Quantify the value of Netskope One SSE – Get the 2024 Forrester Total Economic Impact™ study

close
close
  • Why Netskope chevron

    Changing the way networking and security work together.

  • Our Customers chevron

    Netskope serves more than 3,400 customers worldwide including more than 30 of the Fortune 100

  • Our Partners chevron

    We partner with security leaders to help you secure your journey to the cloud.

A Leader in SSE. Now a Leader in Single-Vendor SASE.

Learn why Netskope debuted as a leader in the 2024 Gartner® Magic Quadrant™️ for Single-Vendor Secure Access Service Edge

Get the report
Customer Visionary Spotlights

Read how innovative customers are successfully navigating today’s changing networking & security landscape through the Netskope One platform.

Get the eBook
Customer Visionary Spotlights
Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn about Netskope Partners
Group of diverse young professionals smiling
Your Network of Tomorrow

Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.

Get the white paper
Your Network of Tomorrow
Netskope Cloud Exchange

The Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.

Learn about Cloud Exchange
Aerial view of a city
  • Security Service Edge chevron

    Protect against advanced and cloud-enabled threats and safeguard data across all vectors.

  • SD-WAN chevron

    Confidently provide secure, high-performance access to every remote user, device, site, and cloud.

  • Secure Access Service Edge chevron

    Netskope One SASE provides a cloud-native, fully-converged and single-vendor SASE solution.

The platform of the future is Netskope

Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), and Private Access for ZTNA built natively into a single solution to help every business on its journey to Secure Access Service Edge (SASE) architecture.

Go to Products Overview
Netskope video
Next Gen SASE Branch is hybrid — connected, secured, and automated

Netskope Next Gen SASE Branch converges Context-Aware SASE Fabric, Zero-Trust Hybrid Security, and SkopeAI-powered Cloud Orchestrator into a unified cloud offering, ushering in a fully modernized branch experience for the borderless enterprise.

Learn about Next Gen SASE Branch
People at the open space office
SASE Architecture For Dummies

Get your complimentary copy of the only guide to SASE design you’ll ever need.

Get the eBook
SASE Architecture For Dummies eBook
Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn about NewEdge
Lighted highway through mountainside switchbacks
Safely enable the use of generative AI applications with application access control, real-time user coaching, and best-in-class data protection.

Learn how we secure generative AI use
Safely Enable ChatGPT and Generative AI
Zero trust solutions for SSE and SASE deployments

Learn about Zero Trust
Boat driving through open sea
Netskope achieves FedRAMP High Authorization

Choose Netskope GovCloud to accelerate your agency’s transformation.

Learn about Netskope GovCloud
Netskope GovCloud
  • Resources chevron

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog chevron

    Learn how Netskope enables security and networking transformation through secure access service edge (SASE)

  • Events and Workshops chevron

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined chevron

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

2025 Predictions
In this episode of Security Visionaries, we're joined by Kiersten Todt, President at Wondros and former Chief of Staff for the Cybersecurity and Infrastructure Security Agency (CISA) to discuss predictions for 2025 and beyond.

Play the podcast Browse all podcasts
2025 Predictions
Latest Blogs

Read how Netskope can enable the Zero Trust and SASE journey through secure access service edge (SASE) capabilities.

Read the blog
Sunrise and cloudy sky
SASE Week 2024 On-Demand

Learn how to navigate the latest advancements in SASE and zero trust and explore how these frameworks are adapting to address cybersecurity and infrastructure challenges

Explore sessions
SASE Week 2024
What is SASE?

Learn about the future convergence of networking and security tools in today’s cloud dominant business model.

Learn about SASE
  • Company chevron

    We help you stay ahead of cloud, data, and network security challenges.

  • Careers chevron

    Join Netskope's 3,000+ amazing team members building the industry’s leading cloud-native security platform.

  • Customer Solutions chevron

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Accreditations chevron

    Netskope training will help you become a cloud security expert.

Supporting sustainability through data security

Netskope is proud to participate in Vision 2045: an initiative aimed to raise awareness on private industry’s role in sustainability.

