Learning Library

← Back to Library

From West Point to IBM Cybersecurity

Key Points

  • Jason recounts his journey from a West Point cadet and U.S. Army airborne ranger stationed in northern Italy to a two‑decade career at IBM, where he now builds teams and expands new business areas.
  • Kristy shares her Canadian background and long‑standing experience as a Bain consultant, emphasizing how that role shaped her professional growth.
  • The hosts introduce the episode’s focus on cybersecurity and the strategic partnership between IBM and Palo Alto Networks.
  • Both guests highlight the value of collaboration with brilliant colleagues and partners in driving innovation within the cybersecurity space.

Sections

Full Transcript

# From West Point to IBM Cybersecurity **Source:** [https://www.youtube.com/watch?v=utcYsBKL7e8](https://www.youtube.com/watch?v=utcYsBKL7e8) **Duration:** 00:36:19 ## Summary - Jason recounts his journey from a West Point cadet and U.S. Army airborne ranger stationed in northern Italy to a two‑decade career at IBM, where he now builds teams and expands new business areas. - Kristy shares her Canadian background and long‑standing experience as a Bain consultant, emphasizing how that role shaped her professional growth. - The hosts introduce the episode’s focus on cybersecurity and the strategic partnership between IBM and Palo Alto Networks. - Both guests highlight the value of collaboration with brilliant colleagues and partners in driving innovation within the cybersecurity space. ## Sections - [00:00:00](https://www.youtube.com/watch?v=utcYsBKL7e8&t=0s) **West Point Roots, Ranger Journey** - Jason shares his upbringing, West Point education, football experience, and service as a U.S. Army airborne ranger in Italy before transitioning to the cybersecurity discussion. - [00:03:06](https://www.youtube.com/watch?v=utcYsBKL7e8&t=186s) **Bridging Consulting and Cloud Partnerships** - The speaker recounts his journey from Bain consulting to product roles at New Relic and Palo Alto Networks, now combining consulting expertise and product focus to deepen a strategic partnership with IBM, highlighting IBM’s identity as a multicloud, hybrid‑cloud AI company. - [00:06:08](https://www.youtube.com/watch?v=utcYsBKL7e8&t=368s) **Taming Zero Trust Tool Sprawl** - The speaker explains how the proliferation of zero‑trust checkpoints creates alert fatigue and tool sprawl, and how Palo Alto’s unified platform—augmented by IBM’s expertise—helps consolidate and re‑architect environments without sacrificing best‑of‑breed security. - [00:09:13](https://www.youtube.com/watch?v=utcYsBKL7e8&t=553s) **AI Increases Data‑Security Stakes** - The speakers contend that our expanding dependence on data and rapid AI evolution magnify both defensive and offensive threats—especially ransomware—making heightened preparedness essential despite AI’s overall productivity benefits. - [00:12:43](https://www.youtube.com/watch?v=utcYsBKL7e8&t=763s) **Balancing Data Security and Growth** - The speaker urges hospital CEOs to first clarify their objectives before addressing PII protection, inter‑site data sharing, and the efficiency‑security trade‑offs that arise when scaling nationally or internationally. - [00:15:49](https://www.youtube.com/watch?v=utcYsBKL7e8&t=949s) **Healthcare Innovation Meets Cybersecurity** - The speaker argues that as digital tools enhance patient care and collaboration, a strong cybersecurity strategy—like their SASE solution—must protect privacy without sacrificing speed or efficiency. - [00:18:57](https://www.youtube.com/watch?v=utcYsBKL7e8&t=1137s) **From Scanning to AI Defense** - The speaker stresses beginning with comprehensive asset discovery and visibility—using integrations and tools like Palo Alto’s attack‑surface scanners, illustrated by a house‑security analogy—and then explains how AI acts as a force multiplier that transforms modern cyber‑defense strategies. - [00:22:02](https://www.youtube.com/watch?v=utcYsBKL7e8&t=1322s) **Accelerating Cyber Threat Detection** - The speaker describes how an AI‑based security operations platform slashes mean time to detect and respond from days to under an hour by consolidating alerts and streamlining investigations. - [00:25:05](https://www.youtube.com/watch?v=utcYsBKL7e8&t=1505s) **CIOs Adopt AI Policy Tool** - The speaker outlines a newly announced AI governance platform that enables CIOs to define usage policies, gain visibility into risky AI applications, automatically detect prohibited data like Social Security numbers, and block non‑compliant actions at runtime. - [00:28:07](https://www.youtube.com/watch?v=utcYsBKL7e8&t=1687s) **AI‑Driven Automation for Cybersecurity Teams** - The speaker emphasizes using AI tools like Cortex XSIAM to automate routine SOC tasks, freeing analysts to focus on advanced threat hunting and ensuring they stay skilled and adaptable against evolving threats. - [00:31:15](https://www.youtube.com/watch?v=utcYsBKL7e8&t=1875s) **Future Vision: Quantum AI 2029** - Speakers imagine 2029 where quantum computing is mainstream and quantum‑safe, cloud firewalls guard cloud instances, and AI acts as a seamless productivity multiplier integrated into every employee’s workflow. - [00:34:18](https://www.youtube.com/watch?v=utcYsBKL7e8&t=2058s) **Integrating Systems Through AI Automation** - A speaker explains how unifying disparate front‑ and back‑office functions via workflow automation—using AI tools such as ChatGPT and a consulting assistant—enables strategic work while balancing openness and zero‑trust security. ## Full Transcript
0:00Jason, Kristy, welcome to Smart Talks with IBM. 0:02Thank you for joining me. 0:04Thank you. 0:04It’s great to be here. 0:06We are here to discuss cybersecurity and the partnership between 0:09IBM and Palo Alto Networks. 