The AI Cybersecurity future is here

David Bombal Podcasts
9 Feb 202426:42

Summary

TLDRIn a discussion on the future of cybersecurity, Jeetu Patel from Cisco emphasizes that AI will be central to enhancing security, particularly in handling the overwhelming amount of data from attacks like email phishing. He highlights the need for integrated platforms over multiple point solutions to correlate data effectively. Patel also addresses the talent shortage in cybersecurity, advocating for a diverse workforce and the importance of user-friendly design in security products. The conversation touches on the potential of AI to augment human efforts, not replace them, and the ethical considerations of data use in AI for security.

Takeaways

  • 🤖 The future of cybersecurity is heavily reliant on AI, which will enhance security platforms' effectiveness.
  • ⏳ Over 80% of cyber attacks originate from emails, often leading to malware downloads and subsequent network breaches.
  • 🚨 The current challenge in cybersecurity is not a lack of data, but the overwhelming amount that overwhelms human analysis capabilities.
  • 🛡 AI is crucial for sifting through vast data sets to detect anomalies and predict potential threats, moving from a reactive to a proactive stance.
  • 🔒 Critical infrastructure like hospitals, water supply, and power grids are vulnerable to cyber attacks, emphasizing the need for robust security measures.
  • 🧩 The cybersecurity industry has been fragmented, with numerous niche companies addressing specific threats, but there's a shift towards integrated platforms for comprehensive security.
  • 🔗 Correlation of data across different security control points (email, web, network, identity, endpoint) is key to improving threat detection and response.
  • 👨‍💻 The talent shortage in cybersecurity is significant, with millions of jobs going unfilled annually, necessitating AI to scale operations.
  • 💼 AI's role in cybersecurity is to assist, augment, and automate tasks, allowing human experts to focus on more complex challenges.
  • 🔄 The discussion around the potential Splunk acquisition indicates a strategic move towards becoming a data-centric AI company to bolster security offerings.

Q & A

  • What is the significance of AI in the future of cybersecurity?

    -AI is projected to be a driving force in the future of cybersecurity, as it can handle the vast amounts of data and detect patterns that would be overwhelming for human analysts. It's expected to shift the balance in favor of defenders, providing a data advantage and enabling predictive security measures rather than just reactive ones.

  • Why are email attacks so prevalent, and how does AI help mitigate them?

    -Email attacks are prevalent because they are a common entry point for malware, often through social engineering tactics. AI assists by correlating data from various security layers such as email, web, and endpoint protection, to detect and respond to threats more effectively.

  • How does the complexity of managing multiple cybersecurity products impact organizations?

    -Managing a multitude of cybersecurity products can be untenable due to the high complexity, leading to inefficiencies and potential security gaps. The industry is moving towards integrated platforms that can correlate data across different security layers, simplifying management and improving security efficacy.

  • What is the role of AI in handling the cybersecurity skills shortage?

    -AI plays a crucial role in addressing the cybersecurity skills shortage by automating routine tasks, allowing human analysts to focus on higher-order tasks. This approach helps to augment the capabilities of existing staff and maintain security effectiveness despite the talent gap.

  • How does the encryption visibility engine (EVE) improve cybersecurity?

    -EVE enhances cybersecurity by detecting anomalies in encrypted traffic, which is a significant challenge as traditional deep packet inspection is not feasible with encryption. EVE uses AI to infer potential threats based on packet behavior, improving the efficacy of security measures.

  • What is the importance of a single policy engine in integrated cybersecurity platforms?

    -A single policy engine simplifies the management of security policies across an organization by providing a unified interface. This approach reduces complexity, allows for consistent enforcement of security policies, and enables better correlation of data from various security layers.

  • How does AI help in making cybersecurity more efficient and cost-effective?

    -AI contributes to efficiency by automating routine tasks and improving threat detection rates. It also helps in cost-effectiveness by reducing the need for extensive manual intervention, lowering the resources required for managing security, and preventing breaches that could lead to costly damages.

  • What is the potential impact of a cybersecurity breach on critical infrastructure like hospitals and power grids?

    -A breach in critical infrastructure can have severe consequences, including loss of life, disruption of essential services, and significant economic impact. AI can help prevent such breaches by providing advanced threat detection and response capabilities.

  • How does AI assist in managing firewall rules and improving security policy?

    -AI can analyze and optimize firewall rules, identifying duplicates and suggesting improvements. It allows for the creation and management of policies using natural language, reducing complexity and the need for specialized knowledge, thus enhancing the user experience and security efficacy.

  • What is the vision for the future of cybersecurity in terms of talent and diversity?

    -The future of cybersecurity envisions a more diverse workforce, including individuals from various backgrounds and disciplines, to address the broad and complex challenges in the field. This diversity is seen as essential for creating effective security solutions for a global and interconnected world.

  • How does the concept of 'hallucination' in AI differ between generative AI like ChatGPT and AI used in cybersecurity?

    -In generative AI, like ChatGPT, 'hallucination' refers to the AI's ability to create new content, which is a feature. In contrast, cybersecurity AI must be precise and accurate, as it deals with critical data and operations where false creations or 'hallucinations' can be detrimental to security.

