in as through other social channels in ways that are more personal to individuals. >>So is that, is, is, is more sophistication around the human training element. Really the key as opposed to God knows how many vendors are in this, this building right now. I mean I, I feel so much for the buyer trying to sort it all out. Right? And there's big players in the established solutions that have been around forever. And then of course he get a spice with the startups that are cutting edge and doing new things when in fact all that goes out the window. If I can call the person up and say, you know, your house is on fire, please give me your, your password or your front door. Cause I gotta get the kids out. I mean I'm exaggerating to make a point, but is enough appreciation going into the human factors of training? Not on the technology side, but really the motivators for people to do things, um, to, to, to make, to try to please. Right. That's another great motivator to try to please. >>Well, right. Cause people like to be wanted. They like to be acknowledged. So they like to feel they're doing good. But again, it boils down to the people, the process and the technology. You can't have one without the other. You can't just focus on the people without focusing on the technology. But if you leave them as separate entities and you don't deal with the process in the middle, that glue, you're gonna leave yourself open. So they have to work hand in hand all the time. It's something that's a, it's a one plus one if you'll stand right at that perspective. So yes, you really need all of it together. >>The other thing that we hear over and over and over, right is just zero trust. The whole concept of zero trust. It's been around for a long time, which, which you know, you just assume that the bad guys are going to get in. Right? So then how do you try to find them quicker? How do you try to limit what they can get once they get in? So it's a really different kind of point of view to take a zero trust attitude on the assumption they're going to get it at some point and then try to mitigate the damage after the fact. >>So I look at zero trust from a little bit of a different perspective. I think zero trust is pertinent. Everyone should be using it because again, you're authenticating yourself, you're giving access only to that person for that specific task. But again, in organizations, if they say we're locking down everything all the time because we want to be secure, the employees are going to say, this is ridiculous. We don't have to be locked down for ABC. It makes no difference to us. What I say to organizations that are don't lock down things that don't need to be locked down, and when you do lock down something, it's important to have that three 60 dialogue with your employees. Explain why. Make them part of the solution, not part of the problem. If everyone's saying, Hey, you human, you're the weakest link. >>People are going to take offense at that and say, look, we know what we're doing. But if you make them part of the solution, Hey, we're in this together, let's make this part of the culture and they act as that with an organization you're going to have, they'll kill piece of ness so becomes just an ongoing everyday life living thing. Right. You brought that up. The windy neither from from Cisco is one of the keynotes on the first day and she was phenomenal. The basic, her basic premise was we as an industry have been to a kind of a not inclusive, exclusive like we own everything. We have all the control, we have all the answers, we know everything and her whole gist was no you don't. You don't have the context necessarily to make risk trade offs a benefit trade off. You don't necessarily have the context to see the softer stuff and really what you're saying really embrace everybody as part of the solution as opposed to trying to Creech people to do certain things and do and not do other things. >>I'm a little bit of both, right? Proper balance but also look at organizations today in the past would be, these are our solutions. We found out this Intel, you figure it out on your own and that it wasn't helping anybody. The idea now of sharing of information has become widely embraced certainly in the larger security companies at large and they really understand the value of it. So when I talk about, yes, you do have to lock down certain things and people do have to understand where the end points are, but they also need to understand that they are part of the solution and where the ends in the beginning. Let's shift gears a little bit from the people who back to the machines because the other thing that's happening really, really fast, right? As IOT. Yes, a lot of more edge devices, a lot of sensor devices. >>We saw what happened with, with some of the Alexa devices that was not very, was not very good. Um, so as you talk to your clients and, and, and, and people that read your book, how do you get them to think about IOT? How do you get them to think about this kind of machine to machine though? Of course that five G, which will just accelerate it at a, at a whatever, a hundred X, uh, speed to think about working. That is because we want API to API communication. We want machines to, to interface with each other. We want to remove that kind of human integration point a lot of times. But now you just opening up a boatload more of attack surfaces don't necessarily have the smartest machines is and often they can be compromised in ways that maybe people didn't think through before they connected them onto the internet. >>Well, it's also interesting when you talk about five G, it's not that we can do things at speed that speed, it's also bad actors could do things at that speed sales. So understand the portals of what your connectivity is, your third party software to whose, who has access, where are the access points, how are you going to protect those access points because the speed is that much quicker. We have to be that much more diligent. So yes, they're massive. Haas, really good positives. But there's also some negatives. So if we have to be diligent around those, it can be fabulous, but it could also be really, really dangerous for us. Sure. And it's coming right? It's coming. Right. So give us the, give us the 401 on the book. What's the, you know, kind of the top level themes for people to run out and get this? I saw some great reviews on Amazon. You're selling it upstairs, you know, what are kind of the really key takeaways here? >>Well, the key takeaways are really, again, cybersecurity is the umbrella over all of the technology. When you think of technology, cybersecurity is part of it. And when you look at cyber security, that comes from many different elements. It's not just a technology play, it's also a human element play. And the humans are an essential part of cybersecurity, whether you're securing for or securing too. It's just an interplay of both. So cyber mine's really touches upon all those concepts and all the latest and greatest emerging tech out there, as well as blockchain, AI, IOT, cyber warfare. Uh, think about it. It really just travels through. And I had some really amazing interviews with some top of the minds within the book that really adds tremendous value to it and grateful for them. >>Great. Well, I'm glad to finally get my own copies so I will be able to dig in and next time we talk I'll be digging deep into this book with you and getting a little bit more of that insight. I look forward to hearing your thoughts. Well, thanks. You're, hopefully you can kick your feet up a little bit tonight, but probably not. I'm sure you're busy, busy, busy. Well, thanks for stopping by. All right. She shear. I'm Jeff. You're watching the cube. We're at RSA 2020 at Moscone. Thanks for watching. We'll see you next time.
SUMMARY :
conference, 2020 San Francisco, brought to you by Silicon angle media. Rubinoff Shira, great to see you and welcome back to the cube. It's just now becoming accepted and put at the beginning of what So a plug for the book plug for the book cyber minds is a, So the human over the string, right? how will the role of the human shift, you know, can we really expect them even Well, I think it also boils down to real world examples and we have to really understand the demographics Hey, I'm the list all the projects I'm working for. but she's famous for, you know, kind of live hacking at black hat, all social engineering, So when you deal about the human element, it's panic. If I can call the person up and say, you know, your house is on fire, please give me your, So they have to work hand in hand all the time. So then how do you try need to be locked down, and when you do lock down something, it's important to have that three 60 dialogue You don't have the context necessarily to make the end points are, but they also need to understand that they are part of the solution and where Um, so as you talk to your clients and, and, and, and people that read your book, Well, it's also interesting when you talk about five G, it's not that we can do things at speed that speed, And the humans are an essential part of cybersecurity, whether you're securing for or securing deep into this book with you and getting a little bit more of that insight.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Diane Greene | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
James Kobielus | PERSON | 0.99+ |
Jeff Hammerbacher | PERSON | 0.99+ |
Diane | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Mark Albertson | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
Jennifer | PERSON | 0.99+ |
Colin | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Rob Hof | PERSON | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
Tricia Wang | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Singapore | LOCATION | 0.99+ |
James Scott | PERSON | 0.99+ |
Scott | PERSON | 0.99+ |
Ray Wang | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Brian Walden | PERSON | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
Rachel Tobik | PERSON | 0.99+ |
Alphabet | ORGANIZATION | 0.99+ |
Zeynep Tufekci | PERSON | 0.99+ |
Tricia | PERSON | 0.99+ |
Stu | PERSON | 0.99+ |
Tom Barton | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Sandra Rivera | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Qualcomm | ORGANIZATION | 0.99+ |
Ginni Rometty | PERSON | 0.99+ |
France | LOCATION | 0.99+ |
Jennifer Lin | PERSON | 0.99+ |
Steve Jobs | PERSON | 0.99+ |
Seattle | LOCATION | 0.99+ |
Brian | PERSON | 0.99+ |
Nokia | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Scott Raynovich | PERSON | 0.99+ |
Radisys | ORGANIZATION | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
Amanda Silver | PERSON | 0.99+ |
Sanjay Poonen, VMware | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Hi everyone. Welcome back to the cubes coverage here at in San Francisco, the Moscone center for RSA conference 2020 I'm job for your host. We are the very special guests, the COO of VMware, Sanjay Poonen, cube alumni. When you talk about security, talk about the modern enterprise as it transforms new use cases, new problems emerge. New opportunities exist here to break it down. Sanjay, welcome back. Thank you John. Always a pleasure to be on your show and I think it's my first time at RSA. We've talked a number of times, but nice to see you here. Well, it's a security guard. Well, this is really why I wanted you to talk, talk to you because operations is become now the big conversation around security. So you know, security was once part of it. It comes out and part of the board conversation, but when you look at security, all the conversations that we're seeing that are the most important conversations are almost a business model conversation. >>Almost like if you're the CEO of the company, you've got HR people, HR, organizational behavior, collaboration, technology, stack compliance and risk management. So the threat of cyber has to cut across now multiple operational functions of the business. It's no longer one thing, it's everything. So this is really kind of makes it the pressure of the business owners to be mindful of a bigger picture. And the attack velocity is happening so much faster, more volume of attacks, milliseconds and nanosecond attacks. So this is a huge, huge problem. I need you to break it down for me. >> Good. But then wonderful intro. No, I would say you're absolutely right. First off, security is a boardroom topic. Uh, audit committees are asking, you know, the CIO so often, you know, reports a report directly, sometimes, often not even to the CIO, to the head of legal or finance and often to the audit. >>So it's a boardroom topic then. You're right, every department right now cares about security because they've got both threat and security of nation state, all malicious, organized crime trying to come at them. But they've also got physical security mind. I mean, listen, growing a virus is a serious threat to our physical security. And we're really concerned about employees and the idea of a cyber security and physical security. We've put at VMware, cybersecurity and, and um, um, physical security. One guy, the CIO. So he actually runs vote. So I think you're absolutely right and if you're a head of HR, you care about your employees. If you're care ahead of communications, you care about your reputation and marketing the same way. If you're a finance, you care about your accounting systems and having all of the it systems that are. So we certainly think that holistic approach does, deserves a different approach to security, which is it can't be silo, silo, silo. >>It has to be intrinsic. And I've talked on your show about why intrinsic and how differentiated that intrinsic security, what I talked about this morning in my keynote. >> Well, and then again, the connect the dots there. It's not just security, it's the applications that are being built on mobile. For instance, I've got a mobile app. I have milliseconds, serious bond to whether something's yes or no. That's the app on mobile. But still the security threat is still over here and I've got the app over here. This is now the reality. And again, AirWatch was a big acquisition that you did. I also had some security. Carbon black was a $2 billion acquisition that VMware made. That's a security practice. How's it all coming together? Can you think of any questions? Blame the VMware because it's not just security, it's what's around it. >> Yeah. I think we began to see over the course of the last several years that there were certain control points and security that could help, you know, bring order to this chaos of 5,000 security vendors. >>They're all legitimate. They're all here at the show. They're good vendors. But you cannot, if you are trying to say healthy, go to a doctor and expect the doctor to tell you, eat 5,000 tablets and sailed. He just is not sustainable. It has to be baked into your diet. You eat your proteins, your vegetables, your fruit, your drink, your water. The same way we believe security needs to become intrinsically deeper parts, the platform. So what were the key platforms and control points? We decided to focus on the network, the endpoint, and you could think of endpoint as to both client and workload identity, cloud analytics. You take a few of those and network. We've been laboring the last seven years to build a definitive networking company and now a networking security company where we can do everything from data center networking, Dell firewalls to load balancing to SDN in this NSX platform. >>You remember where you bought an nice syrup. The industry woke up like what's VM ever doing in networking? We've now built on that 13,000 customers really good growing revenue business in networking and and now doing that working security. That space is fragmented across Cisco, Palo Alto, FIU, NetScaler, checkpoint Riverbed, VMware cleans that up. You get to the end point side. We saw the same thing. You know you had an endpoint management now workspace one the sequel of what AirWatch was, but endpoint security again, fragmented. You had Symantec McAfee, now CrowdStrike, tenable Qualis, you know, I mean just so many fragmented IOM. We felt like we could come in now and clean that up too, so I have to worry about to do >> well basically explaining that, but I want to get now to the next conversation point that I'm interested in operational impact because when you have all these things to operationalize, you saw that with dev ops and cloud now hybrid, you got to operationalize this stuff. >>You guys have been in the operations side of the business for our VMware. That's what you're known for and the developers and now on the horizon I gotta operationalize all the security. What do I do? I'm the CSO. I think it's really important that in understanding operations of the infrastructure, we have that control point called vSphere and we're now going to take carbon black and make it agentless on the silverside workloads, which has never been done before. That's operationalizing it at the infrastructure level. At the end point we're going to unify carbon black and workspace one into a unified agent, never been done before. That's operationalizing it on the client side. And then on the container and the dev ops site, you're going to start bringing security into the container world. We actually happened in our grade point of view in containers. You've seen us do stuff with Tansu and Kubernetes and pivotal. >>Bringing that together and data security is a very logical thing that we will add there. So we have a very good view of where the infrastructure and operations parts that we know well, a vSphere, NSX workspace one containers with 10 Xu, we're going to bring security to all of them and then bake it more and more in so it's not feeling like it's a point tool. The same platform, carbon black will be able to handle the security of all of those use cases. One platform, several use cases. Are you happy with the carbon black acquisition? Listen, you know, you stay humble and hungry. Uh, John for a fundamental reason, I've been involved with number of acquisitions from my SAP VMware days, billion dollar plus. We've done talking to us. The Harvard business review had an article several years ago, which Carney called acquisitions and majority of them fail and they feel not because of process of product they feel because good people leave. >>One of the things that we have as a recipe does acquisition. We applied that to AirWatch, we apply the deny Sera. There is usually some brain trust. You remember in the days of nice area, it was my team Cosato and the case of AirWatch. It was John Marshall and that team. We want to preserve that team to help incubate this and then what breve EV brings a scale, so I'm delighted about Patrick earlier. I want to have him on your show next time because he's now the head of our security business unit. He's culturally a fit for the mr. humble, hungry. He wants to see just, we were billion dollar business now with security across networking endpoint and then he wants to take just he's piece of it, right? The common black piece of it, make it a billion dollar business while the overall security business goes from three to five. >>And I think we're going to count them for many years to come to really be a key part of VMware's fabric, a great leader. So we're successful. If he's successful, what's my job then? He reports to me is to get all the obstacles out of the way. Get every one of my core reps to sell carbon black. Every one of the partners like Dell to sell carbon black. So one of the deals we did within a month is Dell has now announced that their preferred solution on at Dell laptops, this carbon bike, they will work in the past with silence and crowd CrowdStrike. Now it's common black every day laptop now as a default option. That's called blank. So as we do these, John, the way we roll is one on here to basically come in and occupy that acquisition, get the obstacles out of the way, and that let Patrick scaled us the same way. >>Martine Casado or jumbo. So we have a playbook. We're gonna apply that playbook. Stay humble and hungry. And you ask me that question every year. How are we doing a carbon black? I will be saying, I love you putting a check on you. It will be checking in when we've done an AirWatch. What do you think? Pretty good. Very good. I think good. Stayed line to the radar. Kept growing. It's top right. Known every magic quadrant. That business is significant. Bigger than the 100 million while nice here. How do we do a nice hero? NSX? It's evolved quite a bit. It's evolved. So this is back to the point. VMware makes bets. So unlike other acquisitions where they're big numbers, still big numbers, billions or billions, but they're bets. AirWatch was a good bet. Turned out okay. That the betting, you're being conservative today anyway. That's it. You're making now. >>How would you classify those bets? What are the big bets that you're making right now? Listen, >> I think there's, um, a handful of them. I like to think of things as no more than three to five. We're making a big bet. A multi-cloud. Okay. The world is going to be private, public edge. You and us have talked a lot about VMware. AWS expanded now to Azure and others. We've a big future that private cloud, public cloud edge number two, we're making a big bet on AB motorization with the container level 10 zoos. I think number three, we're making a big bet in virtual cloud networking cause we think longterm there's going to be only two networking companies in matter, VMware and Cisco. Number four, we're making a big bet in the digital workspace and build on what we've done with AirWatch and other technologies. Number five, and make it a big bet security. >>So these five we think of what can take the company from 10 to 20 billion. So we, you know, uh, we, we've talked about the $10 billion Mark. Um, and the next big milestone for the company is a 20 billion ball Mark. And you have to ask yourself, can you see this company with these five bets going from where they are about a 10 billion revenue company to 20. Boom. We hope again, >> Dave, a lot that's doing a braking and now he might've already shipped the piece this morning on multi-cloud. Um, he and I were commenting that, well, I said it's the third wave of cloud computing, public cloud, hybrid multi-cloud and hybrids, the first step towards multi-cloud. Everyone kind of knows that. Um, but I want to ask you, because I told Dave and we kind of talked about this is a multi-decade growth opportunity, wealth creation, innovation, growth, new opportunity multicloud for the generation. >>Take the, this industry the next level. How do you see that multicloud wave? Do you agree on the multigenerational and if so, what specifically do you see that unfolding into this? And I'm deeply inspired by what Andy Jassy, Satya Nadella, you know, the past leading up to Thomas Korea and these folks are creating big cloud businesses. Amazon's the biggest, uh, in the iOS pass world. Azure is second, Google is third, and just market shares. These folks collectively are growing, growing really well. In some senses, VM-ware gets to feed off that ecosystem in the public cloud. So we are firm believers in what you're described. Hybrid cloud is the pot to the multicloud. We coined that term hybrid thought. In fact, the first incantation of eco there was called via cloud hybrid service. So we coined the term hybrid cloud, but the world is not multi-cloud. The the, the key though is that I don't think you're gonna walk away from those three clouds I mentioned have deep pockets. >>Then none of them are going away and they're going to compete hard with each other. The market shares may stay the same. Our odd goal is to be a Switzerland player that can help our customers take VM or workloads, optimize them in the private cloud first. Okay? When a bank of America says on their earnings caller, Brian Warren and said, I can run a private cloud better than a public cloud and I can save 2 billion doing that, okay? It turns off any of the banks are actually running on VMware. That's their goal. But there are other companies like Freddie Mac, we're going all in with Amazon. We want to ride the best of both worlds. If you're a private cloud, we're going to make you the most efficient private cloud, VMware software, well public cloud, and going to Amazon like a Freddie Mac will help you ride your apps into that through VMware. >>So sometimes history can be a predictor of future behavior. And just to kind of rewind the computer industry clock, if you looked at mainframe mini-computers, inter networking, internet proprietary network operating systems dominated it, but you saw the shift and it was driven by choice for customers, multiple vendors, interoperability. So to me, I think cloud multicloud is going to come down to the best choice for the workload and then the environment of the business. And that's going to be a spectrum. But the key in that is multi-vendor, multi, a friend choice, multi-vendor, interoperability. This is going to be the next equation in the modern error. It's not gonna look the same as mainframe mini's networking, but it'll create the next Cisco, the create the next new brand that may or may not be out there yet that might be competing with you or you might be that next brand. >>So interoperability, multi-vendor choice has been a theme in open systems for a long time. Your reactions, I think it's absolutely right, John, you're onto something there. Listen, the multicloud world is almost a replay of the multi hardware system world. 20 years ago, if you asked who was a multi hardware player before, it was Dell, HP at the time, IBM, now, Lenovo, EMC, NetApp, so and so forth and Silva storage, networking. The multicloud world today is Amazon, Azure, Google. If you go to China, Alibaba, so on and so forth. A Motiva somebody has to be a Switzerland player that can serve the old hardware economy and the new hardware economy, which is the, which is the cloud and then of course, don't forget the device economy of Apple, Google, Microsoft, there too. I think that if you have some fundamental first principles, you expressed one of them. >>Listen where open source exists, embrace it. That's why we're going big on Kubernetes. If there are multiple clouds, embrace it. Do what's right for the customer, abstract away. That's what virtualization is. Managed common infrastructure across Ahmed, which is what our management principles are, secure things. At the point of every device and every workload. So those are the principles. Now the engineering of it changes. The way in which we're doing virtualization today in 2020 is slightly different from when Diane started the company and around the year 2020 years ago. But the principals are saying, we're just not working just with the hardware vendors working toward the cloud vendors. So using choices where it's at, the choice is what they want. Absolutely, absolutely. And you're right. It's choice because it was the big workloads. We see, for example, Amazon having a headstart in the public cloud markets, but there's some use cases where Azure is applicable. >>Some use his word, Google's applicable, and to us, if the entire world was only one hardware player or only one cloud player, only one device player, you don't need VMware. We thrive in heterogeneity. It's awesome. I love that word. No heterogeneity provides not 3000 vendors. There's almost three, three of every kind, three silver vendors, three storage vendors, three networking vendors, three cloud vendors, three device vendors. We was the middle of all of it. And yeah, there may be other companies who tried to do that too. If they are, we should learn from them, do it better than them. And competition even to us is a good thing. All right. My final question for you is in the, yeah, the Dell technologies family of which VMware is a part of, although big part of it, the crown jewel as we've been calling them the cube, they announced RSA is being sold to a private equity company. >>What's the general reaction amongst VMware folks and the, and the Dell technology family? Good move, no impact. What we support Dell and you know, all the moves that they've made. Um, and from our perspective, you know, if we're not owning it, we're going to partner it. So I see no overlap with RSA. We partner with them. They've got three core pillars, secure ID, net witness and Archer. We partnered with them very well. We have no aspirations to get into those aspects of governance. Risk and compliance or security has been, so it's a partner. So whoever's running it, Rohit runs on very well. He also owns the events conference. We have a great relationship and then we'll keep doing that. Well, we are focused in the areas I described, network, endpoint security. And I think what Michael has done brilliantly through the course of the last few years is set up a hardware and systems company in Dell and allow the software company called Vima to continue to operate. >>And I think, you know, the movement of some of these assets between the companies like pivotal to us and so on and so forth, cleans it up so that now you've got both these companies doing well. Dell has gone public, we Hammer's gone public and he has said on the record, what's good for Dell is good, what's good for VMware and vice versa and good for the customer. And I think the key is there's no visibility on what cloud native looks like. Hybrid, public, multi, multi, not so much. But you get almost, it's an easy bridge to get across and get there. AI, cyber are all big clear trends. They're waves. Sasha. Great. Thank you. Thanks for coming on. Um, your thoughts on the security show here. Uh, what's your, what's your take to, uh, definitive security shows? I hope it stays that way. Even with the change of where RSA is. >>Ownership goes is this conference in black hat and we play in both, uh, Amazon's conference. I was totally starting to, uh, reinforce, reinforce cloud security will show up there too. Uh, but we, we think, listen, there's what, 30,000 people here. So it's a force. It's a little bit like VMworld. We will play here. We'll play a big, we've got, you know, it just so happens because the acquisition happened before we told them, but we have two big presences here. We were at carbon black, um, and it's an important business for us. And I said, like I said, we have $1 billion business and security today by 30,000 customers using us in a security network, endpoints cloud. I want to take that to be a multi, multiple times that size. And I think there's a pot to do that because it's an adjacent us and security. So we have our own kind of selfish motives here in terms of getting more Mindshare and security. >>We did a keynote this morning, which was well received with Southwest airlines. She did a great job. Carrie Miller, she was a fantastic speaker and it was our way of showing in 20 minutes, not just to our point of view, because you don't want to be self serving a practitioner's point of view. And that's what's really important. Well finally on a personal note, um, you know, I always use the term tech athlete, which I think you are one, you really work hard and smart, but I got to get your thoughts. But then I saw you're not on Twitter. I'm on. When IBM announced a new CEO, Arvin, um, fishnet Indian American, another CEO, this is a pattern. We're starting to see Indian American CEOs running cup American companies because this is the leadership and it's really a great thing in my mind, I think is one of the most successful stories of meritocracy of all time. >>You're quick. I'm a big fan of oven, big fan of Shantanu, Sundar Pichai, something that Ellen, many of them are close friends of mine. Uh, many of them have grown up in Southern India. We're a different ages. Some of them are older than me and in many cases, you know, we were falling behind other great players like Vino Cosla who came even 10 to 15 years prior. And you know, it's hard for an immigrant in this country. You know, um, when I first got here and I came as an immigrant to Dartmouth college, there may have been five or 10 Brown skin people in the town of Hanover, New Hampshire. I don't know if you've been to New Hampshire. I've been there, there's not many at that time. And then the late 1980s, now of course, there's much more, uh, so, you know, uh, we stay humble and hungry. >>There's a part of our culture in India that's really valued education and hard work and people like Arvin and some of these other people are products. I look up to them, the things I learned from them. And um, you know, it's true of India. It's a really good thing to see these people be successful at name brand American companies, whether it's IBM or Microsoft or Google or Adobe or MasterCard. So we're, we're, I'm in that fan club and there's a lot I learned from that. I just love being around people who love entrepreneurship, love innovation, love technology, and work hard. So congratulations. Thank you so much for your success. Great to see you again soon as you put in the COO of VM-ware here on the ground floor here at RSA conference at Moscone, sharing his insight into the security practice that is now carbon black and VMware. All the good things that are going on there. Thanks for watching.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon We've talked a number of times, but nice to see you here. So the threat of cyber has to cut across now multiple the CIO so often, you know, reports a report directly, sometimes, employees and the idea of a cyber security and physical security. It has to be intrinsic. And again, AirWatch was a big acquisition that you did. that there were certain control points and security that could help, you know, the endpoint, and you could think of endpoint as to both client and workload identity, We saw the same thing. conversation point that I'm interested in operational impact because when you have all these things to operationalize, You guys have been in the operations side of the business for our VMware. Listen, you know, you stay humble and hungry. One of the things that we have as a recipe does acquisition. So one of the deals we did within a month is So this is back to the point. I like to think of things as no more than three to five. So we, you know, uh, we, we've talked about the $10 billion Mark. Dave, a lot that's doing a braking and now he might've already shipped the piece this morning on Hybrid cloud is the pot to the multicloud. and going to Amazon like a Freddie Mac will help you ride your apps into that through VMware. I think cloud multicloud is going to come down to the best choice for the workload serve the old hardware economy and the new hardware economy, which is the, which is the cloud and then of We see, for example, Amazon having a headstart in the public cloud markets, but there's some use cases where Azure although big part of it, the crown jewel as we've been calling them the cube, they announced RSA is being What we support Dell and you know, all the moves that they've made. And I think, you know, the movement of some of these assets between the companies like pivotal to us and so on and so forth, And I think there's a pot to do that because it's an adjacent us and note, um, you know, I always use the term tech athlete, which I think you are one, And you know, Great to see you again soon as you put in the COO
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Brian Warren | PERSON | 0.99+ |
Michael | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Satya Nadella | PERSON | 0.99+ |