0:11But before we get there, I wanted you guys to tell me a little bit about yourself. 0:16Jason, let’s start with you. 0:18I see on your résumé “West Point,” which makes me think there’s some 0:24interesting things going on there. 0:26How did you get to West Point? 0:28West Point—West Point was a decision. 0:30First, it was affordable back in the day. 0:33But I had a sense of service. 0:34My father was a World War II vet. 0:37So I grew up on the weekends watching World War II video. 0:39Was he Army? 0:41He’s Army as well. 0:42And so I thought, “Oh, that’d be exciting.” And I thought 0:47I’d do some type of service. 0:49Went there, and now I have the biggest family, extended 0:52family, I could ever have. 0:53So it was very exciting. 0:55Played football. 0:56Lucked out—uh, meaning I wasn’t recruited. 1:00Yeah. I walked on. 1:02And that kept me there because it gave me something—an outlet 1:05for all the other pressure. 1:06What position did you play? 1:07Defensive back. 1:08I was—I was great at knocking the ball down, not the best at catching it. 1:11Yeah. 1:13And then you were a ranger? 1:15I was. 1:16I was privileged to be a U.S. 1:17Army airborne ranger. 1:18Yeah. 1:19Stationed—but did most of my time in, uh, northern Italy. 1:21We’re part of the 82nd Airborne. 1:24Hardship post. 1:25Oh, yeah. 1:26That’s what people say: “Seriously? 1:27Like, you know, you were—you were in northern Italy? 1:29You were drinking wine and having bread?” 1:31Eating pasta. 1:32We were part of a NATO force there at the time. 1:35Yeah. 1:35So, yeah, exciting. 1:37How did you get from there to IBM? 1:41A long path. 1:43As I came out of the military, I started in manufacturing, retail, housing, 1:51and did a quick stint—took a leave of absence from industry and did a stint of, 1:57yet again, public service, in the state of Tennessee, with economic development, 2:02and got a whiff of how fun it could be to do things around data and media. 2:08Started a small media firm—what we would now call a 'digital firm'. 2:12Mm-hmm. 2:13Sold it, and said I wanted to go do it again somewhere, but I 2:17wanted to go to a big company. 2:19And the family at IBM brought me in and have yet to let me go. 2:22That was how many years ago? 2:26Two decades. 2:26Oh, wow. 2:27I know. 2:28I look amazingly young. 2:29Yes, I was going to say, “You must have—" 2:33IBM was my fifth career. 2:35And I’ve enjoyed it since. 2:36And that’s what I do, is—I build teams, grow new parts of the company, and get 2:41to work with some of the most brilliant people on the face of the planet, as 2:45well as partners like, like Kristy, that, you know, just keep it exciting. 2:49Kristy, you’re—I was delighted to learn that you are Canadian. 2:51Yes. 2:52From Toronto. 2:53Nothing made me happier. 2:55But you—so you were a consultant for a long time at Bain? 2:59Yes. 2:59Yeah, I joined Bain Consulting intending to spend a couple 3:02years there, learn the ropes, and then go get my first “real” job. 3:06But the value, personally, to my growth and development—and then 3:09that we were able to bring our clients—I ended up there for 16 years. 3:13And then post-Bain, went on to another—my first product company, at New Relic. 3:18And then it’s come full circle at, at Palo Alto Networks. 3:20But at Bain, it was all about bringing expertise across different 3:24industries to help our clients improve whatever they needed to improve, 3:28and bringing that expertise to bear. 3:30And then you have the product lens and you think, “Okay, we’re gonna build 3:33the absolute best product to help our customers do what they need to get 3:36done.” And then I joined Palo Alto about six, seven months ago in a partnerships 3:41role, and I’m delighted to be able to work with amazing consulting companies 3:45like IBM, where we bring both to bear. 3:48How long have IBM and Palo Alto Networks been partners? 3:52Well, we’ve been working together for quite a long time, but we, uh, made it 3:57official, meaning we, we got married as strategic partners, last year. 4:01Oh, I see. 4:02So what is it that each of you bring to the table? 4:04What’s each side’s specialty? 4:06So—so it’s great that you ask that, because about a decade ago, our now-CEO, 4:11Arvind Krishna, says, you know, “Wouldn’t it be great if we just had, you know, 4:15this one focus, which is: What does IBM do?” And you could have this whole list. 4:19And he says, “Let’s make it simple. 4:21We are a multicloud, hybrid-cloud AI company.” And so when you say 4:27that, it sounds very simple, but then people—"What the hell does that—? 4:31You’re ’hybrid cloud?’ You’re—?” Well, both of those two things 4:34have a lot of data involved. 4:36And a lot of those mean that that data is going to sit in multiple 4:39places, in distributed environments. 4:42Well, if you’re able to tie those things together with multiple partners, you 4:46also have to make sure that it’s secure. 4:50Because in the direction that we’re going, where data is now being consumed 4:55in many different places, and it is the fuel behind AI, as we know, then 4:59you say, “Ah, well, who does that well? 5:03And who does it in a way that’s—that’s getting rid of seams?” The seams—that 5:06could be across multiple products. 5:09Multiple product sets, even. 5:10And that’s where Palo comes in. 5:12I think that the conventional wisdom in cybersecurity was always, “You 5:16need all the new tools,” right? 5:18You need a—every threat, it’s like Whac-a-Mole. 5:20Every threat that pops up, you get the tool that’s purpose-built 5:23for that specific thing. 5:25Well, fast forward to, you know, the RSA conference this year. 5:28There were 4,000 vendors on the floor. 