Outlines

00:00

🛡️ The Pivotal Role of AI in Cybersecurity

The paragraph emphasizes the indispensable role of AI in the future of cybersecurity. It highlights the overwhelming volume of data from email attacks that humans can't manage alone, necessitating AI's assistance. The conversation points out the severe consequences of cyber attacks on critical infrastructures such as hospitals, water supply, and power grids. It also touches on the historical advantage of attackers over defenders due to the high number of variables defenders must account for. However, AI's data correlation capabilities are seen as a potential game-changer, possibly tipping the scales in favor of defenders. The discussion also addresses the evolution from numerous niche cybersecurity products to integrated platforms, which can better correlate data and respond effectively to threats.

05:02

🔍 AI's Capacity to Detect and Prevent Cyber Threats

This section delves into how AI can analyze vast amounts of data to distinguish between normal and anomalous behavior, allowing for a proactive response to cyber threats. It discusses the importance of detecting patterns of activity to predict and prevent breaches, rather than merely detecting and responding after they occur. The conversation also addresses the challenge of data overload for human analysts and how AI can provide a significant improvement by deriving meaningful insights from data. Furthermore, it touches on the integration of AI into various security products, such as firewalls, to increase efficacy, improve user experience, and contain costs.

10:03

🤖 AI as an Assistant and the Broader Impact on Security

The paragraph discusses the application of AI across different security products, not just firewalls, to enhance security efficacy, user experience, and economics. It mentions the introduction of AI assistants that can manage policies in natural language, reducing the complexity and skill required for certain tasks, thus addressing the talent shortage in cybersecurity. The conversation also highlights the importance of handling cybersecurity at a machine scale due to the increasing attack rates and the need for a rapid response that humans alone cannot provide. The potential of AI to assist, augment, and automate tasks is emphasized, allowing human experts to focus on higher-order efforts.

15:03

💧 The Ripple Effect of Cybersecurity on Critical Infrastructure

This section underscores the impact of cybersecurity on critical infrastructures, such as hospitals and utilities, and the potential for loss of life and services due to breaches. It discusses the need for cybersecurity measures to scale up to machine levels to handle the increasing sophistication and volume of cyber threats. The conversation also briefly touches on the potential of AI to manage all security products and the importance of data in driving security strategies. The discussion hints at the company's intention to integrate AI across its product line and the significance of data in improving security outcomes.

20:05

🧠 AI's Evolution and Its Implications for the Future Workforce

The paragraph discusses the evolution of AI and its implications for the future workforce in cybersecurity. It challenges the misconception that AI will replace human jobs, instead arguing that AI will assist and augment human efforts, allowing for a higher bandwidth of work. The conversation emphasizes the need for a diverse workforce in the cybersecurity industry, including individuals from non-technical backgrounds, to reflect the global population that relies on secure technology. It also addresses the importance of designing user-friendly enterprise products and the company's commitment to making its products as intuitive and accessible as consumer technologies.

25:08

🔗 The Importance of Identity in Cybersecurity

This section focuses on the importance of identity as a key component of cybersecurity. It discusses the challenges of managing identity in a world where attacks increasingly target identity as a薄弱环节. The conversation highlights the company's approach to identity management, which involves creating a thin analytics layer that sits on top of existing identity providers to correlate user, machine, and application data. The goal is to enable continuous authentication and response to potential threats based on behavior and context, rather than providing yet another identity provider.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. It is central to the video's theme as it discusses the future of security in a world increasingly reliant on digital infrastructure. The script mentions the evolution of cybersecurity, emphasizing the need for AI to combat the overwhelming volume of cyber threats, such as email-based attacks leading to malware downloads.

💡Artificial Intelligence (AI)

AI is the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. In the context of the video, AI is portrayed as a critical tool for the future of cybersecurity, capable of handling vast amounts of data and identifying patterns that could signify a cyber attack, thus providing a 'data advantage' to defenders over attackers.

💡Data Overload

Data overload occurs when there is too much information to process effectively. The video script highlights this issue, noting that the sheer volume of data from cyber activities is too much for humans to manage, thus necessitating AI's role in making sense of this data and enhancing security measures.

💡Machine Learning

Machine learning is a subset of AI that enables machines to learn and improve from experience without being explicitly programmed. The script alludes to machine learning's importance in cybersecurity, particularly in correlating data from various sources to predict and prevent cyber threats.

💡Encryption

Encryption is the process of encoding messages or information to ensure secure communication and data storage. The script discusses the challenge that widespread encryption poses to traditional cybersecurity methods, such as deep packet inspection, and how AI can help infer potential threats from encrypted traffic.

💡Anomaly Detection

Anomaly detection is the identification of unusual patterns that indicate a potential cyber threat. The video emphasizes AI's role in anomaly detection, as it can analyze patterns of behavior to differentiate between normal and abnormal activities, allowing for a more proactive cybersecurity stance.

💡Integrated Platforms

Integrated platforms refer to comprehensive systems that consolidate multiple functionalities into a single, unified platform. The script discusses the shift from numerous specialized cybersecurity tools to integrated platforms that can correlate data more effectively, enhancing the overall security posture.

💡Natural Language Processing (NLP)

NLP is a branch of AI that focuses on the interaction between computers and humans through natural language. The video script mentions the use of NLP in AI assistants for firewalls and other security products, allowing for more intuitive policy setting and management.

