May 15, 2024

00:41:22

Episode 256 Deep Dive: Andre Durand | Verify More, Trust Less

Episode 256 Deep Dive: Andre Durand | Verify More, Trust Less
KBKAST
Episode 256 Deep Dive: Andre Durand | Verify More, Trust Less

May 15 2024 | 00:41:22

/

Show Notes

Founded in 2002, Ping Identity has become a leading provider of enterprise identity security, serving more than half of the Fortune 100 and protecting more than 3 billion identities worldwide. In 2016, Ping Identity was acquired by Vista Equity Partners and in 2019, became the first Vista company to IPO on the New York Stock Exchange, trading under the symbol PING. In 2022, Thoma Bravo acquired PING and took the company private for US$2.8B. Prior to Ping Identity, Durand founded Jabber to commercialise the Jabber open source instant messaging platform which was acquired by Cisco in 2008. 

Durand serves on the board of Jamf (NASDAQ: JAMF) and in his spare time focuses on causes related to children in the foster care system, building great culture and creating opportunities for entrepreneurs. Durand holds a BA in Biology and Economics from the University of California at Santa Barbara and lives in Denver, Colorado, with his wife Kim and two daughters.

 

View Full Transcript

Episode Transcript

[00:00:00] Speaker A: All the interactions where there is some level of trust embedded in our way of operating. If you really dissect all the places that there's a level in trust for us to do business, it's pretty extreme. It's like every interaction has some element of trust. So to embed verification into every transaction comes at an extreme. Both infrastructure cost, technology cost, as well as possible friction to end users. And so we live in the balance of the tension between how much risk do we want to assume? How much friction are we willing, or can we afford to introduce to our end users? All I'm suggesting is that the bar is rising on all of those dimensions. [00:00:44] Speaker B: This is KBCs as a primary target for ransomware campaigns, security and testing and performance and scalability, risk and compliance. We can actually automate that, take that data and use it. Joining me today is Andre Duran, CEO and founder of Ping Identity. And today we're discussing verify more, trust less. Andre, thanks for joining and welcome. [00:01:08] Speaker A: It's my pleasure. Thank you. [00:01:10] Speaker B: So let's start right there. Talk to me more about what you mean by verifying more and trust less. [00:01:16] Speaker A: I would say really, through the evolution of human history, we've gone from small, communal like societies where reputation and trust, and what I'll call the network of trust, was kind of implicitly woven into how communities worked to now the world is flat, and all 8 billion people can essentially click a button and communicate and interact. And in this new world that is made up of both good actors and bad actors, the possibility for essentially theft and fraud and malicious intent has essentially gone exponential in this digital world. And so the historical perspective on the boundary between what is safe and what is not safe, what is known versus what is unknown and what is presumed either trusted or untrusted. In the digital world, we've defined those boundaries historically as our network. So our network and our people and the computers and systems and data, we would essentially both physically and virtually create a barrier that we refer to as the firewall, for example, and or the door that gets you into the building in a physical manifestation of that. And so we had these trusted areas, and inside of these trusted areas, there was a lot of trust if you were kind of through the barrier, if you're in the building or through the firewall, so to speak. But we live in a world now where the speed and the intricacy of the interconnectedness of everything to everyone is one in which that paradigm essentially doesn't work for our current world. I mean, people are working from home on personal devices. They're changing locations a lot. All the applications and data obviously have left our building and are now spread throughout multiple clouds. And so in that world now we're in a situation where trusting and what does it mean to trust people or their actions is being called into question. And there is a security, I want to call it necessarily a philosophy, but maybe goal, in which let's presume that we can't trust interaction by default versus trust them by default. And we now need to verify always as just a safer paradigm from which to transact in our new world. So don't trust the identity, verify the identity, don't trust the device that the user is using at a moment in time that they're interacting with you. Let's verify the identity of the device. A lot of malicious intent happens because actors spoof an identity, but on a different device. And the entire notion of a secure network, let's not trust that the network is secure. Let's presume that bad actors are already on the network. So it's a shift in thinking from old world kind of safe zones, trusted zones and untrusted zones. All those lines have now been