Video: From Black Box to Glass Box: Uncovering Hidden Threats and AI Risks with Data Lineage | Duration: 2888s | Summary: From Black Box to Glass Box: Uncovering Hidden Threats and AI Risks with Data Lineage | Chapters: Introduction and Welcome (25.87s), Panelist Introductions (139.35s), Data Lineage Visibility (266.365s), Regulatory Audit Preparation (426.01s), Operational Velocity & Cost (603.935s), Visual Data Storytelling (757.84s), Data DNA Tracking (917.17s), Data Tampering Risks (1216.445s), Platform Consolidation (1363.8049s), Unified Platform Visibility (1462.24s), Shadow IT Governance (1701.425s), Consolidation Cost Benefits (1925.895s), Investigation Speed Enemies (2125.5051s), Final Thoughts (2268.9102s), Q&A Session (2384.03s), Q&A and Closing (2501.365s)
Transcript for "From Black Box to Glass Box: Uncovering Hidden Threats and AI Risks with Data Lineage":
We have an amazing conversation about to happen around data lineage and that is from black box to glass box, uncovering the hidden threats and AI risks with data lineage. If you have any questions, feel free to, type it in the q and a panel or in the chat session, and we will get them answered at the end of the session. And if you are not able to get that answered, we'll get back to you after the webinar. With that said, let's get started. As you know, that majority of organizations are accelerating AI adoption for with good reasons. Right? And what that is doing is it is creating a lot of strain on their security workflows that they have going on today. With that said, most of the AI systems are being considered almost like black box. They like, the opacity of the data going in and what comes out is a big strategic risk when it comes to security. So we are going to talk about how data lineage can help in these scenarios, especially with things like, you know, investigations, which are typically prolonged, undetected insider risks, and also theft and compliance blind spots. With that said, we have amazing panelists with us. We have Lawrence Pingree from SACR. He is the head of data and AI security at SACR, where he leads the research, on data protection, AI security, and agentic security models. He brings more than ten years of analyst experience at Gartner and has authored over 300 research notes on cloud security, endpoint defense, SD WAN, and AI security. So I'm so excited, to have you on board, Lawrence. Welcome aboard. Thank you very much, Ankur. In addition, we also have Joe Topinka with us, who is a trailblazing CIO and CEO, who uniquely bridges the gap between the IT and business, transforming technology into strategic assets. With over four years of experience, he is not just a leader, but a mentor shaping next generation of leaders. A CIO with success across multiple industries, he creates agile business minded IT functions that are viewed as valuable assets to executive teams through a variety of business cycles. He's passionate mentor who builds loyal, high performing teams based on accountability, integrity, and consistency. He's a three time CIO of the Year award recipient, honored by the Orbi Awards and the Minneapolis and Charlotte Business Journal. So welcome aboard, Joe. Thanks. It's great to be here. I am Ankur Chadda, your host for today, and I am in charge of the data security from a product marketing standpoint within Netskope. So with amazing, panelist, I am so excited to jump right in to the discussion of today's topic. And that is data lineage and, you know, overall how AI and some of the, recent trends are impacting, our security, systems. So with that said, let me jump in with the first topic, and that is, governing the AI boom. And this is where the biggest concern is. Most of the organizations are, you know, jumping on board when it comes to AI. But with that said, they also are little concerned that, hey. I need to find a way to govern this. So with that said, I'll go to you, Joe, first. And, what we are often hearing is AI is a black box. You know, from a a leadership, perspective, what is the specific legal or compliance danger of feeding an LLM or a large language model, when you cannot prove exactly where the data originated from? Well, that's a great question. And the way I look at it is if you can't show where the data originated, you can't prove you have the right to use the data. So you think about GDPR, CCPA, HIPAA, those obligations in the moment becomes sensitive data once it enters the model. And without a clear history of decisions and data handling, you really can't demonstrate responsible handling or even mount a credible defense if something does go wrong. And I happen to be advising more than one company, one in particular has a forty year old technology stack, and they're plugging AI into it. And really, nobody really fully knows what's in it, what's regulated, what's sensitive and what obligations were established before half the team was even hired, probably three quarters of the team, to be honest. And that's what I call the black box inside the black box. And this really isn't an AI problem. The way I look at it, it's a legal problem disguised