 Navigating the road to cyber resiliency. Next stop, Cyber Resiliency Summit. Hello, welcome to Navigating the Road to Cyber Resiliency. The summit made possible by Dell Technologies. I'm Dave Vellante with John Furrier. Rob Streche is here as is Shelly Kramer. And we're live in our Palo Alto studios to discuss the changing threat landscape and how you can best adapt to the unpredictable nature of ongoing cyber threats. John, it's great to be here with you. This is our seventh Super Studio event this year when you include the four super clouds we did. I mean, I love this format. Ransomware is booming, Dave. It's going to be a great, great topic. Yeah, so, you know, you and I were at the, the MGM property, it was Cosmopolitan earlier this year in June, right? The MGM was, when you drove in, it was, you know, usually it's all green. It was black because they had the ransomware attack. They had that hit. All the lights were out. It was kind of eerie, but it's a pretty serious situation for customers. I mean, it quoted chain analytics over three billion is extorted in crypto, MGM, other high-profile attacks, Clorox. You got huge amount of names, Del Monte, U.S. Marsha, and many more hit the mainstream media. Every day, ransomware is putting the fear into every single enterprise, public sector, EDU, all aspects, every vertical is under threat with ransomware. That's just the beginning. More and more cybersecurity are playing more, more offense with general AI. You're seeing a lot more activity with cyber and this road that we're going down is going to be pretty dynamic, but there's solutions and we're going to get into that. And Caesars paid the ransom, you know, MGM didn't, and I think it was more disruptive. It cost them more. You know, a lot of companies, they pay the ransom crypto, like you said, is sort of enable them to do that. But John, these examples represent only a small piece of the true cost of cyber attacks. There's a publication called Cybercrime Magazine. They do a really good job here. They say when you include factors like destruction of data, lost productivity, IP theft, I mean, also, John, if you think about the impact on your market value if you're a public company, fraud, the overall market impact of cyber, be $3 trillion of cyber attacks in 2023 and that's growing in the double digits annually. So, I mean, look, the IT market, John, is four trillion in spending. And we're talking about three trillion in economic impact of cyber attacks. It's actually absolutely enormous. It's changing the game on how people are reacting to it, but also being proactive. You're starting to see this pay not pay. You're starting to see lines forming between the good guys and the bad guys. And again, like I said, we've been saying on theCUBE, generative AI is offering a better opportunity now for enterprises not to play just defense, but actually play offense and be proactive. So, certainly there's a huge tan for the criminals and that's what they're tapping into. It's its own industry. We've been covering that on theCUBE, but this is a real market and the solutions are evolving. And again, I'm really optimistic. We're seeing now lines of sight of new solutions going down this road of cyber resilience. I'm telling you, it's going to be a different ball game. But again, this game is still the same. Bad guys are trying to get the money and the data is the money, protect the cheddar, as they say. So that is the key and it is a huge market. Well, in terms of paying or not paying, it seems like a lot of companies are paying. Sometimes when you pay, you don't really get everything back. We had nature's fresh farm on earlier. In episode one, they didn't pay. They didn't have to pay because they were able to recover. So that's pretty important. Others have said they've actually paid the ransom and they got their data back. Others have paid the ransom, didn't get their data back. We heard earlier, and I think episode one, it's actually illegal to pay ransom to actors in North Korea and other nation states. So it's a pretty sticky situation for us. There's also other factors, like reputational harm is a big deal. So you have the business isn't one, the financial risk is huge, but reputational harm on trust. And as apps are becoming, again, the user experience changing with the new apps emerging in the modern era with cloud and now distributed computing with the edge. You're seeing a lot more devices having data. You're seeing a lot more distributed computing paradigms. You sovereign cloud in Europe. Enterprises have to re-architect what they're doing. And again, doing it at the pace of play of cyber. Again, it's fast. And so the solutions are evolving to that. We're going to cover that a lot on this event. I think to that point too, it's not binary. It's not like, okay, I'm not protected. Now all of a sudden I'm protected. It is a journey. And that's why we chose this theme of navigating the journey because it's a progressive journey. You don't just solve this problem overnight and you can't completely solve this problem. So, and this is why we are doing this summit with the help of Dell Technologies and really putting together and sort of an episodic journey to cyber resiliency. Well, the name is awesome. Navigating the road to cyber resilience is a great name, but if you zoom out and you think navigating, part of navigating is discovery. And one of the things we're going to unpack in this event is people are trying to discover what's the best solution for their environment. This idea of general purpose stuff is kind of moving away. The environments are certainly going to be tailored and customized for each other. So the discovery aspect of solutions with new tech stacks evolving, you're starting to see the whole cloud chips, again, distributed computing coming. So there's a lot of discovery. People are interested in learning about what is the impact for AI, threats to critical infrastructure, changing landscape, rise in nation-state activity, increased sophistication of cyber criminals, public-private partnerships, and then how to take an ecosystem approach for attacking the problem. These are the key areas we're going to cover on this as we