5:31Um, you look at an average company—there’s hundreds of cybersecurity tools. 5:34It introduces a level of complexity that is really hard to manage. 5:39You, as a user, query an application, right? 5:44That query can go through a bunch of different pings 5:48from one cloud to the next. 5:49It goes into and out of a SaaS application. 5:51It may be running along a network. 5:53You may be accessing it from your phone, which is an unmanaged device. 5:56It’s gotta go in and out. 5:57And if you say, “Okay, I’ve gotta secure that phone, I’ve gotta 6:01secure the network, I’ve gotta—." 6:03Then all of a sudden you’ve got, sort of, firewalls, software and hardware 6:05firewalls, popping up everywhere. 6:07You’ve got cloud security. 6:09And it’s—you’ve probably heard of this concept of “zero trust,” which 6:11is—every time you have to check and say, “Are you allowed in here? 6:14Are you allowed in here?”—the number of places that can fall 6:16down, uh, just becomes overwhelming. 6:18So you end up with either alerts firing, you know, every two seconds 6:24that you have to then go investigate, most of which are false positives, 6:27or you miss something, right? 6:30And so that was—the conventional wisdom was, “We’ve got to buy all these 6:32tools,” and now you’ve got overwhelmed CIOs and CISOs with hundreds of tools. 6:36And Palo Alto’s strategy has been, “Look, we’re going to create a platform 6:40where—where everything can be stitched together, everything can speak the same 6:43language, and we can, sort of, manage throughout the architecture and, and watch 6:49this call as it’s, as it’s passing through all these different, uh, checkpoints.” 6:54And we can do it in a way that you still have the confidence 6:57that it’s “best of breed,” right? 6:58So you’re not making any, any trade-offs. 7:00But, um, it’s not so simple just to get from the spaghetti to, 7:03to the seamless architecture. 7:05You need, oftentimes, to reengineer your business processes. 7:08You have to re-architect your digital environment. 7:11And so that’s where we partner with a company like IBM, to bring that 7:15expertise and say, “We’re gonna help you not just deploy the best, 7:18um, cybersecurity architecture, but really get your environment 7:20ready to have this ‘zero trust.’ 7:22As well as all of those players that cross that spaghetti. 7:27And because, when you start thinking about all the other partners that you work 7:30with, if you’re—you think of an industry perspective, you’re gonna have an ERP. 7:34It could be an Oracle. 7:35It could be an SAP. 7:37You’re not gonna have one cloud, as I mentioned. 7:38It’s gonna be possibly multiple clouds. 7:40You’ll have some AWS, maybe Microsoft Azure, and then 7:43even—even some Google in there. 7:45And then your own that you’ve built in your private—over there. 7:49Some IBM. An IBM cloud. 7:51You’ll have those multiple clouds. 7:53And then you also will have, you know, “fit for purpose.” “Oh, I 7:56need a, a—I need a Salesforce in there for my customer-focusing. 8:01I’m doing some graphics out of Adobe.” So I—just as—I, I could name, name, name—all 8:05of those then have to be reengineered. 8:09Seriously? 8:10I mean, come on, Malcolm, are you gonna sit there? 8:11You think how long that would take? 8:13Mm-hmm. 8:13So if you haven’t done that before, you’re going to have to go to 8:18each one of those individually—or you can work with a company that 8:21can tie those things together. 8:22Because we are also strategic partners with them. 8:26Yeah. 8:26So that’s where you start to say, “Okay, I—I see how this comes together.” 8:31You have to make sure that your ecosystem is going to be stronger 8:35than your competitors’ ecosystem. 8:37And you have to be secure in what you’re doing, because as you add more 8:40players or products, you create seams. 8:43And you want to make sure there’s fewer seams, and that there’s 8:46zero trust across that capability you’re building, and that’s why the 8:52complement between the two companies— 8:54Take a step back for a moment before we, sort of, launch into the 8:57specifics of what you guys are doing. 8:59I’m curious: At this moment, in 2024, how nervous should we be about cybersecurity? 9:09So compare it to five years ago, or ten years ago. 9:13Are we—are you less nervous than you were five years ago, or more nervous? 9:17Are all the changes going on right now increasing vulnerability or decreasing it? 9:23I would say—and I—you know, Kristy also; I think we share the point of view—is that 9:28it’s not necessarily being more nervous. 9:31I think you should be more prepared. 9:33Yeah. 9:34Because the amount of threat is increasing based on our dependence upon data. 9:41And that’s where I think the attention should be placed—is that, more and more, 9:47especially with the importance of AI, that you say, “Okay, then what’s under 9:52all that?” And it’s the data, as I said. 9:55I said, “So, knowing that, you should be more concerned.” 10:00Does the advent of AI and its rapid evolution help 10:04defense more or offense more? 10:07I think it’s—I think it’s like any megatrend that we’ve 10:10witnessed: um, both, right? 10:13So you think about AI; it’s—it’s 99 percent great, right? 10:17In terms of what it’s going to unlock for productivity, for humanity. 10:20But it also makes it a whole lot easier to build ransomware. 10:23It’s a whole lot easier to test different ways into, into a system, right? 10:28But I think that’s true if you think about, like, the 10:30rise of the internet, right? 10:31All of a sudden everyone was putting their data online. 10:34Uh, and you had to think of, of new ways to stay ahead, and keep that secure, 10:38and I don’t think AI is any different. 