💡Identity Intelligence

Identity intelligence involves the use of AI to analyze and protect user identities and access privileges. The script discusses the importance of identity as a critical attack vector and the need for an 'identity intelligence layer' that can provide continuous authentication and anomaly detection.

💡Efficacy

Efficacy in the context of cybersecurity refers to the effectiveness of security measures in preventing cyber threats. The video script repeatedly emphasizes the need for AI to increase the efficacy of cybersecurity by improving the correlation of data and the ability to predict and prevent attacks.

💡Human-Machine Collaboration

Human-machine collaboration is the partnership between humans and machines, where each complements the other's strengths. The script suggests that AI in cybersecurity is not about replacing human jobs but about augmenting human capabilities, allowing for a more efficient and effective cybersecurity approach.

Highlights

The future of cyber security is expected to be powered by AI, which will be essential for an effective security platform.

80% of cyber attacks originate from email, highlighting the importance of email security in cyber defense.

AI can help manage the overwhelming amount of data in cybersecurity, which is often too much for human analysts.

Cyber warfare can have severe real-world consequences, such as disrupting hospitals, water supply, power grids, and financial systems.

There's a significant shortage of skilled cybersecurity professionals, emphasizing the need for AI to scale defenses.

AI can correlate data effectively to predict and prevent cyber attacks, moving beyond just detection and response.

The cybersecurity industry has been fragmented, with many niche companies offering specific solutions, but a shift towards integrated platforms is occurring.

Integrating multiple cybersecurity products into a single platform allows for better data correlation and a more unified defense.

AI can help reduce the complexity of managing numerous cybersecurity products, leading to more efficient defenses.

The importance of natural language processing in AI for simplifying cybersecurity policy management and reducing the need for technical expertise.

AI can assist in addressing the talent shortage in cybersecurity by automating routine tasks and allowing experts to focus on more complex issues.

Cisco's AI initiatives aim to increase security efficacy, improve user experience, and contain economic costs.

AI's role in cybersecurity is not to replace human jobs but to assist, augment, and automate tasks, allowing humans to focus on higher-level challenges.

The potential of AI in cybersecurity extends beyond just firewalls, with plans to integrate AI across all Cisco products for a comprehensive defense.

AI's ability to handle large volumes of data is crucial for cybersecurity, as the field is essentially a data game.

Cisco's focus on privacy ensures that AI is used responsibly, with explicit consent required for any data used to train models.

The future of cybersecurity will require a diverse workforce, including not just AI experts but also individuals from various backgrounds and disciplines.

AI's role in cybersecurity is to assist in decision-making, not to replace human judgment, which remains crucial for the foreseeable future.

Transcripts

play00:00

Is it fair to say that the future of cyber security is AI?

play00:04

The future of cyber security is going to be powered by AI and anyone that thinks otherwise

play00:08

is not going to have an effective platform for security.

play00:10

If you think about 80% of the attacks that happen originate from email.

play00:14

Yep.

play00:15

Like you get an email from some prince from some exotic country and then they'll say,

play00:19

well, click on this link and you can download your $10 million.

play00:22

Yep.

play00:22

From there, you actually download some malware.

play00:25

But the problem people have, right?

play00:27

Too much data, too much it's overload for a human.

play00:29

Correct. That's where AI helps.

play00:31

Okay.

play00:31

It took a while for folks to realize is at this point, think about it, warfare starts with cyber.

play00:37

Yeah.

play00:38

A hospital, people would lose their lives if the hospital got breached.

play00:41

Yeah.

play00:42

Because people wouldn't be able to get dialysis.

play00:44

Yeah.

play00:46

Or whatever the treatment is that they're looking to get.

play00:48

Water supply can stop for a city.

play00:51

You can have power grids completely stopped.

play00:53

You can have the financial system stop.

play00:55

Your healthcare system stops.

play00:56

There's a tremendous impact with that shortage of skill.

play01:00

We have to make sure that we actually get to that at machine scale.

play01:10

Hey everyone, it's David Bombal coming to you from Cisco Live back with Jeetu.

play01:13

Jeetu, welcome.

play01:14

Great to have you back here.

play01:15

Thank you.

play01:15

Thank you for having me, David.

play01:16

It's great to see you again, man.

play01:17

Likewise.

play01:18

You on stage.

play01:19

I saw today lots of announcements.

play01:21

Is anyone on stage these days?

play01:22

Well, but big question.

play01:26

Recently, they're calling it the mother of all breaches.

play01:29

26 billion records got leaked.

play01:31

Last time we spoke about the attackers are, you know,

play01:34

it looks like the attackers are winning.

play01:36

Hopefully, you guys are going to do something about that.

play01:37

Well, you know, for 30 years, David, it's been the way that things have actually transpired.

play01:43

The adversary has the advantage over the defender.

play01:46

And the reason for that is because they have to be right once.

play01:49

We have to be right every single time.

play01:51

I think this is the first time, at least in my professional career,

play01:54

that I see a light at the end of the tunnel where I think the scales might tip in favor

play01:59

of the defender because they'll have a data advantage.

play02:02

The defenders will have a data advantage over time.

play02:05

Now, it's not quite, we're not there today.

play02:07

OK.

play02:08

But I do see that being a possible state in the future.

play02:12

And we're pretty excited about the things that we can do with it

play02:14

because it's not just having a lot of data.