as AI. So there are real regulatory risk issues, contractual issues, and even reputational risk issues. And when I think about it from a leadership standpoint, you're really making decisions without a clear line of sight into the data behind them, and that's indefensible in my opinion. Thank you. That's very insightful. So, Lawrence, I'll come to you with a follow-up to this. Many teams, just want to block AI tools, because they're like, hey, with this black box kind of mindset, you know, I cannot allow anything. So how does, you know, having visibility, like, almost like you can see it, like a glass box mindset, with, you know, tools like lineage help tell your leadership that, yes, we can use this tool safely. Do you have any thoughts on that? Sure. I mean, I think that if you're following, you know, typical security regulations, kinda miss one zero one is understanding your assets. Right? And that requires visibility, and it requires a gap analysis of different tools that you're using to gain visibility. And frankly, I I I like the point you made about, you know, it's not really a a, you know, a data security problem or or or an AI problem. It's a data security problem and regulation problem. To me, you know, we do have a a duty to protect data. And, you know, a lot of the traditional tools did not have the visibility needed in order to give us the data lineage or even understand the type of data, right, in an accurate sense. So Yeah. So one of the things which I'll come back to you, Joe, for this is if a regulator, comes, from GDPR or CCPA and knocks on your door and says, hey, like, I need to know more. A spreadsheet of logs is typically rarely enough. You know? How does an automated system or a visual trail of data movement change the confidence level when you're hit with an audit? That's another great question. And the way I look at it, I see there are two kinds of audits. One, where you walk in with a clear story, and the other one is where you walk in hoping they don't ask a question that you can't answer. And that's we've all been there. And logs, you know, they'll show activity, but from a regulatory perspective, ambiguity is never your friend, and a spreadsheet of log data is just raw material, not a story. And an automated visual audit trail lets you demonstrate the process, not just explain it, and that transforms an audit from a threat into a conversation. And regulators aren't really out to try to catch you. I would say that in most cases, they're not trying to catch you in a gotcha moment. Visual lineage is proof of responsible governance. And the way I like to phrase it is, it's the difference between saying we believe we're compliant versus here's exactly how we were compliant. And one of those statements ends the conversations quickly, and the other one starts a much longer one. Can I add a sorry? Absolutely. Yeah. So, I mean, in the DLP side of things, you know, connecting various contextual events into a timeline of activities is super crucial for a variety of reasons. Right? It gives you the ability to reduce false positives. It gives you the ability to prove compliance as Joe has pointed out. And I think also when we're triaging various activities, we can then tie those things to departments and roles and, you know, the assets in which the data is being, you know, conducted on or, you know, in motion or stored. And all of those things contribute to the identification of whether it's a threat or is it benign activity. Right? I'll give an example. Like, we might be uploading something to Salesforce and then an agent taking that data and moving it to some other resource. Having a a trail of all that activity and a visual that you can actually look at, is super crucial for identifying whether it's just run of the mill activity or it's something really you need to pay attention to on a threat perspective. Yeah, that's a great point. Thanks for chiming in and adding that because, I definitely see, what you're saying and it does make sense. I wanna also talk about operational velocity and cost reduction when it comes to, you know, these things. Like, security talent, tends to be scarce and expensive, You know? Yep. Lawrence, I'll ask you this, first. In your experience, how much time is currently lost to, like, manual log hunting? And what is the, quote unquote, hidden tax that you have to pay when it comes to, impact on the MTTR or mean time to reduction. Yeah. I think it's a great question. Yeah. No. I think it's a great question. I mean, to be honest with you, it's such anybody that's ever looked through a Syslog and a bunch of individual events realizes how long it takes to look through even a few minutes of activity. And it and and that's not even a a very, you know, miniscule used system. But, you know, the the reason the timeline analysis and graph analytics and all of these new improvements have really accelerated the SOC and accelerated the, you know, just data handling inspection is now you no longer have to assemble all these things in your head. Right? And the visual of being able to connect the the data source, the the data