Tyler Pinckard 27 min

SupportLogic Security-First Architecture


Security is often treated as a checkbox, but it’s the foundation of trust. This session will challenge your complacency by exploring SupportLogic’s Security First Architecture. You’ll learn why security should be integral to every layer of your support operations, and what SupportLogic has built to align with that expectation.



0:00

Folks, security is so important at SupportLogic.

0:04

We have Tyler here.

0:05

We have an absolute expert here to talk all about our security and our data

0:09

pipeline and

0:10

everything that we do to keep our customer data secure, but also flexible.

0:14

Tyler, if your mic is on.

0:16

If it sounds like it is, check, check, check.

0:19

Is it coming through?

0:20

I like it's a little better.

0:23

Sound check, right?

0:25

Check, check.

0:26

Close enough.

0:27

All right.

0:28

Well, I'm going to stand here and talk about it.

0:30

So good afternoon, everyone.

0:32

My name is Tyler Pinkard.

0:33

I'm going to be talking about our security architecture here at SupportLogic.

0:36

I'm making up for a little lost time, but if you have questions, raise your

0:41

hand.

0:41

I'd love to hear them.

0:44

So overview, stuff we're going to talk about.

0:48

You guys can read the slide.

0:49

I don't need to labor it.

0:50

Onto it.

0:51

Me, I'm your speaker.

0:52

Hello, I'm Head of Security.

0:53

I'm the data privacy officer here.

0:55

The word of this is a bill.com for four and a half years where I built their

0:58

DevSecOps

0:59

practice and was a founding engineer to a blockchain start before then, as was

1:03

cool

1:03

at the time.

1:05

Here in the valley, I'm on the board of the Information Systems Security

1:08

Association.

1:09

I'm active in the community and I work hard to keep your data safe.

1:15

All right.

1:17

So perimeter security.

1:20

It's out.

1:21

Don't do that.

1:22

All right.

1:23

So let's start off.

1:24

Talk about what security is.

1:26

All right.

1:27

Security is not one thing.

1:28

It's a combination of systems that come together to deliver a few things.

1:33

We want to maintain assurance of our environments as we're running the code

1:37

that manages your

1:38

data.

1:39

We got to protect that data.

1:40

Keep it out of bad guys' hands.

1:42

Keep it off the internet.

1:44

And make sure we maintain compliant.

1:49

That was actually a former CISO of Levi's that told me this.

1:52

It's like, what are you doing?

1:53

Security.

1:54

It's like, oh, you keep the system safe.

1:55

Wrong.

1:56

All right.

1:57

You generate systems that are able to generate the evidence that you provide to

2:00

auditors to

2:01

give them proof you are keeping everything safe as you say you are.

2:07

Now, we got some cool names on the board.

2:11

Everybody in this room included, but these ones were asked by my boss, Krishna,

2:18

right?

2:19

These serious security companies entrust us with our data, right?

2:24

And they are obviously large targets of attack.

2:28

And it's important that we maintain assurance of it.

2:31

But these guys trust us, so you should too.

2:35

All right.

2:37

So we got some certifications.

2:40

All right.

2:41

Sock 2.

2:42

I'm actually in the midst of my sock 2 audit right now.

2:45

I believe our sock 2 auditors will be joining us this afternoon because their

2:48

office is around

2:49

the corner.

2:50

ISO 27001, I just finished our surveillance audit a month before last.

2:56

GDPR, HIPAA and CCPA, right?

2:59

Mostly on the breach notification side.

3:02

We do regular internal and external security audits.

3:05

I'm lining up our pen testers for my next round of sock.

3:09

Looking to get that engagement underway.

3:11

Next month, shocks were already in October, right?

3:16

But not only are we doing internal external pen tests, we invite our customers

3:22

to try out

3:23

your environment.

3:24

Try and beat it up.

3:25

Let me know.

3:26

All right.

3:27

There's no perfect approach.

3:29

But you can use a bunch of different pieces to build a robust security program.

3:34

Let me see if I can make this a little bit bigger on my screen.

3:40

There we go.

3:41

Okay.

3:42

So we're not just keeping bad guys out, but we got to make sure our workforce

3:45

and the

3:46

infrastructure is secure.

3:48

And that's a multifaceted problem.