play02:16

We've always had a lot of data.

play02:18

I think the ability to correlate data effectively

play02:21

and then reason with that intelligence that's there and then be able to feed that

play02:25

into everything else is where I think we'll be able to predict and prevent rather than just detect

play02:30

and respond.

play02:30

Last time we spoke about the fact that cybersecurity especially has all of these sort of niche

play02:35

companies, it seems, that are providing a very specific solution, but there's no overall solution.

play02:40

Yeah, the way that innovation has evolved in cybersecurity, it's all through patchwork.

play02:46

There's a new threat that comes up.

play02:47

There's a new company that came out to go out and help the threat.

play02:49

The ironic part about this is that model started so that the efficacy would be high for security.

play02:55

That is the model that's breaking security down today because on average people have

play02:59

50 to 70 different products in their cybersecurity stack.

play03:02

Yeah.

play03:03

And it's untenable to go out and manage that anymore.

play03:05

Exactly.

play03:06

The complexity is too high.

play03:08

And so what needs to happen, and I think there's the shift that's occurring right now in the market.

play03:13

We'd like to think we're one of the people that are driving it, but the shift that's occurring is

play03:16

moving from a bunch of point solutions to integrated platforms.

play03:21

And what that'll allow you to do is have a single policy engine.

play03:26

It'll have a single kind of core design system.

play03:31

And it's going to allow us to do things that we couldn't do before, largely because you

play03:34

could correlate data sets that you weren't able to in the past.

play03:38

If you think about 80% of the attacks that happen originate from email.

play03:43

You get an email from some prince from some exotic country.

play03:47

You're very polite.

play03:48

Yep. And then they'll say, well, click on this link and you can download your $10 million.

play03:53

It takes you to a website that didn't exist two hours ago.

play03:57

From there, you actually download some malware.

play03:59

That malware kicks off a process on your PC that then does lateral movement throughout

play04:05

the entire network.

play04:06

That is 80% of the attacks that happen today.

play04:09

Now, what happens in those attacks and how the defenses work?

play04:12

There is a company that does email protection.

play04:15

There's a company that does web protection and DNS protection.

play04:19

There's a company that's actually doing things around endpoint protection.

play04:22

And then there's a company that's doing something on network.

play04:25

Each one of them have their own telemetry.

play04:28

And so an email that comes in gets passed as a low level alert.

play04:32

And then a website that you go to might get passed as a low level alert.

play04:36

And a process that got kickstarted on the endpoint might be tagged as a low level alert.

play04:41

But if you put those three low level alerts together, that is a high level alert.

play04:45

Low level alerts get ignored because of the signal and noise ratio being way off.

play04:50

But a high level alert, you would do something about.

play04:53

And that only happens when you actually start to correlate telemetry.

play04:55

And that's the idea of data, right?

play04:57

That's the idea of making sure that you have data across multiple control points,

play05:01

email, web, network, identity, endpoint, that you can start to correlate together

play05:07

and say what's anomalous versus what's normal behavior.

play05:11

And when you start detecting patterns of legitimate activity

play05:17

versus patterns of abnormal activity, you can then start to have a graduated set of

play05:21

responses that you can apply to that.

play05:23

Quarantine this.

play05:24

Make sure that you kill this session.

play05:26

Make sure that you actually have gone out and done a snapshot backup.

play05:29

All of those things can start happening once you have that core set of, you know,

play05:34

kind of indication that this is in fact a breach that's about to happen.

play05:38

And therefore, I'm going to predict and prevent rather than just detect and respond.

play05:42

But the problem people have, right?

play05:44

Too much data, too much.

play05:45

It's overload for a human.

play05:46

Correct. That's where AI helps.

play05:48

So up until now, we've not had a data scarcity issue.

play05:52

We've had an issue of making deriving meaning from that.

play05:56

And that's where AI can massively kind of bits of step function improvement.

play06:00

So I know that I interviewed DJ, I believe, is in your team.

play06:04

Love DJ, man.

play06:05

On the firewall.

play06:07

Like there's an assistant for a firewall.

play06:08

Yes. Are we talking about that or is there more?

play06:10

No. So what we're talking about on the firewall, so the way that we think about it is there's

play06:14

three major objectives in security that we're trying to go out and solve.

play06:17

First one is massively increase the efficacy of security.

play06:21

Second one is make sure that your experience gets way better than what it is right now.

play06:25

Yeah.

play06:25

And then third one is make sure that the economics are contained so that you don't

play06:28

end up spending more money.

play06:30

Because right now, if you look at the trajectory over the past 15 years,

play06:33

people have spent an inordinate amount of money in security.

play06:36

And it's not effective because it's not.

play06:38

It's not effective actually.

play06:38

Yeah.

play06:39

And so you have to do all these three at once.

play06:42

In order to do all these three things at once, on the efficacy side,

play06:46

what I'm talking about is a correlation of data.

play06:48

Okay.

play06:48

On the efficient experience side, what I'm talking is what DJ was talking about,

play06:52

which is I can go out and set a policy in natural language.

play06:56

And what that policy natural language is going to do is it's going to reduce the

play07:00

dexterity that people need to go out and get certain things done.

play07:03

And so then you actually can address the talent shortage.

play07:05

Because right now, 4 million jobs just in the US go unfilled every year.

play07:10

Millions go unfilled throughout the world.