blurred or blown away. And we are taking on a new view of how to secure just a highly distributed world. [00:04:40] Speaker B: There's a couple of things in there that I want to just press on a little bit more. You said shift in thinking. Now we are optimistic in cybersecurity, or we try to be, would you say from your experience and where you're sort of sitting, we have arrived in that sort of shift in thinking. [00:04:55] Speaker A: Oh, we're a long ways from it. I think that there's a general appreciation for the fact that the topology that we're looking to secure has now changed. And the methods, the tools and the techniques that we historically leveraged to create security are now less relevant in the topology of the new environments that we find ourselves in. And so as a result of that, I think there is a general recognition that we need to shift from, to something from, you know, call it secure boundary thinking, or things in my control that I can secure to things that are outside of my control but I still have to secure. But the journey to get there is sophisticated, if not complex. It involves a lot of new tools and mental models and thinking. The environments that we're looking to essentially evolve to this new way of thinking really navigate a multi generational it landscape. And much of which is not, let's just say, friendly, if you will, inherently friendly to all the new things that we're trying to do. So it just makes the it makes it a big challenge. It doesn't change the fact that it's reality and we have to deal with it. But it's going to be a journey, and it's going to be measured as a multi year, if not a decade long journey. [00:06:18] Speaker B: So you said before we have to shift from something to something. So what would be the to something? [00:06:23] Speaker A: So the to something is where the presumption is that anything or anyone that you're interacting with needs to be verified as best as we can verify. For example, if I send you an email with a link that says, follow this link to enroll in our MFA program, and we will have you download some software, install the software on your phone, and the software and the device will now be leveraged as a factor of authenticating you. We no longer should trust that the person that clicks on the link and enrolls their phone is actually the person that we think it is. We might want to verify that it's actually that person enrolling their phone into your strong authentication. Does that make sense? [00:07:11] Speaker B: Absolutely. So is that the part where you would sort of think with customers, that's the part that people are finding difficult maybe to understand, or there's more friction, or where's the part, because you mentioned before that we're not sort of there. In terms of the shift of the. [00:07:25] Speaker A: Way I'm thinking, zero trust thinking expands far beyond the example that I gave you. So I think if you give any one concrete example, I don't think it's difficult for people to comprehend or appreciate that some of those challenges that they've been living with, the risk associated with what I've described, the risk has been rising in recent years. Just given the focus that is now happening on with digital fraud. I mean, it just really is starting to reach a level of criticality that I think everyone is feeling it. So again, it's not that they don't see or appreciate it, but the examples that I gave are broad. All the interactions where there is some level of trust embedded in our way of operating. If you really dissect all the places that there's a level in trust for us to do business, it's pretty extreme. Every interaction has some element of trust. So to embed verification into every transaction comes at an extreme. Both infrastructure cost, technology cost, as well as possible friction to end users. And so we live in the balance of the tension between how much risk do we want to assume, how much friction are we willing or can we afford to introduce to our end users. All I'm suggesting is that the bar is rising on all of those dimensions. [00:08:46] Speaker B: Yeah. And I know it's not an easy thing to sort of answer, so I know that we're speaking in more generalized terms. So I had a discussion yesterday with head of security from a large australian retailer here in Australia, and we were talking, going back to your point before, around friction. And it's like, you know, some of these organizations, and if we focus on retailer for a moment, they don't want to introduce extra friction because it could result in people not checking out and not, you know, making them money. How do companies sort of then balance that? But then as a result, this organization was in the news recently, this year, because of, you know, credential stuffing, et cetera. How do you, how do you find that balance in that equilibrium? [00:09:22] Speaker A: It's a great question and a great example. And we're actually involved in many companies that are tackling both the security and the user convenience impact to the bottom and top line. And I'll share generically what some are doing here. So one of our retail