BlueXP is now NetApp Console
Monitor and run hybrid cloud data services
All right now, just like last time, this is a smaller session. So if you're in the back, come on up. We do have people watching online. And this is also being recorded for on demand as well. So there's always an audience. But show your panelists some love by coming up from the back. I know some of you are starting to come on in. That's great file on in. This is going to be a really great piece of your day, because it's really something that's super important, and we know how important it is because it's security, something that we've been talking about a lot at NetApp INSIGHT, and we'll continue to do so and lead in that way and keeping the user in our organizations safe from bad actors and accidents that can happen in this crazy tech landscape that we're moving very fast in and from here on out. For the rest of our customer jam sessions, we're going to be bringing in a very special guest to lead the proceedings and facilitate the conversations in these jam sessions. I'm really excited about this. You should be excited for her too. She's a big deal. She's an acclaimed online TV personality, commentator, interviewer covering the tech industry and an all around awesome human. Please welcome our amazing moderator, Lisa Martin. Thanks, Mario. Hi everyone. Good to see you! Hello INSIGHT. Happy Tuesday everyone. I am so thrilled to be with you here today. We're going to be anchoring a very important conversation about an issue that all of us are paying so much more attention to today: Security. You all know data is the core DNA of operations across industry, across government, And the stakes really have never been higher to protect it. With increasingly sophisticated cyber threats, organizations need robust security strategies. They need innovative technologies and solutions, and they need forward thinking leadership to ensure data protection and resilience. In a moment, I'm going to be joined by some real experts whose IT factor is that they are absolute powerhouse technology leaders. They're going to share insights with you. They're going to talk about how they're partnering with NetApp to strengthen threat detection and response. Action zero trust and leverage AI powered threat detection and more, both internally and externally to their customers. But before we talk to them, take a look at this. From ECS. Please welcome Vice President, Department of Defense Cybersecurity, Mark Maglin. Come on in, Mark. From General Dynamics Information Technology or GDIT, Chief Technology Officer, Federal Civilian Division. Michael Cole is here. Hey, Michael, come on in. And from IBM Cloud, Director for Cloud Product Management for Infrastructure as a Service. Jay Jubran. Welcome, Jay. Oh, Jay's got a fan club here. Have a seat guys. We're going to get y'all fan claps by the time we're done here. Question one goes to all of you guys. Obviously we talked about the incredibly important topic of security. Mark, we're going to start with you. The cyber landscape has changed dramatically recently. Talk to us about the state of the current cyber threat landscape. How is it affecting data protection, enterprise data protection from edge to core to cloud? That's a great question, Lisa, and thanks for inviting me here and be able to talk to everybody about security and what we're doing and how we're using NetApp to secure some of our nation's greatest assets and the mission that we do. I see it as two separate aspects. One is the threat actors and the other is the cyber terrain. On the threat actor areas, we're seeing that the cyber criminals are getting more emboldened, quite honestly. Used to be honor among thieves, thatwas a victimless crime with ransomware. But we're seeing more attacks within the healthcare system, IoT, critical infrastructure, and it's no longer a victimless crime. There's actually actual lives are being put at stake. And so that's a critical mission that we all have to do to work on. It's also a political consideration on how we set the policies and go after these cyber criminals. The second part of that, too, is from the threat actor perspective, are the nation state actors. Those are always going to be a threat. And espionage has been around for as long as there's been nation states out there. So that's expected. But what kind of is encouraging is what we've been seeing in Ukraine right now is that the resilience of the network from the Russian attack. So it's been a collaborative effort with all our allies, but we're doing a great job on that and taking a lot of lessons learned. But it's encouraging to see that the Ukrainians are able to continue using their networks and get on. So and then we always have the insider threat vector that is a concern for all,companies and the government too. So from that, the threat actor from the cyber terrain and as you're saying, from edge to core to cloud, you know, we're shifting to a zero trust architecture where the assumption is, that the adversary is already within your network. We don't have that big wall castle wall around us anymore. And then it really comes to protecting the data. And that's where within that app, that is where all your data is, all your data is going to be there. So that's that.makes it a very critical mission. But part of that is we go from the edge to the core to the cloud is our attack services are getting huge, right? Because without that boundary protection, you know, we have a very large attack surface. Definitely. You mentioned ransomware. And Michael, I want to get your opinion and then Jay, on the same question. Ransomware became a household word I think when the Colonial Pipeline hit. But it's also become a no longer are we going to get hit. It's when. It's how often. It's to what extent. What are you seeing, Michael, from the threat landscape perspective and its impact on enterprise data protection edge to core to cloud. Yeah, absolutely. I mean, when you think