10:40You’ve got companies like Palo Alto, partnerships like Palo and IBM, that are 10:45constantly scanning the landscape for not only the current threats, but what’s next. 10:49What’s coming around the corner? 10:50What’s after AI? 10:52And so I think taking it seriously and being prepared is probably 10:54the right way of looking at it. 10:56As opposed to—because, if you think about it too hard, you’ll just 10:59wanna crawl into a corner and stuff everything under the mattress. 11:02Let me give you a hypothetical. 11:05I am the CEO of a regional, uh, hospital chain. 11:12Big, distributed healthcare system. 11:15So: ton of data. 11:16Uh, the consequences of being hacked and held for ransom are— 11:20Life and death. 11:21Life and death, right? 11:23Um, when you come—so you, you come down, you sit down with me and you chat with me. 11:28Um, walk me through the kinds of things you would tell me 11:32about what I need to get safer. 11:34For example, let’s start with one: Is it likely that I’m spending too little? 11:38Or am I spending money in the wrong place? 11:39That’s a great question. 11:42It depends how you’ve broken it out. 11:44If you are distributing all of your dollars across a whole bunch of 11:48different tools, it’s likely you’re just spending the wrong money. 11:51Yeah. 11:51And in fact, you know, putting it all in one place is a way of 11:54potentially saving money, uh, but keeping your security actually higher. 11:59And I—I’d love to hear, Jason, how you would approach it. 12:01How we would approach it, of course, is by saying, you know, “What—what does your 12:04environment look like?” You know, “Are—do you have the connected medical devices 12:08into your EMR?” Uh, “Are your respirators and ventilators all online?” Right? 12:14And so we would talk about, “Okay, here’s how you get coverage, and how the 12:18coverage of both—the firewalls as well as the detectors—all feed back into your 12:22security operations center, and you can manage it and, and do your alerting with 12:26AI, and keep yourself secure and safe.” 12:29And I would say Kristy and I would go to the same point, because if you get under 12:33what she was just asking, it’s, “Is your data on prem?” And when it’s on prem, 12:40how active is it across the enterprise? 12:44And so that begins—the basis for the start. 12:46And then often you’re going to say, “Well, we actually take in data from outside. 12:50And then we also have the circumstances—there’s a lot 12:53of PII.” And so that personal— 12:56“PII”? 12:57Personal information. 12:59And so now you’re saying, “Okay, now, how are we securing that? 13:03And where are we securing it?” And so you have to start really 13:07thinking about the different areas within that hospital chain. 13:12Are you sharing that amongst your hospitals? 13:15And now you start to think of, if I’m saying “No” to a lot of that, it’s like, 13:19“Well, then, are you as efficient as you want to be?” So there is that trade-off 13:24of, you know, “Am I so tightly walled that I’m not productive?” And so that’s 13:29where we would start to say, “What’s the outcome that you’re trying to get to? 13:33All right, maybe you’re good, maybe you’re good with your five locations and 13:37you don’t need to go any further, but maybe you want to expand to 50, and by 13:41the way, you’re going to go cross-border. 13:42You’re going to be in Toronto and in New York. 13:45Okay, well, then, how do you do that?” 13:48And so I think that it’s very easy to start jumping into any of the typical 13:54situations, but the first question that you have to ask—you as the hospital 14:00CEO—is what’s your objective; what are you—what are you trying to do. 14:04Because too often, what we see is that there’s some bright, new, shiny thing 14:09that everybody wants to put in play. 14:11You know, it’s a sandwich looking for a lunch. 14:14And you go, “Oh, but what is it that you want to do as this hospital? 14:17Are you doing research? 14:18Are you a research hospital? 14:20Are you more consumer oriented?” So those are the questions you start to 14:23ask, because they start to then tell a story, in line with what Kristy questions. 14:28And I think that that’s where the—again, the complement. 14:32Instead of just saying, “Oh, well, that’s—thanks for 14:34telling me all this, Malcolm. 14:36Here’s your 10-page strategy. 14:38Now go find somebody,” we have the benefit in IBM. 14:43And it’s probably why I’m still there—is, you know, we’re very unique. 14:46We’re the only company on the planet that has a consulting business at 14:51scale inside of a technology company. 14:53Mm-hmm. 14:54So we have—you know, the left brain, right brain; we’re able to do that. 14:59And then we’re able to say, “Okay, now which partners are going to be most 15:03valuable for our clients?” What’s going to work for you isn’t going to work 15:06for the manufacturer down the road, isn’t going to work for the consumer 15:10or CPG company, uh, across the river. 15:12Those things are very specific. 15:15The threats and the seams that I was talking about are very specific. 15:20So that’s where it becomes very valuable to make sure that I’m not just giving 15:25you some strategy that’s generic. 15:27But everything—as a healthcare CEO, everything I have done, almost 15:33everything I’ve done over the last 10 years—hasn’t it had the effect 15:37of increasing my vulnerability? 15:38I want to digitize data within the hospital. 15:41It used to be on pieces of paper. 15:43I want doctors to go home and to be able to seamlessly hook into stuff at work, 15:47because they gotta do all their paperwork. 15:49I want to make sure the diabetes people are speaking 15:51to the organ-transplant people. 