Sanjay Poonen | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Dave | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Alibaba | ORGANIZATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Carrie Miller | PERSON | 0.99+ |
Sanjay | PERSON | 0.99+ |
$10 billion | QUANTITY | 0.99+ |
5,000 tablets | QUANTITY | 0.99+ |
Lenovo | ORGANIZATION | 0.99+ |
$2 billion | QUANTITY | 0.99+ |
2 billion | QUANTITY | 0.99+ |
$1 billion | QUANTITY | 0.99+ |
Southwest | ORGANIZATION | 0.99+ |
New Hampshire | LOCATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
MasterCard | ORGANIZATION | 0.99+ |
Sasha | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
India | LOCATION | 0.99+ |
Sundar Pichai | PERSON | 0.99+ |
20 minutes | QUANTITY | 0.99+ |
FIU | ORGANIZATION | 0.99+ |
five bets | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
Freddie Mac | ORGANIZATION | 0.99+ |
Arvin | PERSON | 0.99+ |
Patrick | PERSON | 0.99+ |
20 billion | QUANTITY | 0.99+ |
John Marshall | PERSON | 0.99+ |
VMworld | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
30,000 customers | QUANTITY | 0.99+ |
Vima | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
billions | QUANTITY | 0.99+ |
Rohit | PERSON | 0.99+ |
Southern India | LOCATION | 0.99+ |
Ellen | PERSON | 0.99+ |
30,000 people | QUANTITY | 0.99+ |
NetApp | ORGANIZATION | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
13,000 customers | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
One platform | QUANTITY | 0.99+ |
Pete Gerr, Dell EMC | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angled media. >>Okay, welcome back. Everyone's keeps coverage here in San Francisco for RSA. Copper's 2020. I'm John Farrow, your host, you know, cybersecurity industry's changing and enterprises are now awake to the fact that is now a bigger picture around securing the enterprise cause it's not only the data center, it's cloud, it's the edge. A lot of great stuff. I've got a great guest here from Dell, EMC, Peter Garris, consultant cyber resilient solutions and services marketing, uh, Dell EMC. Great to see you. Thanks for to John. Good to see you again. So you know, I was joking with Dave Alante just this morning around the three ways of cloud, public cloud, hybrid cloud, multi-cloud. And we see obviously the progression hybrid cloud is where everyone spend most of their time. That's from ground to cloud on premises to cloud. Yep. So pretty much everyone knows around on premise is not going away, validated by all the big cloud players. >>But you've got to nail the equation down for on premises to the cloud, whether it's Amazon, Amazon, Azure, Azure, whatever, all those costs. But the multicloud will be a next generation wave that is an industry backdrop and it's very, very key. Plus AI and data are huge inputs into solving a lot of what is going to be new gaps, blind spots, whatever insecurity. So I guess, you know, Dell's has a history with huge client base, traditional enterprises transforming. You're in the middle of all this. So you've got, you know, the airplane at three to 30,000 feet. Yep. And the companies have to swap out their engines and reboot their teams and it's a huge task. What's going on with cyber and the enterprises? What are, what are some of the key things? Well, so I like to keep it pretty simple. I've been in this industry over 20 years and I've really consistently talked about data as the global currency, right. >>So it's beautifully simple. Whatever industry you're in, whatever size company you're in, enterprise or even now, small to medium businesses, their businesses are driven by data connectivity. That data availability of the data, integrity of the data and confidentiality of the data, and so the sort of the area of the world that I focus upon is protecting customers. Most valuable data assets now, whether those are on prem, in the cloud or in a variety of modalities, and ensuring that those assets are protected and isolated from the attack surface and then ability to recover those critical assets quickly so they can return resume business operations. That's really the area that I work in. Now, that data, as you pointed out, it could start on prem, it could live in multi-cloud, it can live in a hybrid environment. The key is really to to understand that not all data is created equally if you were to have a widespread cyber attack, really the key is to bring up those critical applications, systems and datasets first to return to business operations. >>Really challenging. You know, it's not funny. It's actually, I just, I run it, but it's, it's, it's, it's really kind of indicative of the society now is that EMC was bought by Dell storage and the idea of disruption was always been a storage concept. Yes, we want, we don't want a lot of disruption when we're doing things right. So not know whether it's backup and recovery or cyber ransomware, whatever it is, the idea of non-disruptive operations. Absolutely. A core tenant. Now that's obviously the same for cyber as you can tell. So I've got to ask you, what is your definition in view of cyber resilience because, well, that's what we're talking about here. Cyber resilience. What's your view on this? So when we started developing our cyber recovery solution about five years ago, we used, uh, the NIST cybersecurity framework, which is a very well known standard that defines really five pillars of how organizations can think about building a cyber resilience strategy. >>A cyber resilience strategy really encompasses everything from a perimeter threat detection and response all the way through incident response after an attack. And everything that happens in between protecting the data and recovering the data, right? And critical systems. So I think of cyber resilience is that holistic strategy of protecting an organization and its data from a cyber attack as great insight. I want to get your thoughts on how that translates into the ecosystem. Okay. Because there's an ecosystem around cyber resilience. Absolute, let's just say, and you may or may not be able to comment on this, but RSA was now being sold. Yeah, no, that's fair. That's going out of the Dell family. But you guys have, you know, obviously VMware and insecure words, but it's not just you guys. It's an ecosystem. It really is. Does Dell now without, with and without RSA fit into the ecosystem. >>So as I mentioned, cyber resilience is really thought of as a holistic strategy. RSA and, and other Dell assets like carbon black, um, fit in somewhere in that continuum. Right? So RSA is really more on threat detection and response, perimeter protection. The area of the business that I work on, data protection and cyber recovery really doesn't address the, um, prevention of attacks. We really start with the premise that preventing a cyber attack is not a hundred percent possible. If you believe that, then you need to look at protecting and recovering your assets. Right? And so whether it's RSA, whether it's carbon black, whether it's secure works, which is about cyber incident and response, we really work across those groups. It's, it's about technology processes and people. It's not any one thing. We also work outside of the Dell technologies umbrella. So we integrate, our cyber recovery solution is integrated with Unisys stealth. >>Uh, so there's an example of how we're expanding and extending the cyber recovery solution to bring in, you know, other industry standards. You know, it's interesting, I talked to a lot of people that come on the Q of history here at RSA. Sure. Everyone wants better technology, but this also has shipped back the best of breed because you one of the best new technologies. At the same time, you've gotta have proven solutions. So what are you guys selling? What is the best of breed from, uh, Dell? Yeah, you guys are delivering to customers. What are some of the areas? So I, I'm old EMC guy myself, right? And, and back from the days of disaster recovery and business continuity, right? More traditional data protection and backup. The reality is that the modern threats of cyber sec of cyber hackers, breaches, insider attacks, whatever you like, those traditional data protection strategies weren't built to address those types of threats. >>So along with transformation and modernization, we need to modernize our data protection. That's what cyber recovery is. It's a modern solution to the modern threat. And what it does is it augments your data or your, excuse me, your disaster recovery and your backup environment with a purpose built isolated air gap digital vault, which is built around our proven data domain and power protect DD platforms. Uh, that, you know, I've been around for over a decade. Um, but what we've done is added intelligence, uh, analytics. We've hardened that system and we isolate it. Uh, so customers can protect really the most valuable assets in that kind of evolved. So one of the things I've been doing some research on and digging into is cyber resilience, which you just talked about cybersecurity, which is the industry trend and you're getting at cyber recovery. Okay. Can you talk about some examples of how this all threads together? >>What are some real recent examples? Sure. So think of cyber recovery as a purpose-built digital vault to secure your most valuable assets. Let me give you an example. One of our customers, is it a global paint manufacturer? Okay. And when we work with them to try to decide what of their apps and datasets should go into this cyber recovery vault, it said, what is the most critical intellectual property that you have? So in their Kenyan, Oh, some customers might say my Oracle financials or my office three 65 environment. For this customer it was their proprietary paint matching system. So they generate 80 to $100 million every day based upon this proprietary paint matching system, which they've developed and which they use every day to run their business. If that application, if those algorithms were destroyed, contaminated or you know, posted on the public internet somewhere, that would fundamentally change that company. >>So that's really what we're talking about. We're working with customers to help them identify their most critical assets, data systems, applications, and isolate those from the threat vector. Obviously all verticals are impacted by cyber security. Every vertical is data-driven. That's true. Obviously the low hanging fruit, are they below the normal suspects financial services? Is there, is there a particular one that's harder than having financial services got fraud and all that stuff on it, but yeah, that's still number one or so. I think there's two sides to the coin. One, if you look at the traditional enterprise environments, absolutely financial services in healthcare because they're both heavily regulated, uh, therefore that data has very high value and is a very attractive target to the Woodby hackers. If you look on the other end of the spectrum though, the small to medium businesses that all rely on the internet for their business to run, uh, they're the ones that are most susceptible because they don't have the budgets, the infrastructure or the expertise to protect themselves from a sophisticated hacker. >>Um, so we, you know, we work across all verticals. Obviously the government is also very susceptible to cyber threats, but it's every industry, any business that's data-driven. I mean, everyone's been breached so many times and no one even knows how many times. Uh, I gotta ask you about, um, um, some cool trends we're reporting on here. Sure. Homomorphic encryption is getting a lot of traction here because financial services in healthcare homomorphic homomorphic yeah. Okay. Did I say that right? Oh, it's the first time I've ever heard that term, John. I, it's encryption at end use. So you have data at rest, data in flight and data and use encryption. When you're doing all, you're protecting all your transactional data. Ah, so it's focusing with discovery. Intel's promoting it. Uh, we just covered a startup that's doing that as well. That's new, that's new for me, but allows for more use cases, but data and use, not just motion static. >>Yeah. That's opening up these other things. But it brings up the why, why that's important. And the reason is, is that financial services and healthcare, because they're regulated. Yes. Have systems that were built many moons ago or generations. Absolutely. So there was not these problems that you mentioned earlier that were built for that, but now you need more data. AI needs sharing of data sharing is a huge deal. Real time share real time. Right. And I think that's where the homomorphic encryption comes in. That's exactly right. So you mentioned that, so these industries, how can they maintain their existing operations and then get more data share? Do you have any insight into how you see that? Because that's one of those areas that's becoming like, okay, HIPAA, we know why that was built, but it's also restrictive. Yeah. How do you maintain the purity of a process if your infrastructure is, is old? >>That is, that is a challenge. Healthcare especially because, I mean, if I'm, if I'm, uh, you know, running a health system, every dollar that I have should really go into improving patient care, not necessarily into my it infrastructure, but the more that every industry moves towards a real time data-driven model for, for how we give care. Right? Yeah. Um, the more that, uh, companies need to realize that data drives their business, they need to do everything they can to protect it and also ensure that they can recover it when and if a cyber attack happens. Well, I really appreciate the insight and it's going to be great to see Dell technologies world coming up. We'll dig into a lot of that stuff while we're here on talking to us about some of this financial service in banking. I want to get your thoughts, I've been hearing this term sheltered Harbor. >>Yeah. Being kicked around. What does that about? What does that mean? Sheltered Harbor? You're right, I think you'll hear a lot more about it. So sheltered Harbor, uh, was, uh, is it isn't financial industries group and it's also a set of, uh, best practices and specifications. And really the, the purpose of sheltered Harbor is to protect consumer and financial institutions data, uh, and public confidence in the U S financial system. So the, the, the use cases, this, you can imagine that a, a bank having a cyber attack and B being unable to produce transactions could cause problems for customers of that bank. But the, just like we were talking about the interconnectedness of the banking system means that one financial institution failing because of a cyber attack, it could trigger a cascade and a panic and a run on the U S financial banks. And therefore the global financial system sheltered Harbor was developed to really protect public confidence in the financial system by ensuring that banks, brokerages, credit unions are protecting their customer data, their account records, their most valuable assets from cyber attack and that they can recover them and resume banking operations quick. >>So this is an industry group. It's an industry build group. Sheltered Harbor is a U S financial, uh, industry group. Uh, it's a nonprofit. You can, you can learn more about it. It's sheltered harbor.org. Uh, the interesting thing for Dell technologies is we're actually the first member of the sheltered Harbor solution provider program and we'll be announcing that shortly. In fact this week and we'll have a cyber recovery for sheltered Harbor solution in the market very shortly. Cyber resilience. Great topic, and you know, it just goes to show storage has never gone away. The basic concepts of it, recovery, continuous operations, not disruptive operations. Yeah, cloud scale changes the game. It's all about the data. All about the data. Still sites, RSA coverage here, cube day, two of three days of coverage. I'm John furrier here on the ground floor in Moscone in San Francisco. Thanks for watching.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon So you know, I was joking with Dave Alante just And the companies have to swap out their engines and reboot their teams and it's a huge task. isolated from the attack surface and then ability to recover those Now that's obviously the same for cyber as you can tell. And everything that happens in between protecting the data and recovering the data, right? that, then you need to look at protecting and recovering your assets. to bring in, you know, other industry standards. So one of the things I've been doing some research on and digging into is cyber resilience, intellectual property that you have? the other end of the spectrum though, the small to medium businesses that all rely on the internet So you have data at rest, data in flight and data So there was not these problems that you mentioned earlier that Well, I really appreciate the insight and it's going to be great to see Dell technologies world coming up. So the, the, the use cases, this, you can imagine that a, and you know, it just goes to show storage has never gone away.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Farrow | PERSON | 0.99+ |
Dave Alante | PERSON | 0.99+ |
John | PERSON | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Pete Gerr | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
three days | QUANTITY | 0.99+ |
80 | QUANTITY | 0.99+ |
two sides | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.99+ |
Peter Garris | PERSON | 0.99+ |
Unisys | ORGANIZATION | 0.99+ |
$100 million | QUANTITY | 0.99+ |
Azure | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.98+ |
this week | DATE | 0.98+ |
30,000 feet | QUANTITY | 0.98+ |
Dell EMC | ORGANIZATION | 0.98+ |
over 20 years | QUANTITY | 0.98+ |
RSA | EVENT | 0.98+ |
three | QUANTITY | 0.98+ |
HIPAA | TITLE | 0.98+ |
first member | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
RSAC | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.96+ |
hundred percent | QUANTITY | 0.96+ |
sheltered harbor.org | OTHER | 0.95+ |
five pillars | QUANTITY | 0.95+ |
John furrier | PERSON | 0.94+ |
Harbor | ORGANIZATION | 0.93+ |
five years ago | DATE | 0.93+ |
first time | QUANTITY | 0.92+ |
NIST | ORGANIZATION | 0.92+ |
one thing | QUANTITY | 0.91+ |
over a decade | QUANTITY | 0.9+ |
USA | LOCATION | 0.89+ |
Kenyan | OTHER | 0.88+ |
three ways | QUANTITY | 0.84+ |
VMware | ORGANIZATION | 0.84+ |
this morning | DATE | 0.8+ |
first | QUANTITY | 0.8+ |
Silicon | ORGANIZATION | 0.79+ |
U S | ORGANIZATION | 0.76+ |
65 | QUANTITY | 0.76+ |
Woodby | ORGANIZATION | 0.75+ |
many moons | DATE | 0.74+ |
U | ORGANIZATION | 0.68+ |
RSA | TITLE | 0.66+ |
2020 | DATE | 0.64+ |
U | LOCATION | 0.57+ |
prem | ORGANIZATION | 0.55+ |
sheltered | ORGANIZATION | 0.54+ |
many times | QUANTITY | 0.51+ |
RSA | OTHER | 0.47+ |
sheltered Harbor | ORGANIZATION | 0.46+ |
2020 | OTHER | 0.26+ |
Pam Murphy, Imperva | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angled medias. >>Hey, welcome back everybody. Jeff Frick here with the queue. We are wrapping up a Wednesday here at RSA 2020. Again, it's like 50,000 people. This is a huge conference. Everyone has got anything to do with cybersecurity is here. Uh, it's the biggest show, uh, that we cover outside I think of reinvent. So we're excited to have our next guest. She's been on the cube many times but never. And in her current role, she's Pam Murphy, the new CEO of Imperva. Pam, great to see you and congratulations on your new law, on your new gig. Thank you very much. Second month, your second month. So tell us about, you know, kind of what attracted you to the opportunity, you know, kinda, you haven't been there a whole long time, but what's, uh, what's kind of your first impression now that you've been at it for a couple of days? >>I, I'm extremely impressed. It really is. Uh, how would you describe it? Like a dark horse or sort of like the biggest kept secret. So in terms of my previous roles, as you know, we've, you've interviewed me many times, but I've always been in software vendors who basically build applications and sort of build to build databases. Um, and I guess for the last five to eight years it's been all about rebuilt again rearchitecting applications for the cloud. Right. Um, and through that I've managed dev op functions and CCL functions. And so I've been on the consuming side of security. Um, so it's always been a very, you know, area that interested me, Greg Lee, um, as a consumer, you know, obviously the landscape was very much changing. Um, and so I decided to jump over to the other side, right. And lead a company that created and delivered cybersecurity solutions. >>So, uh, so it's been awesome. As I said, month two, uh, Imperva has just amazing products. Um, I didn't quite know when I took the job exactly everything that had had, but when I came over and saw it, it was really working very hard over the last couple of years to acquire new products. And also build and innovate new solutions, uh, to have such a complete AppSec and dataset set of solutions today. I mean, I think, I can't see anybody else in the market right now that has as complete a solution covering ups and data stack that we have. So it's, it's been a really fun time. Um, I must say, you know, it's, uh, it's got a great culture as well. Um, there people have sort of a purpose and sort of, you know, have a feel that they'd be great responsibility sort of making great solutions, which really protect our customer's data and their applications. So it's been really cool. >>No, I saw it on the website. You know, the values are very clearly stated right up front and uh, it's a really important ones. But before we go deeper there, I want to kind of take you back to your old role from a, from a buyer of these services. Because as I, as I walk around the floor here, there are so many vendors, right? Big and small, established and new. So for when you were in your other role and now you, it'll be a great thing for you now that you're on this side of the house, how did you think about sorting it all out? How do you, you know, kind of keep up with, you know, the trusted and true, but yet, you know, kind of the new and innovative in this massive sea of vendors and technologies? >>Totally at one of the things that customers have been saying to me since I came to Imperva is they want a partnership from us because as you rightly said, we're in a sea of loads of vendors, a lot of whom claim to do the same, the same thing effectively. And it's becoming, and I found the same thing when I was on the other side. There is such a sea of clutter right now. It's really hard to sort of find your way through, um, costumers and like myself and my former role, you want fewer vendors, um, and you want to have more complete and integrated solutions. Uh, that's what I wanted and my former role. And that's really what I'm focused on now at Imperva is on the customer side of things. Um, making solutions easier to consume. Um, showing them the breadth of what we have, frankly speaking so that they don't have to go to other solutions. >>I mean your worst nightmare is going to a customer and finding out that you had a, B and C and they didn't realize that you actually had it. So from that perspective, I am bringing the voice of the customer with me from my previous role. It's been echoed and what I'm hearing from our customers now in terms of where they want to see us go and do. Um, so that's really what we're focused on is just doing a better job of giving customers more integrated solutions. Because, you know, as you said, the threat landscape right now, it's becoming really complex. Um, very much automated. Um, you know, in terms of automated attacks, I think by talking to my team this morning, we think based on the data we're seeing right now that bad bots are probably making up like 30% of web traffic right now. Yeah. Yeah. I mean it's getting really hard. Right? And that's in terms of, you know, what they do around account scraping, ATO, um, spam in terms of all the damage that that could do right to you as a customer. So that's what we're focused on. We're focused on, and again, it's bringing from my former old, what do customers need rather than what software companies or tech companies or security companies think that they need. Right. >>Such a good spot. Cause you were in that buyer's seat, you know, just a short, long, short time ago. Cause the other thing you've seen and where you guys applied across a lot of apps in your old space was AI and machine learning and really the power of that apply to lots of different challenges, opportunities and really changing the game now. Now you're fighting against those, those same forces that are being much more sophisticated in their, in their attacks. So when you, when you sit with the team and you look at kind of the evolution of AI, you look at the evolution of 5g and all the IOT connectivity that's going to happen in the increased vulnerabilities. Um, where do you see kind of the solution evolving? Is it just a constant, you know, kind of grind and trying to keep up? Or are there some big strategic things that you see now that you've been here for whatever, all the 60 days? Um, to kind of take advantage of these opportunities. >>So we have this, uh, we call it a threat research group within the company. And their job is to take all the data from the sensors we have. I mean, we have, we look at about 25 petabytes of data every day. All our solutions are cloud solutions as well as on-prem. So we get the benefit of basically seeing all the datas that are hitting our customers every day. I mean, we block a bed 1 million attacks every minutes, like every minute, basically every minute, right? We protect over 3 million databases and you know, we've mitigated some of the largest DDoSs, um, attacks that's ever been reported. So we have a lot of data, right, that we're seen. And the interesting thing is that you're right, we are having to always, we're using that threat research data to see what's happening, how the threat threat landscape is changing there for guiding us on how we need to augment an add to our products to prevent that. >>But interestingly, we're also consuming AI and machine learning as well on our products because we're able to use those solutions to actually do a lot of attack analytics and do a lot of predictive and research for our customers that can kind of guide them about, you know, where things are happening. Because what's happening is that before a lot of the talks were just, um, sort of fast and furious, now we're seeing a pattern towards snow, snow, and continuous, if that makes sense. And so we're seeing all these patterns and threats coming in. Uh, so we're fighting against those technologies like AI, but we're also using those technologies to help us soon, you know, decide where we need to continue to, to add capabilities to stop it. You know, the whole bad box thing wasn't a problem right. A number of years ago. And so it's, it's ever changing in our world, which frankly speaking makes it an interesting place to be because who wants to be in a static, >>in a boring place, no boring here. So another kind of interesting thing about this, this particular industry is the coopertition, you know, kind of aspects to it where there is a lot of sharing across competitors on information when there is some new new type of threat or new kind of threat pattern. So it's a little bit different than, than just a pure competition because there is a, a shared benefit in sharing some of this late breaking news. I don't know if you've started to get into to some of that or had an instant, yeah, it's probably a little bit early, but that's, that's a unique trade I think. >>No, it is for sure. And we make all of our data publicly available. If you go to our website, you look at the CTI index whereby we literally index what we, you know, see the level as being and we're providing all of this data. I mean we get that from our own sensors, but obviously we pull it as well from other third party data sources as well and bring it all together. Um, you know, T to hide that and not make it available to everyone would be would be would be just a very bad thing. Um, for us we are, and I, I'm still trying to find someone, but in terms of most of the vendors out there focus on pieces of apps or pieces of data where we've got both combined, right? Which gives us a huge closed loop advantage of being able to mesh that data together and see the full track record of what's happening from the data from the, from the application down to the data on back again. So that's a benefit that we have that literally we're taking great advantage of right now because in other cases, our competition is sort of point solution based, right? For every one of the best of breed solutions that we have. Right, >>right. It always goes back to the data, right? I mean it's always about the data. >>That's the thing. I mean at the end of the day, uh, why, why is all these things happening? HEOS and attacks and spamming. It's your, as you said, it's to get to the data. And that's why we say we protect data and all paths leading to it because fundamentally that's what customers care about, right? >>Right. So it's crazy. The date is the business and the date is what you're protecting and the business. All right, so put you on the spot. So what are some of your kind of top priorities, you know, kind of out of the gate, they brought you in, you're all excited, you see this great team and opportunity. You know, what are some of the things if we sit down a year from now or maybe six months of black hat that you, uh, that you've got on your plate that you're working on? >>So I think innovation will always be, you know, first and foremost, um, we have Gardner magic quadrant and Forester leading edge products. But in this industry, you need to be paranoid. You always need to be staying ahead. So from an innovation perspective, that's where we're focused. We're working on a lot of cool stuff which we'll be rolling out through the rest of the year. Um, platform as well is really important. I mentioned that we have the unique advantage of having a huge amount of data at the application level and also at the database level and that's allowing us to give use cases and value back to our customers that they don't have right now from any other vendor. So we're working with customers on, on getting that done. Um, I think as well, just purely in terms of, um, publicizing what we have. Right. I think we could do a, I found a lot of things right coming to Imperva and I feel we didn't communicate exactly, exactly. So I think there's a lot of capabilities that we're going to do, um, a lot in terms of publicizing them this year. So there's a lot of really, really cool stuff happening and uh, you know, great momentum going on in the company. Right. >>Well, uh, well, good for them for getting you there. Very fortunate to have you, uh, have you on board. Alright. Right. Well, thanks for taking a few minutes and again, congratulations on your new role. We really look forward to watching this story unfold. All. Alright. Geez, Pam, I'm Jeff. You're watching the cube where at R S a 2020 fear. We're supposed to know everything with the benefit of hindsight, but we're still learning. Thanks for watching. We'll see you next time.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon Pam, great to see you and congratulations on your new law, So in terms of my previous roles, as you know, Um, there people have sort of a purpose and sort of, you know, have a feel that they'd So for when you were in your other role and now you, it'll be a great thing for you now that you're Totally at one of the things that customers have been saying to me since I came to Imperva is they want a all the damage that that could do right to you as a customer. at kind of the evolution of AI, you look at the evolution of 5g and all the IOT connectivity So we have a lot of data, right, that we're seen. to help us soon, you know, decide where we need to continue to, to add capabilities to stop it. this particular industry is the coopertition, you know, kind of aspects to it where there is a lot Um, you know, T to hide that and not make it available to everyone would be I mean it's always about the data. I mean at the end of the day, uh, why, why is all these things happening? you know, kind of out of the gate, they brought you in, you're all excited, you see this great team and opportunity. So I think innovation will always be, you know, first and foremost, um, Well, uh, well, good for them for getting you there.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Greg Lee | PERSON | 0.99+ |
Pam Murphy | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Pam | PERSON | 0.99+ |
30% | QUANTITY | 0.99+ |
60 days | QUANTITY | 0.99+ |
six months | QUANTITY | 0.99+ |
Wednesday | DATE | 0.99+ |
Imperva | ORGANIZATION | 0.99+ |
Second month | QUANTITY | 0.99+ |
50,000 people | QUANTITY | 0.99+ |
second month | QUANTITY | 0.99+ |
first impression | QUANTITY | 0.98+ |
over 3 million databases | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
RSA 2020 | EVENT | 0.98+ |
RSA | EVENT | 0.98+ |
AppSec | TITLE | 0.97+ |
Gardner | ORGANIZATION | 0.97+ |
Forester | ORGANIZATION | 0.97+ |
RSAC | ORGANIZATION | 0.96+ |
eight years | QUANTITY | 0.96+ |
this year | DATE | 0.95+ |
today | DATE | 0.94+ |
about 25 petabytes | QUANTITY | 0.93+ |
first | QUANTITY | 0.91+ |
one | QUANTITY | 0.9+ |
2020 | DATE | 0.89+ |
every minutes | QUANTITY | 0.88+ |
1 million attacks | QUANTITY | 0.87+ |
month two | QUANTITY | 0.87+ |
this morning | DATE | 0.87+ |
CTI | ORGANIZATION | 0.84+ |
five | QUANTITY | 0.83+ |
last couple | DATE | 0.82+ |
number of years ago | DATE | 0.75+ |
years | DATE | 0.69+ |
every day | QUANTITY | 0.68+ |
USA | LOCATION | 0.66+ |
5g | QUANTITY | 0.64+ |
a year | QUANTITY | 0.62+ |
2020 | EVENT | 0.62+ |
minute | QUANTITY | 0.55+ |
Silicon | ORGANIZATION | 0.55+ |
every minute | QUANTITY | 0.55+ |
last | QUANTITY | 0.5+ |
CCL | TITLE | 0.49+ |
R | TITLE | 0.34+ |