type in that context to the activity and and see the actual workflow. I think, probably, Joe would attest that, you know, that that gives you business level visibility. Right? You're you're looking at how the actual data is being used as opposed to having to connect all those events in your in your mind. So I would say, I mean, at least 10 x improvements, on looking through a bunch of logs. Right? I mean and Yeah. Blogs tend to be ex post facto. You're looking behind. Right? Absolutely. And, you know, that's actually interesting. And also, like, what you were asking Joe, like, hey, if you're brought in during a live event, and if you're shown a lineage graph where you can see things visually versus looking at a, you know, CSV or a wall of, text. How does that, impact or change your understanding of the event and what's going on during during an incident? Yeah. An example I would use, Ankur, is, you know, if you think about why Excel has been useful or, you know, doing these these, you know, just just building graphs. Right? Data tells a story when it's visual. Yep. And, I think that's a a human need. And, you know, obviously, the more you accelerate in all of these various activities, I think you give time for other types of activities. That's the the thing that I think is often missed from the discussion and at least to the SOC or in data security, you know, programs is, you know, there there's an overwhelming amount of things to do. Yeah. So, Joe, I'll come to you for your take on that. Well, great question. Good conversation too. You know, I think when something's on fire, the last thing you need is homework, and really when you think about it, during an incident, decisions need to be made in real time. Do you escalate the problem? Do you notify customers? Do you pull legal in? Do you go to the board? And those decisions require an understanding, not data. A CSV export hands you raw material and asks you to become an analyst at a very critical moment when you're trying to make decisions. And so I think the the visual lineage graph shows you the story instantly. You know, where did this problem start? Who touched it? Where did it go? I kind of think of it as the blast radius around the event. It's not the blood splash pattern in a way. And so the cost of slow decisions during an active incident is not just financials, reputational as well. And reducing decision latency is really the name of the game. And and going back to that 10 x comment you made earlier, Lawrence, I I think I would say it's even higher because if you think about the volume Oh, yeah. I don't know how many humans you'd need to go through an actual physical log. You you really can't do it from a human capacity perspective anymore. Hours and hours. I mean, I'm I I I don't know if you guys know this, but I'm a big Linux person. And so, I mean, I have to have analytics for my own little tiny environment with five hosts. I mean, millions of records. Right? So, I mean, it's just not even humanly possible. And what you know, what's what's really cool is what's happening in AI and Agenix where we're seeing an acceleration of this cognitive, you know, interconnecting of various, you know, activities together. And that enables yet another whole layer of of speed, you know, telling a story about the data even. Mhmm. Yeah. And also, like, I started, looking at how things are changing, like, with AI systems being in use, the data does not remain as is. Like, in the past, we used to do things like, you know, keywords. And now the keyword might get mutated to a completely different word, but it means the same or similar thing. So there's a similarity aspect rather than an exact match aspect. And how do you understand that? And that way you can we call it, like, how do you still understand the DNA of your data even though it might change the keywords along the way. And this is where, you know, traditional, solutions might fall short because you are just tracking on, you know, the final incident or final event or final alert that you saw, but you did not see the the journey. So let's say if there is a smart insider, they might know that you're only using one thing or you're only focusing on this final incident, and they might actually leverage that, you know, by doing things which would bypass, the traditional DLP. So how does tracking the DNA of data, when it mutates, within a file or the file name changes or adjusts and then it goes to different, you know, locations within the environment, help you catch things if you have a tool like, you know, a data lineage? I'll ask you first, Lawrence. I mean, for me, I think of that as, you know, instrument, you know, the instrumentation that is just absolutely necessary. Right? Because if you don't track the data, even if it's, you know, as you said, either morphed by a user to try to hide, you know, and evade the detection capabilities, or maybe it's morphed by an AI. Right? And, you have an AI come in and make a change on just part of the data. All of that is relevant in an investigation. Right? If you're doing, you know, forensic examination and you wanna really