Find out more
Supporting Sustainability Through Data Security
Help shape the future of cloud security

At Netskope, founders and leaders work shoulder-to-shoulder with their colleagues, even the most renowned experts check their egos at the door, and the best ideas win.

Join the team
Careers at Netskope
Netskope dedicated service and support professionals will ensure you successful deploy and experience the full value of our platform.

Go to Customer Solutions
Netskope Professional Services
Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn about Training and Certifications
Group of young professionals working
Post Thumbnail

Tune into our latest Security Visionaries podcast where host Max Havey engages in a riveting discussion with Ray Canzanese, the Director of Netskope Threat Labs as they reflect on the threat landscape trends of 2023. In this episode they examine the emergence of generative AI, the rampant use of Trojans in cyber attacks, the dynamic tactics of cyber extortion, and delve into the effects of geopolitical conflicts on cyber threats and the prevalent role of ransomware.

Read the latest Cloud and Threat Report.

The trend of attackers getting better and better at stealth and blending in, that’s going to continue. It’s not like they figured out the secret, and that’s what they’re going to do forever. They’ve figured out how to operate effectively right now, and they will continue to operate that way until it becomes very difficult for them to operate that way.

—Ray Canzanese, Director, Netskope Threat Labs
Ray Canzanese

 

Timestamps

*00:01 - Introduction*08:25 - Attackers’ blend-In techniques
*00:23 - 2023 threat trends*09:29 - Regional and sector-specific cyber threat activity
*02:25 - Surprises*11:58 - AI impact on the threat landscape
*03:42 - Geopolitical turmoil and its cyber consequences*17:16 - Adaptability in Cybersecurity
*05:05 - Ransomware dominance in cyber attacks*18:56 - Advice for Security Leaders: Current Attack Methods & Adaptability
*07:15 - Shift in attacker ideology*21:37 - Conclusion

 

Other ways to listen:

green plus

On this episode

Ray Canzanese
Director, Netskope Threat Labs

chevron

Robert Arandjelovic

Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.

LinkedIn logo

Max Havey
Senior Content Specialist at Netskope

chevron

Max Havey

Max Havey is a Senior Content Specialist for Netskope’s corporate communications team. He is a graduate from the University of Missouri’s School of Journalism with both Bachelor’s and Master’s in Magazine Journalism. Max has worked as a content writer for startups in the software and life insurance industries, as well as edited ghostwriting from across multiple industries.

LinkedIn logo

Robert Arandjelovic

Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.

LinkedIn logo

Max Havey

Max Havey is a Senior Content Specialist for Netskope’s corporate communications team. He is a graduate from the University of Missouri’s School of Journalism with both Bachelor’s and Master’s in Magazine Journalism. Max has worked as a content writer for startups in the software and life insurance industries, as well as edited ghostwriting from across multiple industries.

LinkedIn logo

Episode transcript

Open for transcript

Max Havey [00:00:02] Hello and welcome to another edition of the Security Visionaries Podcast, a podcast all about the world of cyber data and tech infrastructure, bringing together experts from around the world and across domains. Today, we're taking a look back at the year in threats with Ray Canzanese, Director of Netscape Threat Labs, digging into some of the trends he saw, as well as what surprised him about the findings for 2023. How's it going, Ray? How are you doing today?

Ray Canzanese [00:00:23] Hey, happy New Year, Max. Glad to see you again. Glad to be here talking cybersecurity again. No more cookies and pies.

Max Havey [00:00:30] Yeah, we're out of the cookies and pies. And we're almost out of the 2023 year end reflection season. This is capping us off here. We're out of predictions, we're out of resolutions. Let's talk. Let's look back at the year on threats and then see what we have in store for 2024 here. So to start things off here, as you look back at 2023, what were some of the biggest trends that you encountered looking back at that data?