Luke Wilson, 4IQ | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Welcome to the cubes coverage here in Moscone in San Francisco for RSA copper's 2020. I'm John hosted the cube and you know, cyber security is the hottest thing. Transforming businesses and you know, old. It has to transform into not only playing defense but playing off fence and understand the threats, how to organize around it. And that's really been a big part of this new next generation architecture operations and just mindset. We've got a great guest here to share his perspective. Luke Wilson, who's the vice president, intelligence for four IQ hot startup but also former FBI counter terrorism of right other DOD state department. Uh, tons of experience on both sides. Now on the commercial side. Luke, thanks for coming on. Thanks for having me. So obviously your background gives you a unique perspective and you know, I've been in uh, in the commercial side, I haven't done any government service like you have, but I can tell you it in the enterprise it's been boring. >>Oh yeah. He has storage, provisioning, storage, business servers, cloud comes in, it gets exciting. Yeah. Startups are doing cloud native lot more robust scale and you starting to see the new applications with that, the security perimeter is gone. It's now a huge surface area. So the enterprise has to get more FBI like or more smarter around how they organize, how they hire. Yeah. This is your, this is your world. Yes, it is. What's your take on this? What's it, what's your view of the industry right now? Well, I think right now what you're seeing is this change from, uh, you know, I hate to be cliche about it, but for years we've been playing whack-a-mole against the bad guys. I've see Matt, you know, uh, at my time at the FBI and various government, different agencies there, um, we're starting to see a shift of alright, we want, they want to know, okay, how is this happening to them? >>So it's just not the, the, what's happened. It's like who's behind it. And you know, in today's, in today's, uh, arena with the, you know, with cyber security, you have to start figuring out what entity is behind these attacks, uh, what they're going after. So you can start protecting that, but then also using that information, that intelligence from there, sharing it with other business sectors and then also turn in that big backend side so you can have some kind of preventive maintenance as well. I mean, you've got a lot going on. There used to be a nice little neat little industry in a box security by some software. You've got the servers, you have firewalls, all that nice stuff. Now you're talking about elaboration. Operating models are changing. A whole new dimension and open source has given a, an ability to cloak, whether it's nation States can now be operating under stealth mode. >>Oh yeah. You have all kinds of new dynamics. What is, what does the company do? You know, how do people solve this? There, there is no one answer or that, you know, it's got, it's gonna take a community, uh, the community of protectors and, uh, groups that want to help solve these issues. Uh, you know, and law enforcement, we always say, you know, it's a, it's a cat and mouse game. We catch up to them and then they change a little, you know, maybe a little bit here and there and then we catch up to him again and, uh, we're just gonna keep playing that game. But you know, uh, businesses, commercial businesses are starting to get into that, into that mode as well of, Hey, just because I defeated something today doesn't mean it's going to be right back at my door tomorrow. You know, you and I saw each other last night at the general Alexander's, uh, talk, uh, and he's always been all about offense, defense and understanding visibility and signals. >>Um, you know, there's a lot to do there. Um, you got to know where things are coming from. There's a lot of shared responsibility, but shared work, right? It's like, yes, we want, there's a lot of redundancy going on in security now. Oh yeah. And within and without pumping. So the collaboration, you mentioned the big part, how do you see that evolving that you work with the FBI counterterrorism, you kind of see how this kind of thinking renders itself. How does that work in a commercial world? How do you see that evolving? Well, you have certain cyber centers that are built for that kind of model, uh, for, uh, helping, you know, commercial, uh, industries, uh, deal with that threat. You know, there's no, uh, one tool, one company that can protect itself from a nation state attack. Uh, we've seen that, you know, so, uh, the best thing that's happening right now is people are starting to understand in order to get the entire, um, I would say the topology of the attack, that's that that's affecting you. >>You're going to have to share this information. You're going to have to learn from other groups. Uh, law enforcement, intelligence agencies are sharing. Um, and, you know, it's quite frankly, it's, it's, we're kind of late in the game of sharing, which the criminals have been doing this now for years, you know, sharing that information and understanding who to attack them, when to attack. Yeah. And they've been been winning. So I gotta ask you, as someone who's been in the industry now, and I'm book both sides, you look at RSA this year, um, besides the headline of the coronavirus who's got a backdrop to all of this, there's still a huge show here and, and the trends are changing. It seems to be the scene game, whack a mole on steroids, but now you've got cloud. What's new out there that, that's getting you excited? What do you think people should be paying attention to? >>Why? I think what people should be paying attention to is now a lot of the, I would say the products and the tools that are coming out are actually being developed by people who are practitioners have been in that space and understand what it takes in order to defeat, uh, the, the types of criminals that you're facing every day. Um, you know, I, I see a lot of products, uh, getting into the, the hoop, you know, and for me, I think that's a very, uh, a very strong point now that you can't just keep saying, I closed this court and that court in this sport and we're good. No, they're just gonna change little thing and come right back in. Um, so I see a lot of tools or act or identification or identification time attribution, um, people are trying to get to the who in this space now in order to turn that back around for prevention as well. >>So something where normally this is, you know, an FBI, uh, uh, you know, a federal government, uh, uh, agency trying to figure out the who, a lot of the tools and, and some of the, uh, you know, the data today is helping out with that for private industry. So that are great point gradient site by the way. I love that. I love that angle on that. What about meal time? Because now real time is a big one and people are overworked. It's a pile of threat detection out there. Like, Hey, there's some stuff happening in another company. So people are buying feeds. I get it right now. You need a data processing perspective. You've got to get the data. How does that, how do you see that whole challenge become an opportunity? Well, you know, uh, we're a data driven society now, right? So everything has data connected to it. >>Um, you know, and, and you're getting that amount of data stream float into your commercial entity. You know, first of all, it needs to be automated. You're going to have, you know, a lot, a lot of data to sift and sort through to understand what's actually happening here. So I think the, the, you know, that that live feed going real time is very helpful, but also content, uh, you know, put some context context behind that and having and having that, that information fully digested so you can understand what's the threat, how's it coming at you. And then using that for prevention. Super exciting time. I want to get into your experience and how that translates into maybe your advice for people that are kinda kind of waking up from lack of multiple, kind of being more of a kind of a versatile athlete, if you will, athletes, cyber athletes. >>Um, but I gotta ask you about, um, the idea of threats that are coming in that you seen in the FBI that enterprises should be paying attention. Because I'll give you an example. I'll say, Luke, I'm good. My it department covering this for years. I don't really have anything that's valuable, right? So I'm good. I got my patches done, so I don't really need to buy anything from you or I'm good, right? Not everyone's saying that, but that can be the mentality at different spectrum of, all right, so what do, what do you say to that? Well, you know, besides, I'm an idiot, you know, we see that a lot and I think, um, you have to, that, that's a very big naive approach about it. Um, you know, you also have to start thinking about, are you good with your insider threat? Are you good with your third party risks, you know, threats. >>Um, so there's so many things going down the line. When you look at what it takes for, let's say a large financial institution to run, would it take for a large, uh, company like an Uber or Lyft to run? Um, you know, there's, there's threats there and if you're saying you don't have any threats and you're, you're, you're OK, then uh, you know, I would say that's a, that's another, it's being polite, being polite. What you're saying is, no, you're not. Okay. Well, I mean, cause if, think about it, if you're just running a main small little manufacturing operation, I don't have any IP, but your operations is your IP. You might be exposed for ransomware or some, you know what I'm saying? There's always disruption. This has been kind of an interesting, there's a mindset. It's not just what you think you have. There's a holistic view. >>What's your take on the reaction to that? Yeah. It isn't the holistic view. You have to take that approach. You've seen what's happening nowadays, especially within the ransomware. Uh, you know, it's, it may come from a third party that basically didn't secure their systems, but they knew exactly what they went with, the cyber criminal, exactly what they were doing because they solely wanted to attack you and they knew the weakest link was three steps down from you. And so that's exactly where they went to. You know, I love these conversations and not, you know, a lot. I'm a Patriot and I love to help our country. I do my best. I don't really serve in the government, but one of the things I feel strongly about and people know I rant about this all the time when I'm on the cube is that digital war is happening and I really believe that, you know, our, we're a free society. >>You can't lock every door in this country. You've got borders, physical borders, so digital borders or if we're open society, you can't really be defensive all the time. Yeah. So if someone does strike us, our answers especially been counter strike back with a vengeance. Exactly. Which is how the deterrent is. But digitally, where's that line? I mean if you drop chips in Manhattan, you know you're, we're a tapping attack. What's the digital drawing in your opinion? Because this is something that Noah's talking about, but it's kind of paper cuts is that there's a line of knowing is are we being attacked? It's the who. What's your view on this? I know it's a new emerging area. Yeah. Aye. Aye. Aye. I seem to I think a little bit on both sides here. I want to do something back, but I don't think I'm most special, especially commercial businesses. >>Understand what that means. Actually find some attribution and then say, you know, it is this entity or this country that's doing that and it's kind of a slippery slope when you start getting out of that cutting edge societal issue. Because I mean the government has a military to protect me, right? But if I'm a cyber company, I going to build my own military digital military. Now what are we talking about here? I mean, it's interesting. It's, it's again, that's why I start seeing a lot. If you look at the place, you know around here you start looking at some of these tools, they are offensive weapons. When you look at them, these are weapons to understand, well not weapons, but tools to understand who and you already know what happened. And so now you get the who and the why, right? Yeah. You can't really strike back. >>But what you could do is turn that back inward and say, okay, I'm going to start preventing this stuff. Yeah. Right. But then also, Hey, I can go to the, you know, the FBI and say, here's a nice neat packet of information on what happened to me and who we believe it to be. And that's where that conversation starts to happen. And I'm really excited by the digital twin and the simulation environments where you can start having flex, you can flex scenarios to do, use some of this scenario based planning so you can protect and plan for scenarios which is reacting to it. Yeah. Yeah. The digital training space, when he got there, you know, and it just like you stated earlier, right? You know, the, the, the United States military goes out here and trains for certain scenarios all the time. Companies have to start doing that because that's what's happening to them. >>You know, they're, you're right on the money. I love the insight. Thanks for sharing. Greetings. I love that you got to get the reps and you got to do the operations. You got to nail that. So just give a quick plug before IQ. Thanks for sharing your awesome insight. What do you guys do and what are you guys all about? What's your value proposition? Great. Yeah, we're, we're identity intelligence company. Oh, what that means is that we have tools and products that's going to allow our clients get to that who, you know, uh, and we also have tools that allow them to get to the what as well. So we're on both sides of a, of the fence there. Um, we're trying to get left of boom, what they call it. Um, but our data and our intelligence allows us clients to find the bad guy. >>A very simple, we have some AI and machine learning built into there where it's almost like a click of a button, I can expand and figure out who these individuals are and understand their TTPs. And what we want to do is make automation of these different types of tools easier and faster for the clients to use. So you want to bring intelligence into their visibility space or data space or, yes, I actionable intelligence. Yeah. So basically in their, into their digital space of understanding, you know, their attack surface, understanding what problems that they're having. And then we have, um, you know, like I said, a lot of tools and, and, and, and, and, um, it's, I would call it tell who calls you out, who's the customer, who's the buyer, the IOC show? Is it, uh, uh, off-gas? What's the, who's buying your stuff? So mainly what we're into a lot of, um, cyber fraud, fusion centers, just like that. >>Law enforcement intelligence agencies. Um, I would say, you know, I, I know for a fact that I wouldn't use this, you know, if I had this tool and the FBI. Um, and, and, and a lot of, you know, if you have a large digital footprint, uh, we have cryptocurrency companies using this as well. Um, you know, you're, you're seeing some, some, some pretty bad guys attacking your systems, trying to defraud you. Our product helps you out with that. Right. Luke, great conversation. Thanks for coming on. Appreciate RSA coverage. Taking the show. What's the hot thing at the show? What's your favorite moment here? What's, what's the big story here at RSA? I w I would say, uh, for me it's this, uh, sit in the one, uh, Ashton Martin sit now, you know, every year there's something different. You know, I go to these Bitcoin conferences and I see they usually have Lamborghinis out for it. And now I think this is happening. So yeah, I don't know if we're trending in that direction now. Get in that car and we're gonna erase away. Great. Luke Wilson, VP of intelligence before I Q a here inside the cube, the cube coverage show our say I'm John furrier. Thanks for watching.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon I'm John hosted the cube and you know, cyber security is the hottest thing. uh, you know, I hate to be cliche about it, but for years we've been playing whack-a-mole against the bad guys. in today's, in today's, uh, arena with the, you know, with cyber security, But you know, uh, businesses, commercial businesses are Um, you know, there's a lot to do there. Um, and, you know, the hoop, you know, and for me, I think that's a very, uh, a lot of the tools and, and some of the, uh, you know, the data today is helping Um, you know, and, and you're getting that amount of data stream float into your commercial Um, you know, you also have to start thinking then uh, you know, I would say that's a, that's another, it's being polite, Uh, you know, I mean if you drop chips in Manhattan, you know you're, we're a tapping attack. then say, you know, it is this entity or this country that's But then also, Hey, I can go to the, you know, the FBI and say, to that who, you know, uh, and we also have tools that allow them to get to the you know, like I said, a lot of tools and, and, and, and, and, um, it's, I would call it tell who calls I know for a fact that I wouldn't use this, you know, if I had this tool and the FBI.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Luke Wilson | PERSON | 0.99+ |
Matt | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Luke | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Noah | PERSON | 0.99+ |
Manhattan | LOCATION | 0.99+ |
tomorrow | DATE | 0.99+ |
Ashton Martin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
Lyft | ORGANIZATION | 0.99+ |
both sides | QUANTITY | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
RSAC | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.98+ |
today | DATE | 0.98+ |
one tool | QUANTITY | 0.98+ |
three steps | QUANTITY | 0.98+ |
last night | DATE | 0.98+ |
Alexander | PERSON | 0.98+ |
RSA | EVENT | 0.97+ |
one company | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
RSA | ORGANIZATION | 0.95+ |
USA | LOCATION | 0.95+ |
one | QUANTITY | 0.94+ |
United States | ORGANIZATION | 0.9+ |
Silicon angle | ORGANIZATION | 0.89+ |
coronavirus | OTHER | 0.87+ |
2020 | DATE | 0.85+ |
Lamborghinis | ORGANIZATION | 0.85+ |
four IQ | QUANTITY | 0.81+ |
John furrier | PERSON | 0.76+ |
IOC | ORGANIZATION | 0.73+ |
4IQ | ORGANIZATION | 0.71+ |
VP | PERSON | 0.63+ |
2020 | EVENT | 0.57+ |
RSA | TITLE | 0.55+ |
2020 | ORGANIZATION | 0.45+ |
Jamil Jaffer, IronNet | RSAC USA 2020
>>Bye from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Hey, welcome back. Everyone's keeps coverage here in San Francisco at the Moscone center for RSA conference 2020 I'm John, your host, as cybersecurity goes to the next generation as the new cloud scale, cyber threats are out there, the real impact a company's business and society will be determined by the industry. This technology and the people that a cube alumni here, caramel Jaffer, SVP, senior vice president of strategy and corporate development for iron net. Welcome back. Thanks to Shawn. Good to be here. Thanks for having so iron net FC general Keith Alexander and you got to know new CEO of there. Phil Welsh scaler and duo knows how to scale up a company. He's right. Iron is doing really well. The iron dome, the vision of collaboration and signaling. Congratulations on your success. What's a quick update? >> Well look, I mean, you know, we have now built the capability to share information across multiple companies, multiple industries with the government in real time at machine speed. >>Really bringing people together, not just creating collected security or clip to defense, but also collaborating real time to defend one another. So you're able to divide and conquer Goliath, the enemy the same way they come after you and beat them at their own game. >> So this is the classic case of offense defense. Most corporations are playing defense, whack-a-mole, redundant, not a lot of efficiencies, a lot of burnout. Exactly. Not a lot of collaboration, but everyone's talking about the who the attackers are and collaborating like a team. Right? And you guys talk about this mission. Exactly. This is really the new way to do it. It has, the only way it works, >> it is. And you know, you see kids doing it out there when they're playing Fortnite, right? They're collaborating in real time across networks, uh, to, you know, to play a game, right? You can imagine that same construct when it comes to cyber defense, right? >>There's no reason why one big company, a second big company in a small company can't work together to identify all the threats, see that common threat landscape, and then take action on it. Trusting one another to take down the pieces they have folk to focus on and ultimately winning the battle. There's no other way a single company is gonna be able defend itself against a huge decency that has virtually unlimited resources and virtually unlimited human capital. And you've got to come together, defend across multiple industries, uh, collectively and collaboratively. >> Do you mean, we talked about this last time and I want to revisit this and I think it's super important. I think it's the most important story that's not really being talked about in the industry. And that is that we were talking last time about the government protects businesses. If someone dropped troops on the ground in your neighborhood, the government would protect you digitally. >>That's not happening. So there's really no protection for businesses. Do they build their own militia? Do they build their own army? Who was going to, who's going to be their heat shield? So this is a big conversation and a big, it brings a question. The role of the government. We're going to need a digital air force. We're going to need a digital army, Navy, Navy seals. We need to have that force, and this has to be a policy issue, but in the short term, businesses and individuals are sitting out there being attacked by sophisticated mission-based teams of hackers and nation States, right? Either camouflaging or hiding, but attacking still. This is a huge issue. What's going on? Are people talking about this in D C well, >> John, look not enough. People are talking about it, right? And forget DC. We need to be talking about here, out here in the Silicon Valley with all these companies here at the RSA floor and bring up the things you're bringing up because this is a real problem we're facing as a nation. >>The Russians aren't coming after one company, one state. They're coming after our entire election infrastructure. They're coming after us as a nation. The Chinese maybe come after one company at a time, but their goal is to take our electoral properties, a nation, repurpose it back home. And when the economic game, right, the Iranians, the North Koreans, they're not focused on individual actors, but they are coming after individual actors. We can't defend against those things. One man, one woman, one company on an Island, one, one agency, one state. We've got to come together collectively, right? Work state with other States, right? If we can defend against the Russians, California might be really good at it. Rhode Island, small States can be real hard, defends against the Russians, but if California, Rhode Island come together, here's the threats. I see. Here's what it's. You see share information, that's great. Then we collaborate on the defense and work together. >>You take these threats, I'll take those threats and now we're working as a team, like you said earlier, like those kids do when they're playing fortnight and now we're changing the game. Now we're really fighting the real fight. >> You know, when I hear general Keith Alexander talking about his vision with iron net and what you guys are doing, I'm inspired because it's simply put, we have a mission to protect our nation, our people, and a good businesses, and he puts it into kind of military, military terms, but in reality, it's a simple concept. Yeah, we're being attacked, defend and attack back. Just basic stuff. But to make it work as the sharing. So I got to ask you, I'm first of all, I love the, I love what he has, his vision. I love what you guys are doing. How real are we? What's the progression? >>Where are we on the progress bar of that vision? Well, you know, a lot's changed to the last year and a half alone, right? The threats gotten a lot, a lot more real to everybody, right? Used to be the industry would say to us, yeah, we want to share with the government, but we want something back for, right. We want them to show us some signal to today. Industry is like, look, the Chinese are crushing us out there, right? We can beat them at a, at some level, but we really need the governor to go do its job too. So we'll give you the information we have on, on an anonymized basis. You do your thing. We're going to keep defending ourselves and if you can give us something back, that's great. So we've now stood up in real time of DHS. We're sharing with them huge amounts of data about what we're seeing across six of the top 10 energy companies, some of the biggest banks, some of the biggest healthcare companies in the country. >>Right? In real time with DHS and more to come on that more to come with other government agencies and more to come with some our partners across the globe, right? Partners like those in Japan, Singapore, Eastern Europe, right? Our allies in the middle East, they're all the four lenses threat. We can bring their better capability. They can help us see what's coming at us in the future because as those enemies out there testing the weapons in those local areas. I want to get your thoughts on the capital markets because obviously financing is critical and you're seeing successful venture capital formulas like forge point really specialized funds on cyber but not classic industry formation sectors. Like it's not just security industry are taking a much more broader view because there's a policy implication is that organizational behavior, this technology up and down the stack. So it's a much broad investment thesis. >>What's your view of that? Because as you do, you see that as a formula and if so, what is this new aperture or this new lens of investing to be successful in funding? Companies will look, it's really important what companies like forge point are doing. Venture capital funds, right? Don Dixon, Alberta Pez will land. They're really innovating here. They've created a largest cybersecurity focused fund. They just closed the recently in the world, right? And so they really focus on this industry. Partners like, Kleiner Perkins, Ted Schlein, Andrea are doing really great work in this area. Also really important capital formation, right? And let's not forget other funds. Ron Gula, right? The founder of tenable started his own fund out there in DC, in the DMV area. There's a lot of innovation happening this country and the funding on it's critical. Now look, the reality is the easy money's not going to be here forever, right? >>It's the question is what comes when that inevitable step back. We don't. Nobody likes to talk about it. I said the guy who who bets on the other side of the craps game in Vegas, right? You don't wanna be that guy, but let's be real. I mean that day will eventually come. And the question is how do you bring some of these things together, right? Bring these various pieces together to really create long term strategies, right? And that's I think what's really innovative about what Don and Alberto are doing is they're building portfolio companies across a range of areas to create sort of an end to end capability, right? Andrea is doing things like that. Ted's doing stuff like that. It's a, that's really innovation. The VC market, right? And we're seeing increased collaboration VC to PE. It's looking a lot more similar, right? And now we're seeing innovative vehicles like stacks that are taking some of these public sort of the reverse manner, right? >>There's a lot of interests. I've had to be there with Hank Thomas, the guys chief cyber wrenches. So a lot of really cool stuff going on in the financing world. Opportunities for young, smart entrepreneurs to really move out in this field and to do it now. And money's still silver. All that hasn't come as innovation on the capital market side, which is awesome. Let's talk about the ecosystem in every single market sector that I've been over, my 30 year career has been about a successful entrepreneurship check, capital two formation of partnerships. Okay. You're on the iron net, front lines here. As part of that ecosystem, how do you see the ecosystem formula developing? Is it the same kind of model? Is it a little bit different? What's your vision of the ecosystem? Look, I mean partnerships channel, it's critical to every cyber security company. You can't scale on your own. >>You've got to do it through others, right? I was at a CrowdStrike event the other day. 91% of the revenue comes from the channel. That's an amazing number. You think about that, right? It's you look at who we're trying to talk about partnering with. We're talking about some of the big cloud players. Amazon, Microsoft, right? Google, right on the, on the vendor side. Pardon me? Splunk crashes, so these big players, right? We want to build with them, right? We want to work with them because there's a story to tell here, right? When we were together, the AECOS through self is defendant stronger. There's no, there's no anonymity here, right? It's all we bring a specialty, you bring specialty, you work together, you run out and go get the go get the business and make companies safer. At the end of the day, it's all about protecting the ecosystem. What about the big cloud player? >>Cause he goes two big mega trends. Obviously cloud computing and scale, right? Multi-cloud on the horizon, hybrids, kind of the bridge between single public cloud and multi-cloud and then AI you've got the biggies are generally will be multiple generations of innovation and value creation. What's your vision on the impact of the big waves that are coming? Well, look, I mean cloud computing is a rate change the world right? Today you can deploy capability and have a supercomputer in your fingertips in in minutes, right? You can also secure that in minutes because you can update it in real time. As the machine is functioning, you have a problem, take it down, throw up a new virtual machine. These are amazing innovations that are creating more and more capability out there in industry. It's game changing. We're happy, we're glad to be part of that and we ought to be helping defend that new amazing ecosystem. >>Partnering with companies like Microsoft. They didn't AWS did, you know, you know, I'm really impressed with your technical acumen. You've got a good grasp of the industry, but also, uh, you have really strong on the societal impact policy formulation side of government and business. So I want to get your thoughts for the young kids out there that are going to school, trying to make sense of the chaos that's going on in the world, whether it's DC political theater or the tech theater, big tech and in general, all of the things with coronavirus, all this stuff going on. It's a, it's a pretty crazy time, but a lot of work has to start getting done that are new problems. Yeah. What is your advice as someone who's been through the multiple waves to the young kids who have to figure out what half fatigue, what problems are out there, what things can people get their arms around to work on, to specialize in? >>What's your, what's your thoughts and expertise on that? Well, John, thanks for the question. What I really like about that question is is we're talking about what the future looks like and here's what I think the future looks like. It's all about taking risks. Tell a lot of these young kids out there today, they're worried about how the world looks right? Will America still be strong? Can we, can we get through this hard time we're going through in DC with the world challenges and what I can say is this country has never been stronger. We may have our own troubles internally, but we are risk takers and we always win. No matter how hard it gets them out of how bad it gets, right? Risk taking a study that's building the American blood. It's our founders came here taking a risk, leaving Eagle to come here and we've succeeded the last 200 years. >>There is no question in my mind that trend will continue. So the young people out there, I don't know what the future has to hold. I don't know if the new tape I was going to be, but you're going to invent it. And if you don't take the risks, we're not succeed as a nation. And that's what I think is key. You know, most people worry that if they take too many risks, they might not succeed. Right? But the reality is most people you see around at this convention, they all took risks to be here. And even when they had trouble, they got up, they dust themselves off and they won. And I believe that everybody in this country, that's what's amazing about the station is we have this opportunity to, to try, if we fail to get up again and succeed. So fail fast, fail often, and crush it. >>You know, some of the best innovations have come from times where you had the cold war, you had, um, you had times where, you know, the hippie revolution spawn the computer. So you, so you have the culture of America, which is not about regulation and stunting growth. You had risk-taking, you had entrepreneurship, but yet enough freedom for business to operate, to solve new challenges, accurate. And to me the biggest imperative in my mind is this next generation has to solve a lot of those new questions. What side of the street is the self driving cars go on? I see bike lanes in San Francisco, more congestion, more more cry. All this stuff's going on. AI could be a great enabler for that. Cyber security, a direct threat to our country and global geopolitical landscape. These are big problems. State and local governments, they're not really tech savvy. They don't really have a lot ID. >>So what do they do? How do they serve their, their constituents? You know, look John, these are really important and hard questions, but we know what has made technology so successful in America? What's made it large, successful is the governor state out of the way, right? Industry and innovators have had a chance to work together and do stuff and change the world, right? You look at California, you know, one of the reasons California is so successful and Silicon Valley is so dynamic. You can move between jobs and we don't enforce non-compete agreements, right? Because you can switch jobs and you can go to that next higher value target, right? That shows the value of, you know, innovation, creating innovation. Now there's a real tendency to say, when we're faced with challenges, well, the government has to step in and solve that problem, right? The Silicon Valley and what California's done, what technology's done is a story about the government stayed out and let innovators innovate, and that's a real opportunity for this nation. >>We've got to keep on down that path, even when it seemed like the easier answer is, come on in DC, come on in Sacramento, fix this problem for us. We have demonstrated as a country that Americans and individual are good at solve these problems. We should allow them to do that and innovate. Yeah. One of my passions is to kind of use technology and media to end communities to get to the truth faster. A lot of, um, access to smart minds out there, but young minds, young minds, uh, old minds, young minds though. It's all there. You gotta get the data out and that's going to be a big thing. That's the, one of the things that's changing is the dark arts of smear campaigns. The story of Bloomberg today, Oracle reveals funding for dark money, group biting, big tech internet accountability projects. Um, and so the classic astroturfing get the Jedi contract, Google WASU with Java. >>So articles in the middle of all this, but using them as an illustrative point. The lawyers seem to be running the kingdom right now. I know you're an attorney, so I'm recovering, recovering. I don't want to be offensive, but entrepreneurship cannot be stifled by regulation. Sarbanes Oxley slowed down a lot of the IPO shifts to the latest stage capital. So regulation, nest and every good thing. But also there's some of these little tactics out in the shadows are going to be revealed. What's the new way to get this straightened out in your mind? We'll look, in my view, the best solution for problematic speech or pragmatic people is more speech, right? Let's shine a light on it, right? If there are people doing shady stuff, let's talk about it's an outfit. Let's have it out in the open. Let's fight it out. At the end of the day, what America's really about is smart ideas. >>Winning. It's a, let's get the ideas out there. You know, we spent a lot of time, right now we're under attack by the Russians when it comes to our elections, right? We spent a lot of time harping at one another, one party versus another party. The president versus that person. This person who tells committee for zap person who tells committee. It's crazy when the real threat is from the outside. We need to get past all that noise, right? And really get to the next thing which is we're fighting a foreign entity on this front. We need to face that enemy down and stop killing each other with this nonsense and turn the lights on. I'm a big believer of if something can be exposed, you can talk about it. Why is it happening exactly right. This consequences with that reputation, et cetera. You got it. >>Thanks for coming on the queue. Really appreciate your insight. Um, I want to just ask you one final question cause you look at, look at the industry right now. What is the most important story that people are talking about and what is the most important story that people should be talking about? Yeah. Well look, I think the one story that's out there a lot, right, is what's going on in our politics, what's going on in our elections. Um, you know, Chris Krebs at DHS has been out here this week talking a lot about the threat that our elections face and the importance about States working with one another and States working with the federal government to defend the nation when it comes to these elections in November. Right? We need to get ahead of that. Right? The reality is it's been four years since 2016 we need to do more. That's a key issue going forward. What are the Iranians North Koreans think about next? They haven't hit us recently. We know what's coming. We got to get ahead of that. I'm going to come again at a nation, depending on staff threat to your meal. Great to have you on the QSO is great insight. Thanks for coming on sharing your perspective. I'm John furrier here at RSA in San Francisco for the cube coverage. Thanks for watching.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon The iron dome, the vision of collaboration and Well look, I mean, you know, time to defend one another. Not a lot of collaboration, but everyone's talking about the who the attackers are and collaborating like a And you know, you see kids doing it out there when they're playing Fortnite, take down the pieces they have folk to focus on and ultimately winning the battle. the government would protect you digitally. and this has to be a policy issue, but in the short term, businesses and individuals are sitting out there out here in the Silicon Valley with all these companies here at the RSA floor and bring up the things you're bringing Rhode Island, small States can be real hard, defends against the Russians, You take these threats, I'll take those threats and now we're working as a team, like you said earlier, You know, when I hear general Keith Alexander talking about his vision with iron net and what you guys are doing, We're going to keep defending ourselves and if you can give us something back, Our allies in the middle East, they're all the four lenses threat. Now look, the reality is the easy And the question is how do you bring some of these things together, right? So a lot of really cool stuff going on in the financing world. 91% of the revenue comes from the channel. on the impact of the big waves that are coming? You've got a good grasp of the industry, but also, uh, you have really strong on the societal impact policy Risk taking a study that's building the American blood. But the reality is most people you see around at this convention, they all took risks to be here. You know, some of the best innovations have come from times where you had the cold war, you had, That shows the value of, you know, innovation, creating innovation. You gotta get the data out and that's going to be a big thing. Sarbanes Oxley slowed down a lot of the IPO shifts to the latest stage capital. It's a, let's get the ideas out there. Great to have you on the QSO is