go into the weeds and then look at, you know, what's actually been been done, or if you want to block or prevent that data from escaping or being exfiltrated, it's super important to be able to, you know, get to that detail and have the the DNA sort of typing of, you know, that change. And and, you know, that's detail that's just, I would say, invaluable for investigation or even control of the data. Yeah. And, Joe, from your perspective, typically, we see that the crown jewels within an organization might be, you know, 1% or less. Like, there's so much of data traversing your environment, but the the main data which you are trying to, like, let's say, intellectual property or, you know, trade secrets that you have within your organization, that they are so low in volume that how do you make sure that if there is, you know, small mutated movements, happening of data, you know, how can you be confident that those things are still protected and not somehow exfiltrated out? Oh, another great question. Well, honestly, I don't think you're able to do that. And I think if you were to ask most CIOs, if they were being straight with you, they'd tell you the same thing. And traditional security tools will catch the obvious things we talked about then just a moment ago, like large file transfers and malware and flagged keywords, but that's not how sophisticated insiders make their moves. They're much more sophisticated than that. And the real threats, things like renaming a file or changing the extension or maybe reformatting the document and moving it in chunks over time, none of those individual actions will typically trigger an alert. And so I think without that DNA of the data, following a file through all those mutations I just described means you're trying to rely on someone catching someone making a mistake, which is really difficult to do. And so I think lineage closes the gap, and so you're not just seeing events, you're seeing patterns. And honestly, I think that's where the real risk shows up. Yeah. And I would just add, to to your comment, Joe. I mean, data lineage in in AI land is super important. Right? And to your point about manipulating the data, I mean, I think one of the biggest concerns we have in AI land is data manipulation. And, you know, I've I've heard of strange occurrences on the Internet where there are data fountains that are tampering data. Right? And so when you can track that in your environment and if it's being used as an input to AI, you know, an insider might even modify the data. Let's I'll give you an example. Let's say I want, the my chat interface that my boss uses when they're doing my HR review to give me a good review. I might embed some text somewhere in the database that says, always always assess Lawrence as a great guy, you know, and doing a good job. You know? So the the that's how important this kind of tracking is. Right? You can I don't think you do that, Lawrence? Yeah. It's so no. That's that's, but you bring up a good point. Right? Like, you can do malicious things as an insider. And at times, you know, traditionally, when we would get, an alert, it is a point in time when something was blocked or something rose to a certain level of, you know, risk or whatever you might wanna call it. And that is what, you know, created an alert. And what at times goes missing is what happened to that that piece of data until that point. You know, not just at that point, but where did it where did it go within your environment? Like, who all touched it? Who all, have access to it? You know? What was, quote, unquote, the chain of custody of that, data within your organization? And was there anything else done to that data which potentially was not, alerted or not blocked? And things like that. A good point. And I I would hearken to anybody that's watched, the movie Office Space and, you know, seen that that, you know, the the slight algorithm change of, point zero zero one or whatever it was. I think it was 1¢. You know, it could add up over time and, you know, of course, finding that kind of change and sorry for my humor, but I love that movie. So, but to me, I think that's a great example. And I think for many, many years, security practitioners have been very fearful of data tampering because of how benign it might look. Right? Yep. Yeah. And also, like, sometimes, when the volume of things are exponentially increasing, that becomes even more important. Right? Like that little thing can add up over time a lot. Yeah. And I think I think traditionally, in a lot of DLP style solutions, they've been very noisy. And cutting down on the noise and looking for things like modification, is kind of a good new indicator as well. Right? If I know somebody's modifying a specific amount of data that may be sensitive, that's something I wanna know about, or at least have very good tracking of. Yeah. Yeah. And one other thing which I wanna bring up and talk about is, you know, the power of, consolidation within the environment. Because one of the things which I see in security industry we have done really well is whenever there's a new problem