about ransomware, right, there are companies out there now that do ransomware as a service. I mean, anybody can go hire them. You got 25 bucks, you hire a service, they're going to bring that ransomware. So it goes to what Mark said is the perimeter is changing, right. It's getting bigger. I mean, COVID happened. We all went home. We had to figure out how to work so we can now go and work from anywhere, right. Our customers in the federal civilian part of public sector work from home, but they're also working on vacation at an Airbnb. So we have to make sure as people that we are cyber aware, right. Everybody in this room and everybody online is now a designated cybersecurity officer. Right. We have to make sure that we are aware. Right. It went from let's if I see something, say something to being that cyber aware of what's going on, you've got to watch out person behind you.got to worry about what you're connecting to so that as we've gone from that, like you said, from edge to the core, we really have to think about where are people are interacting in the mission that they're supporting and making sure that we're protecting it, using zero trust architectures, using the right technology stacks that make us ransom resilient, I believe, is the word that Harv used earlier. Right. So making sure that we're. Taking that into account so that we're providing the right technology to get the power from it. 100% . Jay, let's bring you into the conversation. What are your thoughts? Sure? Lisa, thank you for bringing me in. The customer base that we targeted, IBM and IBM Cloud, is very similar and symmetric to what NetApp targets, which is a large enterprise customers who are very concerned about security and the cost of security breach isestimated about for each event about $5 million for a financial services client. And since that type of client we focus on the security from edge to cloud is very important. Now we're lucky that in the cloud that we have, we have some control over what the client can do and cannot do. So that gives us the ability tonavigate through security. So the way we build our infrastructure, it's secure at the core. It's resilient and it's compliant. That's those are the three metrics that we built IBM cloud around. And it was inspired by the financial services sector. We brought in roughly 150 banks that were part of our financial services councils. That kind of guided us, put some of the controls in our cloud and therefore when a cyber attack comes in, the bank knows what to expect and knows what to do. It's important tosecure the edge. But it's also critical to control the infrastructure in the cloud. So just to give you an example, at the bottom layer we have nine regions, ten regions across the globe. They all connected with a private network, meaning that the customer data never leaves our IBM cloud private network if they choose to. If they don't want to egress, they don't have to. Then we build the infrastructure above that, including that app storage that is built for resiliency, meaning that you have confidential compute, you have infrastructure that designed to sustain some of the vulnerabilities that we see out there, like you saw in the last couple of years with Log4J, et cetera. And then we build our software platform above that,has security embedded in it. And then we build the mission critical applications like VMware, SAP, HPC, all the workloads that were heard yesterday and today in the keynote, those are sitting on IBM Cloud. And since those are all mission critical workloads, we secure them the same way we secure our own workloads. For IBM, that's our strategy is to build the platform resilient, take in the threats if they come, reduce the blast radius such that if an actor got into the cloud, it stays maybe in the VM level or the server level, it doesn't take down the whole data center. And that's an important design point for us. That's incredibly important design. I mean, you mentioned all mentioned cyber resilience. We talk about this all the time, right? It's a journey to be able to get there. You're all involved in very critically important programs across industry, across government. For example Mark, I want to highlight you for a second. And then Michael and Jay, the US Army entrusts ECS with the task of protecting - get this - more than 1.4 million endpoints across the Army's entire global infrastructure, which is the largest, as Mark shared with us the other day, Trellix endpoint security environment in the world. I'd love to hear from each of you about a key customer solution - Mark, we'll start with you - where security is at the forefront. Mark, we'll go with you. Sure. And again, our company, ECS, we work with our customers and partner with industry to really solve complex problems. So the business drivers for the Army a few years back was they had aging infrastructure, end of life appliances, but also very fragmented network. It was grown up overtime and a lot of stovepipes for information and not a lot of standardized security protocols from one site to another site. So the Army wanted to consolidate all that into an enterprise managed service. So when we went to do the initial design, we kind of looked at how would we deploy this and kind of very similar to the what we were talking about, the IBM Global Cloud. We had to have a global infrastructure to be able to work because, again, the Army is globally deployed. So we had we came up with an east west continental US Conus sites and then three overseas sites that were all networked together using again the NetApp appliances for the basis of the storage. And we were able to standardize and migrate and consolidate a whole bunch of different legacy systems and contracts onto that system, and then continuously innovate over the course of the contract and having the flexibility, because it's all about storage. And storage and security to be able to increase that storage as needed. And what's been very helpful