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Andrea | PERSON | 0.99+ |
Chris Krebs | PERSON | 0.99+ |
Ron Gula | PERSON | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
Jamil Jaffer | PERSON | 0.99+ |
Japan | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Sacramento | LOCATION | 0.99+ |
30 year | QUANTITY | 0.99+ |
DHS | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Don Dixon | PERSON | 0.99+ |
November | DATE | 0.99+ |
Don | PERSON | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Shawn | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
91% | QUANTITY | 0.99+ |
Vegas | LOCATION | 0.99+ |
Today | DATE | 0.99+ |
one company | QUANTITY | 0.99+ |
DC | LOCATION | 0.99+ |
six | QUANTITY | 0.99+ |
Ted | PERSON | 0.99+ |
caramel Jaffer | PERSON | 0.99+ |
Rhode Island | LOCATION | 0.99+ |
one woman | QUANTITY | 0.99+ |
Alberto | PERSON | 0.99+ |
Java | TITLE | 0.99+ |
Ted Schlein | PERSON | 0.99+ |
America | LOCATION | 0.99+ |
RSAC | ORGANIZATION | 0.99+ |
Bloomberg | ORGANIZATION | 0.99+ |
four years | QUANTITY | 0.99+ |
one final question | QUANTITY | 0.99+ |
Phil Welsh | PERSON | 0.99+ |
Fortnite | TITLE | 0.99+ |
John furrier | PERSON | 0.98+ |
one state | QUANTITY | 0.98+ |
Eastern Europe | LOCATION | 0.98+ |
tenable | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
One man | QUANTITY | 0.98+ |
one party | QUANTITY | 0.98+ |
RSA | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
single | QUANTITY | 0.98+ |
this week | DATE | 0.97+ |
Hank Thomas | PERSON | 0.97+ |
IronNet | ORGANIZATION | 0.97+ |
two | QUANTITY | 0.96+ |
one agency | QUANTITY | 0.96+ |
AECOS | ORGANIZATION | 0.96+ |
America | ORGANIZATION | 0.96+ |
DMV | LOCATION | 0.96+ |
Moscone | LOCATION | 0.95+ |
Americans | PERSON | 0.95+ |
One | QUANTITY | 0.95+ |
Iranians | PERSON | 0.95+ |
2016 | DATE | 0.94+ |
cold war | EVENT | 0.94+ |
Russians | PERSON | 0.93+ |
RSA conference | EVENT | 0.93+ |
middle East | LOCATION | 0.93+ |
single company | QUANTITY | 0.93+ |
California | LOCATION | 0.92+ |
four lenses | QUANTITY | 0.91+ |
Eagle | ORGANIZATION | 0.91+ |
second big | QUANTITY | 0.91+ |
Joe McMann & Bob Meindl, Capgemini | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference 2020 San Francisco brought to you by Silicon angled medias >>live in. Welcome to the cube coverage here in San Francisco at Moscone hall for RSA 2020 I'm John furrier, host of the cube. We're here breaking down all the actions in cyber security. I'll say three days of wall-to-wall cube coverage. You got two great guests here, experts in the cybersecurity enterprise security space. Over 25 years. We've got two gurus and experts. We've got Bob Mindell, executive vice president of North America cyber practice for cap Gemini and Joe McMahon, head of North America cyber strategy, even a practitioner in the intelligence community. Langley, you've been in the business for 25 years. You've seen the waves guys, welcome to the cube. Thank you John. Thanks for having us. So first let's just take a step back. A cyber certainly on the number one agenda kind of already kind of broken out of it in terms of status, board level conversation, every CSO, risk management and a lot of moving parts. >>Now, cyber is not just a segment in the industry. It is the industry. Bob, this is a big part of business challenge today. What's your view? What was going on? So John has a great point. It's actually a business challenge and that's one of the reasons why it's now the top challenge. It's been a tech challenge for a long time. It wasn't always a business challenge for you as was still considered an it challenge and once it started impacting business and got into a board level discussion, it's now top of mind as a business challenge and how it can really impact the business continuity. Joe is talking before we came on camera about you know CEOs can have good days here and there and bad days then but sees us all have bad days all the time because there's so much, it's so hard. You're on the operations side. >>You see a day to day in the trenches as well as the strategy. This is really an operations operationalizing model. As new technology comes out, the challenge is operationalizing them for not only a business benefit but business risk management. It's like changing an airplane engine out at 35,000 feet. It's really hard. What are you seeing as the core challenge? This is not easy. It's a really complex industry. I mean, you take the word cybersecurity, right? Ready? Cybersecurity conference. I see technology, I see a multitude of different challenges that are trying to be solved. It means something different to everybody, and that's part of the problem is it's a really broad ecosystem that we're in. If you meet one person that says, I know all of cyber, they're lying, right? It's just like saying, I know active directory and GRC and I know DNS and I know how to, how to code, right? >>Those people don't exist and cyber is a little bit the same way. So for me, it's just recognizing the intricacies. It's figuring out the complexities, how people processing technology really fit together and it's an operation. It is an ongoing, and during operation, this isn't a program that you can run. You run it for a year, you install and you're done. There's ebbs and flows. You talked about the CISOs and the bad days. There's wins and there's losses. Yeah. And I think part of that is just having the conversation with businesses. Just like in it, you have bad days and good days wins and losses. It's the same thing in cybersecurity and we've got to set that expectation. Yeah, you didn't bring up a good point. I've been saying this on the cube and we've been having conversations around this. It used to be security as part of it, right? >>But now that it's part of the business, the things that you're mentioning around people, process, technology, the class, that kind of transformational formula, it is business issues, organizational behavior. Not everyone's an expert specialism versus generalists. So this is like not just a secure thing, it's the business model of a company is changing. So that's clear. There's no doubt. And then you've got the completion of the cloud coming, public cloud, hybrid multi-cloud. Bob, this is a number one architectural challenge. So outside of the blocking and tackling basics, right, there's now the future business is at risk. What does cap Gemini do? And because you guys are well known, great brand, helping companies be successful, how do you guys go to customers and say, Hey, here's what you do. What's the, what's the cap Gemini story? >>So the cat termini stories is really about increasing your cybersecurity maturity, right? As Joe said, starting out at the basics. If you look at a lot of the breaches that have occurred today have occurred because we got away from the basics and the fundamentals, right? Shiny new ball syndrome. Really. Exactly exasperates that getting away from the basics. So the technology is an enabler, but it's not the be all and end all right, go into the cloud is absolutely a major issue. That's increasing the perimeter, right? We've gone through multiple ways as we talked about, right? So now cloud is is another way, cloud, mobile, social. How do you deal with those from on prem, off prem. But ultimately it's about increasing your cyber cyber security maturity and using the cloud as just increasing the perimeter, right? So you need to, you really need to understand, you have your first line defense and then your maturity is in place. Whether the data resides in your organization, in the cloud, on a mobile device, in a social media, you're responsible for it all. And if you don't have the basics, then you're, you're really, and you guys bring a playbook, is that what you guys come in and do? Correct. Correct. Right. So our goal is to coordinate people, process technology and leverage playbooks, leverage the run books that we had been using for many years. >>I want to get down to you on this one because of what happens when you take that to the, into the practitioner mode or at implementation. Customers want the best technology possible. They go for the shiny new choice. Bob just laid out. There's also risks too because it may or may not be big. So you've got to balance out. I got to get an edge technically because the perimeters becoming huge surface area now or some say has gone. Now you've got edge, just all one big exposed environment, surface area for vulnerabilities is massive. So I need better tech. How do you balance and obtain the best tech and making sure it works and it's in production and secure. So there's a couple of things, right, and this is not, it's not just our, and you'll hear it from other people that have been around a long time, but a lot of organizations that we see have built themselves so that their cybersecurity organization is supporting all these tools that we see. >>That's the wrong way to do it. The tools should support the mission of the organization, right? If my mission is to defend my enterprise, there are certain things that I need to do, right? There's questions I need to be able to ask and get answers to. There's data I need visibility into. There's protections and controls I need to be able to implement. If I can lay those out in some coordinated strategic fashion and say, here's all the things I'm trying to accomplish, here's who's going to do it. Here's my really good team, here's my skilled resources, here's my workflows, my processes, all that type of stuff. Then I can go find the right technology to put into that. And I can actually measure if that technology is effective in supporting my mission. But too often we start with the technology and then we hammer against it and we run into CISOs and they say, I bought all this stuff and it's not working and come hell yeah. >>And that's backing into it the wrong. So I've heard from CSOs, I'd like they buying all these tools. It's like a tool shed. Don't be the fool with the wrong tool as they I say. But that brings up the question of, okay, as you guys go to customers, what are some of the main pain points or issues that they're trying to overcome that that are opportunities that you guys are helping with? Uh, on the business side and on the technical side, what are some of the things? So on the business side, you know, one is depending on their level of maturity and the maturity of the organization and the board of directors and their belief in, in how they need to help fund this. We can start there. We can start by helping draw out the threat landscape within that organization where they are maturity-wise and where they need to go and help them craft that message to the board of directors and get executive sponsorship from the board down in order to take them from baby, a very immature organization or you know, a reactive organization to an adaptive organization, right. >>And really become defenders. So from a business perspective, we can help them there. From the technology perspective, Joe, uh, you know, or an implementation perspective. I think, you know, it's been a really interesting road like being in this a long time, you know, late two thousands when nation States were first really starting to become a thing. All the industries we were talking to, every customer is like, I want to be the best in my industry. I want to be the shining example. And boards in leadership were throwing money at it and everybody was on this really aggressive path to get there. The conversation is shifted a little bit with a lot of the leadership we talked to. It's, I just want to be good enough, maybe a little bit better than good enough, but my, my objective anymore is it to leave the industry. Cause that's really expensive and there's only one of those. >>My objective is to complete my mission maybe a little bit above and beyond, but I need the right size and right. So we spent a lot of time helping organizations, I would say optimize, right? It's what is the right level of people, what is the right amount of resources, what's the right spend, what's the right investment, the right allocation of technology and mix of everything, right? And sometimes it's finding the right partner. Sometimes it's doing certain things in house. It's, there's no one way to solve this problem, but you've got to go look at the business challenges. Look at the operational realities of the customer, their budgets, all those, their geographies mattered, right? Some places it's easy to hire talent. Some places it's not so easy to hire talent. And that's a good point, right? Some organizations, >>they just need to understand what does good look like and we can, we have so many years of experience. We have so many customers use skates is we've been there and we've done that. We can bring the band and show them this is what good looks like and this is sustainable >>of what good looks like. I want to get your reactions to, I was talking to Keith Alexander, general Keith Alexander, a former cyber command had last night and we were talking about officers, his defense and that kind of reaction. How the Sony hack was was just was just, they just went after him as an example. Everyone knows about that hack, but he really was getting at the idea of human efficiency, the human equation, which is if you have someone working on something that here, but their counterpart might be working on it maybe from a different company or in the same company, they're redundant. So there's a lot of burnout, a lot of people putting out fires. So reactive is clearly, I see as a big trend that the conversation's shifting towards let's be proactive, let's get more efficient in the collaboration as well as the technology. What you, how do you guys react to that? What's your view on that statement? So >>people is the number one issue, in my opinion. In this space, there's a shortage of people. The people that are in it are working very long hours. They're burnt out. So we constantly need to be training and bringing more people into the industry. Then there's the scenario around information sharing, right? Threat information sharing, and then what levels are you comfortable with as an organization to share that information? How can you share best practices? So that's where the ice sacks come into play. That's also where us as a practitioner and we have communities, we have customers, we bring them together to really information, share, share, best practice. It's in all of our best interests. We all have the same goal and the goal is to protect our assets, especially in the United States. We have to protect our assets. So we need, the good thing is that it's a pretty open community in that regards and sharing the information, training people, getting people more mature in their people, process technology, how they can go execute it. >>Yeah. What's your take on the whole human equation piece? Right? So sharing day, you probably heard a word and the word goes back to where I came from, from my heritage as well, but I'm sure general Alexander used the word mission at some point, right? So to me, that's the single biggest rallying point for all of the people in this. If you're in this for the right reasons, it's because you care about the mission. The mission is to defend us. Stop the bad guys from doing days, right? Whether you're defending the government, whether you're defending a commercial enterprise, whether you're defending the general public, right? Whatever the case is, if you're concerned, you know, if you believe in the mission, if you're committed to the mission, that's where the energy comes from. You know, there's a lot of, there's a lot of talk about the skill gap and the talent gap and all of those types of things. >>To me, it's more of a mindset issue than anything. Right? The skill sets can be taught. They can be picked up over time. I was a philosophy major. All right? Somehow I ended up here. I have no idea how, um, but it's because I cared about the mission and everybody has a part to play. If you build that peer network, uh, both at an individual level and at an organizational and a company level, that's really important in this. Nobody's, nobody's an expert at everything. Like we said, you brought a philosophy. I think one of the things I have observed in interviewing and talking to people is that the world's changed so much that you almost need those fresh perspectives because the problems are new problems, statements, technology is just a part of the problem set back to the culture. The customer problem, Bob, is that they got to get all this work done. >>And so what are some of the use cases that you guys are working on that that is a low hanging fruit in the industry or our customer base? How do you guys engage with customers? So our target market is fortune 500 global 1000 so the biggest of the big enterprises in the world, right? And because of that, we've seen a lot of a complex environments, multinational companies as our customers. Right? We don't go at it from a pure vertical base scenario or a vertical base solution. We believe that horizontal cybersecurity can it be applied to most verticals. Right. And there's some tweaking along the way. Like in financial services, there's regulars and FFIC that you need to be sure you adapt to. But for the most part the fundamentals are applicable. All right. With that said, you know, large multinational manufacturing organization, right? They have a major challenge in that they have manufacturing sites all over the world. >>They building something that is, you know, unique. It has significant IP to it, but it's not secure. Historically they would have said, well, nobody's really gonna just deal steal what we do because it's really not differentiated in the world, but it is differentiated and it's a large corporation making a lot of money. Unfortunately ransomware, that'd be a photographer. Ransomware immediately, right? Like exact down their operations and their network, right? So their network goes down. They can have, they can, they can not have zero downtown and their manufacturing plants around the world. So for us, we're implementing solutions and it's an SLA for them is less than six seconds downtime by two that help secure these global manufacturing environment. That's classic naive when they are it. Oh wow. We've got to think about security on a much broader level. I guess the question I have for you guys, Joe, you talk about when do you guys get called in? >>I mean what's your main value proposition that you guys, cause you guys got a broad view of the industry, that expertise. Why do, why are customers calling you guys and what do you guys deliver? They need something that actually works, right? It's, it's you mentioned earlier, I think when we were talking how important experiences, right? And it's, Bob said it too, having been there, done that I think is really important. The fact that we're not chasing hype, we're not selling widgets. That we have an idea of what good looks like and we can help an organization kind of, you know, navigate that path to get there is really important. So, uh, you know, one of our other customers, large logistics company, been operating for a very long time. You know, very, very mature in terms of their, it operations, those types of things. But they've also grown through merger and acquisition. >>That's a challenge, uh, cause you're taking on somebody else's problem set and they just realize, simply put that their existing security operations wasn't meeting their needs. So we didn't come in and do anything fancy necessarily. It's put a strategic plan in place, figure out where they are today, what are the gaps, what do they need to do to overcome those gaps? Let's go look at their daily operations, their concept of operations, their mission, their vision, all of that stuff down to the individual analysts. Like we talked about the mindset and skillset. But then frankly it's putting in the hard work, right? And nobody wants to put in the heart. I don't want to say nobody wants to put in the hard work. That's fun. There's a lot of words that's gets done I guess by the questions that you guys getting called in on from CSOs chief and Mason security officers. >>Guess who calls you? So usually we're in talking to the Cisco, right? We're having the strategic level conversation with the Cisco because the Cisco either has come in new or has been there. They may have had a breach. Then whatever that compelling event may be, they've come to the realization that they're not where they need to be from a maturity perspective and their cyber defense needs revamping. So that's our opportunity for us to help them really increase the maturity and help them become defenders. Guys, great for the insight. Thanks for coming on the cube. Really appreciate you sharing the insights. Guys. Give a quick plug for what you guys are doing. Cap Gemini, you guys are growing. What do you guys look to do? What are some of the things that's going on? Give the company plug. Thanks Sean show. It's been a very interesting journey. >>You know this business started out from Lockheed Martin to Leidos cyber. We were acquired by cap Gemini a year ago last week. It's a very exciting time. We're growing the business significantly. We have huge growth targets for 2020 and beyond, right? We're now over 800 practitioners in North America, over 2,500 practitioners globally, and we believe that we have some very unique differentiated skill sets that can help large enterprises increase their maturity and capabilities plug there. Yeah, I mean, look, nothing makes us happier than getting wins when we're working with an organization and we get to watch a mid level analyst brief the so that they just found this particular attack and Oh by the way, because we're mature and we're effective, that we were able to stop it and prevent any impact to the company. That's what makes me proud. That's what makes it so it makes it fun. >>Final question. We got a lot of CSOs in our community. They're watching. What's the pitch to the CSO? Why, why you guys, we'd love to come in to understand what are their goals, how can we help them, but ultimately where do they believe they think they are and where do they need to go and we can help them walk that journey. Whether it's six months, a year, three years, five years. We can take them along that journey and increase the cyber defense maturity. Joe, speak to the CSO. What are they getting? They're getting confidence. They're getting execution. They're getting commitment to delivery. They're getting basically a, a partner in this whole engagement. We're not a vendor. We're not a service provider. We are a partner. A trusted partner. Yeah, partnerships is key. Building out in real time. A lot new threats. Got to be on offense and defense going on. A lot of new tech to deal with. I mean, it's a board level for a long time. Guys, thanks for coming on. Cap Gemini here inside the cube, bringing their practices, cybersecurity, years of experience with big growth targets. Check them out. I'm John with the cube. Thanks for watching.
SUMMARY :
It's the cube covering John furrier, host of the cube. It's actually a business challenge and that's one of the reasons why it's now the As new technology comes out, the challenge is operationalizing So for me, it's just recognizing the intricacies. But now that it's part of the business, the things that you're mentioning around people, process, So the technology is an enabler, but it's not the be all and end all right, I want to get down to you on this one because of what happens when you take that to the, into the practitioner mode or at implementation. Then I can go find the right technology to put into that. So on the business side, you know, From the technology perspective, Joe, uh, you know, or an implementation perspective. Look at the operational realities of the customer, their budgets, all those, their geographies mattered, We can bring the band and show them efficiency, the human equation, which is if you have someone working on something We all have the same goal and the goal is to protect our assets, of the people in this. statements, technology is just a part of the problem set back to the culture. So our target market is fortune 500 global 1000 so the biggest of the big I guess the question I have for you guys, Joe, you talk about when do you guys get called in? Why do, why are customers calling you guys and what do you guys deliver? There's a lot of words that's gets done I guess by the questions that you guys getting called in on from CSOs chief and Mason We're having the strategic level conversation with the Cisco because the Cisco either has We're growing the business significantly. What's the pitch to the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Joe | PERSON | 0.99+ |
Joe McMahon | PERSON | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
Bob Mindell | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
six months | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
Bob | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
35,000 feet | QUANTITY | 0.99+ |
Alexander | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
Bob Meindl | PERSON | 0.99+ |
less than six seconds | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
over 2,500 practitioners | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
two gurus | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
FFIC | ORGANIZATION | 0.99+ |
Langley | PERSON | 0.99+ |
Joe McMann | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
first line | QUANTITY | 0.98+ |
last night | DATE | 0.98+ |
Sean | PERSON | 0.98+ |
Capgemini | ORGANIZATION | 0.98+ |
Mason | ORGANIZATION | 0.98+ |
two great guests | QUANTITY | 0.98+ |
a year ago | DATE | 0.98+ |
a year | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
over 800 practitioners | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
three days | QUANTITY | 0.97+ |
RSAC | ORGANIZATION | 0.97+ |
Over 25 years | QUANTITY | 0.97+ |
Gemini | PERSON | 0.97+ |
Leidos | ORGANIZATION | 0.96+ |
1000 | QUANTITY | 0.96+ |
cap Gemini | ORGANIZATION | 0.95+ |
one person | QUANTITY | 0.92+ |
Moscone hall | LOCATION | 0.88+ |
USA | LOCATION | 0.87+ |
RSA 2020 | EVENT | 0.83+ |
CSOs | ORGANIZATION | 0.83+ |
one issue | QUANTITY | 0.8+ |
Cap | PERSON | 0.78+ |
executive | PERSON | 0.78+ |
single biggest | QUANTITY | 0.77+ |
RSA conference 2020 | EVENT | 0.76+ |
zero | QUANTITY | 0.76+ |
John furrier | PERSON | 0.74+ |
North | LOCATION | 0.72+ |
last week | DATE | 0.72+ |
Cap Gemini | ORGANIZATION | 0.71+ |
GRC | ORGANIZATION | 0.71+ |
Silicon | ORGANIZATION | 0.67+ |
North America | ORGANIZATION | 0.65+ |
fortune | QUANTITY | 0.59+ |
two thousands | QUANTITY | 0.58+ |
America | ORGANIZATION | 0.46+ |
500 | QUANTITY | 0.38+ |
Derek Manky, FortiGuard Labs | RSAC USA 2020
