 Well, aloha, how you doing, Gordo the Tech Star here, welcome to another exciting episode of Hibachi Talks. Hibachi Talks, the world listens, that's our new tagline. Thank you Andrew. Andrew, the security guy is here with us today, nice to have you back, the traveling fool is here. So grab yourself a libation, pull up a chair and sit down and join us as we talk about physical security, not physical security, not cyber security, physical security with Brian Tusken who is the senior director as opposed to the junior director of security for Microsoft. Yes. So this Microsoft, that's a company I've heard of. Yeah, it's a software company up in the Pacific Northwest. We have been around for a little while and you're the senior guy of security. Hi, I'm like the, I report to the CSO. Okay. Wow, Chief Security Officer. Yes. That's terrific, that's terrific. But you look like one local guy. Yeah, I'm a local. So where did you go to school? So I grew up in Waimanalo, Windward Side. Okay. And I went to Kailua High School. Oh, Kailua. One of the Chef Frieders, Imua Kailua. Yeah, yeah. Right. Wow. So a local boy makes good from Waimanalo. From Waimanalo, goes to Kailua High School and is the senior director of physical security. Oh, he has a little, there's a little more there. Yeah, so what else did you do here? Halfway up. Yeah, there's a good one. Well, usually the transition to a private security firm is usually through law enforcement. So I spent almost five years with HPD, and those very fond memories. Hatch a tattoo? Yeah, yeah, yeah. Covered up. Wow. So you were HPD? Well, nice. I was HPD, yes. Were you a detective? No, I wasn't a detective. But I worked mainly in the D6, Waikiki unit. Then I got it to SSD, the SWAT team, really, really good fond memories. But I was the ATV guy on the beach. So that was a cool job. Oh, nice. That was hard to get up. You dreamed about that all those years in Waimanalo, you said, you know what, I got to get this beach job. ATV guy on the beach. That's cool. Awesome. So you're here to apply for the police chief position, right? Oh, no, no, no. I don't think so. I wish, I wish all the candidates the best of luck. And I know a couple of them, which is kind of strange. Maybe we can get some on here. Yeah, I should. Are they going to decide today, I think? No. I said something, the paper was released today, it was the last day of testimony or something. I don't know. Well, there's seven in the hunt. So how'd you get to Redmond? There must have been a, from Waikiki to Redmond, like what happened there? Men and women with HPD, some of the finest police officers, professional, great department. Yep. And no many. It was the old cost of living in Paradise. And so I took a job with the city of Redmond, so I was a police officer and detective for eight years in Redmond, Washington. And all behind the detective piece case. Yes. And they recruit pretty heavily over here, right? They do. Washington State, Seattle, all of them, right? A lot of locals from HPD, lateral up to Pacific Northwest because the academy here, Kikula Makai, is one of the best accredited academy, so a lot of people just transition up to the mainland. And that's unfortunate because we lose some of the best. We do. But there's a great community there. Do any come here? Like from there? I think... No, it doesn't work that way. There's no... They don't take any laddles. You've got to start from the beginning here. There's something about the cost of living here that just scares everybody away. So what possessed you to get into the police force? I was always interested in law enforcement. Because at Kaila High School, I was in the Air Force ROTC. And so, serving was something I wanted to do, and I applied to HPD when I got in, when I was 23. Okay. But before that, I worked in a hotel industry. Oh, so you've got the whole thing. So then you go through... And when we get a little further in the show, we're going to talk about artificial intelligence and what's happening in the physical security side. But just tell us a little bit about it. It's kind of exciting. You're with Microsoft, you've been with them. How long now? 17 years. 17 years in the physical security aspect of it. Yes. So it has to have changed tremendously over the decades. Well, it has. Well, it's kind of circled back when I was with HPD. Okay. I was fascinated by computers. Okay. So I was the first... They didn't have any, though. They did. They had wings. Terminal mainframes. DS-65, and they had the mainframe. They had the mainframe. Really? Which they still have, by the way. So I was one of the first to get a laptop, a Tandy, didn't have a hard drive, dual floppy. And we got a form filler, and we wrote a report. So I could write as many reports, so many reports than the typewriter. Okay. So we had a little hooey. There was about 10 of us. They got the computers, and then we bought a dot matrix printer, put it in. This was the old station in King Street. Oh, the one all the way over. Yes. Yeah. Before we moved to the new one. Yeah. And we had this little geek club. And I still remember. There was a more senior officer, and he's just like that. What are you using that computer? And I said, this is the future. And I was just a young 23-year-old kid, and I said, this is the future. And from that early time on, the power of computing is what really excited me. So my transition to Redmond, which in their backyard, is Microsoft. So I was mostly a detective, city of Redmond, did a lot of cases with the Microsoft Corporation. And 17 years ago, I did a really big case. They offered me a job. They bring in law enforcement, retired law enforcement, existing law enforcement, came