Ray Canzanese [00:00:51] Yeah, sure. I'll give you three. Right. The first one's got to be generative AI. And what I mean by that is like a year ago, right? If we look back to the end of 2022, nobody was using generative AI for anything. Fast forward to today. We've got about 10% of all enterprise users every month that are using at least one of these cloud based generative AI apps. And even more than that, the amount of usage we're seeing of those apps growing exponentially. Right. So these things are just getting more and more popular by the minute. Number two Trojans, right? We saw Trojans as the most popular attack method attackers were using to to get into victim organizations and we've been seeing a lot of that infiltration be happening by delivering those Trojans over very popular cloud apps. And then I'd say number three is probably the continuing evolution of the extortion playbook. Right? This is, uh, it began as ransomware. Right. And then people stopped paying ransoms and it was like, okay, we'll disclose all your secrets publicly, right? If you don't pay our ransom, it's evolved a little bit more where we see now, it's like ransomware info stealers and wipers. And as you better pay that, ransomware pay that and pay that ransom fast, or I'm going to start breaking stuff and I'm going to start releasing data. Right. It's just more tools to try to incentivize victims to pay up.

Max Havey [00:02:19] Definitely. And among those trends, was there anything that really stuck out to you as a really big surprise? Was there anything that jumped out at you?

Ray Canzanese [00:02:25] Yeah. So it's not from one of the three things that I just said. And it's because it's hard to, I think, surprise me when it comes to the threat-related trends. I think the biggest thing that surprised me when we were looking at all this stuff at the end of the year, was that I was convinced from all the media that I consumed throughout the year that nobody was using Twitter anymore. Right. I would have expected Twitter use after the Elon Musk takeover based on what I had been reading, to be down significantly, but it was mostly flat. It was mostly like exactly the same as it was a year ago. So that's maybe the way you surprise me as a trend like that popping up, where obviously social media has its ebbs and flows. Right? We saw some platforms lose popularity like Facebook. We saw this gain popularity. But I was very surprised when I saw Twitter. They're right about the same levels. It was a year ago.

Max Havey [00:03:18] Definitely. I think that was the feel from a lot of folks, like someone else who's using Twitter for well over a decade. At this point. I was surprised to to hear that when I when when you brought that up there and this is Twitter being used for malware campaigns, for people using attacks and things of that sort?

Ray Canzanese [00:03:31] This is just overall Twitter use, right? This is just like people logging on to Twitter and looking at what their friends are doing or current events or whatever it is kids are using Twitter for these days.

Max Havey [00:03:42] Absolutely. I've always described this. I'd keep going back there being like, oh yeah, I know this is a laundromat, but this place used to serve really good burgers. That's how it that's how it feels most. It's going from there, though. A lot of stuff has been happening out in the world. So thinking about a lot of the geopolitical turmoil we've seen this year, have you seen this sort of play out in the cyber threat landscape at all? Is that something that's popped up among these sort of key trends that you've noticed it?

Ray Canzanese [00:04:04] Absolutely. We live in a world now where cyber operations, right, when we're talking about espionage, sabotage, information warfare, right, misinformation campaigns, all of that stuff, it's a like standard and central component of international relations. And so wherever you see geopolitical conflict, you are going to see cyber conflict mirroring that geopolitical conflict. It's just the way the world is now, obviously, for example, in Ukraine, we've seen and we've covered on our net scope throughout labs blog, multiple attacks targeting public utilities in Ukraine, targeting private citizens in Ukraine, targeting companies in Ukraine. And just because of that conflict and others throughout Asia, we've seen very high geopolitical threat group activity more than any other region.

Max Havey [00:05:05] Absolutely. And I think that makes a lot of sense, and that the trends that we're seeing elsewhere are going to be popular among the threat actors who are on all sides of these sorts of conflicts. Cyber warfare is just the latest frontier of all this. Going from that to other sort of trends that we've seen here, ransomware was a really big, broad trend going into 2023. Did it really dominate the conversations the way you were expecting it to? When we were thinking about things in 2022, coming into 2023.

Ray Canzanese [00:05:30] Ransomware was absolutely dominant as expected and continued to grow as well. So extortion has been a big moneymaker for cybercriminals. And so when you have that much money being made, you're going to continue to see new groups try to get into that game. And so you'll see at Netskope Threat labs. We're going to cover this stuff all the time. New ransomware family released written in this new language targeting this new set of victims. New groups getting formed from old groups that have gotten broken up or splintered to members of old groups. Right. It's become this industry, right? Which is going to be very hard to break up. And I mentioned when we got started that we saw that extortion playbook that used to just be ransomware, then became ransomware and info stealers. Now it seems to be ransomware and info stealers and wipers, where it's just groups doubling down, leaking data, destroying data, doing anything they can do to get their victims to pay. And you've even seen a lot of groups in this past year who used to claim to be the good guys, right? Like we're extorting people, but the only people we extort are oil companies, right? We would never extort a hospital. Right. You're seeing a lot of groups now that don't draw that line anymore, right? That they're done trying to play that game of we're benevolently extorting people here to just extort everybody you can. Right. We're just here to make money off of anybody we possibly can, no matter what happens as a result.