customers, a ways back, built a business case around the notion that logging in an abandoned parts, meaning they might have responded to an email or an ad, put something in a cart, then kind of got cold feet and left, and when they come back, they have to register again. And so the thesis was, if we could figure out a way to not force users to register all the time, maybe we could figure out a way for them to register every six months, for example, or maybe once a year, not register, but authenticate login. And so that was the business case, that was the hypothesis that some amount of top line was being lost to the friction of login and abandoned cards. Lo and behold, they implemented some of our technology that in essence, leverages a growing number of signals, risk signals, that might indicate that an account or a session has been hijacked or an account has been taken over. And as a result of implementing this behind the scenes technology, they were able to achieve really what was the desired goal of not having users log in every single time they clicked on anything and came back to the website, were just logged in and they saw a massive increase. I can't share the numbers, but a massive increase to the top line. So the presumption was actually accurate. Friction was robbing them of top line business. Furthermore, they actually ended up seeing a reduction in fraud. So they ended up seeing what I kind of referred to as the trifecta for a retailer in the online world, which is they saw a better top line, they saw reduced fraud, and they delivered a better user experience, which speaks to NP's and loyalty. Ultimately, retailers online measure the distance in competition in really seconds and keystrokes versus minutes and miles in the physical world. So one bad user experience and people have too many choices where they can get an exceptional experience. And so loyalty is very fickle to the friction in the retail experience anyway. So there's an example we've had since, had many retailers implement what I'm describing to similar top line, bottom line user experience impacts. It's just a great example of where we're progressing the technology to find a better balance in the security broad frictionless end user experience. [00:12:00] Speaker B: And I think it's a great example because that's one that I'm probably a little bit more familiar with and one that came up my conversation yesterday, and I agree with you in terms of loyalty being fickle nowadays, I just want to follow this example up a little bit more. Now, if we go back to retailers, would you say, and using this australian retailer that was in the media recently, they were sort of gambling with, well, we don't want to introduce more friction because, I don't know, 10% of customers are not going to check out and we're going to lose 10% of revenue or whatever it may be then, because there was an issue, it actually meant it was a disruption to their business, they had to pay customers back, etcetera. So do you think they had calculated that risk on, okay, if we had maybe just implemented the friction at the start and front loaded that sort of maybe risk to their business on the revenue, perhaps we wouldn't have had the long tail impact. Now, I don't know whether it's the same or, you know, outweigh one another, but do you have any thoughts then on that, with your experience? [00:12:59] Speaker A: I do. It's such an astute question when you're focused on the movie and not a frame of the movie. So everything related to what are you willing to spend today based upon the probability of a future event that could cost you? And in all of the risk management math, I guess at the end of the day, while there are statistics that say, for example, the average cost of an insider breach, caught early, not late, averages $16.2 million to an organization. Okay, well, what is the probability of an insider event from which I could derive my willingness to invest today to keep a possible event from occurring and a much more exorbitant fee being essentially extolled by the organization? It's a tough argument. I'm just going to say that the reality is security and risk. While it is getting board level attention. And people do recognize that there is a material, immediate financial cost, but an unknown, very large reputational cost. I think companies recognize it, but I wouldn't say that is necessarily fully reflected in the investment or spend. So there does seem to be a disconnect and maybe the industry needs to work harder to connect the probability of those events and the cost to the actual investments which are being made. I do think that there probably is work there to be done and maybe a little bit more science to be applied. DNO insurance and some of the exorbitant fees through ransomware and other things as insurance companies try to recover from some really, really big, very, very expensive breaches. It certainly has created a financial awareness that many companies can no longer avoid. They can't afford to be without some level of cyber insurance and DNO insurance. And there's regulation that is putting even more focus on the