play07:12

And how can we go out and make sure that that changes quite dramatically?

play07:17

Because if the attack rates keep going up and keep compounding,

play07:23

and your talent shortage remains, you just by definition get weaker.

play07:27

So you have to handle this at machine scale.

play07:29

You can't handle it at the human scale.

play07:30

So does Cisco just have AI on a firewall?

play07:32

Is it bigger than that?

play07:34

No, no.

play07:34

So the beauty about this is we started with AI on the firewall,

play07:37

but it was such a huge problem.

play07:39

And we said, wow, firstly, wouldn't it be nice if you had the ability to have

play07:45

natural language interface on every single product of ours?

play07:48

So you can set policy.

play07:50

You can do basic hygiene on policy.

play07:52

So one of the demos we showed this morning at the keynote was the ability to say,

play07:57

I've got 1200 rules in my firewall, but 350 of them are duplicates.

play08:03

So what do I do?

play08:04

Do I disable them?

play08:05

Do I delete them?

play08:06

In order to go out and even determine that in a reasoning engine,

play08:09

when you're creating a rule, it would be something that right now is not something that people do.

play08:13

And now this is something that you can do in a very easy way.

play08:15

It's not only is it easier, it does more while making it a whole lot easier.

play08:20

And so then the people that are working on these things,

play08:22

it's not like you don't need them.

play08:24

You will just be able to have them focus on higher order efforts rather than the things

play08:29

that actually you use up a huge amount of cycles.

play08:33

It requires a very high level of dexterity and isn't really progressing us as fast as we need

play08:38

to progress.

play08:38

We need all the human minds on the problem of security.

play08:41

So one thing that I think people need to take away from this is

play08:44

it's not that we're trying to eliminate jobs.

play08:47

What we're trying to do is make sure that those jobs that are being done

play08:51

can be done at a higher bandwidth so that the mundane work can actually happen

play08:55

with the augmentation of a machine.

play08:57

I mean, old people like me, you know, firewall...

play09:01

You're still younger than me, which is really depressing.

play09:04

Firewall rules are a nightmare, right?

play09:06

CLI was difficult in the old days.

play09:09

It's like assembly code.

play09:10

That's right.

play09:11

Yeah.

play09:11

And I mean, you don't want to touch it because you might break it.

play09:13

Yes.

play09:14

So we need something...

play09:15

And actually, the people that wrote the rules retired, the kids graduated from college.

play09:19

Exactly.

play09:19

And so now you've got...

play09:20

There's companies we know that have millions of rules on the firewall.

play09:23

And so what they do is because they don't want to break anything,

play09:26

they just don't touch it.

play09:27

Exactly.

play09:27

And then at some point in time, that system which was designed for efficacy

play09:32

is actually the most ineffective system that's out there.

play09:34

I mean, you mentioned in your keynote, AI is not going to replace it.

play09:38

Assist, I think, augment and automate, will you?

play09:40

Assist, augment and automate.

play09:41

So why we do...

play09:44

Why we are using AI is to increase efficacy,

play09:47

improve the experience and improve the economics.

play09:50

How we do it is by assisting every human to actually have an assistant.

play09:55

Yeah.

play09:56

Augmenting so that the detection is going to happen at a much faster pace

play10:02

and make sure that the human's in the loop and then automate certain tasks

play10:07

that can be done so that humans can actually be graduated to doing better tasks.

play10:10

Yeah, because the warrior's jobs, right?

play10:12

Like you mentioned, and you've addressed that.

play10:13

We just simply don't have the number of people to go out

play10:16

and address the number of attacks that are happening.

play10:19

And by the way, this is critical infrastructure

play10:22

that's going to damage other critical infrastructure.

play10:25

The thing that people...

play10:26

It took a while for folks to realize is at this point,

play10:30

think about it, warfare starts with cyber.

play10:33

A hospital, people would lose their lives if a hospital got breached

play10:37

because people wouldn't be able to get dialysis

play10:41

or whatever the treatment is that they're looking to get.

play10:43

Water supply can stop for a city.

play10:46

You can have power grids completely stopped.

play10:49

You can have the financial system stop.

play10:50

Your healthcare system stops.

play10:51

So there's a tremendous impact with that shortage of skill.

play10:55

And we have to make sure that we actually get to that at machine scale.

play10:58

So you've mentioned firewalls quite a bit.

play11:01

There are other products, right, where the AI is involved in.

play11:04

So our AI assistant actually manages all of our products.

play11:08

So we started with firewall.

play11:10

We just added secure access, which is our competitor, the SASE market.

play11:15

And so you can actually go out and have policies that are set

play11:18

with natural language in our secure access product.

play11:21

We have announced a SOC assistant, which will come out later in the year.

play11:25

We will have, we currently also have a documentation site for our,

play11:31

if people want to find out exact documentation that,

play11:33

how do you do this? How do you do that?

play11:34

That's actually going to be in that that's available with an AI assistant.

play11:39

And we will continue to keep adding email as well, right?

play11:42

Yeah. So email has, we just announced today that email threat defense

play11:46

will have some AI capabilities to do better detection of spam

play11:50

and so on and so forth.

play11:51

And so every single product will have different uses for it,

play11:54

but we will make sure that AI gets injected across the board.

play11:57

Because frankly, the way I think about it, security is a data game.