15:53And so I’m—you know, isn’t that—everything I have done to, kind of, keep up with 15:58the revolution in healthcare—isn’t that also making me more and more 16:02vulnerable to, uh, a bad actor? 16:03It’s such a great question, ’cause think about the quality 16:06of healthcare delivery, right? 16:07So now doctors aren’t filling out forms; they’re spending time with patients. 16:11And so the quality of care is improving, and the vulnerability is improving, right? 16:15And so I think, um, that’s where having a strong cybersecurity 16:18strategy actually enables all of that. 16:21One of our products is our SASE product, and we tested it with 16:24some business applications. 16:25And oftentimes the rap is, “Oh, security is going to slow you down,” right? 16:28Like, you have to add a firewall, you have to add checkpoints. 16:31Our product actually increases the velocity of, of your ability to use that 16:35application because of the way that it is queried through our system, as opposed 16:40to just through a—the regular network. 16:42So it doesn’t slow it down, and in fact it makes it run more efficiently. 16:45Yeah. 16:46That’s just one minor example. 16:48But back to the healthcare question: I, as a patient, want my doctors accessing all 16:53the technology and talking to each other and connecting the dots behind the scenes. 16:56I also want my data to stay private. 16:58And so having both a consulting partner [who understands how to ask 17:04questions of the environment and of the applications you’re using and who 17:07understands the industry inside and out and a technology partner that builds 17:11and stays ahead of all of the different threats come together and advise 17:15you, I think is, is super important. 17:17When you bring in a partner like IBM, like—with a platform like Palo Alto that 17:22covers, you know, all the different, um, parts of your environment, uh, 17:27you’re able to say, “Look, where, where are the vulnerabilities in the system? 17:31Where are the different end points, um, that we need to have covered?” And then 17:35just make sure you get that breadth of coverage, and then you’re better 17:38able to—so yes, you’ve increased the risk, but then you’ve mitigated it. 17:42Mm-hmm. 17:42So to give—sorry, before I retire my healthcare analogy—because I 17:47was thinking about—I was trying to understand the importance of this, of 17:51this idea of having a single platform. 17:55So if this—my little healthcare network—is typical, I’ve acquired a whole series of. 17:59. . . Over the last 10 years, I bought a hospital over here; some—I got some 18:03physicians’ things that I snapped up over here; I bought a diagnostics company. 18:07And so I have all of these legacy systems. 18:11And I have—like you said, maybe I got some stuff in the cloud with one 18:14company, some stuff with the cloud. 18:15And what you’re saying is, the first step is to kind of rationalize that—put it on 18:21a single platform so you understand where your points of weakness are, as opposed 18:26to being blind to your points of weakness. 18:29There’s—yes, although anyone who’s done any kind of M & A knows that 18:35that’s a long journey, right? 18:37So I think the first step is just understanding where everything is. 18:41Yeah. 18:41And then you get on a path and you say, “Where’s the biggest risk? 18:43Let’s, let’s neutralize or mitigate that risk one at a time.” The thing about “open 18:48and secure”—you know, Palo Alto, we, we keep touting the benefits of the platform. 18:53Everything on Palo Alto, your risk is going to be mitigated and you’re 18:56going to have the full visibility. 18:57But you can’t get there overnight. 19:00And so we’ve got, you know, thousands of integrations with other technology 19:04companies, including our partners, to, to make sure that we can capture 19:07and have visibility into those end points and those systems as well. 19:12And so I think step one is just figure out where everything is. 19:14Just get the scan. 19:15So Palo Alto has a couple of products where you can kind of deploy and 19:18get a view of your attack surface. 19:20I love the analogy: just like a digital environment as a house, right? 19:24And so, like, you have your front-door lock, of course, because probably 19:27they’re gonna try the front door first. 19:29But that’s not all you’re gonna do, right? 19:30You’re gonna make sure the whole—you know, the windows are locked, and 19:32there’s an alarm system and all of that. 19:35Um, and, uh—and I think that’s how you have to think about it, is: just 19:38how do we cover the whole surface? 19:40So everyone—laypeople like me have been bombarded, over, it seems like 19:44over the last year, with one thing or another about how quickly AI is moving 19:49forward and how big of a deal it is, suddenly is going to be, in the economy. 19:53What is the impact of that dramatic change in AI’s capabilities 20:00on the cybersecurity question? 20:03So what does it mean if you’re defending somebody that you now have these 20:06sophisticated AI tools at your disposal? 20:09I think that AI becomes the force multiplier for cyber. 20:14To think about cyber before—it was just locking your doors. 20:20Locking the windows. 20:21And if you were really good, you had an alarm system, you know. 20:26Now, with AI you can say, “Well, I can predict what’s going to happen. 20:32I can see around the corner. 20:33I know I can leave my windows open upstairs, and it’s fine, and it’s okay.” 20:37You mean—why? 20:38Because the AI is running a million simulations? 20:42It can, and that’s exactly it. 20:44It becomes the intelligent part of that AI. 20:48It’s not artificial, it’s augmented. 20:50So you now have this new capability to see around corners. 20:54And so you’re able to do the jobs of yesterday more effectively, of—and the, 21:00the, the queries that you were doing. 