responsibility of boards and management teams to protect customer data and essentially behave in a cyber responsible manner. So I do think that things are improving, but I think there's pretty big disconnect. [00:15:13] Speaker B: Yeah, I think that's a great point because when you said around board levels, I used to write the sizzo for the, one of the largest banks here in Australia, all their reports. So I sort of had a appreciation for the communication side of it. One of the things that's going back to the example again is this is I had this discussion with his head of security. Do you think we're just not doing a great job at explaining, hey, if you invest arbitrary number 100k here, yes, we're probably going to lose a bit of money and in doing an investment, whether it's with ping identity or whoever, but then we potentially may not then lose, I don't know, a million dollars worth of sales because, I don't know, something happens down the line or it's a disruption to our business, we're not making the revenue that we were. Do you think that perhaps security practitioners not conveying that perhaps to a CFO? And I asked that because I have spoken to CFO's and really, if you, if you zoom out, what they ultimately care about or their function is how much money is the business earning and how much money is the business sort of burning. [00:16:11] Speaker A: And they have benchmarks, frankly, in it that includes security that they also are monitoring, which is oblivious to the risk or cost of deferring risk. So, yes, I would say we are not doing a good job as an industry. Connecting the dots now, one of the things that we do at Ping, both on the cost avoidance, meaning cyber incident avoidance, as well as on the productivity or top line, say in the retail example, we have spent a fair amount of time quantifying what we can and providing essentially value assessments or value calculators that are used by the, the champions and others who do leverage our technology, who, like everything, seek budget in a finite pool of budget to invest proactively in the integrity of their security stuff. So we have done a fair amount there. That tool and the effort that we apply to that tool in concert with some of our customers, it's not to all of our customers by any means, by any stretch, and I would say tools, whether it's ours or others like ours, to in essence put to number what would be a responsible spend and what the outcome and lowered risk would be for the CFO. We just have a long, long ways. [00:17:28] Speaker B: To go in terms of connecting the dots with your experience and your background and the tenure you've been doing this. Where do you think was sort of going wrong? Because this is an executive podcast, and this podcast is not just for sizes, it is for CFO and friends. I'm really curious then to hear your thoughts, because I think that this is still a problem that has been around for so long. Oh, we can't communicate. Always being technical and really coming back to, well, what's important to a CFO. It's what I mentioned before, it's not about the technical elements to a product. Can this make me money? And how much does the thing cost really, when you zoom out? [00:18:03] Speaker A: Well, I mean, if you net it out, the role of management is in the allocation of resources, people and investments in tech and processes, both capital and operating. And everyone is starved ultimately for what they would want to feed every part of their business. And some parts of their business are, you know, cost of operations and other investments really drive the top line. So when push comes to shove, you want to feed the side of the organization which drives the top line in revenue, and you're trying to cost, contain at some level what could be an endless amount of investment in the back office, so to speak. I do think that it just really comes back to, can we drive harder and more defensible return on investment analysis of this infrastructure? I think that's probably the area, and that normalizes it because everyone's talking about a dollar spent here and what the ROI is and a dollar spent there. What's the ROI? And I just think we can and should do a better job on that front. And the risks are rising rapidly. I mean, we're not living in the same threat landscape or digital infrastructure that we were a decade ago. It is materially more active and more sophisticated, as evidenced by the number of breaches. And the amount of money that has been extolled from companies has, you know, it has been steadily rising at it and really at an accelerated pace, I'd say, over the course of the last five years. So whereas you might have been able to not focus on it because probability of risk was x and now the probability is y, I think we're entering a zone to where it becomes somewhat unavoidable. We just need to be paying more attention to it. [00:19:49] Speaker B: Would you say as well that people are willing to, in air quotes, gamble, run the risk until there is some type of incident? Because no one's gonna willingly want to pay more money for stuff like cyber that, you know, and I, and I know this