play12:00

Yeah.

play12:01

And you cannot make sense of data without having strong, robust AI models in place.

play12:09

How do you get the data?

play12:10

Is that perhaps related to the possible Splunk acquisition?

play12:13

Splunk will definitely be one of the contributors of that.

play12:15

And the way you think about this is, you know, we are a networking company

play12:19

in order to be a great networking company, we have to be a great security company.

play12:22

I love that. Yeah.

play12:23

If you're going to be a great security company, you have to be a great AI company.

play12:27

And you cannot be a great AI company if you're not a great data company.

play12:30

And Splunk will definitely allow us to scale that to a very different level.

play12:35

We can't talk much about that because we're in the regulatory approval process right now.

play12:39

But in addition to Splunk, we just have to think about all aspects where we have telemetry

play12:45

that can be pulled together.

play12:47

We have data about every packet that flows through the network.

play12:51

We have data about every email and every forward that happens.

play12:54

We have data about every process that gets kickstarted on an endpoint.

play12:56

We have data about every WebDNS query that gets made.

play12:59

We have data about every identity, human or machine identity.

play13:03

Now with the identity intelligence engine,

play13:05

where you can tell whether or not there's anomalous behavior,

play13:08

both reactively, David's doing something that seems out of character, or proactively.

play13:15

I've got these three devices that I've never logged in for three years.

play13:20

Maybe I should decommission those devices and instill a level of basic hygiene.

play13:25

So all of those things, that telemetry, if we can take and start to correlate,

play13:30

where there's magic that can happen.

play13:31

And that's why I think there's an advantage to,

play13:34

once you start really mining this data effectively for the customer being safe.

play13:38

I'm going to push on that word mining because a lot of people may be concerned

play13:44

about giving their personal data or confidential data to AI.

play13:48

Yeah, so the way that we do it is firstly,

play13:51

when you start thinking about the world of security,

play13:55

it's slightly different in the sense that if there's an incident that's happening,

play13:58

you want to know what that incident is so that others can actually get prevented from it.

play14:03

But we don't use anyone's data.

play14:07

So what I'm talking about is an instance that you would have with your data.

play14:11

Okay, so it's personal to my company?

play14:12

Personal to your company.

play14:13

And you'll say, okay, here's your data.

play14:14

Not like the typical check GBT thing.

play14:15

No, no, no.

play14:16

And so we would actually make sure that that's there.

play14:18

But in security, in the world of security,

play14:20

you typically have a pretty common practice of making sure that certain kinds of data

play14:25

on incidents and breaches get shared with the community so that you know what's going on.

play14:30

Otherwise, you're fighting against the adversary.

play14:33

But the thing to keep in mind is this, what I'm talking about over here is largely for

play14:38

like, one of our big core value systems is privacy.

play14:43

And we think it's a basic human right.

play14:45

And we should, if we ever used a data set to train the model,

play14:50

there would be with explicit consent.

play14:52

I mean, I suppose that's an advantage, right?

play14:53

Because you've got AI for my company, but Cisco also have a lot of data from many people that

play14:57

are perhaps sharing it with you.

play14:58

So I think one of the concern is ChatGPT is like pulling data from the internet,

play15:02

but that's very different to the AI that you're using.

play15:06

Yeah, I mean, on the data side, like it's a very different thing from ChatGPT,

play15:10

because in ChatGPT, for example, you would say, what's the weather like today?

play15:15

With us, it's more around how do I go out and configure this policy?

play15:20

And that's a very different kind of way that you've actually trained the model.

play15:25

And it's a very constrained set of data that we've actually trained the model on.

play15:29

It's called retrieval augmented generation, where you actually make sure that

play15:33

you train the model based on a very specific custom set of data for that account.

play15:37

And that's important because of hallucinations as well.

play15:39

Yeah, hallucinations in ChatGPT is a feature, not a bug, right?

play15:43

Because when you start thinking about it, in some cases, what ends up happening is

play15:47

the creative personas.

play15:50

If you think about how AI evolved, and Sam Altman had a great kind of thought over here

play15:56

in one of the podcasts, he was in where he said that if you would have asked him five years ago,

play16:01

seven years ago, how is AI going to evolve?

play16:02

He would have said, it starts with the blue collar workers.

play16:05

Yeah, exactly.

play16:06

Right.

play16:06

And then it's going to go to the knowledge workers and then to the super high creatives.

play16:10

It's actually turned out exactly the opposite.

play16:12

Exactly.

play16:12

Yeah.

play16:12

Why is that?

play16:13

Part of the reason is because hallucination actually helped in actually creating the

play16:19

creative wandering that can happen.

play16:21

That does not work in security.

play16:22

I was going to say.

play16:23

I can't hallucinate about a firewall policy I want to implement.

play16:26

Exactly.

play16:27

So it has to be pretty precise.

play16:29

So what we do is we actually create a...

play16:34

The way in which you train the models is very decent.

play16:36

I think another misconception people perhaps have is just because of ChatGPT, they think

play16:40

it's just an assistant or an interface, but like on the firewalls, you've got the assistant,

play16:44

but you've also got EVE, right?

play16:46

Yes.

play16:47

Can you just explain that and how perhaps AI is doing similar things on other products?