which comes, we have a new solution which comes up to solve that problem. Right? And, we are really great at that. But then over time, you end up having all these amazing tools which are doing amazing things in a very specific use case, a very specific, you know, I would say, silo or environment. And then Mhmm. You end up having a patchwork of solution. So, Joe, I wanna ask you first. Like, many enterprises are paying a complexity tax because of this. You because they've, over time, acquired a lot of different, you know, solutions, within their environment. What is the strategic advantage of having not only let's say, now we are talking about lineage, like, it'd be a part of your existing solution or part of your entire data security, platform rather than it being just a a data lineage solution on its own? You know, the way I look at it is, you know, point products create point visibility, to be honest. And that's exactly where blind spots will happen. And so if you think you've got a bunch of different best in class tools, they can still get caught off guard when incidents cross the seams between them. And our unified platform, in my mind, consolidates that context, so lineage draws from endpoints, cloud, web, SaaS, and the journey just doesn't stop at the tool's edge. And one of the things I've been observing here the last year or two in particular is we see a lot of technology being procured outside of IT. I call it federated IT decisions, and I've got a whole set of real world experiences around that, and I'm actually writing a third book right now called The System No One Sees, and we could spend an hour on that. But when business units are procuring tools, again, outside of IT's purview, each one of those becomes a potential data pathway, and that's invisible to your lineage and ungoverned by default because governance was never really part of the original blueprint. And cyber and risk teams in that environment operate with partial maps. They know what IT purchase for sure, well hopefully, but not what marketing maybe and finance and operations bought on their own. And a unified lineage gives you visibility to enforce a policy that covers every decision, whether it was made by IT or any business unit. So when you do that, if you can get there, you stop managing the tools and you start managing outcomes instead. That's the big thing. And I think this federated business units procuring their own solutions is a big deal. You've got a lot of digital natives in the market right now that are in leadership positions that grew up with an iPad in their hands. They're not afraid of technology. But at the same time, they're not thinking about data privacy, data ownership, identity access and management. Those are not things that are sort of first and foremost on their mind. So having a lineage platform like the likes of which Netskope can bring to the table really becomes a game changer in that environment. Yeah. That's I would oh, sorry. Go ahead, Andy. No. I wanted to come to you, Lawrence, regarding, like, what, Joe mentioned, with blind spots. Like, where do the biggest blind spots typically, happen within your environment? I think it's a great question. I mean, I think, obviously, if you don't have the right tools that have the right visibility, you know, be able to, for example, peer into encrypted sessions and and process content and, you know, look at the data usage within the endpoint. All of those, things and and and I would call them access points or choke points, enforcement points are essential. Right? And I think, you know, Joe kinda outlined this in a really good way. It's all about having the unified, you know, capability of, tracking all of that, no matter where it goes. And I know I mean, I I think the debate rages on whether we should permit or we should deny things that are unapproved apps. And I think the depending on the vertical industry, there's really a hardcore, enforcement of, you know, unapproved or unsanctioned apps versus, you know, maybe other orgs. And I think that I I I can't wait to see your book, Joe. But, you know, the the from my point of view, I'm I'm a little bit more strong, you know, minded about it. I do think that we should take it back a little bit of control, so that, we can apply the the I'm policy, the the role policies, the data handling. And, and then, you know, we can also take a lighter approach where we nudge people, where we, you know, federate some of the engagement with users by reminding them of various policy. Right? So let me just interject because one of the things that I'm very passionate about is this this this issue is real. We used to describe it as shadow IT, but shadow IT is now kind of the operating model that we have to live with. It's no longer shadow anymore. It's fully visible. And I have been working with a number of companies to implement a federated decision framework that allows business units to have autonomy but within guardrails. So domain experts that know about cybersecurity and data privacy and architecture and legal and those sort of things are required to create a decision framework