21:03And that’s all you’re really doing. 21:04Now you’re doing them, you know, faster. 21:07You’re able to access even more data, and you’re able to then make it more secure. 21:13So that’s why AI becomes a force multiplier. 21:16Yeah. 21:18And let’s talk about the “faster” part. 21:20What does “faster” mean, in practical terms, if you’re trying to defend 21:24an enterprise against a cyberattack? 21:26Why does speed matter in that environment? 21:29You’re always trying to find a pen . . . a place through. 21:32I go back to—you brought up the Army. 21:34You always. 21:35. . . How do you break the line? 21:36How do you find a penetration point? 21:38And when you think about, you know, pin testing, penetration 21:41testing, where are those? 21:43So if you’re able to do that faster than the bad guys, and—not only faster, but 21:47you’re picking more-probable points. 21:50This is back to the intelligence. 21:51I could waste time doing penetration testing someplace where—that’s why 21:55I mentioned, if they can’t get in the second-story windows, why are 21:59you spending time trying to . . .? So that becomes more effective. 22:03So that’s when I think of speed. 22:05That’s what I think of, because with—not just speed. 22:08I think it’s also what’s effective. 22:10Just to put a, put a fine point on it. 22:11So I found a way in. 22:13Okay, now what? 22:14I don’t know where the jewelry is, so I have to look around and 22:16see if there’s any, uh, hidden gems, and try to find my way. 22:19That used to take a week, two weeks, or 7 to 14 days. 22:23Now it’s hours, right? 22:24So they’re in and they can actually exfiltrate data within less than a day. 22:29The metric we use in the security operations center is “mean time 22:32to detect” so—to see anyone’s there, “mean time to respond and 22:35remediate” to get them out, right? 22:37That used to be also, you know, 7, 8, 9, 10 days. 22:42Now it needs to be less than an hour. 22:45Uh, and with our AI-based security operations platform, it is. 22:50Now you’ve got one tool that’s—whether, whether it’s all Palo Alto Networks or 22:53whether it’s just, you know, “hoovering in” data from other places, then 22:56you’re able to see it all together. 22:57So you actually get fewer alerts. 22:59So you get from thousands of alerts down to a hundred alerts. 23:03Right? 23:03And you can investigate them, and you investigate them using AI too. 23:06And AI is, is today—it’s today’s threat, but it’s—you know, you 23:10think about threat and opportunity, you think about what’s next, you 23:12always have to be kind of evolving. 23:14And you have to think—we talk about threat and risk. 23:17You know, we didn’t talk, you know—what is the cost of 23:20cyber—some type of penetration. 23:22You know, the typical cost is about four, four and a half million dollars. 23:27Uh, and that’s just in labor and remediation. 23:32If you think about reputational risk as well—our Institute for Business Value 23:37did a study and found that in 2023, there were 39 banks that, that we watched, 23:42that, uh, suffered a reputational risk. 23:46A market value of $130 billion. 23:49And so you start to think, wow, that’s just reputational risk. 23:54Mm-hmm. 23:54So that’s what’s at, at stake here. 23:56It’s, it’s—and that is only going to get bigger. 23:59Yeah. 24:00So one of the pieces we haven’t talked about AI that I find super 24:03interesting—because we’ve been talking, essentially, about, 24:06um, like the Terminator, the robots fighting robots, right? 24:08Like, whose robots are quicker? 24:10Like, I’m designing attacks and I’m defending against attacks. 24:12And I think that’s, that’s super important. 24:15But, uh, we recently launched and are working with IBM on our AI 24:19security product to actually secure the use of AI, because it also opens 24:22up another set of threat factors. 24:23Um, I’ll give you an example. 24:26I’m a marketing executive, now, for your hospital, so I work for you. 24:30And you want to announce the launch of a new center. 24:34And so I upload all the information about all the patients and our—you 24:38know, how we do things—into ChatGPT to write the PR for me. 24:40Well, I’ve also just uploaded to ChatGPT a whole bunch of secrets, right? 24:44So, um, it’s, it’s how employees are using AI. 24:47Because I think, you know, some companies are sort of building their own language 24:50models and their own AI applications that they want to keep secure. 24:53Others are just curious about how their employees are using 24:56AI applications on the shelf. 24:58And so we announced in May a product where you can actually scan and see how 25:03AI is being used in your enterprise. 25:05And within—we, we made the announcement—the GA was last month, 25:08but we made the announcement in May. 25:10And we had immediately thousands of CIOs signing up. 25:12Because just understanding, you know, who’s using what—it’s 25:16another open question. 25:16Because, you know, we talk about AI enhancing productivity and all the 25:20benefits it’s gonna bring, but it brings, it brings risks, not just 25:23in how it’s being used by the threat actors, but also, you know, what 25:27other vulnerabilities it exposes. 25:28Is the AI that you—does that system tell you what is a problematic use? 25:34It does. 25:35So, it—what, what it does—and you’ve got to train it, right? 25:38But what it does is say, “This is—this is outside of your policy.” So CIOs 25:42will set policies on, “Here’s what is acceptable and not acceptable use.” So 25:45we’ll be able to scan and say these—these following uses are outside of policy. 25:49And then it’ll say, “I think this is too restrictive; I think this is too 25:51permissive.” And then you can sort of update your policies from there. 