WEBVTT 1 00:00:00.330 --> 00:00:02.730 Tom Field: Hi there, I'm Tom Field. I'm senior vice president 2 00:00:02.730 --> 00:00:05.580 of editorial with Information Security Media Group. The topic 3 00:00:05.580 --> 00:00:08.820 of conversation is why it is near impossible for humans to 4 00:00:08.820 --> 00:00:12.630 beat cybercrime alone. Look who we've got in ISMG Studios - 5 00:00:12.840 --> 00:00:16.020 Bipul Sinha, he is the co-founder and CEO of Rubrik. 6 00:00:16.380 --> 00:00:18.630 Bipul, thank you so much for taking time to speak with me 7 00:00:18.630 --> 00:00:18.960 today. 8 00:00:19.199 --> 00:00:20.849 Bipul Sinha: Thank you so much for this opportunity. 9 00:00:21.020 --> 00:00:23.840 Tom Field: Well, I want to start here. Let's talk about why it's 10 00:00:23.840 --> 00:00:27.740 become so tough for humans to fight cybercrime on their own. 11 00:00:28.010 --> 00:00:30.350 Cybercrime has grown up considerably in the last several 12 00:00:30.000 --> 00:00:33.630 years. 13 00:00:30.000 --> 00:00:34.230 Bipul Sinha: It is actually almost impossible to human to 16 00:00:34.230 --> 00:00:39.450 comprehend the scope, velocity and variability of cyberattacks 17 00:00:39.450 --> 00:00:42.930 because our data is everywhere - it's on-premises in the data 18 00:00:42.930 --> 00:00:46.410 center, it's in the cloud platforms, and all sorts of SaaS 19 00:00:46.410 --> 00:00:50.340 applications, and it increases the surface area of attack. And 20 00:00:50.340 --> 00:00:54.300 for folks to understand, correlate, causate, what started 21 00:00:54.300 --> 00:00:56.730 where and when, it is almost impossible. 22 00:00:56.730 --> 00:01:06.000 Let's talk about machine learning and artificial intelligence. Anecdotally, of course, we hear well, they make phishing notes and ransomware notes more sophisticated and 23 00:01:06.000 --> 00:01:10.170 harder to detect. Specifically, what's been your experience? 24 00:01:10.780 --> 00:01:14.950 If you look at AI/ML, it is, it can be used for good, it can 25 00:01:14.950 --> 00:01:18.760 also used for nefarious purposes. The bad actors are 26 00:01:19.060 --> 00:01:23.710 using AI/ML to really trick us human beings to click into an ad 27 00:01:23.950 --> 00:01:28.300 to actually give us an offer that we can't refuse. Or they 28 00:01:28.300 --> 00:01:32.560 actually are enticing us in different ways and also taking 29 00:01:32.560 --> 00:01:34.720 advantage of human vulnerabilities such as 30 00:01:34.720 --> 00:01:39.220 procrastination, such as our ability to quick react to an 31 00:01:39.220 --> 00:01:42.880 offer, which could be an attack. But on the other hand, AI/ML can 32 00:01:42.880 --> 00:01:47.620 also be used for good for really to understand what is the intent 33 00:01:47.650 --> 00:01:51.640 of a particular event: If this event is correlated to a broader 34 00:01:51.640 --> 00:01:55.030 set of activities? Is this could potentially be a zero day or 35 00:01:55.030 --> 00:01:59.110 could potentially be an unpatched vulnerability, where 36 00:01:59.110 --> 00:02:03.730 the humans can intervene by using the artificial 37 00:02:03.730 --> 00:02:06.550 intelligence augmentation to really solve the problem? 38 00:02:06.000 --> 00:02:09.390 Tom Field: Well, you talk about how AI can be used for good. 39 00:02:09.420 --> 00:02:12.420 Number of vendors they are trying to infuse AI into the dev 40 00:02:12.420 --> 00:02:14.280 process from the get go. What are you seeing? 41 00:02:14.760 --> 00:02:17.370 Bipul Sinha: We have been working on AI for the last five 42 00:02:17.370 --> 00:02:20.910 or six years because what we fundamentally understood is, AI 43 00:02:20.910 --> 00:02:24.090 can be applied on the mission-critical business data 44 00:02:24.090 --> 00:02:27.510 of the customers to really derive security intelligence out 45 00:02:27.510 --> 00:02:30.180 of it, such as how far ransomware has gone or 46 00:02:30.180 --> 00:02:33.150 cyberattacks have gone? What is the sensitivity of the content? 47 00:02:33.180 --> 00:02:36.930 Is there malware sitting in the data? When customers understand 48 00:02:37.230 --> 00:02:40.830 the data risk, they can really restore their operation upon an 49 00:02:40.830 --> 00:02:44.670 attack. Obviously, prevention is important. But resilience, which 50 00:02:44.670 --> 00:02:46.380 comes from data security is the key. 51 00:02:46.810 --> 00:02:50.170 Tom Field: Bipul, Rubrik, you've got a CISO advisory board. So 52 00:02:50.170 --> 00:02:53.110 that you are a little bit about it first, but how is the CISO 53 00:02:53.110 --> 00:02:56.500 advisory board helping you formulate some best practices 54 00:02:56.500 --> 00:02:58.270 that you in turn can share with your customers? 