is my brother in law's a CFO, and he talks to me a lot about these sort of things. So is that, is that a very true sort of, you know, reality that people are willing to maybe gamble? Not all companies, I'm just speaking generally, are the average sort of organization that is out there until something happens and then maybe, oh, we've better do something. [00:20:21] Speaker A: Well, I think the larger the company, the more risk aware they are, the more resources they actually do have. And you also have a series of regulated industries that, you know, that have forced a level of access control, assurance and other controls to ensure companies are not subverting the responsibility of protecting their system. So in regulated industries and large companies with more resources, ones that have more to lose in their brand reputation, their entire business, say, for example, financial services, rests upon a certain level of trust of their customers, that they are good stewards of their, you know, of their money, which is effectively is, you know, boils down to a field in a database somewhere. You think about that. All our value is stored as a field in a database, not as dollars or gold bars and a safe, it would be extremely damaging. So there are industries where I think they're much more risk aware and investing appropriately as a result. But as a general note, yeah, I would say that there are certainly a lot who are more worried about the top line, and this line item on the spreadsheet is not in the top ten. [00:21:34] Speaker B: I agree. I absolutely agree, because I'm at the coal fate of this industry. I'm interviewing people like yourself, people that are outside the space. They are saying that, well, this stuff costs a lot of money. Cybersecurity is not cheap. It is a massive line item. Can't see it. Well, you know, we didn't get hacked or breached this year. Clearly it's done its job. But again, going back into the discourse in which maybe a CFO sees things is very fundamentally different, the way in which maybe you or I would see something. [00:22:01] Speaker A: Well, and it could be endless. I mean, how much defense in depth is enough? And again, to your point, if you haven't been reached last year, it's a decent argument. And human nature is, if it didn't kill me last year, it probably won't kill me this year right up until it does. And so, I mean, this is an inherently challenging conversation to have. [00:22:20] Speaker B: No, I. 100%. I really do get that. And going back to your point around, you know, financial services, you know, worked in a bank, worked across that. Absolutely. You know, you've got government bodies breathing down your net. You have to be compliant in certain areas. So it's a little bit different for, I don't know, retailers and hospitality companies. You know, they don't have that sort of overarching cloud above you that you have to do things. So, I mean, look, it's not about having all the answers, it's more just having a chant and trying to get insights from people like yourself to share with the wider community. So on that note, I want to shift gears now and maybe talk a little bit more about from your experience and what you're seeing. Are you seeing that shift to companies leaning more into verification? We spoke a little bit more about, you know, the cost and having that mindset shift, but are you seeing that happening more now? [00:23:14] Speaker A: Well, ping is seeing it probably because we have a solution here. It's been around for a long time, but I would suggest that verification, it's expensive. Typically, it's not a great user experience. The in person, in many cases, is a proxy for the verification. So remote digital verification, we've had different techniques for a while. Q and a right question and answer for things that only you should know, like a form of secret, if you will, through the credit unions, was what by and large, the industry did to verify your identity remotely for a period of time until. Until all of those data sources essentially got hacked and the secrets were out. So all of a sudden, you can't rely upon some aspect of your financial information to be a secret that only you know. And so it has now shifted to, at least in the self service world, the ability to verify user. It shifted now to verifying in some way your physically issued digital credentials and think driver's license, real id passport, and combining it with your biometrics liveness tests of you and comparing it to the biometric on the issued physical document, I think that's an interim state because there's a lot of room for mistakes in interpreting a falsified document combined with deepfakes hitting about now. But it's the best we can do. I mean, society, for the most part, trust in society does rest upon when truly asked, let me see your driver's license. Honestly, if you like, all kind of legal mechanisms rest upon. The government needs to do a job in vetting you, issuing you some form of identification, typically physical, and we ask to look at it is if we would know a fraudulent one from. I mean, maybe if you're at a bar and you're used to