throughout this is the partnership with NetApp along the way from the initial design, through the implementation, and then also the operations of maintenance. Everything breaks and but we've been very fortunate that we've never missed an SLA. We've never had any downtime related to thenetwork, the NetApp appliances, and the security behind that. And then we were very fortunate that we had a 1R recompete contract last year, and the first thing we needed to do was to do a global tech refresh of our systems starting. And we had a choice. You know, we looked at the best of breed and of course that was NetApp. So we went ahead with that. And again, global tech refresh without missing a beat. No downtime, nogaps in coverage or security. You know, we rebuilt the airplane in flight and kept on moving. Sounds like NetApp is helping you sleep at night. I'm kind of jealous here. Jay, let's talk about you customer security solutions at the forefront. You did a great job of describing all the thoughts and resilience embedded in the IBM cloud platform. But give us your thoughts here. Sure. I'll start with the data point. I like to do that. 90% of the successful attacks come from endpoints. That tells you how important they are. And 70% of the breaches start at the endpoints. And by the way, most of the cyber security threats and problems that we see in the enterprise is caused by human beings. So really for us, we're lucky because a cloud is all about automation. So in the cloud, we automate as much as we can to prevent the humans from touching the code or from touching the servers. And that helps. But also you have to start at the end. Right. At the end you have to put the virus protection just like you talked about. Mark. You have to do MDM management, mobile device manager. You have to put a firewall. You have to educate the users what to click on and what not to click on, what to download, what not to download, all that encompasses a solution for the endpoint to prevent that 90% of that tax that's coming from that side. I once saw this as a funny little anecdote from a sticker, and it said "Humans: Ruining everything since forever". But that's one of the biggest challenges. Michael, what are some of the things that you were seeing? So it's interesting within in our portfolio and what I thought about this question, there are so many areas where we focus on delivering really mission critical applications. And they all have cyber at their core, that we have to protect. So what's relevant to the people here in the room is we do a lot with FAA. So you think about the number of airplanes that are in the air at any given time. You think about the networks, the communication gear, all the things that have to happen to make sure that we can get from point A to point B safely. GDIT is involved in a lot of those different components. And the other side of that is we recently just built high performance computing for NOAA. We're delivering new weather models through those systems. Right. And we have to protect that to provide that information to us, to provide citizen safety in the sense of making sure that you know when a hurricane is coming, when the weather is going to be bad, and maybe you shouldn't go out, or do you just need an umbrella, right? But you got to protect that at the same level that you protect the tactical edge in defense or in Intel space, right? It's the exact same requirements that we're dealing with in the federal civilian side of the market. It's all mission critical. I think it's so great to see just the differences in industry and government that we're talking about here. I want to now double click and get insight from you, which I think is - pun intended, I had to say that - on your collaborative partnership with NetApp, how the alliance is really enabling you guys to design and deliver some of the most innovative and security critical solutions. Michael, we're going to start with you and then Jay, and then Mark. Great. I love this topic. It's the partnership right. The technology is great. And we heard today that security is built in there. Right. And then when you align that with GDIT's understanding of our customer missions. We are delivering highly secured solutions that are meeting their needs today and being ready for tomorrow. Right. This is how we extract the power of technology is through partnership. And when it doesn't go right, they don't walk away. That's the key thing. They're in there with us rolling up their sleeves, figuring out how to make something work correctly. Right. So that we are delivering the mission value to our common customers. Absolutely critical. Jay, talk to us a little bit about IBM, NetApp, long time partners. Give us that backstory. I think I see our NetApp team here, they're great. Our team that supports IBM. Your fan club. Yeah. Theykeep pushing us to new solutions, offering a new ideas, which is great. That's what you expect from a partner. Today we use NetApp for our block file storage. And we're enabling this year CVO, which allows us to bring the software defined storage, which many customers can use to migrate workloads from on prem to cloud. Like I said in the beginning, most of the customers will run that app on-prem, probably have a relationship with IBM of some sort. So having that relationship and understanding that customer pain point and solution for it. I think it's a win-win for both companies. It's a win-win-win the customer as well. Mark, you mentioned some of the synergy with the NetApp partnership. Expand upon that a little bit. Sure, absolutely. One wouldn't be here today if it wasn't an outstanding relationship. We like you. We might have invited you. I would have been out there you know, listening in, but no, it's great. And again, some of the complex problems that our company has solved and through the partnership with NetApp is we deliver the IT ops for the Defense Health Agency for 170 medical treatment facilities and that network relies on