Max Havey [00:07:15] Definitely. And I think it's especially interesting thinking about that sort of that shift that's taken place with the attackers. And is that something that you saw evolving over 2023? Because I remember with some specific different hacker groups that you talked about in, in past monthly threat reports about saying, oh, we're not going to target critical infrastructure, we're not going to target hospitals, but you're just seeing less of those sorts of ethical like mission or quote unquote, ethical mission statements within these groups.

Ray Canzanese [00:07:40] I would say previously, basically every group had a mission statement like that. And what we're starting to see now is groups that certain groups that lack such a mission statement, not that we never saw hospitals or critical infrastructure getting hit before. Right. It was just say, let's try our best to avoid doing that, right? One, because we're not trying to hurt or kill anybody. Right? We're just trying to make money. And two, when you start doing things that hurt and kill people, there is a different level of scrutiny that gets placed on you and you want to, if you're acting in a illegal enterprise, limit your exposure to law enforcement and geopolitical pressures as much as possible.

Max Havey [00:08:25] Of course, you don't necessarily want that kind of smoke that comes from targeting those sort of essential entities.

Ray Canzanese [00:08:31] Exactly.

Max Havey [00:08:33] Interesting. That's a very interesting approach. That sort of seeing the way that the hacker or not hacker, the attacker like ideology shifted in that way. That's an interesting approach. Yeah, we've.

Ray Canzanese [00:08:42] Even seen groups that during the extortion demand phase, they would say things like, we're the good guys here, right? There are other groups that are much worse than us that would have done much more terrible things than we did to you. So you should pay us as a thank you for not doing worse things to you. Once we got access to your network.

Max Havey [00:09:11] Yeah, the old you should be thankful I'm only doing this because I could be doing much worse things than this.

Ray Canzanese [00:09:15] Yes

Max Havey [00:09:17] And so going from there. Were there any sort of either sector or region specific trends that that stuck out to you as well? Or were the patterns the same among regions and sectors as things happened to 2023?

Ray Canzanese [00:09:29] Sure. So like the big picture, right. If we take a big step back, the big picture was cybercrime and extortion, right? That was the big story. No matter what industry or region you were working in, and Russia was on the other side of that in most circumstances, meaning groups operating out of or presumed to be operating out of Russia. When you start seeing the differences, the first place you start seeing differences is when you start to look at things regionally. Right. We already talked about Ukraine, right? And so if you look at just organizations in Asia and you look at that breakdown of criminal activity versus geopolitical activity, you see a much higher percentage of geopolitical activity in Asia surrounding especially that conflict in Ukraine. Latin America, also lots of geopolitical turmoil there also not very far behind in terms of how much geopolitical cyber activity we see there. Then I think the next layer where you start seeing differences is when you start peeling back, what sector am I working in, in which geography and who is targeting me there? So for example, we highlighted some of these groups in our latest report. You look at TA-505. They are a Russian criminal group. They mostly only target organizations in Asia and Europe. Right. So you don't have to really worry about them so much. Right? If you're based somewhere else in the world. Similarly APT-241 a geopolitical group affiliated with the Chinese government. It last year mostly targeted financial services organizations. And most of the organizations they targeted were in Singapore. Right. And so you start to look at the specifics in the nuance of what's going on. That's where the industry you're working in, and that geography of where you're located really determines what specific groups you're targeted with. And then each one of those groups obviously has their own sort of M.O. in terms of tools they use and tactics they use. Right. And if you're thinking about this from a defense point of view, it matters, right? It matters who's on offense, right? It matters because that's how you're going to target your defenses. Make sure that all of your tools protect against the tools that the attackers are using against you.