in, and never looked back. Wow. That's a cool little story. So they kind of took you from the same way that Redmond took you from Hawaii. They sort of took you from Redmond. Same thing. Same thing. Wow, that's kind of neat. Good story. So I mean, in 17 years, you obviously like it there. Love it. It's a wonderful company. Yeah. I think it has legs. How did it stuck? Because I know when we first met. I mean, I remember the sock was there. We came up with the sock. What is that? The security ops center, which I think you guys built one of the first ones. They had global. So how did that start? What is the sock? You know, you walked in and you got all these resources. Right? Well, think of physical security for those that are not familiar. You need some sort of command and control center. So they call it a SOC, security operation center. It's about 12 years ago. We configured or rebuilt our life safety control center, which was a standalone center. You see a lot of that here. You've got apartment buildings, hotels where they just have their own command center within the building. Their little security office somewhere or command center. No different than Microsoft. We had all around the world these little command centers. So what we did is we consolidated about 15, 15 or 20 of these centers into three. We boiled it down to three operation centers. And the main one was in Redmond, Washington, just outside of Seattle. And by doing that, the consolidation, you need it to be on the same network. High availability, you know, if stuff happens, but it gives us redundancy. So if something happened in one center, the other one is hot, it could run, it could take operational control, but it could run the 850 sites we have all over the world. Wow. And those operation centers are not in the same country. Correct. I mean, you don't have them all in the U.S. Correct. You distributed them. They were distributed. So we had one in the U.S., one in the U.K., and Thames Valley, just outside of London, and one in Hyderabad, India. Okay. Yeah, I remember coming up there. We actually did a demo where they did an event in Redmond, I think it was out in the parking lot. I was there. But it was handled from the London. Yes. Remember, we actually did a complete failure of the Redmond site. Right. Everything goes black, all the people left the room, and the team from London handled the entire event. It was amazing. So we're doing that as long as, you know, 12 years ago. Yeah, I was going to say, that is well over 10 years ago that we saw that happening. So think of that technology that they had then. Yeah, I'm just sitting here, like, getting older. So we're heading to the future. So we're heading to the future. So where it's going. That's where it started. So you've still got the three operations centers, there are men, 24 by 7. No, we don't have three. So as technology evolved, the cloud, and we're going to talk more about that, you start using more cloud, software as a service, infrastructure, platform as a service. You don't really need more infrastructure. So we found out, even though we gruely doubled in size, we didn't need three operation centers. So we shut down the one in London and just have two. And so the new concept is the VSOC. So the V is for virtual. And the virtual, using cloud services, is being able to man an operation center with people plug and play from all over the world. So you could actually be embedded from Hawaii. Or sitting here right now. Exactly. And get plugged into this virtual command center. So the premise is really an intelligence-driven, operational-led system. And so you use intelligence to be smart about what you do. So most operation centers, you have these controllers that are just operationally managing these controls and signals. What we're looking at is change in the paradigm. And then having machine learning, artificial intelligence take over the millions of signals that come through, make sense out of it. It's a fusion center. So you fuse these experts in this room. And you can plug and play from all over the world to make decisions, effective decisions, on crisis management, emergency management. So you're not just doing signal mitigation. You're actually managing crises. So tell me, so explains for our viewers, what's signal mitigation? So signal mitigation, think of for anyone that has to access a building. Like Hawaii has a lot of hard keys. But there's some folks that put in hard keys. So if somebody swipes a card or they pushes a door, that's a signal. If you have some sort of low-voltage device that triggers something, duress alarms, with an infrastructure as big as ours, we have over 20,000 cameras. Yeah, how many doors do you have as well? Thousands of doors, 20,000 cameras. Access control using, well, changing now. Right. So access control, there's the usual players out there. And we currently use Leno. It's a good product. But if you really look at where the future is headed, the future is really built off of Active Directory, which is a Microsoft base product that we use. And then getting away from card readers. So you see everybody with their card. Or getting away from cards, but the readers will be different. Readers will be different. Think about using facial recognition. So 3D facial recognition. If you're walking into a building, instead of having to go through a door, instead of going through, have to go through a turnstile, it already recognizes you from the edge that this is Gordon Bruce. But you needed a second authentication factor. That's two-factor authentication. So it could be an app on your phone. It could be some sort of Bluetooth device. It could be a