recognizing fraudulent ids, but for most of us, like looking at an id, I wouldn't be able to tell a fraudulent one for not. And none of us recognize all the different formats of these ids in the states. It's 50 for states and 50 different ids. And even Colorado has changed the look and feel of the id through the years. So I might recognize one, not recognize another, but look, it is state of the art at the moment. There is so much fraud going on now that the willingness to introduce the friction of verification is higher than it was before. So just flat out the need to secure transactions and reduce fraud. We had one of our financial institutions who, in the first week of implementing our verification upon loan origination, cut through $300,000 of essentially fraudulent loan origination in the first week. I would say there is a very heightened awareness now. People are looking at every step in the identity journey, from verification through authentication, through authorization. And there just is a heightened awareness that this is what's being abused, that is leaking money to fraud in many cases, or compromised accounts, that ultimately leads to some form of fraud and lost money. So we're having to fortify every step in our identity perimeter against these attacks because they're so focused here. [00:26:33] Speaker B: Now, would you say that's what the big push is to getting people to lean into verification? Because it's like, wow, 300k in one week. That's a lot. I myself used to report on numbers the bank used to lose per month, and it was a lot. And this was going back ten years ago, so I wouldn't want to know the numbers now. Do you think it's just more so financially? It just makes sense. [00:26:54] Speaker A: It just makes sense. It just makes sense. And things that were hard to solve, and people were willing to assume the risk for the greater good of customer friction. And so you just, you know, I mean, think about, like, for example, you know, the credit card industry operates on roughly 3%, right? If fraud is, if fraud grows to a certain amount, the business model breaks, doesn't work, it can't be profitable. So, and I would say most of our businesses presume some fraud, but at some point, our business model, the fraud overtakes our business model. So it is an imperative that we stay ahead in the techniques that allow us to continue to conduct good business and keep fraud at bay. Now, all value, all forms of value, will always and forever have been attacked. So we're in a forever war on this front unless everyone in society became a good actor, which I'm not, unfortunately, too hopeful about. So, yeah, so I think zero trust, verify, always. And it's not just verification, as I described it, of a user id. It's verification of the device that the user is using. It's verification of their user behavior. It's verification of all the other signals which could indicate authenticity of the user we think we're interacting with. And it's just going to take everything we've got to ensure that integrity in our digital channels. There's one other piece that I was, you know, I mentioned, state of the art at the moment is just verifying the physical credentials. There's one step beyond this that I'm super excited about, and it's right around the corner, and it's when trusted parties issue digital credentials called decentralized identity. And the notion is your phone becomes a wallet for digital credentials, very much the way you would store an airline ticket or a, or a movie ticket in your iOS wallet or the wallet on Android. But think, think much broader in terms of what that digital ticket or card could do. So we refer to them as digital credentials, and it's all backed by some very, very good crypto. But the notion is an individual can carry around certain proofs about themselves, proof that they're an employee of digital proofs that they're an employee of a company or a, or a loyalty member of this airline or a customer of this bank, a citizen with a real id, you know, issued by the government. We today, as individuals, cannot carry digital proofs around with us to prove something about us when asked. So the act of verifying, whereas today the act of verifying is very onerous, and every company has to do it over and over and over again. We have to do that because we have no reusable proofs that individuals could carry around with them. That's an opt to change, and that is massive for zero trust. We live in a world where, let's presume zero trust. Okay, I want to transact with you, and I don't trust you. What am I willing to do? Well, not a lot. I'm not willing to risk a lot. It's the reason why if you get a new credit card for the first time, I'll give you $500 credit. I won't give you 50,000. Cause I don't trust you. There's no history of interaction with you to extend that level of trust. So trust is built over time, as our say do ratio, a one to one. We say it, we do it. When we follow through over a period of time, trust grows, and we in relationships are willing to extend higher and higher levels of risk. But that's a process. And that process, from low to high trust