25:55That’s just sort of the visibility piece. 25:57And then there’s the run-time piece, which will actually stop you from using it. 26:00So you go and say, “Okay, here’s all my patients’ Social Security numbers. 26:03I’m going to upload them to ChatGPT to, you know, get an understanding 26:07of, like, where they all live.” I don’t know what—why you would possibly 26:11do that, but let’s say you were. 26:12And then, um, you know, it’ll note, “That looks like a Social Security number. 26:15You can’t upload that into your prompt.” 26:16Oh, it will stop you before you—a thoughtful voice over your 26:22shoulder, just to remind you not to do something silly, yeah. 26:25Exactly. 26:26But this is—just talk a little bit more about adding AI into this mix. 26:31You say it’s a “force multiplier.” It’s a really interesting—just dig into that. 26:35What—other, other instances of what that means. 26:38How does the balance between AI and, um, human expertise work in the, kind 26:46of, next generation of cybersecurity? 26:48I think the, the common way to look at it is, back to the force multiplier—it’s, 26:55it’s not going to be “Is your AI better?” but “Can you use it better? 26:59Can you ask your AI the right questions? 27:02Are you well trained?” So the competition really becomes your use of AI. 27:07And are you pointing it in the right direction? 27:10You have 50 people. 27:12Can they do the work of 250, and can they do it in a safe and secure manner? 27:18So you’re not opening up more risk based on—or too much risk, as your risk 27:23tolerance, in order to get the outcome. 27:25So that’s why I think there’s the opportunity. 27:28And so you see this truly as a force multiplier, because the first thing, 27:32people go, “Oh, you’re going to get rid of people.” No, the people 27:35portion is still—still going to be just as important, because they’re 27:40doing that other piece of work. 27:41One of my favorite statistics is that there are now more 27:44bank tellers in the U.S. 27:45than there were in 1960, before the ATM was invented, right? 27:49So—but it used to be, you would go to your bank—because you had to, I remember 27:53doing this!—you’d go, you’d fill out your deposit slip, you’d hand it to the 27:56teller, and they’d give you your cash. 27:58And then ATMs were invented and it was like, “Oh, no, what’s going to happen to 28:00all of these jobs?” And now there’s more. 28:02But you’re not withdrawing money from a bank teller; you’re doing 28:06more-sophisticated transactions. 28:08I think it’s similar with AI, right? 28:10Like, you want people doing things that only people can do. 28:13The human element remains absolutely central in all this. 28:16Um, how do you make sure that your cybersecurity folks are equipped to handle 28:23high-value tasks—are, sort of, ready for this increase in responsibility? 28:27There’s a couple ways to answer this, but I think the more you’re able to automate 28:33the routine and the mundane tasks. 28:35For example, the bulk of cybersecurity happens in the security operations center. 28:41There’s analysts who are sitting in that center. 28:42If they’re spending all day either configuring, um, alerts or 28:47responding to alerts, they’re not able to do the advanced sort of 28:49threat hunting and analysis work. 28:51And so I think a big chunk of it is just freeing up their time to be able 28:55to do the more-advanced strategic work. 28:58Um—and a lot of the automation tools based on AI, like our Cortex XSIAM product, 29:02um, is, uh—it’s designed to free up their time in order to be able to do that. 29:07And from our perspective, it’s making sure that—it’s a requirement to make 29:12sure that you have the qualifications. 29:14Because people can easily get used to doing what they’ve always done. 29:18And “That’s, that’s what I do.” You say, well, no. 29:22All the threat actors are learning on the fly. 29:25They’re trying to always outsmart you. 29:26So it’s in your best interest, our best interest, our clients’ best 29:30interest, and partners’ best interest, that you are on the front-leading edge 29:34of that, that learning capability. 29:36If you’re talking to a client who wants to develop a kind of unified 29:40cybersecurity strategy, what’s the best single piece of advice you can give them? 29:48You should have a single platform. 29:51It’s hard not to answer that, but it is true. 29:53I mean, all joking aside, having um, you know, the, the best-of-breed solutions 29:58that are all talking to each other and able to stitch together, uh, and identify 30:02threats before a human might be able to. 30:04Um, that’s number one. 30:05And number two, uh, is making sure you have visibility on all elements. 30:09So, uh, you’re able to cover your whole environment and understand 30:12how people are accessing it. 30:13I’d say, “Think like a bad actor.” Always think “outside in.” Because you 30:19get comfortable the other way around. 30:22You guys work together on a—with a Fortune 500 company, and I’d love for you to talk 30:28a little bit about—to use that as a kind of case study for what this collaboration 30:33between the two—your two companies looks like when you work with a client. 30:37It really was, you know, IBM leading on a digital transformation for 30:41this, this client that wanted to move their applications into the cloud. 30:45And so you’re asking a lot of questions about, “How does AI increase the, 30:48the risk in the surface area?” Those same questions 10 years ago were 30:51asked about the cloud, and, and we’re still on the journey where, where 30:54companies are migrating to the cloud. 30:55We’re not anywhere near finished that yet. 30:57And so there’s two pieces to a cloud migration. 