>> Narrator: Live from San Francisco. It's theCUBE, covering RSA Conference 2020, San Francisco. Brought to you by, SiliconANGLE Media. >> Welcome back everyone. CUBE coverage here in Moscone in San Francisco for RSA, 2020. I'm John Furrier host of theCUBE. We've got a great guest here talking about cybersecurity and the impact with AI and the role of data. It's always great to have Derek Manky on Chief Security Insights Global Threat Alliances with FortiGuard Lab, part of Fortinet, FortiGuard Labs is great. Great organization. Thanks for coming on. >> It's a pleasure always to be here-- >> So you guys do a great threat report that we always cover. So it covers all the bases and it really kind of illustrates state of the art of viruses, the protection, threats, et cetera. But you're part of FortiGuard Labs. >> Yeah, that's right. >> Part of Fortinet, which is a security company, public. What is FortiGuard Labs? What do you guys do, what's your mission? >> So FortiGuard Labs has existed since day one. You can think of us as the intelligence that's baked into the product, It's one thing to have a world-class product, but you need a world-class intelligence team backing that up. We're the ones fighting those fires against cybercrime on the backend, 24/7, 365 on a per second basis. We're processing threat intelligence. We've got over 10 million attacks or processing just per minute, over a hundred billion events, in any given day that we have to sift through. We have to find out what's relevant. We have to find gaps that we might be missing detection and protection. We got to push that out to a customer base of 450,000 customers through FortiGuard services and 5 million firewalls, 5 million plus firewalls we have now. So it's vitally important. You need intelligence to be able to detect and then protect and also to respond. Know the enemy, build a security solution around that and then also be able to act quickly about it if you are under active attack. So we're doing everything from creating security controls and protections. So up to, real time updates for customers, but we're also doing playbooks. So finding out who these attackers are, why are they coming up to you. For a CSO, why does that matter? So this is all part of FortiGuard Labs. >> How many people roughly involved ? Take us a little inside the curtain here. What's going on? Personnel size, scope. >> So we're over 235. So for a network security vendor, this was the largest global SOC, that exists. Again, this is behind the curtain like you said. These are the people that are, fighting those fires every day. But it's a large team and we have experts to cover the entire attack surface. So we're looking at not just a viruses, but we're looking at as zero-day weapons, exploits and attacks, everything from cyber crime to, cyber warfare, operational technology, all these sorts of things. And of course, to do that, we need to really heavily rely on good people, but also automation and artificial intelligence and machine learning. >> You guys are walking on a tight rope there. I can only imagine how complex and stressful it is, just imagining the velocity alone. But one of the trends that's coming up here, this year at RSA and is kind of been talking about in the industry is the who? Who is the attacker because, the shifts could shift and change. You got nation states are sitting out there, they're not going to have their hands dirty on this stuff. You've got a lot of dark web activity. You've got a lot of actors out there that go by different patterns. But you guys have an aperture and visibility into a lot of this stuff. >> Absolutely. >> So, you can almost say, that's that guy. That's the actor. That's a really big part. Talk about why that's important. >> This is critically important because in the past, let's say the first generation of, threat intelligence was very flat. It was to watch. So it was just talking about here's a bad IP, here's a bad URL, here's a bad file block hit. But nowadays, obviously the attackers are very clever. These are large organizations that are run a lot of people involved. There's real world damages happening and we're talking about, you look at OT attacks that are happening now. There's, in some cases, 30, $40 million from targeted ransom attacks that are happening. These people, A, have to be brought to justice. So we need to understand the who, but we also need to be able to predict what their next move is. This is very similar to, this is what you see online or CSI. The police trynna investigate and connect the dots like, plotting the strings and the yarn on the map. This is the same thing we're doing, but on a way more advanced level. And it's very important to be able to understand who these groups are, what tools they use, what are the weapons, cyber weapons, if you will, and what's their next move potentially going to be. So there's a lot of different reasons that's important. >> Derek, I was riffing with another guest earlier today about this notion of, government protection. You've got a military troops drop on our shores and my neighborhood, the Russians drop in my neighborhood. Guess what, the police will probably come in, and, or the army should take care of it. But if I got to run a business, I got to build my own militia. There's no support out there. The government's not going to support me. I'm hacked. Damage is done. You guys are in a way providing that critical lifeline that guard or shield, if you will, for customers. And they're going to want more of it. So I've got to ask you the hard question, which is, how are you guys going to constantly be on the front edge of all this? Because at the end of the day, you're in the protection business. Threats are coming at the speed of milliseconds and nanoseconds, in memory. You need memory, you need database. You've got to have real time. It's a tsunami of attack. You guys are the front lines of this. You're the heat shield. >> Yes, absolutely. >> How do you take it to the next level? >> Yeah, so collaboration, integration, having a broad integrated platform, that's our bread and butter. This is what we do. End-to-end security. The attack surface is growing. So we have to be able to, A, be able to cover all aspects of that attack surface and again, have intelligence. So we're doing sharing through partners. We have our core intelligence network. Like I said, we're relying heavily on machine learning models. We're able to find that needle in the haystack. Like, as I said earlier, we're getting over a hundred billion potential threat events a day. We have to dissect that. We have to break it down. We have to say, is this affecting endpoint? Is this effect affecting operational technology? What vertical, how do we process it? How do we verify that this is a real threat? And then most importantly, get that out in time and speed to our customers. So I started with automation years ago, but now really the way that we're doing this is through broad platform coverage. But also machine learning models for and-- >> I want to dig into machine learning because, I love that needle in the haystack analogy, because, if you take that to the next step, you got to stack a needles now. So you find the needle in the haystack. Now you got a bunch of needles, where do you find that? You need AI, you got to have some help. But you still got the human component. So talk about how you guys are advising customers on how you're using machine learning and get that AI up and running for customers and for yourselves. >> So we're technology people. I always look at this as the stack. The stack model, the bottom of the stack, you have automation. You have layer one, layer two. That's like the basic things for, feeds, threat feeds, how we can push out, automate, integrate that. Then you have the human. So the layer seven. This is where our human experts are coming in to actually advise our customers. We're creating a threat signals with FortiGuard Labs as an example. These are bulletins that's a quick two to three page read that a CSO can pick up and say, here's what FortiGuard Labs has discovered this week. Is this relevant to my network? Do I have these protections in place. There's also that automated, and so, I refer to this as a centaur model. It's half human half machine and, the machines are driving a lot of that, the day to day mundane tasks, if you will, but also finding, collecting the needles of needles. But then ultimately we have our humans that are processing that, analyzing it, creating the higher level strategic advice. We recently, we've launched a FortiAI, product as well. This has a concept of a virtual-- >> Hold on, back up a second. What's it called? >> FortiAI. >> So it's AI components. Is it a hardware box or-- >> This is a on-premise appliance built off of five plus years of learning that we've done in the cloud to be able to identify threats and malware, understand what that malware does to a detailed level. And, where we've seen this before, where is it potentially going? How do we protect against it? Something that typically you would need, four to five headcount in your security operations center to do, we're using this as an assist to us. So that's why it's a virtual analyst. It's really a bot, if you will, something that can actually-- >> So it's an enabling opportunity for the customers. So is this virtual assistant built into the box. What does that do, virtual analyst. >> So the virtual analyst is able to, sit on premises. So it's localized learning, collect threats to understand the nature of those threats, to be able to look at the needles of the needles, if you will, make sense of that and then automatically generate reports based off of that. So it's really an assist tool that a network admin or a security analyst was able to pick up and virtually save hours and hours of time of resources. >> So, if you look at the history of like our technology industry from a personalization standpoint, AI and data, whether you're a media business, personalization is ultimately the result of good data AI. So personalization for an analyst, would be how not to screw up their job. (laughs) One level. The other one is to be proactive on being more offensive. And then third collaboration with others. So, you starting to see that kind of picture form. What's your reaction to that? >> I think it's great. There's stepping stones that we have to go through. The collaboration is not always easy. I'm very familiar with this. I mean I was, with the Cyber Threat Alliance since day one, I head up and work with our Global Threat Alliances. There's always good intentions, there's problems that can be created and obviously you have things like PII now and data privacy and all these little hurdles they have to come over. But when it works right together, this is the way to do it. It's the same thing with, you talked about the data naturally when he started building up IT stacks, you have silos of data, but ultimately those silos need to be connected from different departments. They need to integrate a collaborate. It's the same thing that we're seeing from the security front now as well. >> You guys have proven the model of FortiGuard that the more you can see, the more visibility you can see and more access to the data in real time or anytime scale, the better the opportunity. So I got to take that to the next level. What you guys are doing, congratulations. But now the customer. How do I team up with, if I'm a customer with other customers because the bad guys are teaming up. So the teaming up is now a real dynamic that companies are deploying. How are you guys looking at that? How is FortiGuard helping that? Is it through services? Is it through the products like virtual assistant? Virtual FortiAI? >> So you can think of this. I always make it an analogy to the human immune system. Artificial neural networks are built off of neural nets. If I have a problem and an infection, say on one hand, the rest of the body should be aware of that. That's collaboration from node to node. Blood cells to blood cells, if you will. It's the same thing with employees. If a network admin sees a potential problem, they should be able to go and talk to the security admin, who can go in, log into an appliance and create a proper response to that. This is what we're doing in the security fabric to empower the customer. So the customer doesn't have to always do this and have the humans actively doing those cycles. I mean, this is the integration. The orchestration is the big piece of what we're doing. So security orchestration between devices, that's taking that gap out from the human to human, walking over with a piece of paper to another or whatever it is. That's one of the key points that we're doing within the actual security fabric. >> So that's why silos is problematic. Because you can't get that impact. >> And it also creates a lag time. We have a need for speed nowadays. Threats are moving incredibly fast. I think we've talked about this on previous episodes with swarm technology, offensive automation, the weaponization of artificial intelligence. So it becomes critically important to have that quick response and silos, really create barriers of course, and make it slower to respond. >> Okay Derek, so I got to ask you, it's kind of like, I don't want to say it sounds like sports, but it's, what's the state of the art in the attack vectors coming in. What are you guys seeing as some of the best of breed tax that people should really be paying attention to? They may, may not have fortified down. What are SOCs looking at and what are security pros focused on right now in terms of the state of the art. >> So the things that keep people up at night. We follow this in our Threat Landscape Report. Obviously we just released our key four one with FortiGuard Labs. We're still seeing the same culprits. This is the same story we talked about a lot of times. Things like, it used to be a EternalBlue and now BlueKeep, these vulnerabilities that are nothing new but still pose big problems. We're still seeing that exposed on a lot of networks. Targeted ransom attacks, as I was saying earlier. We've seen the shift or evolution from ransomware from day to day, like, pay us three or $400, we'll give you access to your data back to going after targeted accounts, high revenue business streams. So, low volume, high risk. That's the trend that we're starting to see as well. And this is what I talk about for trying to find that needle in the haystack. This is again, why it's important to have eyes on that. >> Well you guys are really advanced and you guys doing great work, so congratulations. I got to ask you to kind of like, the spectrum of IT. You've got a lot of people in the high end, financial services, healthcare, they're regulated, they got all kinds of challenges. But as IT and the enterprise starts to get woke to the fact that everyone's vulnerable. I've heard people say, well, I'm good. I got a small little to manage, I'm only a hundred million dollar business. All I do is manufacturing. I don't really have any IP. So what are they going to steal? So that's kind of a naive approach. The answer is, what? Your operations and ransomware, there's a zillion ways to get taken down. How do you respond to that. >> Yeah, absolutely. Going after the crown jewels, what hurts? So it might not be a patent or intellectual property. Again, the things that matter to these businesses, how they operate day to day. The obvious examples, what we just talked about with revenue streams and then there's other indirect problems too. Obviously, if that infrastructure of a legitimate organization is taken over and it's used as a botnet and an orchestrated denial-of-service attack to take down other organizations, that's going to have huge implications. >> And they won't even know it. >> Right, in terms of brand damage, has legal implications as well that happened. This is going even down to the basics with consumers, thinking that, they're not under attack, but at the end of the day, what matters to them is their identity. Identity theft. But this is on another level when it comes to things to-- >> There's all kinds of things to deal with. There's, so much more advanced on the attacker side. All right, so I got to ask you a final question. I'm a business. You're a pro. You guys are doing great work. What do I do, what's my strategy? How would you advise me? How do I get my act together? I'm working the mall every day. I'm trying my best. I'm peddling as fast as I can. I'm overloaded. What do I do? How do I go the next step? >> So look for security solutions that are the assist model like I said. There's never ever going to be a universal silver bullet to security. We all know this. But there are a lot of things that can help up to that 90%, 95% secure. So depending on the nature of the threats, having a first detection first, that's always the most important. See what's on your network. This is things where SIM technology, sandboxing technology has really come into play. Once you have those detections, how can you actually take action? So look for a integration. Really have a look at your security solutions to see if you have the integration piece. Orchestration and integration is next after detection. Finally from there having a proper channel, are there services you looked at for managed incident response as an example. Education and cyber hygiene are always key. These are free things that I push on everybody. I mean we release weekly threat intelligence briefs. We're doing our quarterly Threat Landscape Reports. We have something called threat signals. So it's FortiGuard response to breaking industry events. I think that's key-- >> Hygiene seems to come up over and over as the, that's the foundational bedrock of security. >> And then, as I said, ultimately, where we're heading with this is the AI solution model. And so that's something, again that I think-- >> One final question since it's just popped into my head. I wanted, and that last one. But I wanted to bring it up since you kind of were, we're getting at it. I know you guys are very sensitive to this one topic cause you live it every day. But the notion of time and time elapsed is a huge concern because you got to know, it's not if it's when. So the factor of time is a huge variable in all kinds of impact. Positive and negative. How do you talk about time and the notion of time elapsing. >> That's great question. So there's many ways to stage that. I'll try to simplify it. So number one, if we're talking about breaches, time is money. So the dwell time. The longer that a threat sits on a network and it's not cleaned up, the more damage is going to be done. And we think of the ransom attacks, denial-of-service, revenue streams being down. So that's the incident response problem. So time is very important to detect and respond. So that's one aspect of that. The other aspect of time is with machine learning as well. This is something that people don't always think about. They think that, artificial intelligence solutions can be popped up overnight and within a couple of weeks they're going to be accurate. It's not the case. Machines learn like humans too. It takes time to do that. It takes processing power. Anybody can get that nowadays, data, most people can get that. But time is critical to that. It's a fascinating conversation. There's many different avenues of time that we can talk about. Time to detect is also really important as well, again. >> Let's do it, let's do a whole segment on that, in our studio, I'll follow up on that. I think it's a huge topic, I hear about all the time. And since it's a little bit elusive, but it kind of focuses your energy on, wait, what's going on here? I'm not reacting. (laughs) Time's a huge issue. >> I refer to it as a latency. I mean, latency is a key issue in cybersecurity, just like it is in the stock exchange. >> I mean, one of the things I've been talking about with folks here, just kind of in fun conversation is, don't be playing defense all the time. If you have a good time latency, you going to actually be a little bit offensive. Why not take a little bit more offense. Why play defense the whole time. So again, you're starting to see this kind of mentality not being, just an IT, we've got to cover, okay, respond, no, hold on the ballgame. >> That comes back to the sports analogy again. >> Got to have a good offense. They must cross offense. Derek, thanks so much. Quick plug for you, FortiGuard, share with the folks what you guys are up to, what's new, what's the plug. >> So FortiGuard Labs, so we're continuing to expand. Obviously we're focused on, as I said, adding all of the customer protection first and foremost. But beyond that, we're doing great things in industry. So we're working actively with law enforcement, with Interpol, Cyber Threat Alliance, with The World Economic Forum and the Center for Cyber Security. There's a lot more of these collaboration, key stakeholders. You talked about the human to human before. We're really setting the pioneering of setting that world stage. I think that is, so, it's really exciting to me. It's a lot of good industry initiatives. I think it's impactful. We're going to see an impact. The whole goal is we're trying to slow the offense down, the offense being the cyber criminals. So there's more coming on that end. You're going to see a lot great, follow our blogs at fortinet.com and all-- >> Great stuff. >> great reports. >> I'm a huge believer in that the government can't protect us digitally. There's going to be protection, heat shields out there. You guys are doing a good job. It's only going to be more important than ever before. So, congratulations. >> Thank you. >> Thanks for coming I really appreciate. >> Never a dull day as we say. >> All right, it's theCUBE's coverage here in San Francisco for RSA 2020. I'm John Furrier, your host. Thanks for watching. (upbeat music)
SUMMARY :
Brought to you by, SiliconANGLE Media. and the impact with AI and the role of data. and it really kind of illustrates state of the art of viruses, What do you guys do, what's your mission? and then protect and also to respond. How many people roughly involved ? And of course, to do that, But one of the trends that's coming up here, That's the actor. This is the same thing we're doing, So I've got to ask you the hard question, but now really the way that we're doing this I love that needle in the haystack analogy, the day to day mundane tasks, if you will, Hold on, back up a second. So it's AI components. to be able to identify threats and malware, So it's an enabling opportunity for the customers. So the virtual analyst is able to, sit on premises. The other one is to be proactive on being more offensive. It's the same thing that we're seeing that the more you can see, So the customer doesn't have to always do this So that's why silos is problematic. and make it slower to respond. focused on right now in terms of the state of the art. So the things that keep people up at night. I got to ask you to kind of like, the spectrum of IT. Again, the things that matter to these businesses, This is going even down to the basics with consumers, All right, so I got to ask you a final question. So depending on the nature of the threats, that's the foundational bedrock of security. is the AI solution model. So the factor of time is a huge variable So that's the incident response problem. but it kind of focuses your energy on, I refer to it as a latency. I mean, one of the things I've been talking about share with the folks what you guys are up to, You talked about the human to human before. that the government can't protect us digitally. I really appreciate. I'm John Furrier, your host.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Interpol | ORGANIZATION | 0.99+ |
Derek | PERSON | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Center for Cyber Security | ORGANIZATION | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
$400 | QUANTITY | 0.99+ |
95% | QUANTITY | 0.99+ |
five plus years | QUANTITY | 0.99+ |
FortiGuard | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
FortiGuard Lab | ORGANIZATION | 0.99+ |
Cyber Threat Alliance | ORGANIZATION | 0.99+ |
5 million | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
450,000 customers | QUANTITY | 0.98+ |
fortinet.com | OTHER | 0.98+ |
one | QUANTITY | 0.98+ |
RSA Conference 2020 | EVENT | 0.98+ |
Moscone | LOCATION | 0.98+ |
RSA | ORGANIZATION | 0.98+ |
365 | QUANTITY | 0.98+ |
Global Threat Alliances | ORGANIZATION | 0.98+ |
One level | QUANTITY | 0.97+ |
RSA | EVENT | 0.97+ |
this week | DATE | 0.97+ |
four | QUANTITY | 0.97+ |
RSAC | ORGANIZATION | 0.97+ |
One final question | QUANTITY | 0.97+ |
EternalBlue | ORGANIZATION | 0.96+ |
over a hundred billion events | QUANTITY | 0.95+ |
this year | DATE | 0.95+ |
first | QUANTITY | 0.94+ |
30, $40 million | QUANTITY | 0.94+ |
first generation | QUANTITY | 0.94+ |
first detection | QUANTITY | 0.94+ |
three page | QUANTITY | 0.94+ |
one aspect | QUANTITY | 0.93+ |
over 10 million attacks | QUANTITY | 0.93+ |
over a hundred billion potential threat events a day | QUANTITY | 0.92+ |
Russians | PERSON | 0.92+ |
third collaboration | QUANTITY | 0.91+ |
one topic | QUANTITY | 0.9+ |
hundred million dollar | QUANTITY | 0.89+ |
Threat Landscape Report | TITLE | 0.88+ |
one thing | QUANTITY | 0.87+ |
years | DATE | 0.86+ |
5 million firewalls | QUANTITY | 0.85+ |
World Economic Forum | ORGANIZATION | 0.85+ |
day one | QUANTITY | 0.84+ |
90% | QUANTITY | 0.81+ |
layer one | QUANTITY | 0.78+ |
layer seven | QUANTITY | 0.76+ |
earlier today | DATE | 0.75+ |
zillion ways | QUANTITY | 0.74+ |
theCUBE | ORGANIZATION | 0.74+ |
over 235 | QUANTITY | 0.72+ |
RSA 2020 | TITLE | 0.72+ |
Narrator: Live | TITLE | 0.7+ |
second | QUANTITY | 0.69+ |
CSI | ORGANIZATION | 0.69+ |
nanoseconds | QUANTITY | 0.65+ |
PII | ORGANIZATION | 0.64+ |
key four one | QUANTITY | 0.63+ |
BlueKeep | ORGANIZATION | 0.63+ |
Security Insights Global Threat Alliances | ORGANIZATION | 0.62+ |
Casimir Wierzynski, Intel | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Hello and welcome back to the cube coverage here in San Francisco, the Moscone center for RSA Congress 2020 for all the coverage period for three days. I'm John, host of the cube. You know, as cybersecurity goes to the next level, as cloud computing goes, continues to go more enterprise, large scale AI and machine learning have become critical managing the data. We've got a great guest here from Intel, Kaz Borzynski, senior director of the AI price with Intel. Thanks for joining us. Oh thanks. So data is a huge, huge data problem when it comes down to cybersecurity, uh, and and generally across the enterprise. Now it's well known, well documented, but you're here giving a talk about machine learning privacy because everyone wants to know who the bad guys are. So do the bad guys deserve privacy? Okay, we'll get to that later. But first tell about your talk and give a talk here at RSA. >>We'll get into other stuff later. I gave a talk, so thanks for having me. I gave a talk on a whole suite of exciting new techniques known as privacy preserving machine learning. So this is a set of machine learning techniques that help people realize the promise of AI and machine learning. But we know that machine learning systems rely on underlying data to train. So how can you also respect the privacy and the security of the underlying data while still being able to train and use AI systems and just take it, where are you within the Intel sphere? Because Intel osseous surgery obviously chips and power to all the enterprises in large. Skip. How are you on the software side AI group? Explain where you are. And so I'm in the AI group at Intel, but I have the most fun job at Intel. I think so cause I work in the CTO office of the AI group, which means I get to think about more futuristic, you know, where is AI going? >>What are some of the major inflection points? One of these that we've been looking at for the last couple of years is this kind of collision course between the need for data to train machine learning systems to unlock all the power of AI, but still the need to keep data private. Yeah, and I think that's generally consistent with our editorial in our research, which is the confluence of cloud native, large scale cloud computing, multi-cloud and AI or machine learning, all kinds of coming together. Those are multigenerational technologies that are coming. So that's, this wave is big. That's right. And I think one thing that's kind of maybe underappreciated about machine learning, especially in production is it's almost always a multi-party interaction. So you'll have, let's say one party that owns data and other party may own a model. They're running a system on somebody else's hardware. So because of the nature of digital data, if you want to share things, you have to worry about what other parties may be doing with those data. >>Because you bring up a great point I want to get your reaction and thoughts on is that, is that it's multidisciplinary. Now as people aren't breaking into the field. I mean people are really excited about AI. I mean you talk to someone who's 12 years old, they see a Tesla, they see software, they see all these things, they see all this cool stuff. So machine learning, which powers AI is very enticing to anyone that's got kind of technical or nerdy background and social attracting a lot of young people. So it's not just getting a computer science degree. There's so much more to AI because you talk about why, what someone needs to be successful too. And to engage in the AI wave. You don't need to just be a code or you could be outside the scope because it's an integrated model or is it's very much, so my group at Intel is better, very heterogeneous. >>So what have got a, you know, kind of mathematicians, but I also have coders. I have, uh, an attorney who's a public policy expert. I have cryptographers. Uh, I think there's a number of ways to get involved in, in meaning my, my background is actually a neuroscience. So, um, it makes sense. Good. Stitch it all together. Yeah. Well, societal changes has to be the, the algorithm needs training they need to learn. So having the most diverse input seems to me to be a, a posture the industry is taking and what's, is that right? Is that the right way to think about it? How should we be thinking about how to make AI highly effective versus super scary? Right. Well, one of the efforts that we're making, part of my message here is that to make these systems better, generally more data helps, right? If you can expand the availability of data, that's always going to help machine learning systems. >>And so we're trying to unlock data silos that may exist across countries, across the organizations. So for example, you know, in healthcare you could have multiple hospitals that have patient data. If somehow they could pool all their data together, you would get much more effective models, much better patient outcomes, but for very good privacy reasons, they're not allowed to do that. So there's these interesting ideas like federated learning where you could somehow decentralize the machine learning process so that you can still respect privacy but get the statistical power. That's a double down on that for a second cause I want to explore that. I think this is the most important story that's not being talked about. It's nuance a little bit. Yeah. You know, healthcare, you had HIPAA, which was built for all the right reasons back then, but now when you start to get into much more of a cross pollination of data, you need to manage the benefit of why it existed with privacy. >>So encryption, homomorphic encryption for instance, data and use. Yes. Okay. When it's being used, not just in flight or being arrested becomes, now you have the three triads of data. Yes. This is now causing a new formula for encryption privacy. What are some of the state of the art mindset thinkings around how to make data open a usable but yet either secure, encrypted or protected. That's right. So it's kind of this paradox of how do I use the data but not actually get the data. You mentioned homomorphic encryption. So this is one of the most kind of leading edge techniques in this area where somehow you're able to, there are ways of doing math on the data while it stays encrypted and the answer that comes out, it's still encrypted and it's only the actual owner of the data who can reveal the answer. So it seems like magic, but with this capability you enable all kinds of new use cases that wouldn't be possible before where third parties can act on, you know, your sensitive data without ever being exposed to it in any way. >>So discovery and leverage of the days that what you're getting at in terms of the benefits, I mean use cases. So stay on that. They used cases of the, of this new idea. Yeah. Is discovery and usage. How would that work? Well, so when we talked about federated learning and pooling across hospitals, that's one set of techniques. Homomorphic encryption would be, for example, suppose that some AI system has already been trained, but I'd like to use it on sensitive data. How do I do that in such a way that the third party service isn't, you know, this what makes, I think machine learning different from different types of data. You know, security problems is that machine learning, you have to operate on the data. You're not just storing it, you're not just moving it around. So how do you, yeah, and this is a key thing. >>So I've got to ask you the question because one of the things that's a real interesting trade off these days is AI and machine learning is really can create great benefits, but also people just go the knee jerk reaction of, you know, Oh my God, it's scary. My privacy. So it's a frontline with Amazon, just facial recognition. Oh my God, it's evil. Yeah. So there's a lot of scared people that might not be informed. Yeah. How should companies invest in machine learning and AI from your opinion? On how should they think about the next 10 year trajectory starting today, thinking about how to invest, what's the right way to think about it, build a team. Yeah. What's your thoughts on that? Because, and this is the number one challenge right now. Yeah. Well I think the, uh, some of this scary issues that you mentioned, you know, there are legitimately scary. >>They're going to have to be resolved, not by companies, but probably, you know, by society and kind of our delegates. So lawmakers, regulators, part of what we're trying to do at the technical level is give society and regulators a, a more flexible set of tools around which you can slice and dice data privacy and so on, so that it's not just all or none. Right. I think that's kind of my main goal as a, as an organization. I think again, the, this idea of having a heterogeneous set of talents, you know, you're going to need policy experts and applied mathematicians and linguists and you know, neuroscientists. So diversity is a huge opportunity, very much so. Not just diversity of people, but diverse data, diverse data, diverse kind of mindsets, approaches to problems that are hard but very promising. If so. Okay. Let's flip to the other side of the spectrum, which is what should people not do? >>What does, what's a, what's a fail failure formula one dimensional thinking? What's a, what's an identification of something that's not, may not go in the right way? Well, you know, one, uh, distinguishing feature of the machine learning field, and it's kind of a cultural thing, but it's given it a lot of traction is it's fundamentally, it had been a very open culture. So there's a lot of, uh, sharing of methods. It's a very, uh, collaborative academic field. So I think within a company you want to kind of be re you want to be part of that culture too. So every company is going to have its secret sauce. It's things that it needs to keep proprietary, but it's very important for companies to engage this broader community of researchers. So you're saying, which I would want, maybe I'm what I would agree with, but I'll just say it. >>You can agree or disagree to be successful, you got to be open. If you're data-driven, you've gotta be open. That's right. There's more JD equals better data. That's why more data, more approaches to data, kind of more eyes on the problem. But you know, still you can definitely keep your proprietary, you know, it kind of forces organizations to think about what are our core strengths that we really want to keep proprietary. But then other things let's, you know, open. All right. So what's the coolest thing you've working on right now? What are some of the fun projects you guys are digging into and you've got a great job. Sounds like you're excited about it. I mean, AI I think is the most exciting thing. I mean I wish I could be 20 again in computer science or whatever field. Cause I think AI is more than a multigenerational things. >>Super exciting as a technical person. But what are you working on that you're excited about? So I'm very excited about taking some of these things like homomorphic encryption and making them much more available to developers, to data scientists because it's asking too much for a data scientist to also be a kind of a post quantum crypto expert. So we've written an open source package called H E transformer, H G for homomorphic encryption. It allows the data scientists to kind of do their normal data science and Python or whatever they're used to, but then they kind of flick a switch and suddenly their model is able to run on encrypted data. Can you just take a minute to explain why homomorphic encryption trend right now is really important? I mean, give a peek into the why because this is something that is now becoming much more real. >>Yeah. The data in use kind of philosophy. Why now? Why is it so important right now? Well, I think, uh, the, because of cloud in the, the power of cloud and the fact that you know, data are collected in one place and possibly processed in another place, you're going to have to, you know, your data are moving around and they're being operated on. So if you can know that, you know, as long as my data are moving around and people are operating on it but it's staying encrypted the whole time, you know, not just in transit, that gives a much higher level of comfort around and the applications are going to probably be onboarded. I mean you can almost imagine new applications will emerge from this application discovery cataloging and API integration points. I mean you can almost imagine the trust will go up and you can also kind of end up with these different business models where you have entities that compete in some spheres but they may decide to collaborate in other ways. >>So for example, banks could compete on, you know, lending and so on under normal activities. But in terms of fraud detection, they may decide, Hey, maybe we can make some Alliance where we cross check with each other as models on certain transactions, but I'm not actually giving you any transaction data. So that's maybe okay. Right. So that's a very powerful, it's really interesting. I mean I think the uh, the compute power has allowed, the overhead seems to be much more robust because people are working on this for in the eighties and nineties I remember. Yes. But it was just so expensive overhead while that's right. Yeah. So you bring up a great point here. So, and this is one of the areas where Intel is really pushing, my team is pushing these techniques have been around for 20 years. Initially they were maybe like 10 million times slower than real time. >>So people thought, okay, this is interesting, you know, mathematically, but not practical. There've been massive improvements just in the last two years where now things are running, you know, a hundred times slower than, than kind of un-encrypted math. But still that, that means that something that you know would take 50 milliseconds now takes five seconds. That's still not an unreasonable, you're my new friend. Now, my best friend on AI. Um, and I got a business to run and I'm going to ask you, what should I do? I really want to leverage machine learning and AI in my business. Okay, I'm investing in more tech. I got cloud and building my own software. How should I be investing? How do I build out a great machine learning AI scene and then ultimately capabilities? How should I do that? Okay, well I would start with a team that has a kind of a research mindset, not because you want them to come in and like write research papers, but the path from research into production is so incredibly short in AI. >>You know, you have things that are papers one year and they're going into production at Google search and within a year. So you kind of need that research mindset. I think another thing is that you want to, uh, you're gonna, you're going to require a very close collaboration between this data science team and your CIO and kind of, you know, systems. And a lot of the challenges around AI are not just coming up with the model, but how do you actually scale it up and you know, go to production with it and interesting about the research. I totally agree with you. I think, you know, you can almost call that product management kind of new fangled Prague product management because if it's applied research, you kind of have your eye on a market generally, but you're not making hardcore product decisions. You're researching it, you're writing it so that you got to, got to do the homework, you know, dream it before you can build it. >>Well, I'm just saying that the field is moving so fast that you're going to need on your team, uh, people who can kind of consume the latest papers. Oh, you're saying consume the research as well. Yeah, I mean if they can contribute, that's great too. I mean, I think this is this kind of open culture where, you know, people consume, they find some improvement. They can then publish it at the next year's conference. It's just been this incredibly healthy eco software. Acceleration's a big part of the cloud. Awesome. Well I really appreciate your insight. This is great topic. I could go for an hour. One of my favorite things. I love the homophobic uh, encryption. I think that's going to be a game changer. I think we're going to start to see some interesting discoveries there. Uh, give a quick plug for Intel. What are you working on now? >>What are you looking to do? What's your plans, highs hiring, doing more research, what's going on? Well, so we think that this intersection of privacy and AI is kind of at the core of, of Intel's data centric mission. So we're trying to figure out, you know, whatever it takes to enable the community, whether it's, you know, uh, optimize software libraries. It could be custom Silicon, it could be even services where, you know, we really want to listen to customers, figure out what they need. Funding. Moore's law is always going to be around the next wave is going to have more compute. It's never going away. More storage, more data. It's just gets better and better. Yeah. Thanks for coming on Catherine. Thanks for having can we have Intel inside the cube breaking down the future of AI. Really exciting stuff on the technology front security day. That's all going to happen at large scale. Of course, it's the cube bringing you all the data here at RSA. I'm John furrier. Thanks for watching.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon So do the bad guys deserve privacy? So how can you also respect So because of the nature of digital data, I mean you talk to someone who's 12 years old, they see a Tesla, they see software, So what have got a, you know, kind of mathematicians, but I also have coders. So for example, you know, in healthcare you could have multiple So it seems like magic, but with this capability you enable all kinds of new use cases So discovery and leverage of the days that what you're getting at in terms of the benefits, So I've got to ask you the question because one of the things that's a real interesting trade off these days They're going to have to be resolved, not by companies, but probably, you know, by society and kind you know, one, uh, distinguishing feature of the machine learning field, You can agree or disagree to be successful, you got to be open. But what are you working on that you're excited about? I mean you can almost imagine the trust will go up and you can also kind of end up So for example, banks could compete on, you know, lending and so on under normal activities. So people thought, okay, this is interesting, you know, mathematically, but not practical. I think, you know, you can almost call that product management kind of new fangled Prague product Well, I'm just saying that the field is moving so fast that you're going to need on your team, So we're trying to figure out, you know, whatever it takes to enable the community,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Casimir Wierzynski | PERSON | 0.99+ |