fingerprint. Ready to scan? All of these ways to prove its identity management. So what I want to bring here, because something I think we should point out here is that, what I'm hearing you say is the physical security piece really needs to be tied to the logical security piece as part of the Active Directory. Absolutely. And so here's a, I think, and I wonder how many companies out there do not have their physical security systems, I know many, not tied to their Active Directory. And part of that is just because if you look at the physical security industry, who do they hire? Right, ex-law enforcement, ex-military, where usually they have a lukewarm relationship with IT. So I know you're IT guy. We're IT company. We're best of friends. We're best of friends with IT. I had and still have a great relationship with HPD. Oh yeah. So that's still there. And they're a good tech consumer and a good Microsoft tech consumer. But so we're bringing these two things together now. Correct. And then you're going to throw on top of that artificial intelligence and MLs? Well, machine learning, AI's, I'm sure Brian will talk to us a bit about things that they're looking at for the future, but the identity management's always been this clunky thing, right? So you watch the military who brought out a car, so they're able to use that car on their car readers and able to use that car as their logical, and that is Active Directory authentication for them from both places. We had that, it came up as an issue originally as I recall because someone would get fired or someone would get kicked off the network, but yet their car wouldn't get taken out of the access so they could still gain access to the facility. So those worlds not talking was a real problem. Is a real problem. AD's helped us solve. That Active Directory piece is really that kind of piece. And one of the things I've been saying now to a number of my clients is that the Active Directory, although it being managed by the IT department, I think it should be controlled by the HR department. Usually the IT guys go when I say that because you don't know who's in the Active Directory and I can show you today, people that are in there that are no longer employed or vice versa, people that are employed that still aren't in there yet. So especially if you've got a large company, right? Yeah, there's definitely another trigger. Those paths are security, IT, your privilege set, and then your HR, I mean, you really shouldn't be allowed to be an employee unless you get an Active Directory identity. That's right, you've got to get an Active Directory. Yeah, I'll tell it together because you need to be there. Because we're walking around like, I'm walking around with these, right? Different clients are giving me, this one doesn't have even have a picture on it. Yeah, wouldn't you like to have an identity? This one, at least this one has a photo on it. It's got some things going. It allows me to get into certain areas, but this is the only one tied to the Active Directory. This one isn't, right? So, and this one should be. So I'll get them there. Well, you like to have a global identity, right? Yeah. It could manage itself across multiple infrastructures, right? So that your identity was known so that it could be referenced or accessed from anyone who wanted to share it the way the military, you know, they download lists of authorized credentials. So, you know, once you're a certificate or something. Okay, so let's, we've got a perfect time to pause. We don't have Angus today. We'll come back, I got to do a cryptocurrency update and then we'll come back and then we're gonna dig deeper into this AI and ML. See, I used an acronym so you can explain what it is that's gonna come back. All right. All right, go to the tech star. We'll be back in five, well, no, five. We'll be back in a minute. Hibachi talks, the world listens. This is Think Tech Hawaii, raising public awareness. Day is no ordinary day. The pitch, hallowed ground for players and supporters alike. Excitement builds. Game plans are made with responsibility in mind. Celebrations are underway. Ready for kickoff. MLS clubs and our supporters rise to the challenge. We make responsible decisions while we cheer on our heroes and toast their success. Elevate your matchday experience. If you drink, never drive. Aloha, Gordo the tech star here. Welcome back to Hibachi Talk. We have Brian Tuskin here from Microsoft, the senior director of security, physical security over there, and the security guy. We're gonna get into, what? I said, hey, everybody. I thought I got your name wrong. We're gonna get an artificial intelligence, which I have none of, and into machine learning in just a second. But I always do a little cryptocurrency update of the week. That kind of stuff and what's going on. So last week we were talking about the fact that China was closing down all of their exchanges and so on and getting out of it. And so it didn't take long. So China's leaving the cryptocurrency exchange business, but they haven't left the mining business because that's where they make all the money. So they're not stupid. I mean, they're still mining. They're still one of the largest miners in the world. But the people that have picked up and were China left off has been Japan and South Korea. So they literally have just jumped onto it. So the trauma that industry thought was gonna happen didn't happen. Now South Korea is the largest miner in the world. Not North Korea, South Korea. It didn't take long. It didn't take long for them to see the advantage of it. Cryptocurrency is still trading at about $1.4 billion right now today. So it's a rocky