discover the concepts needed to navigate the road to cyber resilience. So discovery and navigation kind of go ahead. Heather, why would you drive a car without ways or Google Maps? You want to have that information. So we're going to unpack it all. Well, in this summer, as John said, you're going to hear from experts in the field, technologists, practitioners. We have CISOs coming on, industry analysts. So how you can build a more resilient organization by both stopping more breaches and responding more quickly to cyber attacks and ransomware with greater confidence. So as John just said, we're going to look at the impact of AI that's obviously front and center these days. It's not just the AI that we've been talking about for 10 years, it's obviously Gen AI as well. What are those use cases for Gen AI? Sometimes they're not so obvious. Threats to critical infrastructure, John. We've been talking for quite a while now about this book written by Mark E. Sorensen on a restaurant in Jaffa, and it's all about how fragile this critical infrastructure is. I mean, talk about those numbers of $3 trillion in cyber attacks. When you start to think about oil rigs and other critical infrastructure and the electric grid, actually that can add up pretty quickly. The IoT, the industrial IoT and those markets are under massive transformation. Again, Gen AI gives them a lift, but so you're seeing a changeover, but that increases the surface area, Dave, for the potential bad guys. So as the transformation happens, that road is needed because they're going to be modernizing their infrastructure. So you're seeing the edge being a big deal, especially the industrial side where it's manufacturing, or critical infrastructure. A lot of activities going on there as OT and IT fully merge, and then we got generative AI, data at the edge. All of this is happening. So this is going to be probably the next three years of solid content we're going to be covering as that edge explodes. And you already saw that at the big conferences, the vertical industries with the ones are getting a lot of lift with the new AI, TextX. And then, you know, this notion of the rise in nation-state activity and the increased sophistication of cyber criminals. One of our guests at this summit is Wendy Whitmore. She leads the unit 42 division of Palo Alto Network. So that's their threat intelligence unit. It's one of the most advanced in the world. We're going to hear a lot about public and private partnerships. Herb Kelsey's coming on, and he's got a lot of experience as do many of other guests inside of government and in public sector companies, as well as commercial companies. So that public private partnerships, you know, John, sometimes I feel like the government is finger wagging, but the truth is inside the government, we have some of the smartest people in the world on this topic and they really are out to do good. I think this event represents, again, discovering the data, navigating the road, it's going to be critical. If you look at the lineup, we have a great breath of industry participation, not just Dell Technologies, but ecosystems, because this is going to be a team sport. When you look at the cyber security market, this threat detection, data protection, working together, they're going to balance out and you're going to start to see some harmony. We're going to predict on the cube you're going to start to see a lot more public private partnerships, but also partners in the ecosystem. I think this is going to be an ecosystem data play. And again, this is, we're going to try to discover these concepts. So you're going to see a lot more of this kind of broad industry conversation where the leaders are stepping up and sharing their solutions. And again, you see APIs connecting things. So again, multi-vendor participation, multi-industry leadership here at this event. I think that ecosystem approach is critical. We're going to hear from partners like global system integrators or even regional system integrators that are actually helping solve this problem. And as earlier I was saying, it's at least a two-part equation. Stopping the breach, which is, you can't stop all the breaches. And that's where like a partnership like CrowdStrike comes in. We're going to hear from those guys. And that's really their whole mantra. Stop the breach. But you know they're going to get through. So you have to have a recovery mechanism and that's where data protection and backup and recovery come in. So that ecosystem approach is critical and we're really going to get into that. I can't help but love the road name metaphor. Is there self-driving data protection date coming soon? Yeah, well with AI, for sure, there's more and more automation. In fact, you have to have more and more automation because why John, the bad guys are automating. They're advanced. I mean, they're really leaning into AI and automation. And so you've got to respond. And we've talked about this before in various supercalls. We did a poll on this, on your breaking analysis. That's right. And I think initially the feeling was that initially the bad guys had the advantage with gen AI. Initially out of the gate because why? Because they can write better phishing emails. But over time, the technologist, the technology vendor community, ultimately is going to have the ability to respond because they own the tech. Yeah, and they're faster too. They have no downside to get into the game. They can just go right in there and start deploying stuff, reuse it. A lot of great content coming out. I'm looking forward to this event. Yeah, okay. First up is John Shimoni. I sat down with him recently. He's the chief security officer at Dell Technologies. He's got a varied background as I was saying earlier. He's an individual who's worked in public sector. He's worked in commercial enterprises. He worked in private equity. And he was at the heart of the Sony hack, John, earlier last decade. And he's going to talk about lessons learned, what's new, what's changed, what hasn't changed. The impact of gen AI, as John said, we have a ton of really exciting content today at this summit from experts in the field. So stay with us first up, John Shimoni.