Kaz Borzynski | PERSON | 0.99+ |
five seconds | QUANTITY | 0.99+ |
Catherine | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
three days | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
50 milliseconds | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
John furrier | PERSON | 0.99+ |
Python | TITLE | 0.99+ |
20 | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
one year | QUANTITY | 0.98+ |
HIPAA | TITLE | 0.97+ |
RSAC | ORGANIZATION | 0.97+ |
RSA | EVENT | 0.97+ |
today | DATE | 0.97+ |
RSA Congress 2020 | EVENT | 0.97+ |
Prague | LOCATION | 0.97+ |
12 years old | QUANTITY | 0.97+ |
next year | DATE | 0.96+ |
eighties | DATE | 0.96+ |
one set | QUANTITY | 0.95+ |
20 years | QUANTITY | 0.95+ |
USA | LOCATION | 0.94+ |
three triads | QUANTITY | 0.94+ |
second | QUANTITY | 0.93+ |
10 million times | QUANTITY | 0.92+ |
an hour | QUANTITY | 0.92+ |
Moscone | LOCATION | 0.92+ |
one party | QUANTITY | 0.9+ |
Moore | PERSON | 0.89+ |
a year | QUANTITY | 0.88+ |
ORGANIZATION | 0.87+ | |
one thing | QUANTITY | 0.85+ |
next 10 year | DATE | 0.84+ |
last two years | DATE | 0.81+ |
one place | QUANTITY | 0.8+ |
Silicon angle media | ORGANIZATION | 0.78+ |
hundred times | QUANTITY | 0.74+ |
nineties | DATE | 0.74+ |
AI | ORGANIZATION | 0.68+ |
last couple | DATE | 0.65+ |
years | DATE | 0.65+ |
E | OTHER | 0.65+ |
CTO | ORGANIZATION | 0.64+ |
2020 | EVENT | 0.61+ |
AI wave | EVENT | 0.58+ |
G | TITLE | 0.54+ |
number one | QUANTITY | 0.52+ |
JD | PERSON | 0.51+ |
2020 | ORGANIZATION | 0.45+ |
next | DATE | 0.44+ |
H | TITLE | 0.35+ |
wave | EVENT | 0.3+ |
Dr. Ellison Anne Williams, Enveil | RSAC USA 2020
>> Narrator: Live from San Francisco. It's the theCUBE covering RSA Conference 2020 San Francisco, brought to you by SiliconAngle Media. >> Alright, welcome to theCUBE coverage here at RSA Conference in San Francisco and Moscone Halls, theCUBE. I'm John Furrier, the host of theCUBE, in a cyber security is all about encryption data and also security. We have a very hot startup here, that amazing guest, Dr. Ellison Anne Williams, CEO and Founder of Enveil just recently secured a $10 million Series A Funding really attacking a real problem around encryption and use. Again, data ,security, analytics, making it all secure is great. Allison, and thanks for coming on. Appreciate your time. >> Thanks for having me. >> So congratulations on the funding before we get started into the interview talking about the hard news, you guys that are around the funding. How long have you guys been around? What's the funding going to do? What are you guys doing? >> Yeah, so we're about three and a half years old as a company. We just announced our Series A close last week. So that was led by C5. And their new US Funds The Impact Fund and participating. Other partners included folks like MasterCard, Capital One Ventures, Bloomberg, Beta 1843, etc. >> So some names jumped in C5 led the round. >> For sure. >> How did this get started? What was the idea behind this three years you've been actually doing some work? Are you going to production? Is it R&D? Is it in market? Give us a quick update on the status of product and solution? >> Yeah, so full production. For production of the product. We're in fact in 2.0 of the release. And so we got our start inside of the National Security Agency, where I spent the majority of my career. And we developed some breakthroughs in an area of technology called homomorphic encryption, that allows you to perform computations into the encrypted domain as if they were in the unencrypted world. So the tech had never existed in a practical capacity. So we knew that bringing seeds of that technology out of the intelligence community and using it to seed really and start the company, we would be creating a new commercial market. >> So look at this, right? So you're at the NSA, >> Correct >> Your practitioner, they're doing a lot of work in this area, pioneering a new capability. And did the NSA spin it out did they fund it was the seed capital there or did you guys bootstrap it >> No. So our seed round was done by an entity called Data Tribe. So designed to take teams in technologies that were coming out of the IC that wanted to commercialize to do so. So we took seed funding from them. And then we were actually one of the youngest company ever to be in the RSA Innovation Sandbox here in 2017, to be one of the winners and that's where the conversation really started to change around this technology called homomorphic encryption, the market category space called securing data in use and what that meant. And so from there, we started running the initial version of a product out in the commercial world and we encountered two universal reaction. One that we were expecting and one that we weren't. And the one that we were expecting is that people said, "holy cow, this actually works". Because what we say we do keeping everything encrypted during processing. Sounds pretty impossible. It's not just the math. And then the second reaction that we encountered that we weren't expecting is those initial early adopters turned around and said to us, "can we strategically invest in you?" So our second round of funding was actually a Strategic Round where folks like Bloomberg beta,Thomson Reuters, USA and Incue Towel came into the company. >> That's Pre Series A >> Pre Series A >> So you still moving along, if a sandbox, you get some visibility >> Correct. >> Then were the products working on my god is you know, working. That's great. So I want to get into before I get into some of the overhead involved in traditionally its encryption there always has been that overhead tax. And you guys seem to solve that. But can you describe first data-at-rest versus data-in-motion and data-in-user. data at rest, as means not doing anything but >> Yeah, >> In flight or in you so they the same, is there a difference? Can you just tell us the difference of someone this can be kind of confusing. >> So it's helpful to think of data security in three parts that we call the triad. So securing data at rest on the file system and the database, etc. This would be your more traditional in database encryption, or file based encryption also includes things like access control. The second area, the data security triad is securing data- in- transit when it's moving around through the network. So securing data at rest and in transit. Very well solution. A lot of big name companies do that today, folks like Talus and we partner with them, Talus, Gemalto, etc. Now, the third portion of the data security triad is what happens to that data when you go use or process it in some way when it becomes most valuable. And that's where we focus. So as a company, we secure data-in-use when it's being used or processed. So what does that mean? It means we can do things like take searches or analytics encrypt them, and then go run them without ever decrypting them at any point during processing. So like I said, this represents a new commercial market, where we're seeing it manifest most often right now are in things like enabling secure data sharing, and collaboration, or enabling secure data monetization, because its privacy preserving and privacy enabling as a capability. >> And so that I get this right, the problem that you solved is that during the end use parts of the triad, it had to be decrypted first and then encrypted again, and that was the vulnerability area. Look, can you describe kind of like, the main problem that you guys saw was that-- >> So think more about, if you've got data and you want to give me access to it, I'm a completely different entity. And the way that you're going to give me access to it is allowing me to run a search over your data holdings. We see this quite a bit in between two banks in the areas of anti-money laundering or financial crime. So if I'm going to go run a search in your environment, say I'm going to look for someone that's an EU resident. Well, their personal information is covered under GDPR. Right? So if I go run that search in your environment, just because I'm coming to look for a certain individual doesn't mean you actually know anything about that. And so if you don't, and you have no data on them whatsoever, I've just introduced a new variable into your environment that you now have to account for, From a risk and liability perspective under something like GDPR. Whereas if you use us, we could take that search encrypt it within our walls, send it out to you and you could process it in its encrypted state. And because it's never decrypted during processing, there's no risk to you of any increased liability because that PII or that EU resident identifier is never introduced into your space. >> So the operating side of the business where there's compliance and risk management are going to love this, >> For sure. >> Is that really where the action is? >> Yes, compliance risk privacy. >> Alright, so get a little nerdy action on this one. So encryption has always been an awesome thing depending on who you talk to you, obviously, but he's always been a tax associate with the overhead processing power. He said, there's math involved. How does homeomorphic work? Does it have problems with performance? Is that a problem? Or if not, how do you address that? Where does it? I might say, well, I get it. But what's the tax for me? Or is your tax? >> Encryption is never free. I always tell people that. So there always is a little bit of latency associated with being able to do anything in an encrypted capacity, whether that's at rest at in transit or in use. Now, specifically with homomorphic encryption. It's not a new area of encryption. It's been around 30 or so years, and it had often been considered to be the holy grail of encryption for exactly the reasons we've already talked about. Doing things like taking searches or analytics and encrypting them, running them without ever decrypting anything opens up a world of different types of use cases across verticals and-- >> Give those use case examples. What would be some that would be low hanging fruit. And it would be much more higher level. >> Some of the things that we're seeing today under that umbrella of secure data sharing and collaboration, specifically inside of financial services, for use cases around anti-money laundering and financial crimes so, allowing two banks to be able to securely collaborate with with each other, along the lines of the example that I gave you just a second ago, and then also for large multinational banks to do so across jurisdictions in which they operate that have different privacy and secrecy regulations associated with them. >> Awesome. Well, Ellison, and I want to ask you about your experience at the NSA. And now as an entrepreneur, obviously, you have some, you know, pedigree at the NSA, really, you know, congratulations. It's going to be smart to work there, I guess. Secrets, you know, >> You absolutely do. >> Brains brain surgeon rocket scientist, so you get a lot of good stuff. But now that you're on the commercial space, it's been a conversation around how public and commercial are really trying to work together a lot as innovations are happening on both sides of the fence there. >> Yeah. >> Then the ICC and the Intelligence Community as well as commercial. Yeah, you're an entrepreneur, you got to go make money, you got shareholders down, you got investors? What's the collaboration look like? How does the world does it change for you? Is it the same? What's the vibe in DC these days around the balance between collaboration or is there? >> Well, we've seen a great example of this recently in that anti-money laundering financial crime use case. So the FCA and the Financial Conduct Authority out of the UK, so public entity sponsored a whole event called a tech spread in which they brought the banks together the private entities together with the startup companies, so your early emerging innovative capabilities, along with the public entities, like your privacy regulators, etc, and had us all work together to develop really innovative solutions to real problems within the banks. In the in the context of this text spread. We ended up winning the know your customer customer due diligence side of the text brand and then at the same time that us held an equivalent event in DC, where FinCEN took the lead, bringing in again, the banks, the private companies, etc, to all collaborate around this one problem. So I think that's a great example of when your public and your private and your private small and your private big is in the financial services institutions start to work together, we can really make breakthroughs-- >> So you see a lot happening >> We see a lot happening. >> The encryption solution actually helped that because it makes sense. Now you have the sharing the encryption. >> Yeah. >> Does that help with some of the privacy and interactions? >> It breaks through those barriers? Because if we were two banks, we can't necessarily openly, freely share all the information. But if I can ask you a question and do so in a secure and private capacity, still respecting all the access controls that you've put in place over your own data, then it allows that collaboration to occur, whereas otherwise I really couldn't in an efficient capacity. >> Okay, so here's the curveball question for you. So anybody Startup Series today, but you really got advanced Series A, you got a lot of funding multiple years of operation. If I asked you what's the impact that you're going to have on the world? What would you say to that, >> Over creating a whole new market, completely changing the paradigm about where and how you can use data for business purposes. And in terms of how much funding we have, we have, we've had a few rounds, but we only have 15 million into the company. So to be three and a half years old to see this new market emerging and being created with with only $15 million. It's really pretty impressive. >> Yeah, it's got a lot of growth and keep the ownership with the employees and the founders. >> It's always good, but being bootstrap is harder than it looks, isn't it? >> Yeah. >> Or how about society at large impact. You know, we're living global society these days and get all kinds of challenges. You see anything else in the future for your vision of impact. >> So securing data and your supplies horizontally across verticals. So far we've been focused mainly on financial services. But I think healthcare is a great vertical to move out in. And I think there are a lot of global challenges with healthcare and the more collaborative that we could be from a healthcare standpoint with our data. And I think our capabilities enable that to be possible. And still respecting all the privacy regulations and restrictions. I think that's a whole new world of possibility as well. >> And your secret sauce is what math? What's that? What's the secret sauce, >> Math, Math and grit. >> Alright, so thanks for sharing the insights. Give a quick plug for the company. What are you guys looking to do? Honestly, $10 million in funding priorities for you and the team? What do you guys live in to do? >> So priorities for us? privacy is a global issue now. So we are expanding globally. And you'll be hearing more about that very shortly. We also have new product lines that are going to be coming out enabling people to do more advanced decisioning in a completely secure and private capacity. >> And hiring office locations DC. >> Yes. So our headquarters is in DC, but we're based on over the world, so we're hiring, check out our web page. We're hiring for all kinds of roles from engineering to business functionality >> And virtual is okay virtual hires school >> Virtual hires is great. We're looking for awesome people no matter where they are. >> You know, DC but primary. Okay, so great to have you gone. Congratulations for one, the financing and then three years of bootstrapping and making it happen. Awesome. >> Thank you. >> Thank you for coming ,appreciate it. So keep coming to your RSA conference in Moscone. I'm John Furrier. Thanks for watching more after this short break (pop music playing)
SUMMARY :
brought to you by SiliconAngle Media. I'm John Furrier, the host of theCUBE, in a cyber security So congratulations on the funding before we get started So that was led by C5. and start the company, we would be creating And did the NSA spin it out did they fund it And the one that we were expecting is that people said, And you guys seem to solve that. In flight or in you so they the same, is there So securing data at rest on the file system and that you guys saw was that-- So if I'm going to go run a search in your environment, say who you talk to you, obviously, but he's always been a tax the reasons we've already talked about. And it would be much more higher Some of the things that we're seeing today under that Well, Ellison, and I want to ask you about your experience so you get a lot of good stuff. Is it the same? So the FCA and the Financial Conduct Authority out of the Now you have the sharing the encryption. private capacity, still respecting all the access controls So anybody Startup Series today, but you really got advanced So to be three and a half years old to see this new market Yeah, it's got a lot of growth and keep the ownership with You see anything else in the future for your vision of And still respecting all the privacy regulations and Math and grit. Alright, so thanks for sharing the insights. We also have new product lines that are going to be coming the world, so we're hiring, check out our web page. We're looking for awesome people no matter where they are. Okay, so great to have you gone. So keep coming to your RSA conference in Moscone.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
FCA | ORGANIZATION | 0.99+ |
MasterCard | ORGANIZATION | 0.99+ |
Bloomberg | ORGANIZATION | 0.99+ |
National Security Agency | ORGANIZATION | 0.99+ |
Gemalto | ORGANIZATION | 0.99+ |
Talus | ORGANIZATION | 0.99+ |
$10 million | QUANTITY | 0.99+ |
Allison | PERSON | 0.99+ |
Financial Conduct Authority | ORGANIZATION | 0.99+ |
Ellison | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Thomson Reuters | ORGANIZATION | 0.99+ |
FinCEN | ORGANIZATION | 0.99+ |
15 million | QUANTITY | 0.99+ |
Capital One Ventures | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.99+ |
two banks | QUANTITY | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
UK | LOCATION | 0.99+ |
DC | LOCATION | 0.99+ |
2017 | DATE | 0.99+ |
San Francisco | LOCATION | 0.99+ |
C5 | ORGANIZATION | 0.99+ |
ICC | ORGANIZATION | 0.99+ |
three parts | QUANTITY | 0.99+ |
GDPR | TITLE | 0.99+ |
last week | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
SiliconAngle Media | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Enveil | ORGANIZATION | 0.99+ |
Ellison Anne Williams | PERSON | 0.99+ |
both sides | QUANTITY | 0.98+ |
second area | QUANTITY | 0.98+ |
second round | QUANTITY | 0.98+ |
three years | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
EU | ORGANIZATION | 0.98+ |
RSA Conference | EVENT | 0.98+ |
Beta 1843 | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
second reaction | QUANTITY | 0.97+ |
third portion | QUANTITY | 0.97+ |
Moscone Halls | LOCATION | 0.97+ |
one problem | QUANTITY | 0.96+ |
Series A | OTHER | 0.95+ |
RSA | EVENT | 0.94+ |
two universal reaction | QUANTITY | 0.94+ |
USA | ORGANIZATION | 0.94+ |
$15 million | QUANTITY | 0.93+ |
around 30 or so years | QUANTITY | 0.93+ |
USA | LOCATION | 0.92+ |
three and a half years old | QUANTITY | 0.91+ |
Data Tribe | ORGANIZATION | 0.9+ |
Francisco | LOCATION | 0.89+ |
about three and a half years old | QUANTITY | 0.87+ |
a second ago | DATE | 0.87+ |
Intelligence Community | ORGANIZATION | 0.86+ |
RSA Innovation Sandbox | ORGANIZATION | 0.86+ |
RSA Conference 2020 San | EVENT | 0.85+ |
theCUBE | ORGANIZATION | 0.82+ |
2.0 | QUANTITY | 0.82+ |
Pre Series A | OTHER | 0.76+ |
EU | LOCATION | 0.72+ |
Incue Towel | ORGANIZATION | 0.69+ |
one of the winners | QUANTITY | 0.67+ |
RSAC | ORGANIZATION | 0.66+ |
2020 | DATE | 0.6+ |
US Funds The Impact Fund | OTHER | 0.59+ |
Narrator | TITLE | 0.56+ |
Dr. | PERSON | 0.5+ |
Lisa O'Connor, Accenture | RSAC USA 2020
>> Narrator: Live from San Francisco, it's theCUBE, covering RSA Conference 2020 San Francisco. Brought to you by SiliconANGLE Media. >> Welcome back everyone. This is theCUBE's coverage from RSA Conference on Moscone South. I'm John Furrier, host of theCUBE. You know, cybersecurity is changing, and the next technology is right around the corner, and it's got to be invented somewhere, and of course Accenture Labs is part of it. Our next guest is Lisa O'Connor, Global Security R&D Lead for Accenture Labs. Lisa's working on some of those hard problems all around the world. Thank you for joining me today. Thanks for coming on. >> Thank you for having me. >> So, we always get the good scoop from Accenture, because you have a lot of smart people in that company. You know, they know their stuff. I know you got a huge analytics team. I've talked to Jean-Luc Chatelain before, and I know you got a massive amount of, deep bench of talent. But as you have to go do the applied R&D, and maybe some of the crazy ideas, you got to start thinking about where the puck is going to be. >> Absolutely. >> You got to understand that. Well, it's pretty clear to us that Cloud is certainly there. Palo Alto Networks had a disappointing earnings yesterday, because their on-premises business is shifting to the Cloud. You're seeing hybrid operating model and multicloud for the enterprise, but now you got global challenges. >> We absolutely do. >> Huge, so what are you guys working on that's coming? Tell us. >> So we're working on lots of exciting things, and Cloud is one of them. But, some of the things I'm so passionate about in labs, and I have the best job at Accenture. Don't tell anyone. (laughs) I do. So, we are working on, like Jean-Luc is working on applied intelligence, we are working on robust AI. So, when we think about AI in the future, how do we feel that, and know that it's okay? How do we put it out there and know it's safe in production, we've done the right training, we've made our model resilient to what's out there? One of the things we see happening, and I love AI, love it. It has great potential, and we get great insights out of it, but a lot of times we stop, we get the insights, and we say, "Okay, it's in the box, we got a couple hits there, "we're good, it's good." No, maybe not. And so really, it's learning and creating the actually applied attacks on AI, and then figuring out what the right defenses are. And, depending on what type of machine learning you're using, those defenses change. And so, we're having a great time in our lab in Washington D.C., working on basically defending AI and building those techniques, so that what we put out as Accenture is robust. >> You know, it's interesting, AI, you watch some of the hardcore, you know, social justice warriors out there going after Amazon, Google, you know, because they're doing some pretty progressive things. Oh, facial recognition, you got AI, you got Alexa. You know, a lot of people are like, "Oh, I'm scared." But, at the end of the day, they also have some challenges like network security, so you have all this AI up and down the stack. And, one thing I like about what's being talked about in the industry is the shared responsibility model. So, I got to ask you, as AI becomes exciting, but also, balancing, frightening to people, how do you get that shared responsibility model, so we get it right, do the experimentation, without people freaking out? (laughs) So, it's kind of like this weird mode we're in now, where I want to do more AI, because I think it benefits society, but everyone's freaking out. >> Yeah, so, in our tech vision that we just launched, The Tech Vision 2020, there's a lot of talk about value and values, which is really important when we think about AI because we can get great value out of it, but there's a values piece of it and it's how we're using it, how we're getting those insights. Because, the one thing, we have this circle, and it's between customer experience, because the companies that do customer experience well are going to excel, they're going to keep their clients, they're going to do amazing things, they're going to become sticky. But, to do that well, you have to be a good custodian of their data and their information, and curated experiences that they want, and not the creepy ones, not the ones they don't want. And so, we really look at that trust is necessary in that ecosystem, in building that, and keeping that with clients. So, that's something that came out of our technology vision. And, in fact, we're going to be talking at the Executive Women's Forum, this is tomorrow, and we're going to be having a panel on AI, and defending it, which will be very interesting. >> Make sure your people film that conference. We'd like to get a view of it on YouTube after. We love those conferences, really insightful. But, I want to get back to what you were talking about, the fun side. >> Yeah. >> You got a lot of new things on, your guys are kicking the tires on, scratching the surface on. You have two operating labs, one in Washington D.C., and one in Israel. What city in Israel? Is it in Tel Aviv or-- >> Herzliya. >> Okay, did not know. >> Yeah, the tech district, just north of Tel Aviv. It's the hotspot. >> So, Silicon Valley, D.C., and Israel, hotbeds of technology now. >> Yes. >> What's coming out of those labs, what's hot? >> Oh, there's so much exciting stuff coming out of our lab in Herzliya. One of the things that we have, and it's something that's been long and coming, it's been brewing for a while, but it's really looking at creating a model of the enterprise security posture. And, when I say a model of it, I'm talking about a cyber digital twin. Because, so much we can't do in our production networks, we don't have the capabilities. We can look around the room, but we don't have the capabilities on the SOCs team side, to ingest all this stuff. We need a playground where we can ask the what-ifs, where we can run high performance analytics, and we do that through a temporal knowledge graph. And, that's a hard thing to achieve, and it's a hard thing to do analytics at scale. So, that's one of the big projects that we're doing out of our Israel lab. >> Are you saying digital twins is a framework for that? >> Yeah. >> Does it really work well with that? >> So the knowledge graph, we can create digital twins around many things, because a digital twin is a model of processes, people, technologies, the statefulness of things, and configurations, whatever you want to pull in there. So, when we start thinking about, what would we take in to create the perfect enterprise security posture? What would give us all the insights? And, then we can ask the questions about, okay, how would an adversary do lateral movement through this? I can't fix everything that's a 10, but I could fix the right ones to reduce the risk impactfully. And, those are the kind of what-ifs that you can do. >> That's real sci-fi stuff, that's right around the corner. >> Yeah, it is. >> That simulation environment. >> It is. >> What-ifs. Oh my god, the company just got hacked, we're out of business. That's your simulation. You could get to, that's the goal, right? >> It absolutely is, to ask those good business questions about the data, and then to report on the risk of it. And, the other thing, as we move to 5G, this problem's getting bigger and bigger, and we're now bringing in very disparate kinds of compute platforms, computing-at-the-edge. And, what does that do to our nice little network model that we had, that our traditional systems are used to defending against? >> I mean, just the segmentation of the network, and the edge opens up so much more aperture-- >> Yes, it does (laughs). >> to the digital twin, or a knowledge graph. You brought up knowledge graph, I want to get your thoughts on this. I was just having dinner last night with an amazing woman out of New York. She's a Ph.D. in computer science. So, we're talking about graphs, and I love riffing on graph databases. But, the topic came up about databases in general, because with the cloud, it's horizontally scalable, you've got all kinds of simulation, a lot of elasticity going on, there's a lot of software being written on this. You got time series database, you got relational database, you got unstructured, and you got graphs. You got to make them all work together. This is kind of the unique challenge. And, with security, leveraging the right database, and the right construct is a super important thing. How do you guys look at that in the labs? Because, is it something that you guys think about, or is it going to be invisible someday? >> Oh, we think about it a lot. In fact, we've had a number of research projects over the last five years now, actually six years, where we've really pivoted hard in cyber security to graph databases. And, the reason for that is, the many-to-many relationships, and what we can do in terms of navigating, asking the questions, pulling on a thread, because in cyber hunting, that's what we're doing. In many of these use cases that we're trying to defend an enterprise, we're following the next new path based on the newest information of now what the challenge is, or what the current configuration is. So, that's really important. So, graph databases enable that so well. Now, there's still the architecture challenge of, okay, when I ask a query, what am I doing? Am I disrupting the whole apple cart? Do I have to process everything over, or is there a way to do that elegantly, where I can ask my query, and because of how I've structured it in storage, I can do it much better, and I can do it much more efficiently. And that, I think, is where the opportunities are. >> I got to tell you, I'm getting exited now on this whole database discussion, because you think about the logic around what you just said. A graph database with that kind of complexity, when you factor in contextually different things happening at any given time, the database needs to be parsed and managed differently. >> Yes. >> That's a huge challenge. >> It is a great research challenge, which is why we're doing it. >> What is that, how far along are we going to be able to have this dynamic, self-evolving, self-governing, self-healing data modeling? Is that coming soon, or... >> Yeah, I hope so. We wrote about it a couple of years ago. >> You did? >> The self-healing enterprise, aspirational. But I think, I mean, we try to get to real time, right? And, we try to get to real time, and again, refactoring. As we talk about what an adversary is going to do, or lateral movement through a business process, we're talking about a lot of computational horsepower to recalculate all that, process it again, update it, and then again present that back. So the number of things we're asking, how we're asking it becomes also very important to the structure. >> Just, it goes zooming up a little bit, high level, what we're really talking about here is value >> of the data. >> Absolutely. >> And, when you get into the valuation of the nodes, and the arcs, and all that graphs, and other databases, you got to know what to pay attention to. It's kind of like going into the hospital and hearing all these alarms going off. At some point you don't know what's, until they hear a flat line, or whatever. >> Right. That's a bad one. >> I mean, well that's obvious. But, now sometimes there's so many