3:51

That's not just people.

3:52

It's not just your execution environment.

3:54

And for the nerds in here, that's prod, right?

3:59

Development support systems, that includes our CI/CD.

4:01

That's a gnarly way to get popped.

4:03

They bust into your CI/CD and now you're shipping malware, right?

4:07

Endpoints, that includes mobile devices, laptops, right?

4:11

That's all in scope of our security.

4:13

And the communication systems are timed together.

4:16

And that's email, Slack, Zoom, GCP, Workspace.

4:20

I can keep going.

4:22

Now, while I'm going to be talking about some of the things I do for security

4:25

and support

4:26

logic, this is not a comprehensive presentation.

4:29

I am not giving you a blueprint to attack my systems.

4:32

All right.

4:33

What I want to do is put your mind at ease.

4:36

There's other stuff too, right?

4:37

We're just going to get you excited.

4:41

But I want you guys to understand how we approach this and how seriously we

4:46

take the security

4:47

of your data within our firm.

4:50

All right.

4:52

And so this is 2024.

4:55

Perimeter security is no longer sufficient, right?

4:59

Your firewall administrators and the network guys, oh, we'll just keep them out

5:02

We don't have to worry about anything.

5:04

It's not really going to cut it anymore.

5:06

The wall castle is dead.

5:09

There are holes in all of your walls, right?

5:12

The old way.

5:13

Strong walls.

5:14

You've got a mode on the outside.

5:15

You know, big draw gate.

5:17

You can crawl up a porculus.

5:18

You can drop down on people that try and charge you gates.

5:21

All right.

5:22

But once you're inside the walls, it's an open field.

5:24

Help yourself, right?

5:25

All you can eat buffet.

5:26

It's expensive to attack.

5:28

But conversely, you've got bad guys on the inside.

5:32

It's really hard to detect and prevent them from doing gnarly stuff.

5:35

They're not supposed to be doing.

5:37

So what are we doing instead?

5:38

Well, attacks can't come from anywhere inside the wall, outside the wall.

5:43

What if I was an attacker, right?

5:45

We use a variety of threat models to define how we build the defenses inside

5:49

our building.

5:51

So baseline is a zero trust approach, defense and death.

5:54

This has become hip these days.

5:56

NSA published a model to zero trust.

5:59

Security, I believe 2015, and then that's rolled out across.

6:04

This is what Google uses inside, right?

6:08

It can come from anywhere.

6:09

I mentioned that.

6:10

Off and encryption attacks.

6:12

Also everywhere.

6:13

And this is even more expensive to attack because it's not just get inside the

6:17

wall

6:17

and you're free.

6:18

Once you get inside the wall, you're still getting questioned at every

6:21

interaction.

6:22

Hey, how do we know you're supposed to be here?

6:24

Oh, you've got the right credentials.

6:25

Great.

6:26

Let's make sure that's going through an encrypted tunnel.

6:29

And the advantage here is that this reduces the risk of inside threats.

6:32

All right.

6:34

So starting from the top, the VPC architecture, right?

6:39

Those of you guys that might do some cloud engineering on the side, be reh

6:44

ashing.

6:44

But again, let me know if you have questions.

6:47

So we maintain a model of single tenancy for our customer environments.

6:51

Salesforce data is not being co-executed with CrowdStrike data, which is not

6:55

being co-executed

6:56

with NTT.

6:58

This means separate networks for every customer environment.

7:00

Separate compute.

7:01

Separate storage.

7:03

And this is uncommon in most SaaS applications.

7:07

And the reason is because it's expensive.

7:10

That means we run duplicate infrastructure for all of our folks.

7:15

Now why it's expensive?

7:16

Why would we do that?

7:18

Right?

7:19

Well, we understand the importance of the data we're processing and we know how

7:23

important

7:23

it is to keep it secure.

7:25

It's literal threat to our enterprise.

7:27

And that's why we take it as seriously as we do.

7:30

So there are some cool things about running a single tenancy from the

7:34

administration side,

7:36

right?

7:37

We get data isolation and security.

7:39

All of your data lives separately, right?

7:41

This reduces my risk of data breach, right?

7:43

Because everybody's running in separate buckets and it's unlikely you'll get

7:46

them all.