Max Havey [00:11:58] Definitely the sense of knowing your adversary. Like we were talking about last time you were on the pod here. Knowing your adversaries, the first step in knowing how to best protect yourself from said adversary, and more or less taking that sort of data to better fortify your defenses. As you look ahead at the year to come. So to circle back to a topic you brought up at the top of the pod here, generative AI, what kind of impact are we really seeing from AI in the threat landscape, and is it being used by the threat actors? Is it being used by defense teams? And if so, like at what sort of scale are we seeing this sort of happening?

Ray Canzanese [00:12:30] Yeah, it's an interesting question, right. Because for as long as I've worked in cybersecurity, there's been AI in cybersecurity, right. We were using AI to detect and block malware to reduce noise in the SOC. We've been using it to identify insider threats and other hard to detect threats for a long time. So as long as it's existed, it's been there because we're obviously as an industry trying to create better tools and do more with less. And all the things that AI promises. The sort of newest thing we see right in this past year is this idea that you can use these large language models as a copilot interface into these massive security data sets that we have, which is a really cool and really awesome thing to do with the large language model and feed it a bunch of data and be able to extract insights from the data. So that's certainly something new that we see people using in the past year. Now, from an attackers perspective, it's the same thing, right? Here's some new tools. Right. Why wouldn't I use some new tools. It's it's a silly example, but I often use this one right. When I write all of my code, I use an IDE, right? I've been using products from intelligent. Right. It makes writing code easier. It's this really nice interface. If I was writing bad code, would I use intelli-J? Right? Of course I would, right? These are tools that make writing code easier. Of course, I'm going to use the tools that make writing code easier, especially if those tools are free to use. Right? And of course, attackers are going to use all the tools at their disposal, right, to make what they are doing easier and more effective. The other thing that I think is interesting, though, is with something like AI and generative AI and all the hype around it and all the new tools, and which I don't know, Max, which of the 75 AI tools that you saw ads for this week are you using? Right? Do you remember how to log into them? Do you have to download something to use them? Right, with all of these questions. It's opportunity for attackers. Right. And so we've seen a lot of stuff that it's not even like using AI, but it's capitalizing on the fact that other people are using AI to try to trick them into visiting a phishing page and entering their Google credentials. From interacting with a fake ChatGPT bot that's just recording the entire conversation to see what they can use to even we've seen Trojans, right? If you Google, where do I download ChatGPT? I don't know what the results are at this moment, but we have multiple times had to report to Google. Hey, when you Google? Where do I download ChatGPT? The top results are like trojans and spyware and adware and all sorts of garbage. Because obviously you and I know you don't download ChatGPT.

Max Havey [00:15:22] And it's interesting in that regard to where it's it is AI as a means to deliver these phishing campaigns versus like using AI enabled threats. It's really just like the simplicity of what people don't know where to still get these tools. So finding ways to trick them around these tools is just the path of least resistance right now. And I know in that same vein, Colin Estep from your team also wrote about prompt injection attacks from earlier this year as well, which is more in that vein of using generative AI as an attack vector. But it's interesting to see that, like the vast majority of them aren't even doing that yet. It's still just the basic tricking people who are trying to find their way into generative AI.

Ray Canzanese [00:16:01] Right yeah, there's a ton of researchers that are acting with good intentions and bad intentions, are trying to get these AI apps to reveal things they shouldn't. Right? To leak information across users, right? There's all sorts of attacks on the AI apps themselves. There's attacks at companies that run AI apps, right, with the notion that they must have a lot of sensitive data. Right? If I wanted to break into a company and get access to some sensitive data, yeah, go for those AI companies. Right. So there's so many layers to this, right? Where you see just lots of different types of shifts in and how people are using these tools and how this sort of affects people's broader behavior and interactions. And it helps me write reports. Right? I write things, they go into Grammarly. Grammarly says, hey, you could have said this differently, and it would have been clearer and easier to understand, right, if I was writing something to convince somebody of something that was untrue, or to visit a phishing page. I could use the same tools, right? And it would help me just the same.