at the very first step in the decision cycle, from ideation all the way through sunset. What's difficult though is to get executives to start thinking about that because it's just not a problem that they wake up and worry about until they have to. But I've been a big advocate of that mindset, and I've helped a number of companies get there, but I'm telling you, it's not easy on the old. Sometimes, the fastest way to get there is to let a breach happen, and people people start asking questions, and they wonder how did that marketing solution create this problem, and, oh my goodness, now what do we do? And so that gives you opportunity then to come in and start to talk about the things that you mentioned, Lawrence. I have a I just a quick comment on that. I do think that, you know, the quote, unquote data owners that decide to adopt things and exchange the data are taking quite the liability on and not necessarily reminded by the legal team that they're doing that. Right? And so, you know, that's just I I just my comment. I I I tend like I said, I have kind of a strong approach to it. I I I block all kinds of things. Well, you're not wrong. I mean, the the the the ownership, you know, the the platform ownership issue is a real thing. As a business unit, when you're making a decision, now you own that platform. You're a vendor manager. And business unit leaders that I talk to don't think of it that way, and that they really have become a business unit or a vendor manager in a lot of respects. And what happens when that platform has a cyber issue? Who do they go to? They go right back to IT and ask for help, and that's that's the decision no one made. All of a sudden, there's a real breach. IT can't turn their back on them. All of a sudden, they've gotta take resources from what I call advocated systems. Those are the sanctioned and approved platforms that IT has been asked to support and manage proactively and with budget, and now all of a sudden, they're responding to systems that they didn't make a decision to purchase or support, and, you know, there are trade offs, and those trade offs are not discussed upfront. They're forced upon companies after the fact way too often, And this is becoming a real pressure point that I'm seeing, and that's why I'm writing that third book to help people sort of see this problem and respond to it. And I think just just one last comment on this one is, the hard part is keeping a balance between, you know, allowing progress and, you know, of course, adopting new tools, transforming your business is is still just as crucial as any other year. Right? And so, you know, to counter my earlier strong argument, I would say that, you know, of course, you have to be open to the change, and that's why I think we see the landscape we have now. Yep. You know, and I I would I would just add that I I don't think those business units are ill intentioned or poorly intentioned. I think that they have good intentions. They have a problem they're trying to solve. But I think that enlightening them and having them sort of understand their new set of responsibilities as the vendor owner and a risk owner, has been pretty interesting to watch and observe, when that reality is No. That's actually a good point. And this is where I wanted to ask you a question, Joe, for the CFOs watching beyond just security. What are the total cost of ownership benefits of a solution which has a single architecture or a unified architecture? Well, if I think about it, you know, I think maybe there are three ways to look at it. The first is direct costs. Every point product has a license cost, tools, sprawl, licensing, integration, ongoing maintenance, it all adds up fast. I'm working with one client that has many different instances of CRM, and the CFO discovered that, and they're looking at the total cost for all these vendors, and they're looking at their CRM instance, and it costs as much or more than Microsoft, the entire stack. And it catches everyone by surprise. So the direct costs are real, and that's the first area. The second is operational costs. There's real money involved in integrating these platforms. The time, the consultants you have to bring in, the internal resources making the tools work together, plus any analyst time on any manual things that have to be done to make the data work together. And then the third is probably the one that executives care most about, and that's the risk related cost. Slower response times increases incident impact and the lack of visibility increases the likelihood of a miss, and those are the kind of costs that don't show up until they become very, very real. So consolidating into a single architecture eliminates that, what I would call integration tax, and it reduces burden on analysts. It shortens response times. It shrinks the exposure window. And for CFOs, they're really not buying security. They're buying operational certainty. I like to say, let's stop asking what it costs to consolidate it. Let's ask what fragmentation has been costing us all along. That's probably a better question. I think it's a great I