7:47

And this is important for industries that have strict compliance requirements.

7:52

All right?

7:53

We are-- allows for greater customization and flexibility, right?

7:57

Single tenancy?

7:58

Salesforce, you'd imagine.

8:00

Lots of tickets.

8:01

It probably needs some pretty beefy hardware.

8:03

That's not universally true for all of my customers, right?

8:07

And this allows us to use targeted infrastructure sizing in order to meet your

8:11

specific performance

8:13

requirements, all right?

8:15

Changes and enhancements can be made to one environment without impacting any

8:19

of the other

8:19

customer environments.

8:21

The performance optimization side, right?

8:23

That's the other side of that coin.

8:25

So since we've got every tenant on their own copy of the infrastructure, right?

8:31

Performance issues that might impact one customer are isolated from the other

8:34

ones, right?

8:35

And this allows us to be very specific with how we turn the dials and adjust

8:40

the VM sizing

8:41

or the database sizing in order to support your operations.

8:46

So these are compliance, right?

8:50

We've got some of my folks, right?

8:53

They have very specific GDPR concerns.

8:56

And because we're single tenancy, I can run a copy of their infrastructure in a

9:00

European

9:01

data center, typically Frankfurt, right?

9:02

Because I've got very strong reasons.

9:06

But we can set up specific infrastructure that is tailored to individual tenant

9:11

needs

9:12

without impacting the overall application.

9:15

You're told that updates and changes.

9:17

Again, we do it on a customer by customer basis.

9:20

And this means that bugs that may impact one customer are isolated to that

9:23

environment.

9:24

And we can roll out updated software to fix that issue without bugging anybody

9:30

else.

9:30

And it has support, right?

9:33

Support can go straight into your instance.

9:35

Makes it very easy to reproduce those problems and can lead to quicker

9:40

resolutions on our

9:41

side as we support your use of our application in your organization.

9:46

Right?

9:47

Resource allocation.

9:49

I touched on this before.

9:50

Dedicated resource.

9:52

And because of that, this can lead to greater performance in high load

9:56

situations.

9:56

And in the specific where you've got one customer facing high loads, that's not

10:00

going to impact

10:00

my other ones.

10:02

And then me on my cloud operations side, easier backup and disaster recovery.

10:08

This is one that we exercise every six months and I'll be moving to quarterly

10:13

because it's

10:15

like lifting weights.

10:16

You want to get stronger.

10:17

You lift bigger weights.

10:18

Right?

10:19

We practice this a lot because this is how we make sure that if something goes

10:24

wrong,

10:25

we can get you back up and running as quickly as possible.

10:28

All right.

10:29

So let's touch on our data security.

10:32

And I'm talking fast because I'm making up a little bit last time.

10:35

But please feel free to raise your hands if you have any questions while I'm

10:37

stepping

10:37

through this.

10:39

Welcome to the opportunity.

10:42

So we're going to keep your data safe.

10:46

And we use ELT to pull the data out of your side.

10:50

Most folks are using 5-tran.

10:51

We've got some options that I'll touch on and how we can do that.

10:54

Data's pulled over SSL using REST APIs.

10:57

All right.

10:58

We reach in to your CRM whether that's Salesforce, Zendesk.

11:04

There's some others I can't pull out.

11:06

Jira.

11:07

All right.

11:08

You give us the authentication token.

11:10

You skip, scope the authentication token and we only have the data that you

11:13

choose to share

11:13

with us.

11:14

You don't have to share those credentials directly with us, especially if you

11:17

're using

11:18

the 5-tran option.

11:19

You go in and set up that connection.

11:21

And then I never hold them at all.

11:23

And that means I never have the opportunity where I can lose them.

11:27

And then access is maintained to the BPC using self-service.

11:31

All right.

11:32

Let's talk through our data flow.

11:35

And we'll start it from your perspective down at the bottom.

11:39

CRM.

11:40

ETL.

11:41

Or ELT in this case?

11:43

Yes.

11:44

Well, it's just whether you decide whether you're going to extract load and

11:49

transform or

11:50

you do the extract, transform and load.

11:51

I've seen them use both.

11:53

So excuse the slip.

11:55

But pulls that out, shoots it into Cloud SQL on our side.