the NetApp storage. We also work with the Navy to provide their public safety net. So all the incident responders globally at every Navy base. We've developed a system that they communicate on and that resides runs on top of a from a NetApp perspective. And then we do also a lot of work with the FBI and have a relationship there. So we talked a little bit earlier about the USS system and the partnership and the services and everything. And the technology works absolutely best in breed, but it really does come down to the people. And that's where it doesn't stop. You know, I've worked with vendors that they made the sale, and the only time you hear from them is when the renewal comes up. So but NetApp has always been with us, stepped along the way and provided excellent support. So I appreciate it. What I've heard from all of you is synergy, symbiosis, collaboration. That's exactly what you would expect from true partnerships, right? Let's talk about - Jay, I want to go to you and kind of dig in on the emerging technologies AI front. Talk about the importance of emerging and cloud technologies as part of an overarching cybersecurity strategy and helping organizations really achieve what they need, which is that offensive cyber posture. Right, yeah. So going back to our experience with our customers and how we build our resilient, offensive approach forcyber security. We started with we started a concept three years ago called Industry Cloud. And our first one was Financial Services Cloud. We coined that term as a financial service cloud, thinking that if I'm good enough for financial services and I'm secure enough for financial services, I'm good enough for regulated industries, I'm good enough for government, and therefore I can expand my business across all, right? The elements in terms of technology is first of all, the relationships with the banks, which I described. We have a council thatguides us and co-create with us. We also created the Confidential Compute Zone, which allows customers to secure not only their workloads but also the infrastructure, meaning that how do I know that the server that my workload is running on is my server, not something that's spoofed by somebody else, right? How do I know that the image that the server booted from is my image? All these, all these elements go into confidential compute to make sure that we have security on the server side, physical security in the data center, security on the storage for encryption. And also we introduced a concept where we allow customers to encrypt their data and keep their own key, which is very unique, that IBM even cannot get into your data because you have the key. And we only just serve in your database on your authentication. This is supported through our Hyper Protect product, which is part of kind of we borrowed fromIBM mainframe technology that they have and they secured for years. And financial service customers use it. And we brought it into IBM cloud to improve our security posture. Michael, share with us what GDIT is doing to really get on the offensive from a cyber resilience, cyber posture perspective. Yeah. So when you think when you looked at that through the context of emerging technology, one of the things that GDIT did earlier this year, we actually went out and surveyed our customers. We wanted to know how are they looking at emerging technology, how are they looking at these innovative things coming in? And when you're dealing with the federal government, there's a lot of legacy. We'll just say it that way, right? There's a lot out there. But 65% of the people who responded said, we want it. We want emerging technology. And as you dug into that, it's because emerging technologies are being built for a purpose. They're not just coming out and saying, hey, I want to do everything IT. They're identifying a problem. They're leveraging cloud native. They're leveraging innovative technologies that are available to them today to bring unique factors in that are actually answering that cyber resiliency, that cybersecurity posture question that every one of our customers has. So it's really good. It's called Seats of Change. It was a really interesting article. I think there's a lot more to it there. But out of those 65%, over 50% of them were like, yeah, it's because of cyber. That's a big cultural shift. Mark, what are you seeing in terms of cloud and emerging technologies and the impact on becoming offensive? It's all about the data. And especially in the cybersecurity world, we're generating huge amounts of data, not only event data and logs and everything like that. And when you expand that out to a million endpoints, that starts piling up. It's but it's also being able to have visibility into your network to understand what is connected to your network, the health of that, the compliance checks that are required, but also that also lends to the vulnerabilities to be able to identify the vulnerabilities of what assets are need patching. And then we have a DoD has a program called Comply to Connect that takes that information and makes decisions on whether you or you can connect your device, whether your device is authorized, whether it's up to date, whether you are unauthorized users, what data that you can access, and the controls that are involved in that. And then from the cybersecurity perspective, it now comes down to threat data. So again we're generating a lot of threat intelligence. We bring in a lot of threat intelligence from different outside sources. Some of those are public sources. Some of those are DoD Intel sources. And we need reliable data, secure data, and we need it fast. And that's where the analytics come and where the edge computing comes is being able to get the data, run your analytics and give the decision makers, whether they're thetier one analyst that's answering an intrusion event, or the Generals that are making strategic decisions and being able to give them complete visibility and have