ride, but it's still hanging in there. It went from whatever was, I think it dropped, I saw it down to like 19 bucks maybe late last week and now it's back up in the 20s. $19 for... Wait, which one? No, you're talking about your investment. Oh yeah, yeah. It's $4,300. Yeah, $43, so maybe it went down to $3,500 or something. Yeah, it did. It dropped down to $3,200 and that happened real fast and then it's creeped its way back up. Yeah, so it recovered fine. Yeah, you're just thinking of all the money you made on the one I gave you. Yeah, one on the show. Yeah, we did a live transfer. Anyway, we'll talk about Microsoft's physical security and so on. But let's tell us now, you said it's moving forward now more and to the more global, cloud less physical presence, more mobile, I would think. Right. And so on. So how's this artificial intelligence and machine learning and all that work? Well, I think Brian's gonna have a lot more visibility on it than I do, but I mean, it's sort of the buzz of technology industries across the spectrum of technology industry today and security's definitely a player in that game and retail's taking advantage of it early on. But for the physical security side, for related to access control, related to identity management and people moving, like how many people do you have moving at any one time in your organization? Thousands, I'm guessing. Just travelers, we're gonna have seven to 10,000. A day. A day, a day. Seven to 10,000 Microsoft employees who are traveling a day. So if you think about trying to keep them safe, where they're going, right? Is it safe to go there? Is there anything happening there? Floods, you know, whatever, all that kind of stuff to try to keep these people safe that he has to work on. You've got to gather all this intelligence to make good decisions and a human just can't handle it. So what's gonna happen in that way? Let's do a quick history. Back in the 80s, you had mainframe computers, right? You literally had to drive to work to do your job. Because they connected these terminals, you had the mainframe, and exactly 10 years later, the PC came out. So that's where Microsoft dominated. PC in every home, every business. 10 years, pretty much to the date, you had web browsing. So you had Google, Chrome dominating, and it's the disruption. So the third disruption was mobile. So you don't really need a browser, you just need a mobile phone. Over here, yep. So the fourth disruption, apps, fourth disruption is really gonna be autonomy, machine learning, artificial intelligence. We're already seeing it now, but it's gonna be the commonplace. So you have Watson, you have what Google has, you have Microsoft's Azure. So when I talk about machine learning in the physical security space, because we're closely aligned to logical, two separate groups, but they're more thing closer and closer together because you have to rely on each other. You have all these edge devices that are vulnerable because they're physical devices that can be hacked. So we rely on our infrastructure with our logical team, the cyber team, but let's get back to where we think artificial intelligence is gonna come into play. Think about data. So when you think about data, big data, data is the new currency, it's the new oil. It's the new electricity. The new blockchain. The blockchain is nothing but data. It's data. It's all data. And so you have all these data points. I mean, even in Hawaii, you have some sort of IP device that is, data is just sitting there. You throw it into a machine because it can think faster than a human. And then what spits out of that, it's consumable. So what we're looking at for trending analysis, think about it, if you have thousands of access control points, you really wanna focus on the most high risk areas, right? If it's a cafeteria of people going in and out, you really don't care about that if it's during lunchtime, but if it's in an executive area. So using the artificial intelligence that we're working with a strategic partner, Johnson Controls, we've been working with them for at least two years as they merged with Tyco. That's right. A year ago. So now you have the smart buildings and then you have the smart security all coming together and we're working on some really amazing solutions in our virtualized security operation center with Johnson Controls. So what we're trying to do is be the industry recognized leader for where this is going well. Physical security. Physical security. Aspects of what's going on. Yes. And what do you think it means? What's it look like? Will the walls come down? Will the doors be open? What do you think it means? Yes, so you, most people look at security as protecting the facility. You don't want, it's beyond the facility. It's the environment. The environment, it's us. Correct. And so you could literally bring down certain walls because you're protecting the environment. So as you drive onto the campus, you already have a camera view of your face that's going through the AI and machine learning that goes, this person is authorized to be here. And so you will have a guard with HoloLens 3D glasses. The evolution of the 3D glasses, it will get down to about the size of these glasses to even implant or contact size. And so it helps you become part of the artificial intelligence phenomena. This is kind of robotics as well. The schema. So we've thrown in a little bit of robotics into this and so on. But what about, okay, there's a lot of people out there that are concerned about, well, wait a minute, now you're watching over everything. I don't want my privacy compromised. Well, yes, privacy is very important. I mean, and that's a big