play16:51

So I think generative AI through transformers is one dimension of AI that actually has gotten a

play16:57

lot of popularity because of ChatGPT over the course of the past year.

play17:00

I think it's fantastic because what it's done is it's allowed us to, as humans, communicate

play17:05

with a machine without learning the language of the machine, but actually requiring the machine

play17:10

to learn the language of humans, which is great.

play17:12

This is the first time that's happened.

play17:13

But that's the transformer side and that's the understanding of natural language.

play17:19

There's a bunch of other areas in machine learning and AI

play17:23

which actually have little to do with language expertise.

play17:27

And more to do with detecting anomalies and making sure that you can find patterns of behavior.

play17:32

And so encryption visibility engine is a really interesting problem to solve because

play17:38

that we solved with the encryption visibility engine, because if you think about majority of

play17:42

the traffic today is encrypted.

play17:45

It's a problem.

play17:46

And so we used to have this technology, we have this technology in firewalls called deep

play17:50

packet inspection, where you can actually go and inspect a packet to know if there's malware inside

play17:54

that packet.

play17:55

And if there is, then you can intercept or block it.

play17:57

Now, if everything's encrypted, there's no way for you to tell.

play18:02

So the only way you can tell is by inferring based on the movement of the packet and whether

play18:07

or not it's anomalous behavior.

play18:09

And that's what EVE does.

play18:11

And that's actually a pretty major step function improvement in driving efficacy once again.

play18:17

So what you'll see is we're doing one of three things.

play18:20

Something like Eve drives efficacy.

play18:22

Something like AI assistant drives the experience.

play18:27

And it also drives the economics.

play18:29

And so those are the ways that we kind of think about it.

play18:31

So EVE kind of like, I don't want to put it, I'm not quite sure how to say it, but like the EVE

play18:36

kind of technology perhaps will be used on email and other spheres as well.

play18:39

It'll be used across the board.

play18:41

EVE itself is being used in the firewall largely.

play18:44

Yeah, but like a similar kind of concept.

play18:47

The concept of empowering these different tools with strong AI that's not generative in nature,

play18:54

but strong AI and also machine learning aspects.

play18:57

That's something we'll have in every single one of our products.

play19:00

And if you think about our AI team and you said you spoke to DJ, we bought his company

play19:07

and they actually are driving all of our AI efforts right now.

play19:10

And that company is actually getting funded quite aggressively so that we can hire more

play19:13

and more people.

play19:14

We need PhDs and researchers and developers and all different kinds of people in AI.

play19:20

And we will continue to keep making sure that the clock speed of innovation over there

play19:24

is very, very high.

play19:25

So I'm glad you mentioned that because looking forward, where do you see things going?

play19:30

Because I think a big concern for people who are moving into this industry or interested in this

play19:34

industry or perhaps younger is it's pointless.

play19:37

AI is going to take my job away.

play19:38

There's no future in this.

play19:39

Or can you address that?

play19:41

And also like, where do you see things going?

play19:42

Just to give people a roadmap and like sort of a vision.

play19:45

Yeah, I think in my mind, I think human judgment is going to be pretty important for the foreseeable

play19:49

future.

play19:50

And now that I am completely wide-eyed about the fact that there's some upside in AI, but

play19:56

there's also going to be a significant downside to humanity.

play19:59

And I think we can go into the areas of regulatory kind of aspects that need to be.

play20:05

And we should talk about that a little bit.

play20:06

But when you start thinking about specifically, you know, new talent coming in, the addressable

play20:14

market for security is 8 billion people, right?

play20:16

Every human on the planet is going to be connected and every human on the planet needs to be

play20:20

secured.

play20:20

Yeah, we need more people from diverse backgrounds to come into this industry.

play20:25

This industry is very homogeneous on multiple dimensions, largely male dominated, largely a

play20:32

technical audience, very jargon fill.

play20:36

They actually, the industry has made it very intimidating for someone that doesn't know

play20:40

security to say, what do I do with security?

play20:42

Exactly.

play20:43

I think we have to make sure that we remove that friction.

play20:45

And that requires, if you're going to build products for 8 billion people, you better

play20:49

have the group that's building products be representative of the population makeup of

play20:54

the 8 billion people that you're building products for.

play20:57

By definition, if you don't have half the people that are women, you're probably not

play21:00

going to be as effective for the people that you're building them for.

play21:02

We need more people who are women in this industry.

play21:04

We need more people with liberal arts backgrounds.

play21:07

I would love to have more people with a design background.

play21:09

I would love to have more people with backgrounds that come from the consumer tech industry.

play21:13

Like I, you know, one of the things that I've always asked my teams is hire people sometimes

play21:18

from Spotify because they know how hundreds of millions of people can actually turn on

play21:24

us all with a couple of clicks.

play21:27

I read a blog, I think you wrote about like the interface is important or you said something

play21:30

about like the interface is so important.

play21:32

It's like historically me going back to Cisco many years.

play21:35

Cisco weren't well known for that.

play21:37

One of my commitments I've made to Chuck is, hey, when you think about Cisco and you see it,

play21:44

you know, fast forward five years, 10 years, what I'd like to leave this company in the

play21:48

hands of the next generation is going to be running it is to be one of the most designed

play21:52

forward companies only second to Apple.

play21:54

That's correct.

play21:55

In fact, I admire Apple so much for what they've done with all of their products.