the information advantage to be able to take that to the mission. Well, right. Visibility and thatdata being now real time is no longer nice to have for any organization. You guys have kind of touched on that I want to move on to we've got to talk about AI, right. Let's talk about Jay, we're going to talk with you first here. How does NetApp storage infrastructure really help pave the way for future looking capabilities like AI? So like I described, NetApp is our core infrastructure for storage today. So it works on all the workloads that run in our VPC cloud, which is a virtual private cloud and other parts of our business. But to talk about the AI journey and how does that fit into cybersecurity? I think we won't do this panel justice by not speaking about it. You know, I'm passionate about it. So in terms of AI security, it's not just the security of your data, it's the security of your model. So let me just walk you through four steps of AI. You collect a large amount of data from public sources. You aggregate that data. You filter it. You remove hate, abuse. You know, anything that you don't like in the data. You remove duplication, you remove personal information. But you're left with some sentiment. That is public data. You're scraping it off the internet. So that's a risk that sits in the model itself. And you can't get rid of that because you didn't build the model as a customer. Now you bring that model after you build it, and then you bring it home and you want it to train on your own data, and now your own data is clean, right? Most likely it doesn't have bias, abuse, hate language. So that's safe. But still the model decisions are based on the original training. So how do you make sure that if you're doing loan processing for example, using AI, how do you know that the model is not biased to a certain segment of the society? And that's what's what I think introducing a lot of risk in AI and making companies think twice before they put it in front of the client. Now, what I'm seeing people experimenting with it today is because it's powerful. I don't want to take away anything from generative AI. I think generative AI is going to change the world the way we see it today. It's going to touch every piece of our life, including how you travel, how you book a trip, how you interact with your kids, your college everywhere. Right. But I think the security of that and the trust of the AI is going to be critical. So for enterprise customers who are going to try and use generative AI, where would you go? How do you trust that the model that you're using is does not have those characteristics that you don't want to put on your customer? I think that's so critical for us to think through. So data security is not about your data. It's about the data that the model was trained on to. That's a great point there, Michael. What are some of the things that you were saying from a NetApp perspective and really helping organizations? Yes, I mean, it's really great when you talk about the AI and the way he's talking about the data, it's great to partner with the company that's putting that first. Right? I mean, we've heard over the two days so far in the keynotes that data driven decisions are the key part of their infrastructure. In that they're looking to enable AI. And I think we heard yesterday it's expensive. Not everybody can go out there and train a large language model. And we're dealing with customers that have a set budget, right. And they certainly don't have the money to do that. So looking at how do we secure the data and how do we secure the models that are going to be on top of that is what the customers need, especially in the federal civilian and the public sector, because they've got to use it. They're all asking for it. It's a force multiplier wherever you implement it, right? Whether it's in cyber or other places of it, that full force multiplication is what they're looking for because we've got to be better, faster, cheaper than the next guy. And the government is constantly looking for partnerships with like a NetApp with the audit, with the NCS to make sure that they are bringing in those technologies that are really going to drive home those solutions for them. Absolutely. Mark, what are some of the things that you were saying, NetApp storage infrastructure, AI capabilities as an enabler? Sure. So ECS is one of the largest providers of AI to DoD right now through several programs that we're running and including what we call the AI forge. And as Jay was talking about, it's all about bringing in the test data, being able to test that in a secure environment, validate the models, and then what we do and working in a for the DoD is evaluate different models, we give them challenges and evaluate the different models. See which models work best. You a little bit of competition there always helps. And then bring those models in to test it on the high side and be able to bring in the actual data, be able to provide feedback, and have a continuous development and integration model that we continually update the models, because a lot of times we'll go bring those models out to the field on different devices on the edge and be able to evaluate, and we'll get instant feedback of whether those things are working or not, and very critical missions that we're supporting out there. So and then being able to bring that and then tweak those models to be able to make them more efficient. And then on the cyber front, and this goes to the actual implementation of the models. There's too much data out there. We'vetried data lakes where we want to bring all the data into one giant repository. Great for NetApp - sell lots of storage. But you know, certainly within the DoD we have very limited bandwidth in many cases, don't have the luxury of the giant pipes that you all have from the cloud perspective, when you're going over satellite links or sneaker net or other ways that we have to get the data out to the