takes a lot of time in the gap. There's a lot of money that's lost. We could do a lot more if we could go from low to high trust fast. How do you go from low trust to high trust fast in new relationships? Well, one of the things we do is we borrow from your reputation with other entities. It's what the credit score actually is. So if you borrowed money from a whole bunch of other people and you've paid it back on time, your reputation or trustworthiness to loan money and get it paid back is based upon your credit score. Your credit score is reputational trust in a digital form. With these digital credentials, it is now possible that our reputation can be carried on our phone, in a wallet with all these digital proofs. And that in new relationships, we go from low trust to high trust, meaning verifiable trust or verified trust in a single click in a millisecond, what would it mean for business if you can go from low to high trust with a click? It's a really big deal, and we're about to unleash that. It's right around the corner. [00:31:27] Speaker B: Okay, so there's a couple of things in there I want to get your thoughts on. Just to go back one moment. Digital identities now, in Australia, they're pushing pretty hard for that. You probably are aware. So I don't carry a physical id on me anymore. Just use the app and I show people if I need to. But in the comments section, when I read on LinkedIn, you know, when the minister was announcing this, people just seem rattled by it. Why do you think people so rattled by this? [00:31:53] Speaker A: Well, there's always the unknown prospects of anything digital creating a digital trail that would somehow violate privacy in ways that people don't know or appreciate or can see. And that's very valid, honestly. It is very valid. So are these systems designed in such a way where we can do zero knowledge proofs, where I need to prove something about myself without giving away everything? You don't need to know my name to verify my age. You don't need to know this to verify that I live at this address. And so there is, you know, we talk about security by design, meaning it's not an afterthought. There's also privacy by design. And I do think that there is a well founded fear of any new thing and what the unintended consequences will be at some future point, and that there is an increasing encroachment upon our privacy with every move that somehow attempts to verify identity and attack fraud in our society for positive, there's some unintended or potential future abuse of that system by governments or otherwise. And again, I think the fears are well founded. Throughout history, there have been good intentions, but the downstream unintended consequences have been very, very significant. So I think part of it is education. Part of it is actually ensuring that the systems and techniques we use actually do have a both security by design and privacy by design mindset. It's not something that we want to just do quickly because it solves one problem and introduces five problems that are more significant ten years from today. [00:33:37] Speaker B: But would you also say that there are companies out there that are prematurely moving quickly without having heavy considerations around security by design, privacy by design, and then potentially as a result, there's a breach that happens and then therefore, what happens after that? People lose more trust. Oh, we shouldn't have done that then. That is sort of a little bit, you know, cyclical, then. [00:33:56] Speaker A: Yeah, I would say if history is an indicator of the future, what you described is the human condition. So, yes, but progress is still made, to be clear, and progress is made on the skeletons of a lot of mistakes. Many times, maybe we could have gotten there faster with better foresight and better architecture and planning. There comes a moment in time where you can't foresee everything in the future and you just have to make a move. So I do subscribe philosophically as an entrepreneur to look. There's moments in time where you step beyond the point of no return. You let the details sort themselves, otherwise we would always make no movement in analysis paralysis. So there's a healthy tension between forward progress, knowing that we will learn and iterate, but nothing's perfect, and sitting back and contemplating all the risks before we're willing to even make the first step. I think that that is a. I think the tension is healthy. The balance is healthy. You could be reckless on either ends of that spectrum. [00:34:55] Speaker B: I want to touch on something as well with the deep fake. So I had an interview yesterday around deepfakes, and the guy was based in the United States. Obviously, you got the election coming up. It was just based around what's real, less perceived, real, all of that type of stuff. So what are your sort of thoughts then, on deepfakes, then verification? How's that going to look now moving forward? [00:35:15] Speaker A: Well, they're very intertwined. So humans are biologically programmed not to authenticate, but to recognize. We use all of our senses to