30:59One is just refactoring for the cloud, to make sure the application 31:02works effectively in the cloud, and the second is security. 31:04And then you built in security by design, using Palo Alto’s Prisma 31:08Cloud products, to make sure that not only did you have the visibility—so, 31:12our cloud product—you can scan and see where the vulnerabilities are. 31:15And then there’s also, you know, cloud firewalls, essentially, 31:19that will keep bad actors out and keep the cloud instance secure. 31:24If we sit down and have this conversation five years from now—which I actually 31:28hope we do; it’d be fun—so, let’s go, let’s, let’s, let’s pretend it’s 2029. 31:35Tell me, what are you happy about in 2029? 31:37I think 2029, quantum computing is mainstream. 31:43I think quantum computing is now quantum safe, where we’re using quantum computing 31:50to make sure that those bad actors aren’t as bad as they used to be back in 2024. 31:58And that we’re—we’re seeing around the corners, and that we’re empowering 32:02our Palo Alto relationship that, in 2029, is the premier type of 32:09capability that people are looking at when they think of what used to 32:14be AI and now is quantum capability. 32:17Yeah. 32:18Yeah. 32:19Kristy? 32:19I think for, for AI, everyone’s just using it as part of their job. 32:22The way email was an innovation in the ’90s; the way, you know, cloud 32:27was an innovation in the 2010s. 32:29And we thought, “How are we going to use this? 32:31What impact is it going to have on, on productivity? 32:33All these people who are spending their days typing up memos, like, what 32:36are they going to do?” We’re going to be past that fear, and we’re all 32:39going to understand that it is this, like, truly positive force multiplier 32:44for—you know, every employee is able to do their best work and, and spend 32:49their time on, on the things that only they can do, and then the AI is doing 32:53the rest of that for them, right? 32:54AI is going to enable many things to work together. 32:59It won’t be just one language model. 33:02We won’t even think about it. 33:03It will be the difference between, you know, Malcolm having 33:07a fax machine, a stereo, and a telephone, and a—and a memo board. 33:12Now it’s in your pocket and it’s all one thing. 33:15And you don’t even call that—you know, I said “Walkman” to my kids the 33:18other day and they’re like “What’s a Walkman?” Um, so I, I do think it 33:22will, it’ll be part of the past, and it’s—it will be this thought of this 33:26seamless connection—that is, secure, seamless connection of HR, of finance, 33:32of distribution, logistics, of billing. 33:35All of those will have a capability to work together. 33:39Yeah. 33:40I have to do some social quick-fire questions. 33:42Are you guys ready? 33:44All right. 33:46What’s the number one thing that people misunderstand about AI? 33:50The reliance on data. 33:52What do you mean by that? 33:54I think that it’s just assumed that it’s happening and it can 33:57just go out and grab data anywhere. 33:59Oh, I see. 34:00Yeah. Oh, I see. 34:01Yeah, yeah. You have to have good data. 34:03Reliable data, and access to the data. 34:06I think people are too afraid of it. 34:08Chatbots and image generators are the biggest things in consumer AI right now. 34:11What do you think is the next big business application, Jason? 34:15I think it’s the tying together of multiple capabilities. 34:18I, I hinted towards this earlier—is that—I think tying together the disparate 34:22systems that sit in different parts of the organization—front office, back 34:25office, making it one office—and tying together those different functions. 34:29That’s it. 34:30For me, it’s workflow automation. 34:32I think, back to your point on . . . the reliance on data seems easy. 34:35It’s a lot harder than you think. 34:37Because you have to have everything set up in exactly the right way to get 34:39all of your systems automated, and the more-boring jobs taken care of so that 34:44humans could do the strategic ones. 34:47How are you already using AI in your day-to-day life? 34:52I mean, I use it at work all the time. 34:55Um—and then I’ve found, right now, I go to ChatGPT instead of 34:59Google, uh, to look things up. 35:01I like having a conversation. 35:03We have a wonderful, uh, capability in our consulting business called, 35:07uh, our consulting assistant. 35:09Uh, uh, Consulting Advantage is the proper name for it, but I 35:13look at it as a, that assistant. 35:14It, it’s a force multiplier for me, so if I need to, to, to pull 35:18together content, proposals with the teams, we go straight to that. 35:23We got one more. 35:25We hear so many definitions of “open” related to technology. 35:28How do you define it, and how does it—the concept—help you innovate? 35:32By definition, in cybersecurity, you don’t want to be too open, right? 35:36So I think we enable openness, um, with this concept of “zero trust,” and saying, 35:41like, everyone’s invited in as long as you have the right credentials, right? 35:45So that’s, that’s one way. 35:46And then the other way is just making sure you’re connected to all the different 35:49systems, uh, in order to be able to have that visibility and see what’s happening. 35:53Because if you are blind, um, that’s the minute you have that vulnerability. 35:58Yeah. 35:59And I’d say it’s moving quickly with security. 36:04It sounds contradictory. 36:05“Open. 36:06Oh, then it means you’re not safe.” No, you are safe and you can move faster. 36:10Yeah. 36:10Thank you so much. 36:11This was fun. 36:11Thanks a lot. 36:12This was great. 36:13We’ll see you in five years? 36:14Yeah, five years. 36:15See you in five years. Yeah, that’s right. 36:17Man, I’ll be old in five years.