11:59

And that's we have some scope like option.

12:01

I'll get into it in a bit.

12:02

But we started with a single tenancy Postgres database.

12:06

So everybody's got their own Postgres database.

12:09

All right.

12:11

Pulled into the back end.

12:12

We do some neat AI models.

12:16

Generate some signals.

12:18

That goes up to push us out to the user interface, which you can reach into,

12:22

just like you log

12:22

into your bank, HTTPS, JAPD56, or I say encryption.

12:28

And then from my side on the administration, we have 2FA mandated on any SSH

12:35

connection.

12:36

And I'll talk about how we do the authorization into that from the DevOps and

12:40

operational

12:41

side.

12:42

But these are the data that we're going to actually pull out of your CRM.

12:47

This is all we need in order to drive those models.

12:49

It's got Alex and her team build.

12:51

And these will be the case details.

12:53

No, it's comments, discussions.

12:55

Go ahead, sir.

12:56

[INAUDIBLE]

12:57

Yes, we absolutely have.

12:59

We're building it now.

13:01

I'm going to leave that to the product.

13:03

But thank you very much.

13:04

That's a great question.

13:05

I am pretty sure we've got that coming up in talks.

13:08

Yes.

13:09

And I see the lady speaking after me nodding.

13:10

So we'll put that in the parking lot.

13:13

But we will have that answer to you in less than an hour.

13:18

Case requestor details, agent details, and then product usage message metrics.

13:23

That's just how we track how using our system so we can make sure we're

13:27

building you good

13:27

systems.

13:29

All right.

13:30

So another view of our data pipeline.

13:33

You got your CRM.

13:35

We extract it from your sign.

13:36

We load it into ours.

13:37

And that goes into the CRM.eb.

13:40

It's like a post-press.

13:43

It's what lives inside the support logic that you can see,

13:47

syntenancy, so it's just your stuff.

13:49

All right.

13:52

What do we say?

13:53

Check the credentials.

13:54

Read the permissions.

13:55

Transform the schema.

13:57

Make the field requests.

13:58

And then the other option, you can come in to look at it on the UI.

14:02

Or we can push that data straight back out to your CRM.

14:05

And we have customers that use this in both ways.

14:09

Some one, some the other, and some together.

14:13

So how can we get that data out of your system?

14:15

Well, I touched on 5-tramp before.

14:17

That's our cloud ETL.

14:19

All right.

14:20

That's either in the standard or a versus SSH.

14:22

If you don't like inbound connections,

14:25

you can push it out through a versus SSH tunnel.

14:28

Data replication via Snowflake.

14:30

This is turning into my favorite way, right?

14:31

Because now we don't have to vacuum it out.

14:34

We don't have to pay five current controls.

14:35

If you've already got all this data inside your Snowflake instance,

14:38

you can share it directly with us.

14:40

And then that saves.

14:41

It makes our models faster and it's cheaper to operate.

14:45

So if you do that, you're interested in that.

14:47

Please talk to us.

14:49

I would love to help you go ahead, sir.

14:50

Are there plans to make it more real-time?

14:52

What kind of is the data movement?

14:55

[INAUDIBLE]

14:58

Well, and that's the thing about 5-tramp, right?

15:00

The closest we can do on a sync is 5 minutes, right?

15:04

And so that's what sets the cadence on how often

15:06

we update that data.

15:07

Now, if you're pushing that into Snowflake, right?

15:11

And it's how well are you feeding that data that

15:13

composes the data lake in your Snowflake?

15:15

If that's live data, then we already

15:17

have live data in our system, right?

15:18

It's just 5-tramp starts to break down

15:20

because we can't get them to turn up that sync frequency more

15:22

than 5.

15:23

That's what sets that limit.

15:24

However, we've got other ones where we can do on-prem ELT.

15:31

If you wanted to, you could host your own.

15:32

So it's not 5-tramp.

15:33

We do have a customer that does this today.

15:35

And we can push that every 30 seconds or 5 seconds.

15:39

That's where we start getting into the performance cost trade

15:41

offs.

15:42

But absolutely, there are ways to do it.

15:44

It's just a more of a custom config

15:46

than going with what we got in our out-of-box solution.