Max Havey [00:17:06] Exactly. Yeah. So what we're seeing right now is we're just the tip of the iceberg here. We're gonna continue to see these grow and develop as we get further into 2024 and well beyond there.

Ray Canzanese [00:17:15] Absolutely.

Max Havey [00:17:16] And looking back at 2023 holistically here, Ray, if you had to sum up the threat trends of 2023 in one takeaway what springs to mind for you.

Ray Canzanese [00:17:25] I'd say that one takeaway is that attackers keep getting better at hiding, and the fact that we're all using cloud apps now for darn near everything gives them lots of opportunities to hide. Right. So we've seen them using popular cloud apps to spread malware. We've seen some attackers use those same apps as command and control channels. Right. Why use command and control infrastructure when you can just send yourself some DMs on Twitter. Right. So it's just becoming they're becoming better at hiding, right? Which makes it harder for those working in cybersecurity to differentiate between good and bad. And that trend of attackers getting better and better at stealth and blending in, that's going to continue, right? It's not like they figured out the secret, and that's what they're going to do forever. They've figured out how to operate effectively right now, and they will continue to operate that way until it becomes very difficult for them to operate that way, because the cybersecurity industry has been gotten better at finding them there, and they'll shift again.

Max Havey [00:18:40] Exactly. They're always finding a new a new backdoor in a new way into whatever walled garden we're trying to work in. In that same vein, then, Ray, what's one piece of advice you'd impart to security leaders who are taking in this data from something like the Cloud Threat Reports reflection on 2023.

Ray Canzanese [00:18:56] Yeah, I'd say focus on what adversaries are currently doing that is successful. Right. So for example, what they're doing right now that's successful. They're targeting and abusing cloud apps. Right. So then what do I do with that information? I try to rein in cloud app use. Right? I don't let my users just use whatever the heck they want to use on a whim all the time. I find the apps that everybody's using right? The the Google Workspaces, the Microsoft 365, and I make sure that they're closely monitored, they're heavily locked down, and that I know exactly what's going on there in case of, uh, a breach or an insider threat. And I make sure that, you know, I'm, I don't have those blind spots. Right? Like, I'm monitoring, I'm inspecting all of my network traffic, and I'm doing everything I can right to defend against what attackers are doing now, with one caveat, which I would say I'm ready to adapt as soon as that landscape changes. I didn't write that down as one I'm going to focus on for all of 2024, and I'm not going to revisit that or make any changes right until, uh, 2025. Know if that changes. So just be prepared to adapt and change along with it.

Max Havey [00:20:16] Yeah, that adaptability seems like the one thing that every that's the resolution for every security leader these days is you have to keep evolving as the landscape and the attackers and the threat vectors continue to evolve.

Ray Canzanese [00:20:26] Absolutely. And it's tough, right? Because you don't want to overdo it in that regard, where every new news article about some new threat, you drop everything you're doing and you focus on that one. Right? So there's a balance between never changing and never adapting. Right. And hyper adapt these daily ebbs and flows, which don't really represent major changes that would require a sort of strategic change.

Max Havey [00:20:57] Absolutely. And Ray, as I as I come to the end of my questions here. Where can folks go to find out more from the, uh, from your cloud and threat report year in review for 2023. Where can folks find this to dig further into this data and take a look?

Ray Canzanese [00:21:12] Yeah absolutely. You can go to. Net scope.com/threat labs. You'll find that report there. You'll find my mailing list there. And you'll find a bunch of other content that we regularly put out on the threats and trends that we are seeing.

Max Havey [00:21:27] Very cool. Right. Thank you so much for joining us today. As always, it's an ever enlightening conversation about the way the the threat world is changing, and you always have such a good perspective to bring up. So thank you so much for joining us.

Ray Canzanese [00:21:37] Thanks for having me, Max.

Max Havey [00:21:38] Excellent. You've been listening to the Security Visionaries podcast, and I've been your host, Max Havey. If you enjoyed this episode, please share and subscribe to Security Visionaries on your favorite podcasting platform. There you can listen to our back catalog of episodes and keep an eye out for new ones dropping every other week, hosted either by me or my co-host, the great Emily Wearmouth. And with that, we will catch you on the next episode.

Subscribe to the future of security transformation

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.