alerts, there's so many alarms. How do you understand at any given time what to pay attention to, because obviously when someone's having a problem you want to pay attention to it. If it's a security alert, that's prioritized. >> And the devil is in the analytics, right? What's the question we're asking, and the analytics that give us that prioritization? And that's non-trivial, because there are a lot of other folks that are doing prioritization in a different manner. To do it at scale, and to do it, not just one hop out, but I want to go all the way to the crown jewels, I want that whole path navigated, and I want to know where to cut along that path. That's a hard thing to do. And so, we've actually developed, and we've submitted patents for them, but we've developed new analytics that'll support that. >> Awesome. Well Lisa, I want to ask you kind of a, I'll give you a plug here, just going to get it out, because I think it's important. Skills gap's a big thing, so I want to give you a minute to explain, or share what you're looking for in your hiring. Who are you looking for? What kind of, the make-up of individual, obviously? Maybe, do you use straight, more academic paper kind of people, or practitioners? I mean, when you look to hire, what are some of the priorities that you look for, and who would thrive in an Accenture Lab's environment? >> Oh, my goodness. >> Take a minute to share what you're looking for. >> Yeah, so we love people that think out of the box, and those kinds of people come from very different backgrounds. And so, part of that is, some of them we look for Ph.D.'s, that have wonderful applied skills, and applied is a key word there. White papers are great, I need to be able to prove something, I need to be able to demo something that has value. So, having the applied skills to a business challenge is really important. So, that sort of ground, understanding the business, very important too. But, our talent comes from many different areas. I mean, I kind of joke, my lab looks like the UN, it's wonderful. I have people from across the globe that are in our cyber security lab. I have, in our Washington D.C. lab, we're 50% women, which is also exciting, because we want different experiences, and we shoot for cognitive diversity, right? So, we're looking for people that think differently about solving problems, and are not encumbered by what they've seen in the past, because we're trying to be tip of spear. And, I'm sure you know that from Paul Daugherty. >> Yeah. >> We are trying to be three to five years over the horizon. >> You guys got a good narrative. I always love talking to Accenture, they have a good vision. So, I got to ask you, the next logical question is, obviously, in the news, you see everyone talking about breaches, and ya know, it's not a breach if the door's open, you just walk in. They're really walking in, nothing was really breached, you're just giving it to them. >> Yeah. It's a passive invitation. >> (laughs) Hey come on in. Human error is a big part of it, but then, breach is obviously targeted, phishing, and all that good stuff. But, as those stories get told, there's a whole nother set of stories that aren't being told that are super important. So, I'd love to get your thoughts on, what are the most important stories that we should be talking about that aren't being talked about? >> Yeah, so I have two that are front-of-mind for me. One theme we come back to, and it's not sexy, it's hygiene. It is IT hygiene, and so many of the large companies, and even medium, small companies, we have legacy technology, and keeping that adds complexity, it adds to the whole breadth and depth of what we have to manage and defend. Keeping that attack surface simple and small, cloud-enabled, all those good things, is a real asset and it makes it much easier to defend. So, that's kind of the first non-sexy one, hygiene. The other one I'll say that I think is a challenge that we are not dealing with yet, quantum computing, right? And so, we're on the way to getting our post quantum cryptography in place, but there's another dimension to it, and it's our histories. So, all of the things that have passed on the wire, all the communications with the key exchanges, all that brilliant stuff, is sitting somewhere. Once we get to that point where this becomes very routine, and it's coming fast, we predicted eight years, two years ago. >> So, all that exhaust is somewhere, pent up. >> It's somewhere that, we have to think about how much data we're keeping as custodians, how we're managing it, and then we have to think about the exposure from our past, and say, "Okay, what does that mean that, that was out there?" "Is it aged enough that it doesn't have value?" And, I think there's a real triage that needs to be done, and certainly data management. >> I think, you know, the hygiene brings up a good point. It reminds me of the story Andy Jassy was telling about the mainframe customer that they couldn't find who had the password. They had to find their person, who was retired 10 years earlier to get the password. You don't forget things, but also, there's a human component in all this. Humans and machines are working together. >> Absolutely. >> And. that's a huge part of it. It's not just machines dominating it all, there's going to be a human component, there's a societal impact that we're seeing with information. And, whether that's out in the open, or behind closed doors, there's all kinds of things looming. >> There are, and I think one of the things in the companies that we're seeing who are embracing innovation well, are doing a lot of retraining. Because, the things that people are excellent at, AI is not good at, and the things that AI is good at, are not at all what people are good at. So, the good news is there is a beautiful teaming there, if we retool the skills, or if we re-envision those roles, so that people can get into those roles, and I think that's really important, because I'd rather see AI do all the heavy lifting well, and be trustworthy, and robust and all those great things, and the people be doing the much smarter things that require a human. >> Does the process serve the purpose? Does the purpose serve the process? Same kind of question, right? >> Exactly. >> AI, you can't have great AI that does nothing. >> That's right. >> (laughs) So, it has to be relevant. >> It absolutely does. >> Relevance is kind of a big thing. >> And we own that context, right? Humans own that context. >> Yeah. Yeah. Yeah. Well, thanks for coming in, and sharing the insight. Really appreciate it. Final question, it's always tough to pick your favorite child, but what is your most coolest thing you're working on right now? >> I'll tell you, the cyber digital twin stuff is so cool. >> The what? >> The cyber digital twin stuff is so cool. When you see the power of what that picture, and the analytics can do, we'll show ya. >> Do you have a demo of that now? >> We absolutely do. >> You do. Is it online, or is it more in person you got to see it? >> More in person. >> Okay. >> Folks can reach out, yeah. >> We'll have to get the exclusive on that. >> We do. >> I love those simulations. I think it's very beneficial. >> It is. >> A lot of learning. I mean, who doesn't want practice? >> Well, and a picture, you know that is worth a million dollars. It's just incredible to look at it, and it clicks. It clicks of all the potential things you could ask or do. And, that's the exciting part now, as we show this with customers' and we co-innovate with customers', they're coming up with a laundry list of questions. >> And, this is the beautiful thing about cloud, is that new capabilities are emerging every day, and you could use the good ones. Lisa O'Connor is here. Thank you very much for sharing your insights. Global Security R&D Lead for Accenture Labs. TheCUBE coverage, getting all the signal here on the show floor, extracting that from all the noise. I'm John Furrier, thanks for watching. (upbeat music)
SUMMARY :
Brought to you by SiliconANGLE Media. and it's got to be invented somewhere, and of course and maybe some of the crazy ideas, for the enterprise, but now you got global challenges. Huge, so what are you guys One of the things we see happening, and I love AI, love it. of the hardcore, you know, social justice warriors out there and not the creepy ones, not the ones they don't want. But, I want to get back to what you were talking about, scratching the surface on. Yeah, the tech district, So, Silicon Valley, D.C., and Israel, One of the things that we have, and configurations, whatever you want to pull in there. that's right around the corner. Oh my god, the company just got hacked, And, the other thing, as we move to 5G, This is kind of the unique challenge. And, the reason for that is, the many-to-many relationships, the database needs to be parsed and managed differently. It is a great research challenge, What is that, how far along are we going to be able a couple of years ago. So the number of things we're asking, how we're asking it and the arcs, and all that graphs, and other databases, That's a bad one. How do you understand at any given time and the analytics that give us that prioritization? What kind of, the make-up of individual, obviously? So, having the applied skills to a business challenge three to five years over the horizon. it's not a breach if the door's open, you just walk in. It's a passive invitation. So, I'd love to get your thoughts on, So, all of the things that have passed on the wire, So, all that exhaust and then we have to think about the exposure from our past, about the mainframe customer that they couldn't find there's going to be a human component, and the people be doing the much smarter things Relevance is kind of And we own that context, right? Well, thanks for coming in, and sharing the insight. and the analytics can do, we'll show ya. Is it online, or is it more in person you got to see it? I love those simulations. A lot of learning. It clicks of all the potential things you could ask or do. and you could use the good ones.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa O'Connor | PERSON | 0.99+ |
Jean-Luc | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Israel | LOCATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Jean-Luc Chatelain | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Paul Daugherty | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Accenture Labs | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
RSAC | ORGANIZATION | 0.99+ |
Washington D.C. | LOCATION | 0.99+ |
50% | QUANTITY | 0.99+ |
Tel Aviv | LOCATION | 0.99+ |
Herzliya | LOCATION | 0.99+ |
two operating labs | QUANTITY | 0.99+ |
10 | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
One theme | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
San Francisco | LOCATION | 0.98+ |
six years | QUANTITY | 0.98+ |
tomorrow | DATE | 0.98+ |
first | QUANTITY | 0.98+ |
RSA Conference | EVENT | 0.97+ |
today | DATE | 0.97+ |
two years ago | DATE | 0.96+ |
Alexa | TITLE | 0.96+ |
theCUBE | ORGANIZATION | 0.96+ |
Moscone South | LOCATION | 0.96+ |
YouTube | ORGANIZATION | 0.96+ |
RSA Conference 2020 San | EVENT | 0.95+ |
last night | DATE | 0.93+ |
Global Security R&D | ORGANIZATION | 0.92+ |
UN | ORGANIZATION | 0.91+ |
D.C. | LOCATION | 0.9+ |
apple | ORGANIZATION | 0.9+ |
10 years earlier | DATE | 0.9+ |
couple of years ago | DATE | 0.87+ |
Silicon Valley, | LOCATION | 0.85+ |
Tech Vision 2020 | EVENT | 0.84+ |
Executive Women's Forum | EVENT | 0.82+ |
a million dollars | QUANTITY | 0.81+ |
one thing | QUANTITY | 0.8+ |
twin | QUANTITY | 0.78+ |
last five years | DATE | 0.73+ |
couple | QUANTITY | 0.71+ |
2020 | ORGANIZATION | 0.69+ |
Francisco | LOCATION | 0.69+ |
many | QUANTITY | 0.69+ |
Narrator | TITLE | 0.67+ |
eight years | DATE | 0.67+ |
USA | LOCATION | 0.62+ |
TheCUBE | ORGANIZATION | 0.59+ |
things | QUANTITY | 0.51+ |
Cloud | TITLE | 0.44+ |
5G | ORGANIZATION | 0.35+ |
Masha Sedova, Elevate Security | RSAC USA 2020
>> Narrator: Live from San Francisco It's theCUBE. Covering RSA Conference 2020, San Francisco. Brought to you by Silicon Angled Media >> Hi everyone, welcome to theCUBE's coverage here at RSA Conference 2020. I'm John Furrier, host of theCUBE We're on the floor getting all the data, sharing it with you here, Cube coverage. Got the best new generation shift happening as cloud computing goes to the whole other level. Multi-cloud, hybrid cloud changing the game. You're seeing the companies transition from an on-premises to cloud architecture. This is forcing all the companies to change. So a new generation of security is here and we've got a great guest, so a hot start-up. Masha Sedova, co-founder of Elevate Security. Welcome to theCUBE, thanks for joining us. >> Thank you so much for having me, John. >> So the next generation in what will be a multi-generational security paradigm, is kind of happening right now with the beginning of, we're seeing the transition, Palo Alto Networks announced earnings yesterday down 13% after hours because of the shift to the cloud. Now I think they're going to do well, they're well positioned, but it highlights this next generation security. You guys are a hot start-up, Elevate Security. What is the sea change? What is going on with security? What is this next generation paradigm about? >> Yeah, so it's interesting that you talk about this as next generation. In some ways, I see this as a two-prong move between, yes, we're moving more into the cloud but we're also going back to our roots. We're figuring out how to do asset management right, we're figuring out how to do patching right, and for the first time, we're figuring how to do the human element right. And that's what where we come in. >> You know, the disruption of these new shifts, it also kind of hits like this, the old expression, 'same wine, new bottle', all this, but it's a data problem. Security has always been a data problem, and we've seen some learnings around data. Visualization, wrangling, there's a lot of best practices around there. You guys are trying to change the security paradigm by incorporating a data-centric view with changing the behavior of the humans and the machines and kind of making it easier to manage. Could you share what you guys are doing? What's the vision for Elevate? >> Yeah, so we believe and we've seen, from our experience being practitioners, you can't change what you can't measure. If you don't have visibility, you don't know where you're going. And that's probably been one of the biggest pain-point in the security awareness space traditionally. We just roll out training and hope it works. And it doesn't, which is why human error is a huge source of our breaches. But we keep rolling out the same one-size fits all approach without wanting to measure or, being able to. So, we've decided to turn the problem on its head and we use existing data sets that most organizations who have a baseline level of maturity already have in place. Your end point protections, your DLP solutions, your proxies, your email security gateways and using that to understand what your employees are doing on the network to see if user generated incidents are getting better over time or getting worse. And using that as the instrumentation and the level of visibility into understanding how you should be orchestrating your program in this space. >> You know, that's a great point. I was just having a conversation last night at one of the cocktail parties here around RSA and we were debating on, we talk about the kind of breaches, you mentioned breaches, well there's the pure breach where I'm going to attack and penetrate the well fortified network. But then there's just human error, an S3 bucket laying open or some configuration problem. I guess it's not really a breach, it's kind of an open door so the kind of notion of a breach is multifold. How do you see that, because again, human error, insider threats or human error, these are enabling the hackers. >> Yeah >> This is not new. >> Yeah. >> How bad is the problem? >> It depends on what report you read. The biggest number I've seen so far is something like 95% of breaches have human error. But I honestly, I couldn't tell you what the 5% that don't include it because if you go far enough back, it's because a patch wasn't applied and there is a human being involved there because there is vulnerability in code, that's probably a secure coding practice when you're a development organization. Maybe it's a process that wasn't followed or even created in the first place. There's a human being at the core of every one of these breaches and, it needs to be addressed as holistically as our technologies and our processes right now in the space. >> The evolution of human intelligence augmented by machines will certainly help. >> That's it, yeah. >> I mean, I've got to ask you, obviously you're well-funded. Costanova Ventures well known in the enterprise space, Greg Sands and the team there, really strong, but you guys entered the market, why? I mean you guys, you and your founder both at Salesforce.com. Salesforce gurus doing a lot of work there. Obviously you've seen the large scale, first wave of the cloud. >> Yeah >> Why do the start-up? What was the problem statement you guys were going after? >> So, my co-founder and I both came from the world of being practitioners and we saw how limited the space was and actually changing human behavior, I was given some animated PowerPoints, said use this to keep the Russians out of your network, which is a practical joke unless your job is on the line, so I took a huge step back and I said, there are other fields that have figured this out. Behavioral science being one of them, they use positive reinforcement, gamification, marketing and advertisements have figured out how to engage the human element, just look around the RSA floor, and there's so many learnings of how we make decisions as human beings that can be applied into changing people's behaviors in security. So that's what we did. >> And what was the behavior you're trying to change? >> Yeah, so the top one's always that our attackers are getting into organizations, so, reducing phishing click-throughs an obvious one, increasing reporting rates, reducing malware infection rates, improving sensitive data handling, all of which have ties back to, as I was mentioning earlier, security data sources. So, we get to map those and use that data to then drive behavior change that's rooted in concepts like social proof, how are you doing compared to your peers? We make dinner decisions on that and Amazon buying decisions on that, why not influence security like that? >> So building some intelligence into the system, is there a particular market you're targeting? I mean, here people like to talk in segments, is there a certain market that you guys are targeting? >> Yeah, so the amazing thing about this is, and probably no surprise, the human element is a ubiquitous problem. We are in over a dozen different industries and we've seen this approach work across all of those industries because human beings make the same mistakes, no matter what kind of company they're in. We really work well with larger enterprises. We work well with larger enterprises because they tend to have the data sets that really provides insights into human behavior. >> And what's the business model you guys envision happening with your service product? >> We sell to enterprises and security, the CISO and the package as a whole, gives them the tools to have the voice internally in their organization We sell to Fortune 1000 companies, >> So it's a SAAS service? >> Yeah, SAAS service, yeah. >> And so what's the technology secret sauce? (laughing) >> Um, that's a great question but really, our expertise is understanding what information people need at what time and under what circumstances, that best changes their behavior. So we really are content diagnostic, we are much more about the engine that understands what content needs to be presented to whom and why. So that everyone is getting only the information they need, they understand why they need it and they don't need anything extra-superfluous to their... >> Okay, so I was saying on theCUBE, my last event was at, CIO's can have good days and bad days. They have good days, CISOs really have good days, many will say bad days, >> Masha: Yeah, it's a hard job. >> So how do I know I need the Elevate Solution? What problem do I have, what's in it for me? What do I get out of it? When do I know when to engage with you guys? >> I take a look at how many user generated incidents your (mumbles) responding to, and I would imagine it is a large majority of them. We've seen, while we were working at Salesforce and across our current customers, close to a 40% reduction rate in user generated incidents, which clearly correlates to time spent on much more useful things than cleaning up mistakes. It's also one of the biggest ROI's you can get for the cheapest investment. By investing a little bit in your organization now, the impact you have in your culture and investing in the future decision, the future mistakes that never get made, are actually untold, the benefit of that is untold. >> So you're really kind of coming in as a holistic, kind of a security data plane if you will, aggregating the data points, making a visualization in human component. >> You've got it. >> Now, what's the human touchpoint? Is it a dashboard? Is it notifications? Personalization? How is the benefit rendered for the customer? >> So we give security teams and CSOs a dashboard that maps their organization's strengths and weaknesses. But for every employee, we give personalized, tailored feedback. Right now it shows up in an email that they get on an ongoing basis. We also have one that we tailor for executives, so the executive gets one for their department and we create an executive leaderboard that compares their performance to fellow peers and I'll tell you, execs love to win, so we've seen immense change from that move alone. >> Well, impressive pedigree on your entrepreneurial background, I see Salesforce has really kind of, I consider real first generation cloud before cloud actually happened, and there's a lot of learn, it was always an Apple case, now it's AWS, but it's it's own cloud as we all know, what are the learnings that you saw from Salesforce that you said hey, I'm going to connect those dots to the new opportunity? What's the real key there? >> So, I had two major aha's that I've been sharing with my work since. One, it's not what people know, but it's what they do that matters, and if you can sit with a moment and think about that, you realize it's not more training, because people might actually know the information, but they just choose not to do it. How many people smoke, and they still know it kills them? They think that it doesn't apply to them, same thing with security. I know what I need to do, I'm just not incentivized to do it, so there's a huge motivation factor that needs to be addressed. That's one thing that I don't see a lot of other players on the market doing and one thing we just really wanted to do as well. >> So it sounds like you guys are providing a vision around using sheet learning and AI and data synthesis wrangling and all that good stuff, to be an assistant, a personal assistant to security folks, because it sounds like you're trying to make their life easier, make better decisions. Sounds like you guys are trying to distract away all these signals, >> You're right. >> See what to pay attention to. >> And make it more relevant, yeah. Well think about what Fitbit did for your own personal fitness. It curates a personal relationship based on a whole bunch of data. How you're doing, goals you've set, and all of a sudden, a couple of miles walk leads to an immense lifestyle change. Same thing with security, yeah. >> That's interesting, I love the Fitbit analogy because if you think about the digital ecosystem of an enterprise, it used to be siloed, IT driven, now with digital, everything's connected so technically, you're instrumenting a lot of things for everything. >> Yeah. >> So the question's not so much instrumentation, it's what's happening when and contextually why. >> That's it, why, that's exactly it. Yeah, you totally got it. >> Okay. I got it. >> Yeah, I can see the light bulb. >> Okay, aha, ding ding. All right, so back to the customer pain point. You mentioned some data points around KPI's that they might or things that they might want to call you so it's incidents, what kind of incidents? When do I know I need to get you involved? Will you repeat those again? >> There's two places where it's a great time to involve. Now, because of the human element is, or think about this as an investment. If you do non-investor security culture, one way or another, you have security culture. It's either hurting you or it's helping you and by hurting you, people are choosing to forego investing security processes or secure cultures and you are just increasing your security debt. By stepping in to address that now, you are actually paying it forward. The second best time, is after you realize you should have done that. Post-breaches or post incidents, is a really great time to come in and look at your culture because people are willing to suspend their beliefs of what good behavior looks like, what's acceptable and when you look at an organization and their culture, it is most valuable after a time of crisis, public or otherwise, and that is a really great time to consider it. >> I think that human error is a huge thing, whether it's as trivial as leaving an S3 bucket open or whatever, I think it's going to get more acute with service meshes and cloud-native microservices. It's going to get much more dynamic and sometimes services can be stood up and torn down without any human knowledge, so there's a lot of blind spots potentially. This brings up the question of how does the collaboration piece, because one of the things about the security industry is, it's a community. Sharing data's important, having access to data, how do you think about that as the founder of a start-up that has a 20 mile steer to the future around data access, data diversity, blind spots, how do you look at that and how do you advise your clients to think about that? >> I've always been really pro data sharing. I think it's one of the things that has held us back as an industry, we're very siloed in this space, especially as it relates to human behavior. I have no idea, as a regular CISO of a company, if I am doing enough to protect my employees, is my phishing click (mumbles), are my malware download rates above normal, below or should I invest more, am I doing enough? How do I do compared to my peers and without sharing industry stats, we have no idea if we're investing enough or quite honestly, not enough in this space. And the second thing is, what are approaches that are most effective? So let's say I have a malware infection problem, which approach, is it this training? Is it a communication? Is it positive reinforcement, is it punishment? What is the most effective to leverage this type of output? What's the input output relation? And we're real excited to have shared data with Horizon Data Breach Report for the first time this year, to start giving back to the communities, specifically to help answer some of these questions. >> Well, I think you're onto something with this behavioral science intersection with human behavior and executive around security practices. I think it's going to be an awesome, thanks for sharing the insights, Miss Masha on theCUBE here. A quick plug for your company, (mumbles) you're funded, Series A funding, take us through the stats, you're hiring what kind of positions, give a plug to the company. >> So, Elevate Security, we're three years old. We have raised ten million to date. We're based in both Berkeley and Montreal and we're hiring sales reps on the west coast, a security product manager and any engineering talent really focused on building an awesome data warehouse infrastructure. So, please check out our website, www.elevatesecurity.com/careers for jobs. >> Two hot engineering markets, Berkeley I see poaching out of Cal, and also Montreal, >> Montreal, McGill and Monterey. >> You got that whole top belt of computer science up in Canada. >> Yeah. >> Well, congratulations. Thanks for coming on theCUBE, sharing your story. >> Thank you. >> Security kind of giving the next generation all kinds of new opportunities to make security better. Some CUBE coverage here in San Francisco, at the Moscone Center. I'm John Furrier, we'll be right back after this break. (upbeat music)
SUMMARY :
Brought to you by Silicon Angled Media This is forcing all the companies to change. down 13% after hours because of the shift to the cloud. and for the first time, and the machines and kind of making it easier to manage. are doing on the network to see if user generated incidents and penetrate the well fortified network. It depends on what report you read. The evolution of human intelligence augmented by machines Greg Sands and the team there, really strong, So, my co-founder and I both came from the world Yeah, so the top one's always that our attackers Yeah, so the amazing thing about this is, So that everyone is getting only the information they need, Okay, so I was saying on theCUBE, the impact you have in your culture kind of a security data plane if you will, so the executive gets one for their department and think about that, you realize it's not more training, So it sounds like you guys are providing a vision and all of a sudden, a couple of miles walk That's interesting, I love the Fitbit analogy So the question's not so much instrumentation, Yeah, you totally got it. I got it. When do I know I need to get you involved? and that is a really great time to consider it. and how do you advise your clients to think about that? What is the most effective to leverage this type of output? I think it's going to be an awesome, We have raised ten million to date. and Monterey. You got that whole top belt sharing your story. Security kind of giving the next generation
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Canada | LOCATION | 0.99+ |
Masha Sedova | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
ten million | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
Masha | PERSON | 0.99+ |
20 mile | QUANTITY | 0.99+ |
Greg Sands | PERSON | 0.99+ |
95% | QUANTITY | 0.99+ |
Montreal | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Costanova Ventures | ORGANIZATION | 0.99+ |
Elevate Security | ORGANIZATION | 0.99+ |
13% | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
two places | QUANTITY | 0.99+ |
Silicon Angled Media | ORGANIZATION | 0.99+ |
Berkeley | LOCATION | 0.99+ |
yesterday | DATE | 0.99+ |
www.elevatesecurity.com/careers | OTHER | 0.99+ |
RSA Conference 2020 | EVENT | 0.99+ |
both | QUANTITY | 0.99+ |
5% | QUANTITY | 0.99+ |
this year | DATE | 0.98+ |
second thing | QUANTITY | 0.98+ |
second | QUANTITY | 0.98+ |
last night | DATE | 0.98+ |
Fitbit | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
Moscone Center | LOCATION | 0.98+ |
first time | QUANTITY | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
Cal | LOCATION | 0.97+ |
one thing | QUANTITY | 0.97+ |
two-prong | QUANTITY | 0.97+ |
Salesforce | ORGANIZATION | 0.97+ |
one | QUANTITY | 0.97+ |
over a dozen | QUANTITY | 0.97+ |
first | QUANTITY | 0.95+ |
Series A | OTHER | 0.94+ |
first generation | QUANTITY | 0.92+ |
Salesforce.com | ORGANIZATION | 0.91+ |
Horizon Data | ORGANIZATION | 0.88+ |
RSAC USA 2020 | ORGANIZATION | 0.87+ |
PowerPoints | TITLE | 0.86+ |
first wave | EVENT | 0.83+ |
Cube | ORGANIZATION | 0.8+ |
Narrator: Live from | TITLE | 0.8+ |
three years old | QUANTITY | 0.79+ |
two major aha | QUANTITY | 0.79+ |
CUBE | ORGANIZATION | 0.79+ |
one of them | QUANTITY | 0.77+ |
1000 companies | QUANTITY | 0.76+ |
couple of miles | QUANTITY | 0.75+ |
McGill | ORGANIZATION | 0.75+ |
SAAS | TITLE | 0.74+ |
Two hot engineering markets | QUANTITY | 0.74+ |
Elevate | ORGANIZATION | 0.65+ |
size | QUANTITY | 0.64+ |
industries | QUANTITY | 0.64+ |
Russians | PERSON | 0.63+ |
breaches | QUANTITY | 0.59+ |
S3 | COMMERCIAL_ITEM | 0.53+ |
Michelle Finneran Dennedy, DrumWave | RSAC USA 2020