15:48

And then on the data replication side on Snowflake,

15:55

we can use a tool called ArchyOn, which

15:57

was bought by one of our customers,

16:00

where we can read in from any discrete data location,

16:03

push it into Snowflake, and then replicate it in that fashion.

16:06

And then the on-prem ETL, where you hosted chunk code

16:10

and push it to us, either a hosted version of 5-tramp,

16:12

which still has the 5-tramp limitations,

16:15

or you can use the air byte.

16:16

And so that's sync to 5 seconds if you're so clamped.

16:20

All right?

16:21

So data restriction.

16:23

So how do you make sure you're not sending us data

16:25

you don't want us to have?

16:26

Because again, we have very tightly scoped data stuff

16:29

that we need in order to drive our models.

16:32

First one, you can change it in the application itself.

16:36

Like we can, at the front end, adjust the levers.

16:39

We still have all that data on our back end,

16:40

but this allows us to do this filtering in real time.

16:44

Two, all right?

16:46

You can scope it on the permissions

16:47

that we use to reach inside your CRM

16:50

so that we only have access when we have visibility

16:53

of that data you want.

16:54

Three, filter it before it even gets to your data lake.

16:59

Then you lose possibility of doing some de-correlations

17:02

on your side that maybe we wouldn't necessarily be doing.

17:05

And then four, you can filter it inside the ELT itself.

17:10

But again, we understand the sensitivity of the data

17:13

that we are processing.

17:14

We are not trying to steal your data.

17:16

We only want to have enough to be able to drive our models

17:18

and give you the signals that you've passed for.

17:22

So data protection.

17:26

We do protect our data.

17:27

We do encrypt the data.

17:28

Data in flight.

17:29

Data at rest.

17:30

Encrypted at every point.

17:33

The one I'll point out here, because this

17:35

gets the security guys excited, VPC instance,

17:38

because we have separate keys for every customer.

17:40

We are fully FIPs.

17:42

140-2 come flying.

17:44

BYOK, this is something I built, or my team

17:50

built in the last month.

17:52

And we are--

17:53

I don't want to name the specific customer,

17:55

but it's one of the security conscious customers you saw

17:57

on my slide before.

17:59

They had a requirement.

18:00

They wanted to host their own key.

18:02

All right?

18:02

In the way we did this, you guys create your KMS key in GCP.

18:06

You share it to us through IAM permissions.

18:09

We assume that role.

18:10

We can read your key, and now we use it transparently.

18:14

Something happens.

18:15

They don't like it.

18:15

They change their key.

18:17

Now they've just blocked access to us accessing their data.

18:20

And that's OK.

18:21

Right?

18:21

It's your data.

18:21

We want to process it in a way that makes you happy.

18:24

But I'm proud of this because it's

18:27

neat to be able to add new features without having

18:28

to change our product.

18:30

That's just coming at it from my side on the intro.

18:34

Data classification matrix.

18:37

When I point out here, ticketing data--

18:39

We classify that as confidential.

18:41

I mean, that's only yours.

18:43

And our sensitive is internal.

18:46

That stuff that we just keep inside,

18:47

although some of our customers do want to get that out.

18:51

Again, we want to make sure you're

18:53

comfortable with us processing your data.

18:58

Code to cloud.

18:58

Let's talk about security posture.

19:00

All right?

19:02

So we've got our requirements to find a JIRA.

19:05

Those commits are linked to Git.

19:07

I'm going to go quickly through this because this is pretty

19:10

generally accepted cloud security information.

19:13

We do mandatory code review on all check-ins,

19:15

at least two party.

19:16

So it's nobody pushing code and running it in prod.

19:18

It has to go through review.

19:21

Static and dynamic code testing, as well as SCAA,

19:26

is integrated in my CI/CD pipeline.

19:27

So it's not someone remembering to run these tools.

19:30

They happen automatically.

19:31

If we move outside thresholds of acceptance,

19:37

then that risk has to be assumed by the folks deploying

19:40

the code.

19:41

And then we have a formal process for that.

19:45

I'm going to give a shout out to QuietAI, who is one of our

19:47

customers.

19:48

And we use their service.

19:50

I like buying my customers' products.

19:53

Great, sweet.

19:54

I don't know if you guys need static or dynamic analysis,

19:57

but I would point you to them.