55 00:02:58.540 --> 00:03:01.540 Bipul Sinha: So if you look at us in Silicon Valley, we are 56 00:03:01.540 --> 00:03:04.750 living in the technology bubble in Silicon Valley. And all the 57 00:03:04.750 --> 00:03:09.160 magic happens at the customer sites when the CISOs and CIOs 58 00:03:09.160 --> 00:03:11.440 are solving real business problem. And we need to 59 00:03:11.440 --> 00:03:15.790 understand their perspective, their feeling and their vision 60 00:03:15.790 --> 00:03:18.190 for the future for their businesses. And how do we 61 00:03:18.190 --> 00:03:21.340 translate that into products and features that we build, and that 62 00:03:21.340 --> 00:03:23.890 is the outside-in and inside-out relationship that we are 63 00:03:23.890 --> 00:03:27.310 building with CISOs and our own CISO advisory board is helping 64 00:03:27.310 --> 00:03:30.520 us formulate the product direction road map to really 65 00:03:30.520 --> 00:03:32.830 solve the problems of today and tomorrow. 66 00:03:32.000 --> 00:03:35.030 Tom Field: So your clients benefit from what you get from 67 00:03:35.030 --> 00:03:36.290 the CISO advisory board? 68 00:03:36.440 --> 00:03:37.280 Bipul Sinha: Absolutely. 69 00:03:37.550 --> 00:03:40.310 Tom Field: They also benefit from partnerships you have with 70 00:03:40.580 --> 00:03:44.330 stalwarts such as Zscaler, Microsoft, Palo Alto Networks. 71 00:03:44.330 --> 00:03:46.310 What are some of the benefits of those partnerships? 72 00:03:46.330 --> 00:03:50.260 Bipul Sinha: See, the thing is that the scope and variability 73 00:03:50.260 --> 00:03:53.890 of the attacks as I was saying is so huge that one vendor alone 74 00:03:53.890 --> 00:03:56.560 cannot solve the problem. Cybersecurity industry 75 00:03:56.560 --> 00:03:59.290 traditionally focused on prevention of attack, but the 76 00:03:59.290 --> 00:04:03.490 new world is resilience, is data security. And how do you bring 77 00:04:03.490 --> 00:04:07.030 this infrastructure security and data security together to 78 00:04:07.030 --> 00:04:10.030 provide end-to-end zero trust? That's what we are doing with 79 00:04:10.270 --> 00:04:14.230 Zscaler, with Microsoft, with Palo Alto Networks. Our goal is 80 00:04:14.230 --> 00:04:18.100 to be a vendor that brings the data intelligence into the 81 00:04:18.100 --> 00:04:21.550 SecOps so that the SecOps can fully understand from 82 00:04:21.550 --> 00:04:23.470 infrastructure risk to the data risk. 83 00:04:23.500 --> 00:04:25.150 Tom Field: What's a good way of saying and we started this 84 00:04:25.150 --> 00:04:27.910 conversation by talking about why it's near impossible for 85 00:04:27.910 --> 00:04:32.380 humans to beat cybercrime alone. How would you summarize how 86 00:04:32.380 --> 00:04:35.770 Rubrik is helping customers to beat cybercrime? 87 00:04:36.110 --> 00:04:38.480 Bipul Sinha: Rubrik is helping customers increase their 88 00:04:38.480 --> 00:04:42.020 cyber-resilience posture. Because if you can restore your 89 00:04:42.020 --> 00:04:46.880 applications, restore your business, you can assume risk, 90 00:04:46.970 --> 00:04:50.150 assume breaches, but still continue to operate, because in 91 00:04:50.150 --> 00:04:54.020 this world, prevention is impossible. The best option for 92 00:04:54.020 --> 00:04:58.310 customers is to build resilience in their whole business operation 93 00:04:58.310 --> 00:04:59.750 and Rubrik is helping to do that. 94 00:04:59.810 --> 00:05:01.130 Tom Field: I don't I think you could say that better. That's a 95 00:05:01.130 --> 00:05:02.180 good message to leave with. 96 00:05:02.510 --> 00:05:04.040 Bipul Sinha: Thank you so much for this opportunity. 97 00:05:04.000 --> 00:05:05.140 Tom Field: Thank you, Bipul, it's been a pleasure. 98 00:05:05.170 --> 00:05:05.800 Bipul Sinha: Same here. 99 00:05:06.040 --> 00:05:08.170 Tom Field: We have been talking with Bipul Sinha. He is the 100 00:05:08.170 --> 00:05:11.290 co-founder and CEO of Rubrik. For Information Security Media 101 00:05:11.290 --> 00:05:14.290 Group, I'm Tom Field. Thank you for giving us your time and your 102 00:05:14.290 --> 00:05:14.710 attention.