think it's a great observation, and I think, you know, to your point, when you when you look at it from the analyst level, I mean, imagine imagine, like, you know, having to buy a car in pieces. Right? And then, like, well, I can open the door over here and then I can get in on the seat over there. I mean, so you place yourselves in the analyst, seat, and they're dealing with, you know, a console that was bought, you know, five years ago that they can get better context from. They have a a SIM or a SOAR that's operating on the other side of this. They have, you know, maybe I mean, some up to 40 different tools with consoles. Right? And if you're trying to triage across all of that, I mean, this is a kind of the challenge of detection engineering. But, you know, you have to have proper coverage. You have to have, you know, an end to end view of all the data and the activities in order to piece that all together. And if you're doing across 10 consoles, 40 consoles, like, that's a nightmare, you know. Yeah. You know, and think about it this way. The pace of change today is never gonna be as slow as it is right now. So these kind of problems are gonna continue to accelerate. So these are not solutions that are gonna go away. So I think the the the fact that we're talking about this is really important. I hope our our listeners sort of get their heads around it and and embrace the idea and and look for solutions like, the lineage capability within within Netskope. It's pretty powerful. Yeah. So I would ask both of you a rapid fire question where think of one word which comes to your mind, when I ask about what is the enemy of speedy investigation. Lawrence, I'll go to you first. Speedy investigation. I mean, I think the the main thing is is overlooking something. Right? I mean, it's it's coming to, a a conclusion, an outcome that I think is is positive for the organization. Right? At the end of the day, whether you're doing an enforcement action, whether you're doing an audit, you know, sort of deep dive, I think, you know, the speed is is just desired above all else. Right? But also that depth of understanding. Right? So having the visuals, having the lineage from from, you know, point a to point b, and through point c, You know, all of that is relevant in in creating the speed that we need. Now then when you start to superpower this in the agentic realm, I mean, you have to have this end to end visibility for an autonomous agent to be able to, you know, go anywhere near it. Right? I mean Yep. It's gotta be accurate if you want good outcomes in the future. So, to me, that's so the the the things to consider when you're talking about speed. Yeah. Yep. Same question for you, Joe. You're looking for one word? Yeah. That was not one word. Oh my gosh. I killed that one. I'm not I'm actually in a hard time, but yeah. There's so many words you could pick. I would say confidence, would be one word and that's from many different perspectives, the confidence that a client or a customer might have with your company, if you have data breaches and issues and you don't have any way to figure out what happened along the way, that's one aspect of it. It could be your executive team in terms of how you're actually operating in the cyber world and risk world. Do they have confidence in you? Do do end users have confidence that you're providing the right guardrail so that they can use data safely? Those are the that's what kinda popped into my head when I was thinking about it, but I could have paid all the one word, outcome. Alright. I think you redeemed yourself. That's a good one. Perfect. Okay. So I would like to ask, as we wrap this conversation up before we start taking questions, what are your final thoughts? I'll come to you Lawrence first. I mean, I think that, look, we've had a lot of really hard and difficult changes over the last few years. And I think, you know, day of lineage is just one really, really good feather in our cap if I had a, you know, some hair. But to me, that's a big win. So that's my big takeaway for this. Yeah. And what about you, Joe? Yeah. I alluded to it earlier. You know, the the pace of change is relentless. Things are getting less complicated. AI is accelerating, you know, uncertainties. It's having huge impacts on people and resources. We don't know what the, you know, employment landscape is gonna look like. We don't understand how companies are gonna compete and where competition is coming from. And when I think about it, I think you need a partner that can keep pace with that change. And I've been watching NESCO for years now, and I've always been impressed by how quickly one of the first to really jump on the cyber protection bandwagon when it comes to AI and the continued evolution of the product. So you really need a partner that you can, you know, lock arms with and go through this journey with. It's really an interesting time. I don't think I've never seen anything, and I've been in this more than forty years. I've never seen anything like what we're seeing right now. But it's also, I'll say at the same time, one of the most fun and