play22:00

And the great part is we have a great partnership with them.

play22:03

They happen to be, you know, they were here at the event and we had a fireside chat with

play22:07

them and we've actually just built a product on the collaboration side of the house with Vision

play22:12

Pro.

play22:12

And I would love to have that same kind of obsession on finesse that's instituted in enterprise

play22:18

products as it was in consumer products.

play22:20

And you're starting to see that now.

play22:22

And so all the new products that we have coming out, they're beautiful to use and they're not

play22:26

overly complex.

play22:27

And we'll make them we'll keep chipping away them and make them simpler and simpler and

play22:30

simpler as time goes on.

play22:31

Like, you know, if you think about passwordless, you think about, you know, all of the things

play22:37

that we're doing with SSE, we try to make the demos for the end user the most boring demos.

play22:43

Yeah.

play22:44

Because that means that you don't have to do much.

play22:46

It's just invisible.

play22:47

And behind the scenes, it just works.

play22:49

I think the concern with AIs, do I need a PhD?

play22:51

A lot of guys in the beginning needed PhDs and like all this kind of knowledge.

play22:55

But do you see like the teams that you're hiring?

play22:57

Are you hiring all kinds of different types of people at different levels?

play23:00

Not just PhD people for AI?

play23:01

Yeah. I mean, look, I think there's a tremendous role that AI researchers and PhDs play, but

play23:06

that's not the only role.

play23:08

Yeah.

play23:08

Right.

play23:09

And anything that's a transformative platform, which I think AI is probably the most wide

play23:16

transformation we will have seen in our lifetimes.

play23:19

You know, it's the most consequential one.

play23:21

You're going to need people from all walks of life.

play23:24

And you're going to need people that deeply understand the tech.

play23:27

You need people who deeply understand the limitations of the tech.

play23:30

You need people who deeply understand the human dynamic.

play23:35

And many, many other kinds of vocations that you're going to need.

play23:37

So I personally feel like the kind of people we're going to need, we just have to make

play23:42

sure that the kind of people we attract to these fields keep a level of diversity to

play23:48

effectively address development of products for the target market.

play23:52

You introduced yourself as Jeetu, but how do I know that you actually are Jeetu?

play23:57

You know, the identity is one of the biggest attack vectors that's actually emerging right

play24:05

now. And it's already emerged, frankly.

play24:06

Yeah.

play24:07

And so many people say identity is a new perimeter.

play24:09

Many people say it's one of the largest attack vectors.

play24:11

And what you've seen as a challenge with identity so far, firstly, anyone who goes

play24:16

out and tries to tackle the identity problem tries to go out and provide you with another

play24:20

an IDP.

play24:20

Yeah.

play24:21

An identity provider.

play24:22

They become an identity provider.

play24:23

Our goal is I don't think the world needs yet another active directory.

play24:28

I don't think the world needs yet another LDAP.

play24:29

We don't need another identity provider.

play24:32

We've got plenty of them.

play24:33

We need to make sure that we have a thin analytics layer that sits on top of the IDPs

play24:38

that can take the data for users, for machines, for applications, and then correlate that

play24:44

data together.

play24:44

Right.

play24:45

And so we launched this identity intelligence layer, which I think is fundamentally going

play24:50

to change how every application and every platform can get hydrated with identity

play24:56

intelligence so that we then are able to take that data and not just apply enforcements

play25:02

for identity at the point of authentication, but do it on a continuous basis based on

play25:08

behavior and context.

play25:09

So David logged in.

play25:11

Yeah.

play25:12

But he's doing something funny with customer database.

play25:15

That's not what David typically does.

play25:17

Maybe I need to quarantine that.

play25:18

Yeah.

play25:19

Maybe I have a honeypot that I create so that I can let it keep going for a while to see

play25:23

what's happening without actually killing the session so that I see if I can actually

play25:28

catch someone doing something wrong.

play25:30

But those are the kind of things that we have to actually create.

play25:33

One is you have to have a better mechanism for detecting post authentication, how anomalies

play25:40

are occurring, and then based on that, have a graduated set of responses against that

play25:46

potential threat and also apply hygiene measures so that you can say, well, these are three

play25:51

devices, like I said earlier, that have never been used before.

play25:55

Let's decommission them.

play25:57

I was doing a POC on Zendesk and I was actually connecting that to my Salesforce account.

play26:03

But then we decided we are not going to do anything with the POC.

play26:06

And then I still have that account connected to my Salesforce account.

play26:10

That doesn't seem like the right thing to do.

play26:11

I need to make sure that I killed that connection.

play26:14

And so what are those kinds of things that we need to have really come up and surface up?

play26:19

That's what we're trying to do.

play26:20

Is it fair to say that the future of cybersecurity is AI?

play26:24

The future of cybersecurity is going to be powered by AI and anyone that thinks otherwise

play26:28

is not going to have an effective platform for security.

play26:30

Jeetu, I really want to thank you for sharing.

play26:32

I know you got to go.

play26:33

Thanks so much.

play26:34

Appreciate it.

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
CybersecurityArtificial IntelligenceAI DefenseData ProtectionThreat DetectionCyber ThreatsSecurity InnovationTech StrategyData OverloadAI in Firewalls
هل تحتاج إلى تلخيص باللغة الإنجليزية؟