kickback. A lot of people don't want cameras in Waikiki. They don't want them in these locations because, well, I don't want, you're integrating my privacy, by the way, they don't, no one has. If they think they've got privacy, they're crazy. But anyway, I still hear it all the time. Well, being in Hawaii, you understand the state and the rules of the city, county, we're a global company. So we have to respect all the rules of privacy in every country. The EU has high privacy, but in Asia. So every country has conditions of what we can record or even storage of cloud data. It has to be regulated. And so how we use it as a whole for Microsoft, internally, is privacy is of the highest importance. You must have a boatload of attorneys. The thing about security though, like you said, it actually gives you more, it actually guarantees your identity in a lot of ways because we know that that wasn't you doing this because you were here, because we know who you were. Right, right. And so that identity management piece is really this sort of this threshold for physical security, the understanding of- I'm, you're singing to the choir here, but I still can't convince a number of people, I still get the pushback, is that you're invading my privacy by putting in these access controls that are telling me, telling people where I went. We're gonna always have those types because they're up to no good. They're really worried about their behavior. Tell that to the CEO. The reason you don't like that is that you're up to no good. Well, there's a balance, right? You wanna have freedom of movement, right? Especially in academics, because to be creative, you don't wanna be locked out. So it's a delicate balance. So as a security leader, working with other leaders, finding that sweet spot, working with your current organization and clients and customers. I just find it terrific, be able to just drive up to a building that may not have a gate. And then within the seconds that you're coming up, you go through and you're on to the next location where you can go within the campus. Well, as you drive up, as long as it knows you and you're right, if you're not, then the gate appears. Then the gate, yes. Because you need that physical- Immediately out of the ground. You may, yeah, like a baller. You may need that physical barrier, depending on the asset, the threat, appetite for the asset. But this ubiquitous knowing, and people have kind of lost, they forget there's really no privacy expectation at work. Right now in your home, we're not gonna be in your home knowing who you are and what you're doing. We'll know who you are, maybe, we won't know what you're doing, right? It's not that kind of invasive. But when you go to work, you kind of surrender, you know that. I was unplug Alexa, because I was afraid she's listening to me. Oh, she is listening. Yeah, I was afraid she's listening to us going on at that minute. So the machine learning part, now what's happening on this machine learning piece? Well, as we have a bunch of data scientists with our Johnson Control partners in Ireland, so we've got about 50 engineers working on a, they call it Tyco as a service. So it's basically the machine learning arm to take all of these signals. Think of a PSEM, you guys familiar with the PSEM, which is a physical security information management. And you kind of have this single view platform from an operator to look at your entire operation. You're looking at the whole thing, right? For us, it's all of this data and signals coming through. How do we intelligently use this data to do our job? So this is new territory. We're just excited because it's a three-year project. So we just started this summer. And so maybe you give me back on the show, I can give you a progress report. Next time you're out for annual update. And the cool thing about machine learning is the machines in the gathering of the data and the parsing through the data, they actually decide what to do with it. They learn from the data themselves without you programming them, telling them what to do. And that's the value of machine learning, right? Because there's just so much power there. And as you said, I can't even imagine from thousands of sites and tens of thousands of people with all that signal, right? It's just noise. Well, the intelligence that's in the cameras, the intelligence that's in the access controllers. Correct. I mean, it's all data, right? Being able to pull all that and then from that distil. Yeah, distill what's valuable, what's important, and why. What's valuable and what can be be alerted to. I'm thinking of what happened in Vegas. If we had this machine learning intelligence, there may have been a flag that suitcases keep coming in, but no suitcases going out or any of those kinds of things as an anomaly. Anyway, I only got one minute left. So any last words before we give you autograph solo cup? Well, thank you for letting me be on the show and talk about Microsoft and our strategic partnership with Johnson Controls. And I really look forward to sharing the best practices that we're building up in the Northwest to Hawaii because I love Hawaii. And just stop recruiting our good police officer. Anyway, all of our guests get an autograph solo cup. This is number 134 in the series. Mahalo? Yeah, right on. You're welcome. And thank goodness for you guys keeping us safe. And I love my Microsoft product. Hey, thank you. Thank you. Surface Pro works like a champ. Helps pay your bills. Anyway, Gordo the tech czar and the security guy. Hello, hi, everybody. Thanks for watching Hibachi Talk. And like we say at the end of every show, one, two, three. How do you do it?