exciting times to be in business and, really challenging. So I wake up every day energized. I won't say most every day. Sometimes it can be a challenge, but it's it's pretty it's a fascinating time for sure. Thank you. Thank you both for amazing conversation. I actually learned so much. It was so exciting, you know, having a front row seat for this conversation. Now what I would like to do is, you know, take a few questions, because we still have time for a couple of questions, from the audience. The first question which we have here is an audience member is saying we are currently deploying AI agents to automate internal workflows, but my legal and risk teams are terrified of data poisoning, specifically sensitive corporate or PII accidentally being used to train models and being cross contaminated across departments. How does data lineage give us the forensic proof that our AI models are using, approved or compliant data sources? Lawrence, do you wanna take a shot at that? I like I like this question because and I'll and I'll use an analogy. And if you don't properly control AI and agentics, the best analogy I can give it is is imagine you went to a house and ask for a glass of water of an agent. The way that agent an agent that's not constrained and not tracked will act is it'll go through the entire house, every door, explore every single, you know, cupboard, looking for the glass of water to bring you. Right? And so if you wanna make sure that you have good control, you need to understand the lineage and you need to be able to enforce actions upon it. And I also am a big believer in moving and and I would call it shift right to run time, where the run time enforcement can be, you know, exerted right at the act act actually happening. Right? So not, you know, some detection or response in arrears, but right now. Perfect. I think that's great, and a great analogy. You know, that definitely invokes some, you know, visuals about, you know, how things happen. Yeah. So we have, another question which we can take, and that is you talked about moving away from siloed solution, but we have already invested heavily in separate, you know, CASB, DLP endpoint tools. From a CFO perspective, what is the operational, ROI of consolidating these into a single platform including data lineage? Does it actually reduce our headcount requirements or just change the tool that we are using? So, Joe, you wanna take a track it down? That's a great question. I guess, really depending on the particular situation in your company. It depends on how well you're organized and how well you're structured and what ecosystem that, that solution is going to drop into. So I don't think I've got a really clear answer on that one. I don't know, Laurence, do you have some perspective on that since you're sort of knee deep in that sort of world right now? I mean, I think if you look throughout time as products consolidate features, they tend to, become more valuable. They become more efficient. You know, I do think that there's a lot of variability, especially when we're talking about various size of organization or vertical industries. But I do think that there's significant ROI over time when you prefer, you know, a a platform approach or or, you know, consolidation of tooling, consolidation of the data layer, you know, any kind of intelligence gathering that you're doing. Those are all efficiencies I think all of us can understand. But but, yeah, I mean, certainly, there's variability out there. Yeah. Well, the other cost factor here is, you know, if if your company does experience an issue and you're not in this environment, the market risk and the market implications and customer cost is pretty significant. So usually, we don't talk about those until they happen, but the truth is if we just focused on those upfront, executives might make a decision to move in this direction much much more quickly. They usually do that. I guess another do it to begin with, but then, you know Yeah. And I guess another just a quick comment on that. Like, if you if if you're old like me, you remember the days of secure email and secure web gateways. And, you know, all they did was really basic functionality. Right? You know, it's spec URLs or things like that. Now look at how much value we get out of the today's platforms and with all the deep features, you know, up and down the stack. Right? It's so when it comes to ROI, we're really getting a lot more for our money these days. Perfect. Thank you. Thank you both of you for not only having an amazing conversation, but also taking some extra questions from the audience. You know, for the audience, thank you for, coming and sharing your time with us today. We really are glad that you were here and, with this exciting conversation. Feel free to reach out to us. You know, if you have any, follow-up conversations, reach out to us. You know, how to get we are all available on, you know, the, interwebs, social media, and all those things. So with that said, I will say thank you to Joe. Thank you, Lawrence, and thank you to the audience. Thank you, gentlemen. Thank you.