 I'm from Talus CPL, Business Development Director, and I'm here today to share with you a little bit why hardware security modules are important and what they mean for you in developing on a trusted foundation. So starting off, I know there's an entire day today around cloud-native security development, but just sharing some, why are we talking about security? Some kind of comes to this from a different vantage point. For us at Talus, we focus purely on the data. What does that mean to keep your data safe and secure? And for us, the measure by which we see someone secure or not is whether they're breached and what are the impacts of those breaches. We collect data on this year over year. We publish a report annually. And for the last eight years, we've seen that the number of breaches are increasing year over year, and correspondingly, the severity of those breaches have also increased. So this is a prevalent problem that's really here to stay. So this is the first reason why we talk about security. And the second is that this is intimately tied with compliance. Earlier today, Kirsten Newcomer gave a presentation where she shared some of the survey results from Red Hat, whereby 67% of enterprises that responded to their survey said that compliance is a must-have for their organization. It doesn't really matter what industry you work in, what your geography is, there's some rule or regulation out there that governs how you secure your data. It can be as prescriptive as PCI that says encryption and key management is mandatory, or it can be something as generic as GDPR that says you must demonstrate control of your data. But either way, that's there. It's a requirement and it's something that the organization, especially large enterprises, which I'm sure most of the people here in the audience today, is tied to. And with the greater adoption of DevOps methodologies, no longer is security just that last step before the application goes to production. It's now included in every single step along the development pipeline. So it's all of our jobs. And we at TALIS want to help instill that early in the application development process and to help you bring trust to those conversations. So that's why we're intimately partnering with Red Hat as strategic security partners to help address those challenges. And we do this through application encryption, tokenization, file encryption. But what I'm going to focus on today are hardware security modules or what we lovingly call HSMs. What is an HSM? Well, quick question. Show of hands. How many of you are familiar with what a hardware security module is? Okay. All right. About 40% of the audience, for those of you that don't know, an HSM is a physical appliance whose sole purpose is the logical and physical security of your cryptographic material, your encryption keys, your certificates. So you can think of it like a bank vault with the garden front. Once you put a key in the HSM, it's never coming out. It's designed so you can't extract it. Why this is relevant is that once that key is in there, it's entirely trusted. You know no one else has access to it. You can demonstrate its provenance. So every time you build cryptography into your application using that key, you can trust that cryptography. And this matters at scale when you think about what you do in your enterprises and what you develop. All right. In addition to that, there's an entropy engine. So if you were to generate your own encryption, you can trust the roots of that as well. So you bring a robust, performant solution to what you're doing. Why that matters? Why how we work with OpenShift? We have containerized our clients for you to use in your pods, in your development so that your application spin up and down, whether it's ephemeral, you know, wherever you move those containers. You will always call back to your key securely stored in our HSM. So if your application needs to demonstrate its identity, if you need to sign a container, if you need to incorporate encryption directly into your application, you can do all of that as you develop. And when it's running in production, it can always call back to your HSM irrespective of where you're deploying that application on-prem, in-cloud, or across multiple clouds. So in closing, what you get is the ability to develop in a secure way across any industry, any environment, any application, so that you can keep your data safe, secure, and you yourself compliant. So with that, at the end of my lightning talk, if you have questions, you can either find me after the talk today. I'll be around all week, or you can find us on our social media channels for more information. All right. Thank you.