>> Announcer: From San Francisco, it's theCUBE! Covering RSA Conference 2020 San Francisco. Brought to you by SiliconANGLE Media. >> Hey welcome back, get ready, Jeff Frick here with theCUBE, we're at RSA 2020, here at Moscone, it's a really pretty day outside in San Francisco, unfortunately we're at the basement of Moscone, but that's 'cause this is the biggest thing going in security, it's probably 15,000 people, we haven't got the official number yet, but this is the place to be and security is a really really really big deal, and we're excited to have our next guest, I haven't seen her for a little while, since data privacy day. I tried to get Scott McNealy to join us, he unfortunately was predisposed and couldn't join us. Michelle Finneran Dennedy, in her new job, the CEO of DrumWave. Michelle, great to see you. >> Great to see you too, I'm sorry I missed you on privacy day. >> I know, so DrumWave, tell us all about DrumWave, last we saw you this is a new adventure since we last spoke. >> It's a new adventure, so this is my first early stage company, we're still seeking series A, we're a young company, but our mantra is we are the data value company. So they have had this very robust analytics engine that goes into the heart of data, and can track it and map it and make it beautiful, and along came McNealy, who actually sits on our board. And they said we need someone, it's all happening. So they asked Scott McNealy, who is the craziest person in privacy and data that you know and he said "Oh my God, get the Dennedy woman." So, they got the Dennedy woman and that's what I do now, so I've taken this analytics value engine, I'm pointing it to the board as I've always said, Grace Hopper said, data value and data risk has to be on the corporate balance sheet, and so that's what we're building is a data balance sheet for everyone to use, to actually value data. >> So to actually put a value on the data, so this is a really interesting topic, because people talk about the value of data, we see the value of data wrapped up, not directly, but indirectly in companies like Facebook and Google and those types of companies who clearly are leveraging data in a very different way, but it is not a line item on a balance sheet, they don't teach you that at business school next to capital assets and, right, so how are you attacking the problem, 'cause that's a huge, arguably will be the biggest asset anyone will have on their balance sheet at some point in time. >> Absolutely, and so I go back to basic principles, the same as I did when I started privacy engineering. I look and I say "Okay, if we believe the data's an asset," and I think that at least verbally, we all say the words "Yes, data is an asset," instead of some sort of exhaust, then you have to look back and say "What's an asset?" Well an asset, under the accounting rules, is anything tangible or intangible that is likely to cause economic benefit. So you break that down, what is the thing, well you got to map that thing. So where is your data? Well data tells you where it is. Instead of bringing in clip boards and saying "Hey, Jeff, my man, do you process PII?" We don't do that, we go to your system, and when you go on DrumWave, you're automatically receiving an ontology that says what is this likely to be, using some machine learning, and then every single column proclaims itself. And so we have a data provenance for every column, so you put that into an analytics engine, and suddenly you can start asking human questions of real data. >> And do you ask the questions to assess the value of the data, or is the ultimate valuation of that data in the categorization and the ontology, and knowing that I have this this this and this, or I mean we know what the real value is, the soft value is what you can do with it, but when you do the analytics on it, are you trying to get to unlock what the potential, underlying analytic value is of that data that you have in your possession? >> Yeah, so the short answer is both, and the longer answer is, so my cofounder, Andre Vellozo, believes, and I believe too, that every conversation is a transaction. So just like you look at transactions within the banking context, and you say, you have to know that it's there, creating a data ontology. You have to know what the context is, so when you upload your data, you receive a data provenance, now you can actually look at, as the data controller, you open what we call your wallet, which is your portal into our analytics engine, and you can see across the various data wranglers, so each business unit has put their data on, because the data's not leaving your place, it's either big data, small data, I don't really care data. Everything comes in through every business unit, loads up their data set, and we look across it and we say "What kind of data is there?" So there's quantitative data saying, if you took off the first 10 lines of this column in marketing, now you have a lump of data that's pure analytics. You just share those credentials and combine that dataset, you know you have a clean set of data that you can even sell, or you can create an analytic, because you don't have any PII. For most data sets, you look at relative value, so for example, one of the discussions I had with a customer today, we know when we fail in privacy, we have a privacy breach, and we pay our lawyers, and so on. Do you know what a privacy success is? >> Hopefully it's like an offensive lineman, you don't hear their name the whole game right, 'cause they don't get a holding call. >> Until they put the ball in the hole. So who's putting the ball in the hole, sales is a privacy success. You've had a conversation with someone who was the right someone in context to sign on the bottom line. You have shared information in a proportionate way. If you have the wrong data, your sale cycle is slower. So we can show, are you efficiently sharing data, how does that correlate with the results of your business unit? Marketing is another privacy success. There's always that old adage that we know that 50% of marketing is a waste, but we don't know which 50%. Well now we can look at it and say "All right," marketing can be looked at as people being prepared to buy your product, or prepared to think in a new, persuasive way. So who's clicking on that stuff, that used to be the metric, now you should tie that back to, how much are you storing for how long related to who's clicking, and tying it to other metrics. So the minute you put data into an analytics engine, it's not me that's going to tell you how you're going to do your data balance sheet, you're going to tell me how dependent you are on digital transactions versus tangible, building things, selling things, moving things, but everyone is a digital business now, and so we can put the intelligence on top of that so you, the expert in value, can look at that value and make your own conclusions. >> And really, what you're talking about then is tying it to my known processes, so you're almost kind of parsing out the role of the data in doing what I'm trying to do with my everyday business. So that's very different than looking at, say, something like, say a Facebook or an Amazon or a Google that are using the data not necessarily, I mean they are supporting the regular processes, but they're getting the valuation bump because of the potential. >> By selling it. >> Or selling it, or doing new businesses based on the data, not just the data in support of the current business. So is that part of your program as well, do you think? >> Absolutely, so we could do the same kind of ontology and value assessment for an Apple, Apple assesses value by keeping it close, and it's not like they're not exploiting data value, it's just that they're having everyone look into the closed garden, and that's very valuable. Facebook started that way with Facebook Circles way back when, and then they decided when they wanted to grow, they actually would start to share. And then it had some interesting consequences along the line. So you can actually look at both of those models as data valuation models. How much is it worth for an advertiser to get the insights about your customers, whether or not they're anonymized or not, and in certain contexts, so healthcare, you want it to be hyper-identifiable, you want it to be exactly that person. So that valuation is higher, with a higher correlation of every time that PII is associated with a treatment, to that specific person with the right name, and the same Jr. or Sr. or Mrs. or Dr., all of that correlated into one, now your value has gone up, whether you're selling that data or what you're selling is services into that data, which is that customer's needs and wants. >> And in doing this with customers, what's been the biggest surprise in terms of a value, a piece of value in the data that maybe just wasn't recognized, or kind of below the covers, or never really had the direct correlation or association that it should've had? >> Yeah, so I don't know if I'm going to directly answer it or I'm going to sidewind it, but I think my biggest surprise wasn't a surprise to me, it was a surprise to my customers. The customers thought we were going to assess their data so they could start selling it, or they could buy other data sources, combine it, enrich it, and then either sell it or get these new insights. >> Jeff: That's what they brought you in for. >> Yeah, I know, cute, right? Yeah, so I'm like "Okay." The aha moment, of course, is that first of all, the "Oh my God" moment in data rarely happens, sometimes in big research cases, you'll get an instance of some biometric that doesn't behave organically, but we're talking about human behavior here, so the "Aha, we should be selling phone data "to people with phones" should not be an aha, that's just bad marketing. So instead, the aha for me has been A, how eager and desperate people are for actually looking at this, I really thought this was going to be a much more steep hill to climb to say "Hey, data's an asset," I've been saying this for over 20 years now, and people are kind of like "Yeah, yeah, yeah." Now for the first time, I'm seeing people really want to get on board and look comprehensively, so I thought we'd be doing little skinny pilots, oh no, everyone wants to get all their data on board so they can start playing around with it. So that's been really a wake-up call for a privacy gal. >> Right, well it's kind of interesting, 'cause you're kind of at the tail end of the hype cycle on big data, with Hadoop, and all that that represented, it went up and down and nobody had-- >> Michelle: Well we thought more was more. >> We thought more was more, but we didn't have the skills to manage it, and there was a lot of issues. And so now you never hear about big data per say, but data's pervasive everywhere, data management is pervasive everywhere, and again, we see the crazy valuations based on database companies, that are clearly getting that. >> And data privacy companies, I mean look at the market in DC land, and any DCs that are looking at this, talk to mama, I know what to do. But we're seeing one feature companies blowing up in the marketplace right now, people really want to know how to handle the risk side as well as the value side. Am I doing the right thing, that's my number one thing that not CPOs are, because they all know how crazy it is out there, but it's chief financial officers are my number one customer. They want to know that they're doing the right thing, both in terms of investment, but also in terms of morality and ethics, am I doing the right thing, am I growing the right kind of business, and how much of my big data is paying me back, or going back to accountancy rules, the definition of a liability is an asset that is uncurated. So I can have a pencil factory, 'cause I sell pencils, and that's great, that's where I house my pencils, I go and I get, but if something happened and somehow the route driver disappeared, and that general manager went away, now I own a pencil factory that has holes in the roof, that has rotting merchandise, that kids can get into, and maybe the ceiling falls, there's a fire, all that is, if I'm not utilizing that asset, is a liability, and we're seeing real money coming out of the European Union, there was a hotel case where the data that they were hoarding wasn't wrong, it was about real people who had stayed at their hotels, it just was in the 90s. And so they were fined 14.5 million Euros for keeping stale data, an asset had turned into a liability, and that's why you're constantly balancing, is it value, is it risk, am I taking so much risk that I'm not compensating with value and vice versa, and I think that's the new aha moment of really looking at your data valuation. >> Yeah, and I think that was part of the big data thing too, where people finally realized it's not a liability, thinking about "I got to buy servers to store it, "and I got to buy storage, and I got to do all this stuff," and they'd just let it fall on the floor. It's not free, but it does have an asset value if you know what to do with it. So let's shift gears about privacy specifically, because obviously you are the queen of privacy. >> I like that, that's my new title. >> GDPR went down, and now we've got the California version of GDPR, love to get your update, did you happen to be here earlier for the keynotes, and there was a conversation on stage about the right to be forgotten. >> Jennifer: Oh dear god, now, tell me. >> And is it even possible, and a very esteemed group of panelists up there just talking about very simple instances where, I search on something that you did, and now I want to be forgotten. >> Did no one watch Back to the Future? Did we not watch that show? Back to the Future where all their limbs start disappearing? >> Yes, yes, it's hard to implement some of these things. >> This has been my exhaustion with the right to be forgotten since the beginning. Humanity has never desired a right to be forgotten. Now people could go from one village to the next and redo themselves, but not without the knowledge that they gained, and being who they were in the last village. >> Jeff: Speaking to people along the way. >> Right, you become a different entity along the way. So, the problem always was really, differential publicity. So, some dude doesn't pay back his debtors, he's called a bad guy, and suddenly, any time you Google him, or Bing him, Bing's still there, right? >> Jeff: I believe so. >> Okay, so you could Bing someone, I guess, and then that would be the first search term, that was the harm, was saying that your past shouldn't always come back to haunt you. And so what we try to do is use this big, soupy term that doesn't exist in philosophy, in art, the Chimea Roos had a great right to be forgotten plan. See how that went down? >> That was not very pleasant. >> No, it was not pleasant, because what happens is, you take out knowledge when you try to look backwards and say "Well, we're going to keep this piece and that," we are what we are, I'm a red hot mess, but I'm a combination of my red hot messes, and some of the things I've learned are based on that. So there's a philosophical debate, but then there's also the pragmatic one of how do you fix it, who fixes it, and who gets to decide whose right it is to be forgotten? >> And what is the goal, that's probably the most important thing, what is the goal that we're trying to achieve, what is the bad thing that we're trying to avoid, versus coming up with some grandiose idea that probably is not possible, much less practical. >> There's a suit against the Catholic Church right now, I don't know if you heard this, and they're not actually in Europe, they live in Vatican City, but there's a suit against, about the right to be forgotten, if I decide I'm no longer Catholic, I'm not doing it, Mom, I'm hearing you, then I should be able to go to the church and erase my baptismal records and all the rest. >> Jeff: Oh, I hadn't heard that one. >> I find it, first of all, as someone who is culturally Catholic, I don't know if I can be as saintly as I once was, as a young child. What happens if my husband decides to not be Catholic anymore? What happens if I'm not married anymore, but now my marriage certificate is gone from the Catholic Church? Are my children bastards now? >> Michelle's going deep. >> What the hell? Literally, what the hell? So I think it's the unintended consequence without, this goes back to our formula, is the data value of deletion proportionate to the data risk, and I would say the right to be forgotten is like this. Now having an indexability or an erasability of a one-time thing, or, I'll give you another corner case, I've done a little bit of thinking, so you probably shouldn't have asked me about this question, but, in the US, when there's a domestic abuse allegation, or someone calls 911, the police officers have to stay safe, and so typically they just take everybody down to the station, men and women. Guess who are most often the aggressors? Usually the dudes. But guess who also gets a mugshot and fingerprints taken? The victim of the domestic abuse. That is technically a public record, there's never been a trial, that person may or may not ever be charged for any offense at all, she just was there, in her own home, having the crap beat out of her. Now she turns her life around, she leaves her abusers, and it can happen to men too, but I'm being biased. And then you do a Google search, and the first thing you find is a mugshot of suspected violence. Are you going to hire that person? Probably not. >> Well, begs a whole discussion, this is the generation where everything's been documented all along the way, so whether they choose or not choose or want or don't want, and how much of it's based on surveillance cameras that you didn't even know. I thought you were going to say, and then you ask Alexa, "Can you please give me the recording "of what really went down?" Which has also been done, it has happened, it has happened, actually, which then you say "Hm, well, is having the data worth the privacy risk "to actually stop the perp from continuing the abuse?" >> Exactly, and one of my age-old mantras, there's very few things that rhyme, but this one does, but if you can't protect, do not collect. So if you're collecting all these recordings in the domestic, think about how you're going to protect. >> There's other people that should've hired you on that one. We won't go there. >> So much stuff to do. >> All right Michelle, but unfortunately we have to leave it there, but thank you for stopping by, I know it's kind of not a happy ending. But good things with DrumWave, so congratulations, we continue to watch the story evolve, and I'm sure it'll be nothing but phenomenal success. >> It's going to be a good time. >> All right, thanks a lot Michelle. She's Michelle, I'm Jeff, you're watching theCUBE, we're at RSA 2020 in San Francisco, thanks for watching, we'll see you next time. (techno music)
SUMMARY :
Brought to you by SiliconANGLE Media. but this is the place to be Great to see you too, last we saw you this is a new adventure and so that's what we're building is a data balance sheet so how are you attacking the problem, and when you go on DrumWave, you're automatically as the data controller, you open what we call your wallet, you don't hear their name the whole game right, So the minute you put data into an analytics engine, the role of the data in doing what I'm trying to do So is that part of your program as well, do you think? So you can actually look at both of those models Yeah, so I don't know if I'm going to directly answer it so the "Aha, we should be selling phone data And so now you never hear about big data per say, and maybe the ceiling falls, there's a fire, if you know what to do with it. about the right to be forgotten. I search on something that you did, in the last village. Right, you become a different entity along the way. Okay, so you could Bing someone, I guess, and some of the things I've learned are based on that. that's probably the most important thing, about the right to be forgotten, is gone from the Catholic Church? and the first thing you find is a mugshot and then you ask Alexa, but this one does, but if you can't protect, There's other people that should've hired you on that one. but thank you for stopping by, thanks for watching, we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Grace Hopper | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Jennifer | PERSON | 0.99+ |
Andre Vellozo | PERSON | 0.99+ |
Michelle | PERSON | 0.99+ |
Michelle Finneran Dennedy | PERSON | 0.99+ |
US | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
50% | QUANTITY | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
McNealy | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Vatican City | LOCATION | 0.99+ |
Scott McNealy | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
one-time | QUANTITY | 0.99+ |
DrumWave | ORGANIZATION | 0.99+ |
European Union | ORGANIZATION | 0.99+ |
15,000 people | QUANTITY | 0.99+ |
Moscone | LOCATION | 0.99+ |
both | QUANTITY | 0.99+ |
Catholic Church | ORGANIZATION | 0.99+ |
GDPR | TITLE | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.98+ |
911 | OTHER | 0.98+ |
14.5 million Euros | QUANTITY | 0.98+ |
Back to the Future | TITLE | 0.98+ |
first time | QUANTITY | 0.98+ |
first 10 lines | QUANTITY | 0.98+ |
California | LOCATION | 0.98+ |
RSA Conference 2020 | EVENT | 0.97+ |
RSA 2020 | EVENT | 0.97+ |
90s | DATE | 0.97+ |
over 20 years | QUANTITY | 0.96+ |
one village | QUANTITY | 0.96+ |
each business unit | QUANTITY | 0.95+ |
theCUBE | ORGANIZATION | 0.95+ |
today | DATE | 0.94+ |
Bing | ORGANIZATION | 0.94+ |
one | QUANTITY | 0.93+ |
Hadoop | ORGANIZATION | 0.9+ |
DC | LOCATION | 0.89+ |
first early | QUANTITY | 0.87+ |
Alexa | TITLE | 0.86+ |
first thing | QUANTITY | 0.86+ |
first | QUANTITY | 0.84+ |
DrumWave | PERSON | 0.82+ |
Dennedy | PERSON | 0.79+ |
first search | QUANTITY | 0.77+ |
every single column | QUANTITY | 0.71+ |
RSAC USA 2020 | ORGANIZATION | 0.69+ |
one customer | QUANTITY | 0.63+ |
series A | OTHER | 0.54+ |
Chimea Roos | OTHER | 0.41+ |
Rishi Bhargava, Palo Alto Networks | RSAC USA 2020
>>from San Francisco. It's the queue covering our essay conference. 2020. San Francisco Brought to you by Silicon Angle Media's >>Welcome Back Around Here at the Cube. Coverage for our conference. Mosconi, South Floor. Bring you all the action day one of three days of cube coverage where the security game is changing, the big players are making big announcements. The market's changing from on premise to cloud. Then hybrid Multi cloud was seeing that wave coming. A great guest here. Barr, our VP of product strategy and co founder of the Mystery, was acquired by Palo Alto Networks. Worries employed now, Rishi. Thanks for coming on. Thank you. Absolutely happy to be here. So, first of all, great journey for your company. Closed a year ago. Half a 1,000,000,000. Roughly give or take 60. Congratulations. Thank you. Big accomplishments. You guys were taken out right in the growth phase. Now at Palo Alto Networks, which we've been following, you know, very careful. You got a new CMO over there, Jean English? No, we're very well. We're very bullish on Palo Alto. Even though that the on premise transitions happening cloud. You guys are well positioned. How's things going things are going fantastic. We're investing a lot in the next Gen security business across the board, as mentioned Prisma Cloud is big business. And then on the other side, which is what I'm part of the cortex family focused on the Security operations center and the efficiencies That's fantastic and, ah, lot off product innovations, investment and the customer pull from an operations perspective. So very excited. You guys had a big announcement on Monday, and then yesterday was the earnings, which really kind of points to the trend that we're seeing, which is the wave to the cloud, which you're well positioned for this transition going on. I want to get to the news first. Then we get into some of the macro industry questions you guys announced the X ore, which is redefining orchestration. Yes. What is this about? What's this news about? Tell us. >> So this news is about Mr was acquired about a year ago as well. This is taking that Mr Platform and expanding it on, expanding it to include a very core piece, which is Intel management. If you look at a traditional saw, what has happened is soccer teams have had the same dead and over the last few years acquired a sword platform such as a mystery security orchestration, automation and response platform. But the Edge Intel team has always been still separate the threat Intel feeds that came in with separate. With this, we are expanding the power of automation and applying doc to the threat intelligence as well. That is, thread intelligence, current state of the art right now. So the current state of the art of threat intelligence is are the larger organizations typically subscribe to a lot of faith, feeds open source feeds and aggregate them. But the challenge is to aggregate them the sit in a repository and nobody knows what to do with them. So the operationalization of those feeds is completely missing. >> So basically, that is going to have data pile. Corpus is sitting there. No one touches it, and then everyone has to. It's a heavy lift. It's a heavy lift, and nobody knows. Cisco sees the value coming out of it. How do you proactively hunt using those? How do you put them to protecting proactively to explain cortex X, or what is it? And what's the value? So the cortex X or as a platform. There are four core pieces, three off which for the core tenants of the misto since the big one is automation and orchestration. So today we roughly integrate with close to 400 different products security and I t products. Why are the FBI on let customers build these work flows come out of the box with close to 80 or 90 different workloads. The idea of these workloads is being able to connect to one product for the data go to another taken action there Automation, orchestration builds a visual book second s case management and this is very critical, right? I mean, if you look at the process side of security, we have never focused as an industry and the process and the human side of security. So how do you make sure every security alert on the process the case management escalation sl A's are all managed. So that's a second piece off cortex. Third collaboration. One of the core tenants of Mr Waas. We heard from customers that analysts do not talk to each other effectively on when they do. Nobody captures that knowledge. So the misto has an inbuilt boardroom which now Cortex X or has the collaboration war room on that is now available to be able to chat among analysts. But not only that charged with the board take actions. The fourth piece, which is the new expanded platform, is the personal management to be able to now use the power of orchestration, automation collaboration, all for threat intelligence feeds as well. Not only the alerts >> so and so you're adding in the threat. Intelligence feeds, yes. So is that visualize ai on the machine Learning on that? How is that being process in real time? How does that on demand work for that fills. So the biggest piece is applying the automation and intelligence to automatically score that on being able to customize the scoring the customer's needs. Customized confidence score perfect. And once you have the high fidelity indicators automatically go block them as an example. If you get a very high fidelity IOC from FBI that this particular domain is the militias domain, you would want to block that in. Your firewall is executed immediately, and that is not happening today. That is the core, and that's because of the constraint is I don't know the data the way we don't know the data and it's manual. Some human needs to review it. Some human needs to go just not being surfaced, just not. So let's get back into some of the human piece. I love the collaboration piece. One of things that I hear all the time in my cube interviews across all the hundreds of events we go to is the human component you mentioned. Yes, people have burnt out. I mean, like the security guys. I mean, the joke was CIOs have good days once in a while, CSOs don't have any good days, and it's kind of a job board pejorative to that. But that's the reality. Is that it works? Yes. We actually okay, if you have another job. Talking of jokes, we have this. Which is what do you call and overwork security analyst. A security analyst, because every one of them >>is over word. >>So this is a huge thing. So, like the ai and some of the predictive analytics trend Is tourist personalization towards the analyst Exactly. This is a trend that we're seeing. What's your view on this? What? You're absolutely We're seeing that trend which is How do you make sure analyst gets to see the data they're supposed to see at the right time? Right. So there's one aspect is what do you bring up to the analyst? What is relevant and you bring it up at the right time to be able to use it. Respond with that. So that comes in one from an ML perspective and machine learning. And our cortex. XDR suite of products actually does a fantastic job of bringing very rich data to the analyst at the right time. And then the second is, can we help analyst respond to it? Can we take the repetitive work away from them with a playbook approach? And that's what the cortex platform brings to that. I love to riff on some future scenarios kind of. I won't say sci fi, but I got to roll a little bit of a future to me. I think security has to get to like a multi player gaming environment because imagine like a first person shooter game, you know where or a collaborative game where it's fun. Because once you start that collaboration, yes, then you're gonna have some are oi around. I saw that already. Don't waste your time or you get to know people. So sharing has been a big part? Yes. How soon do you think we're gonna get to an environment where I won't say like gaming? But that notion of a headset on I got some data. I know you are your reputation. I think your armor, you're you're certifications. Metaphorically putting. I think way have a lot of these aspects and I think it's a very critical point. You mentioned right one of the things which we call the virtual war room and like sex or I was pointing out the fact that you can have analysts sit in front of a collaboration war room not only charge for the appears but charged with a boat to go take care of. This is equivalent to remember that matrix movie plugging and says, you know how to fly this helicopter data and now I do. That's exactly what it is. I think we need to point move to a point where, no matter what the security tool is what your endpoint is, you should not have to learn every endpoint every time the normalization off, running those commands via the collaboration War Room should be dead. I would say we're starting to see in some of the customers are topics or they're using the collaboration war room to run those commands intractably, I would say, though, there's a big challenge. Security vendors do not do a good job normalizing that data, and that is where we're trying to reach you. First of all, you get the award for bringing up a matrix quote in The Cube interview. So props to that. So you have blue teams. Red teams picked the pill. I mean, people are people picking their teams. You know what's what's going on. How do you see the whole Red Team Blue team thing happening? I think that's a really good stuff happening. In my opinion, John, what's going on is right now so far, if you see if I go back three years our adversaries were are committing. Then we started to see this trend off red teaming automation with beach automation and bunch of companies starting to >>do that >>with Cortex X or on similar products, we're starting to now automate the blue team side of things, which is how do you automatically respond how do you protect yourself? How do you put the response framework back there? I think the next day and I'm starting to see is these things coming together into a unified platform where the blue team and the team are part of the same umbrella. They're sharing the data. They're sharing the information on the threat Intel chair. So I see we are a very, very good part. Of course, the adversities. I'm not gonna sit idle like you said about the Dev ops mindset. Heavens, notion of knowledge coming your way and having sharing packages all baked out for you. She doesn't do the heavy lifting. That's really the problem. The data is a problem. So much demand so much off it. And you don't know what is good and what is not. Great. Great conversation again. The Matrix reference about your journey. You've been an entrepreneur and sold. You had a great exit again. Politics is world class blue chip company in the industry public going through a transition. What's it like from an entrepreneur now to the big company? What's the opportunity is amazing. I think journey has been very quick. One. We saw some crazy growth with the misto on. Even after the acquisition, it's been incredibly fast pace. It's very interesting lot of one of the doctors like, Hey, you must be no resting is like, No, the journey is amazing. I think he s Polito Networks fundamentally believe that. We need to know where it really, really fast to keep the adversaries out on. But that's been the journey. Um, and we have accelerated, in fact, some of our product plans that we hard as a start up on delivering much faster. So the journey has been incredible, and we have been seeing that growth Will they picked you guys write up? There's no vesting interesting going on when you guys were on the uphill on the upslope growth and certainly relevance for Palo Alto. So clearly, you know, you haven't fun. People vested arrest when they checked out, You guys look like you're doing good. So I got to ask you the question that when you started, what was the original mission? Where is it now? I mean this Is there any deviation? What's been the kind? Of course you know, this is very, very relevant questions. It's very interesting. Right after the acquisition, we went and looked at a pitch deck, which we presented overseas in mid 2015. Believe it or not, the mission has not changed, not changing iron. It had the same competent off. How do you make the life off a security person? A security analyst? Easy. It's all the same mission by automating more by applying AI and learning to help them further by letting them collaborate. All the aspects off case management process, collaboration, automation. It's not changed. That's actually very powerful, because if you're on the same mission, of course you're adding more and more capabilities. But we're still on the same path on going on that. So every company's got their own little nuanced. Moore's Law for Intel. What made you guys successful was that the culture of Dev ops? It sounds like you guys had a certain either it was cut in grain. I think I would say, by the way, making things easy. But you got to do it. You got to stay the course. What was that? I think that's a fundamental cultural feature. Yeah, there's one thing really stand by, and I actually tweeted about a few weeks ago, this which is every idea, is as good as good as its execution. So there's two things between really focus on which is customer focused on. We were really, really portable about customer needs to get the product needs to use the product, customer focus and execution. As we heard the customers loud and clear, every small better. And that's what we also did. You guys have this agile mindset as well, absolutely agile mindset and the development that comes with the customer focus because way kind of these micro payments customer wants this like, why do they want this? What is the end goal? Attributed learner. Move on to make a decision making line was on Web services Way debate argue align! Go Then go. And then once you said we see great success story again Startup right out of the gate 2015. Acquire a couple years later, conventions you and your team and looking forward to seeing your next Palo Alto Networks event. Or thanks for coming on. Great insight here on the cube coverage. I'm John Furrier here on the ground floor of our S e commerce on Mosconi getting all the signal extracting it from the noise here on the Cube. Thanks for watching. >>Yeah, yeah,
SUMMARY :
San Francisco Brought to you by Silicon Angle Then we get into some of the macro industry questions you guys announced the X ore, But the challenge is to aggregate them the sit in a repository and nobody knows what to do with them. So the misto has an inbuilt boardroom which now Cortex So the biggest piece is applying the automation and intelligence to automatically You're absolutely We're seeing that trend which is How do you make So I got to ask you the question that when you started, what was the original mission?
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Monday | DATE | 0.99+ |
Jean English | PERSON | 0.99+ |
Barr | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
60 | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
second piece | QUANTITY | 0.99+ |
fourth piece | QUANTITY | 0.99+ |
Waas | PERSON | 0.99+ |
Silicon Angle Media | ORGANIZATION | 0.99+ |
Rishi | PERSON | 0.99+ |
mid 2015 | DATE | 0.99+ |
one aspect | QUANTITY | 0.99+ |
Rishi Bhargava | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
second | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
three | QUANTITY | 0.99+ |
2015 | DATE | 0.99+ |
one product | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Polito Networks | ORGANIZATION | 0.98+ |
three days | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
Prisma Cloud | ORGANIZATION | 0.97+ |
four core pieces | QUANTITY | 0.97+ |
a year ago | DATE | 0.96+ |
next day | DATE | 0.94+ |
First | QUANTITY | 0.93+ |
Half a 1,000,000,000 | QUANTITY | 0.91+ |
Mosconi, South Floor | LOCATION | 0.9+ |
90 different workloads | QUANTITY | 0.9+ |
Cortex X | TITLE | 0.9+ |
Third collaboration | QUANTITY | 0.89+ |
few weeks ago | DATE | 0.89+ |
a couple years later | DATE | 0.89+ |
three years | QUANTITY | 0.88+ |
first | QUANTITY | 0.88+ |
Mosconi | LOCATION | 0.88+ |
cortex X | OTHER | 0.85+ |
hundreds of events | QUANTITY | 0.85+ |
The Matrix | TITLE | 0.84+ |
The Cube | TITLE | 0.83+ |
Mystery | ORGANIZATION | 0.83+ |
close to 400 different products | QUANTITY | 0.81+ |
Cortex | TITLE | 0.81+ |
Moore's | TITLE | 0.8+ |
about | DATE | 0.74+ |
80 | QUANTITY | 0.73+ |
close | QUANTITY | 0.72+ |
USA | LOCATION | 0.7+ |
Palo Alto | ORGANIZATION | 0.69+ |
day | QUANTITY | 0.68+ |
last few years | DATE | 0.65+ |
RSAC | EVENT | 0.62+ |
ore | COMMERCIAL_ITEM | 0.6+ |
Cube | COMMERCIAL_ITEM | 0.6+ |
Networks | EVENT | 0.55+ |
X | COMMERCIAL_ITEM | 0.53+ |
2020 | EVENT | 0.5+ |
misto | ORGANIZATION | 0.5+ |
playbook | TITLE | 0.43+ |
X | ORGANIZATION | 0.4+ |
cube | ORGANIZATION | 0.34+ |