field. So we're going towards or migrate it over to data mesh. So when we built the system I talked about the two Conus nodes. We've got three OCONUS nodes being able to tie all those together through a private network and be able to query the data and send the query to the data, instead of trying to backhaul all that event data into one repository and then run your analytics and everything. So we do develop the AI models on the test data, but when you're deploying them out to the field, right, you got to have that data mesh. And in part and all that relies upon the storage out at the edge, at the tactical edge, at the core, and then also being hybrid and being able to query that data in the cloud too. And that speed is critically important. Absolutely. Love to get your perspectives now on the evolution. If you had to have a crystal ball or maybe it's a magic 8 ball, I don't know. How do you see the future of security evolving? Michael, I want to start with you. And how do you advise organizations keep pace with the incredible speed at which things are changing? That's a great question. Right. So it's when we talk to our customers, it's never a one size fits all. It's not one single technology. It's always a collection. Right? I mean that's why they call it system integrators, right. Because we're looking across the industry and we're saying, okay, what do we got to bring in to develop that zero trust architecture that Mark mentioned earlier? Right. That's not one technology. That's a series of technologies that are working together to provide that. So what we do is we look at our customers and we help them identify their gap. Where are they at today and where do they need to be? And also what's the mission of that agency? Where are they going and what do they expect that to evolve into? Especially in our world, where we're dealing with people like you and I who are dealing with services? Right. And how you interact with those services is different depending on who you are. You know, I'm digital aware maybe is a good way to say it. My kids are digital native. My mom doesn't understand digital at all. Right. So my mom's your mom and my mom both. Yeah.They're submitting on paper. I mean, my mom just went through a process. She filled out forms on paper. It's a different way, but that all has to be digitized, right? So we're talking with them about how do you make sure that you get it that way? You get it scanned that the scan is secure, the data is secure. Right? It's all about the data. Like we've said. So just helping them understand what they have and what they want to do with it is kind of the first step. Absolutely. It's all about understanding that and but doing it critically,fast. Right. I want to now kind of move on shift gears here and look at how data protection laws like GDPR or CcpA, how they're impacting security strategies, and how an organization is going to ensure compliance without sacrificing data security. Jay, how do you accomplish this at IBM? Yeah. To me, GDPR is more about protecting the private data within the country. And it started in Europe. And now you can see it in Asia. You can see it in the UK, you can see it even in the US. So I think we'regetting to a world where we're going to have sovereign clouds in every country that they support and they agree to, and that cloud will be approved to run a certain workload that's regulated. And you can see that happening in the UK. You can see it all over Europe. We even have clients in Europe that have their own data center that they bought from us, because they don't want to share it with anybody else, right. It's an expensive purchase. But for them that's more important than anything else in terms of security and compliance. So I think it's just going to change the way we do business in public cloud and no longer it's one cloud fits all. It's going to be sovereign clouds that are spread across the globe. Definitely not one size, one cloud fits all for sure. We talked about this a minute ago when I made the joke about my friends sticker, humans ruining everything since forever. It's huge. The human error factor is huge. We talked about this. It's there. It's persistent. Can you talk about measures you've taken like maybe zero trust. Jay we're going to go back to you to protect from internal threats, whether those are accidental or on purpose. To us really automation is the key topreventing human error from happening. But it still happens. You know, a software developer is going to make a mistake. We release a code and the code has a bug in it. We're deploying AI to help us with that because we just released the product called Watson Code Assistant, and that actually helps the developers produce better code, detect bugs, document the code, and we're hoping that these new tools is going to allow us to even capture it more. We live, like I told you, in our customer base, we live on resiliency. So we've got to be resilient. We got to be secure. We got to be compliant. We don't have a choice before we do anything. We have to be those three and then we build the product on top, right. You're right. We have to be resilient. We have to be compliant. We have to be secure. There is no choice. It's not a nice to have anymore across any type of organization. Guys, thank you so much for joining us on the panel today. Really sharing what's your organizations across industry and government are doing to really enable a cyber a journey that's going to get to cyber resilience, that offensive posture that we talked about, mission critical these days. We appreciate your time and your insights. How about it for Mark, Michael and Jay. Thank you. Thank you gentlemen so much. We appreciate your insights and your time.
Industry experts and thought leaders explore challenges and opportunities with building flexible data storage infrastructure solutions, from security-intensive on prem storage to optimized hybrid multicloud architectures and everything in between.