 Hi, everyone. Welcome to this program sponsored by HPE. I'm your host, Lisa Martin. We're here talking about being confident and trusting your server security with HPE. I have two guests here with me to talk about this important topic. Cole Humphries joins us, Global Server Security Product Manager at HPE and Anne Potten, Trusted Supply Chain Program Lead at HPE. Guys, it's great to have you on the program. Welcome. Hi, thanks. Thank you. It's nice to be here. Anne, let's talk about really what's going on there, some of the trends, some of the threats. There's so much change going on. What is HPE seeing? Yes. Good question. Thank you. Yeah, cybersecurity threats are increasing everywhere and it's causing disruption to businesses and governments alike worldwide. The global pandemic has caused limited employee availability originally. This has led to material shortages and these things opens the door perhaps even wider for more counterfeit parts and products to enter the market. And these are challenges for consumers everywhere. In addition to this, we're seeing the geopolitical environment has changed. We're seeing rogue nation states using cybersecurity warfare tactics to immobilize an entity's ability to operate and perhaps even use their tactics for revenue generation. The Russian invasion of Ukraine is one example. But businesses are also under attack. For example, we saw solar winds, software supply chain was attacked two years ago, which unfortunately went unnoticed for several months. And then this was followed by the colonial pipeline attack and numerous others. It just seems like it's almost a daily occurrence that we hear of a cyber attack on the evening news. And in fact, it's estimated that the cybercrime cost will reach over $10.5 trillion by 2025 and will be even more profitable than the global transfer of all major illegal drugs combined. This is crazy. The macro environment in which companies operate in has changed over the years. And all of these things together and coming from multiple directions presents a cybersecurity challenge for an organization and in particular its supply chain. And this is why HPE is taking proactive steps to mitigate supply chain risk so that we can provide our customers with the most secure products and services. So, Cole, let's bring you into the conversation and did a great job of summarizing the major threats that are going on, the tumultuous landscape. Talk to us, Cole, about the security gap. What is it, what is HPE seeing and why are organizations in this situation? I think, Lisa, you know, what we're seeing is, as the threat landscape increases to, you know, disrupt or attempt to disrupt our customers and our partners and ourselves, right? It's a kind of a double edge, if you will, because you're seeing the increase in attacks. But what you're not seeing is an equal to growth of the skills and the experiences required to address the scale. So it really puts the pressure on companies because you have a skill gap, a talent gap, if you will. There's, you know, for example, there are projected to be three and a half million cyber roles open in the next few years, right? So all this scale is growing and people are just trying to keep up, but the gap is growing, just literally the people to stop the bad actors from attacking the data. And the complicate matters, you're also seeing a dynamic change of the coup and the how the attacks are happening, right? The classic attacks that you've seen, you know, and the Estianage and all the, you know, the history books, those are not the standard plays anymore. You'll have, you know, nation states going after commercial entities and, you know, criminal syndicates and alluded to that there's more money in it than the international drug trade. So you can imagine the amount of criminal interest in getting this money. So you put all that together and the increasing of attacks, it just is really pressing down as literally, I mean, the reports we're reading over half of everyone, obviously the most critical infrastructure cares, but even just mainstream computing requirements need to have their data protected, help me protect my workloads and they don't have the people in house, right? So that's where partnership is needed, right? And that's where we believe, you know, our approach with our partner ecosystem, this is not HTE delivering everything ourselves, but all of us in this together is really what we believe the only way we're going to be able to get this done. So Cole, let's double click on that. HPE and its partner ecosystem can provide expertise that companies in every industry are lacking. You're delivering HPE as a 360 degree approach to security. Talk about what that 360 degree approach encompasses. Thank you. It is an approach, right? Because I feel that security is a thread that will go through the entire construct of a technical solution, right? There isn't a, oh, if you just buy this one server with this one feature, you don't have to worry about anything else. It's really, it's everywhere and at least the way we believe it, it's everywhere. And in a 360 degree approach, the way we like to frame it is it's this beginning with our supply chain, right? We take a lot of pride in the designs, you know, the really smart engineering teams, the designer, technology, our awesome world-class global operations team working in concert to deliver some of these technologies into the market. That is a huge, you know, great capability, but also a huge risk to customers because that is the most vulnerable place that if you inject some sort of malware or are tampering at that point, you know, the rest of the story really becomes mute because you've already defeated, right? And then you move in to, you physically deploy that through our global operations. Now you're in an operating environment. That's where automation becomes key, right? We have software innovations in, you know, our ILO product of management inside those single servers. And we have really cool, new GreenLake for compute operations management services out there that give customers more control back and more information to deal with this scaling problem. And then lastly, as you begin to wrap up, you know, the natural lifecycle and you need to move to new platforms and new technologies, right? We think about the exit of that lifecycle and how do we make sure we dispose of the data and move those products into a secondary life cycle so that we can move back into this kind of circular 360 degree approach. We don't want to leave our customers hanging anywhere in this entire journey. That 360 degree approach is so critical, especially given as we've talked about already in this segment, the changes, the dynamics in the environment. And as Cole said, this is this 360 degree approach that HPE is delivering is beginning in the manufacturing supply chain. Seems like the first line of defense against cyber attackers. Talk to us about why that's important and where did the impetus come from? Was that COVID? Was that customer demand? Yep, yep. Yeah, the supply chain is critical. Thank you. So in 2018, we could see all of these cybersecurity issues starting to emerge and predicted that this would be a significant challenge for our industry. So we formed a strategic initiative called the Trusted Supply Chain Program designed to mitigate cybersecurity risk in the supply chain and really starting with the product lifecycle, starting at the product design phase and moving through sourcing and manufacturing, how we deliver products to our customers and ultimately a product's end of life that Cole mentioned. So in doing this, we're able