recognize people and things that we've seen before, and we are biologically programmed to remember good experiences associated with people or things. And two of our primary senses are our eyes and our ears, more so than our taste, our smell, or our fingers. Now, if you're an animal, your smell is pretty damn good. Ours humans, not so great. So eyes and ears are our primary senses that are biologically programmed to recognize. And the challenge with deep fakes is that two of the most trusted forms of recognition of authenticity now have effectively been compromised. When AI can replicate what I look like in motion and what I sound like in voice, and do it in real time through a video chat, we're in trouble. So how to reintroduce knowing versus trusting zero trust through all digital interactions now is going to be a challenge of the security industry and the identity industry. And we do have some answers, but they have not rolled out en masse and the speed with which abuse will occur. In the absence of education, of how good these deep fakes can be perpetrated, along with social engineering, unfortunately, a lot of money in scams aided by deepfakes is right around the corner. And we knew it was going to happen, and it's starting to happen right about now, and it is going to become a major issue. [00:37:04] Speaker B: Yeah, most definitely. And sort of the consensus I got yesterday is basically like nothing really like, just be mindful and just really watch what you're doing. [00:37:13] Speaker A: You know, without going into a technical conversation, there are ways for us to verify in video calls, in voice calls. There are ways, if we're not sure or if that the request seems odd, there are, right around the corner, very, very good techniques to allow us to reintroduce a verification step, peer to peer between two humans that have a potentially compromised digital channel between them. But we're going to go from zero because the tech exists, but it's not rolled out. We have to go from zero to everyone and everything in a fairly short amount of time. That's going to be pretty daunting. And a few years back, you really could kind of tell something that was rendered. Take like a photograph house. In the last twelve months, I no longer can tell. And what I've noticed is that my feed, the perfection, like utopia, like perfection of everything in my feed, has gone up somewhat exponentially. It's like everything is perfect now. And. And you literally, if. If it's counting pixels, so to speak, and looking at the clarity, is that 4k or is that rough? Like, you can no longer tell. Authenticity is under attack in all digital forms. That is pictures, that is video, and it is now voice. And you're seeing it encroach. It's like all of a sudden, the only way to recognize that something is real anymore is that it's not perfect. And trust me, they'll be onto that one as well. So how do I manufacture imperfections, since that now becomes the point of recognizing something that's deep? Fake or not, we are upon a real challenge, where everything that we presumed or we trusted was real. It's going to switch to the complete opposite end of the spectrum, where everything we see and or hear we're going to presume is fake. It's unfortunately a sad reality. Our kids are going to grow up in a world of not believing anything outright and needing to verify everything. It is a sad commentary. Unfortunately, that is an unintended consequence of the speed, convenience and productivity that technology and digital has given us. [00:39:32] Speaker B: That feels exhausting, though. [00:39:33] Speaker A: Well, and the challenge for the industry is to not make it exhausting. And, you know, there will be answers there, so don't. [00:39:39] Speaker B: We're looking at you, Andre. We need the answers. [00:39:41] Speaker A: Yeah, and look, we're working on it. So, look, I'm optimistic that there is an equal and opposite use for every technology. Generally speaking, humans as a species have moved forward. If you look at nuclear, you've got nuclear power and you've got nuclear weapons. Pretty much every technology that we've created there is a positive and negative use. We try to regulate the negative use out of the system so we can enjoy the positive, so that we can, as a species, continue to move forward. So, look, I'm optimistic that we'll continue to moving forward. However, will there be a lot of people who pay the price for our progress. Unfortunately, the answer is yes. There will be a great cost to a lot of unsuspecting or unprepared people for the progress which we're making. [00:40:39] Speaker B: This is KBcast, the voice of cyber. Thanks for tuning in. For more industry leading news and thought provoking articles, visit KBI Media to get access today. This episode is brought to you by Mercsec, your smarter route to security talent Mercsec's executive search has helped enterprise organizations find the right people from around the world since 2012. Their on demand talent acquisition team helps startups and mid sized businesses scale faster and more efficiently. Find out [email protected]. Today.

Other Episodes