to provide our customers with the most secure products and services, whether they're buying their servers for their data center or using our own GreenLake services. So just to give you some examples, something that is foundational to our Trusted Supply Chain Program, we've built a very robust cybersecurity supply chain risk management program that includes assessing our risk at our all factories and our suppliers. We're also looking at strengthening our software supply chain by developing mechanisms to identify software vulnerabilities and hardening our own software build environments. To protect against counterfeit parts that I mentioned in the beginning from entering our supply chain, we've recently started a blockchain program so that we can identify component provenance and trace parts back to their original manufacturers. So our security efforts continue even after product manufacturing. We offer three different levels of secure delivery services for our customers, including a dedicated truck and driver or perhaps even an exclusive use vehicle. We can tailor our delivery services to whatever the customer needs. And then when a product is at its end of life, products are either recycled or disposed using our approved vendors. So our servers are also equipped with the one button secure erase that erases every byte of data, including firmware data. In talking about products, we've taken additional steps to provide additional security features for our products. Number one, we can provide platform certificates that allow the user to cryptographically verify that their server hasn't been tampered with from the time it left the manufacturing facility to the time that it arrives at the customer's factory facility. In addition to that, we've launched a dedicated line of trusted supply chain servers with additional security features, including secure configuration lock, chassis intrusion detection. And these are assembled at our U.S. factory by U.S. vetted employees. So lots of exciting things happening within the supply chain, not just to shore up our own supply chain risk, but also to provide our customers with the most secure products. And so with that, Cole, do you want to make her big announcement? Alright, thank you. You know, the great setup though, because I think you got to really appreciate the whole effort that we're putting into, you know, bringing these online. But one of the just transparently the gaps we had as we proved this out was, as you heard, this initial proof was delivered with assembly in the U.S. factory. The employees, you know, fantastic program, really successful in all our target industries and even expanding to places we didn't really expect it to, but it's kind of going to the point of security isn't just for one industry or one set of customers, right? We're seeing it in our partners, we're seeing it in different industries than we have in the past. But the challenge was we couldn't get this global right out the gate, right? This has been a really heavy, transparently a U.S. federal activated focus, right? If you've been tracked and what's going on since May of last year, there's been a call to action to improve a nation's cyber security. So we've been all in on that and we have an opinion and we're working hard on that. But we're a global company, right? How can we get this out to the rest of the world? Well, guess what? This month, we figured it out and was taking a lot more than this month. We did a lot of work and we figured it out and we have launched a comparable service globally called server security optimization service, right? HPE, server security optimization service for ProLiant. I like to call it, you know, S-S-O-S, SOF, right? Do you want to be clever? HPE SOF that we can now deploy globally. We get that product hardened in the supply chain, right? Because if you take the best of your supply chain and you take your technical innovations that you've innovated into the server, you can deliver a better experience for your customers, right? So the supply chain equals server technology and our awesome, you know, services teams deliver supply chain security at that last mile. And we can deliver it in the European markets and now in the Asia-Pacific markets, right? Now, we could always just, we could ship it from the US to other markets, so we could always fulfill this promise. But I think it's just having that local access into your partner ecosystem and stuff just makes more sense. But it is a big deal for us because now we have activated a meaningful supply chain security benefit for our entire global network of partners and customers. And we're excited about it and we hope our customers are too. That's huge, Cole and Anne, in terms of the significance of the impact that HPE is delivering through its partner ecosystem globally as the supply chain continues to be one of the terms on everyone's lips here. I'm curious, Cole, we just a couple of months ago were at Discover. Can you talk about what HPE is doing here from a security perspective, this global approach that it's taking as it relates to what HPE was talking about at Discover in terms of we want to secure the enterprise to deliver these experiences from edge to cloud? You know, I feel like for me, and I think you look at the shared responsibility models and, you know, other frameworks out there, the way I believe it to be is this is, it's a solution, right? There's not one thing, you know, if you use HPE supply chain at the end or if you buy an HPE Proline at the end, right, it is an integrated connectedness with our as a service platform, our service and support commitments, you know, our extensive partner ecosystem, our alliances, all of that comes together to ultimately offer that assurance to a customer. And I think these are specific meaningful proof points in that chain of custody, right? That chain of trust, if you will, because as the world becomes more zero trust, we are going to have to prove ourselves more, right? And these are those kind of technical credentials and identities and, you know, capabilities that a modern approach to security needs. Excellent. Great work there. And let's go ahead and take us home, take the audience through what you think ultimately, what HPE is doing, really infusing security at that 360 degree approach level that we talked about. What are some of the key takeaways that you want the audience that's watching here today to walk away with? Right, right. Thank you. Yeah, you know, with the increase in cyber security threats everywhere, affecting all businesses globally, it's going to require everyone in our industry to continue to evolve in our supply chain security and our product security in order to protect our customers and our business continuity. Protecting our supply chain is something that HPE is very committed to and takes very seriously. So, you know, I think regardless of whether our customers are looking for an on-prem solution or a green lake service, you know, HPE is proactively looking for and mitigating any security risk in the supply chain so that we can provide our customers with the most secure products and services. Awesome. Ann and Cole, thank you so much for joining me today talking about what HPE is doing here and why it's important, as our program is called, to be confident and trust your server security with HPE and how HPE is doing that. Appreciate your insights on your time. Thank you so much for having us. Thank you, Lisa. For Cole Humphries and Ann Potten. I'm Lisa Martin. We want to thank you for watching this segment in our series, Be Confident and Trust Your Server Security with HPE. We'll see you soon.