20:00

Anything that comes up is reviewed as part of the QA

20:04

process and build acceptance.

20:05

That's what I touched on before.

20:07

And we have regular developer training, both in security

20:11

and best practices domain.

20:12

All right.

20:15

We call this the DevOps infinity circle.

20:18

But the thing is, it's never done.

20:21

We build it.

20:22

We deploy it.

20:24

We monitor it.

20:25

We integrate.

20:26

And we report.

20:28

And we stay on the cycle forever.

20:29

It's my team that's responsible for keeping your

20:32

systems alive and running.

20:34

We have a 24/7.

20:36

NOCSOC level one that spins up to a level two alert system

20:42

depending on what's going on.

20:46

All right, let's talk about some secure deployment practices

20:49

and harden environments.

20:50

Infrastructure is code.

20:52

All of your code, or at least the infrastructure code that I

20:56

use to build a new customer environment, is built in

20:59

Terraform.

21:00

Cloud environment configurations, that Terraform code is

21:04

checked into Git.

21:05

This facilitates repeatable infrastructure.

21:08

And then from my side is an operator of our cloud

21:11

environment.

21:11

It allows for drift detection and remediation so that we can

21:15

keep all of our customer environments tied together.

21:18

We have threat, intelligence, and detection.

21:21

This is mandated through our ISO 27001.

21:24

I just switched from Lacework to Sysdig.

21:26

Sysdig, I want to give them a shout out as our

21:29

customers as well.

21:30

Great product.

21:31

Thank you, sir.

21:32

All right, but this is cloud control plane monitoring

21:35

through the cloud audit and GCP or cloud trails in AWS,

21:40

depending on cloud you prefer.

21:43

And then we run an agent on every single one of my systems.

21:48

That gives us a very rich set of telemetry that we can use

21:50

to look for things going on in there that may not need to be.

21:56

Logs and alerts are monitored in triage,

21:58

put on my 24/7 NOC SOC and DevOps team, mandatory 2FA on

22:02

production access.

22:04

So we use role-based access.

22:06

It's not blanket permissions, right?

22:08

My developers don't have access to every system out there.

22:11

They say, hey, I want to access Sysdig systems for eight

22:14

hours in order to do this analysis.

22:16

And this isn't my laptop show.

22:19

I can't show you.

22:19

But we have a Slack bot set up in a channel called

22:22

permission request.

22:22

You say, hey, at Gandalf, which is the name of that agent,

22:26

I am seeking access to these systems for this many hours,

22:30

for this purpose.

22:31

And this generates the access log that I present to our

22:35

auditors.

22:35

We go through our audits.

22:39

Yep, the approval list for those access is maintained and

22:44

get.

22:44

So if you need access to a new system, again, it's going

22:47

through mandatory 2-factor.

22:49

Hey, or 2-party review.

22:51

So it's not just you getting access.

22:53

There's always someone in the loop.

22:55

And then if you're on the approval list and get, by that

22:58

permission request bot that I mentioned, you are granted

23:01

access to that system on a time limit of basis.

23:04

Today we're using junk cloud to enforce 2FA.

23:07

And that's how I facilitate connection in there.

23:09

I'm looking at alternate solutions.

23:12

And then once again, cloud EPC, isolated environments.

23:17

So we can keep everything tightly coupled.

23:21

So a couple of advanced security features, and I'll go

23:25

quickly for this.

23:26

We do monthly security audits.

23:31

And this includes access to requests, internal and

23:33

external network scans, vulnerability, review,

23:35

and remediation.

23:37

Everyone inside my company is through a mandatory

23:40

background check.

23:41

And that includes both employees and contractors.

23:45

We do not provision access in Google Workspace, Slack, or

23:49

GCP unless you have a successful background check.

23:54

Encryption and to malware, you know all the stuff that's

23:56

required by SOC 2 and ISO.

23:59

And customer data access is willing to do a small list of

24:01

flight listed employees inside.

24:05

Yep, 24/7 we do it.

24:07

All right, we're looking at it.

24:10

Code coverage, watching GCP, looking for updates, the

24:15

laugh results, and log monitoring.

24:19

Pops up in Slack, and get a validated incident.

24:22

Goes up to Jira.

24:23

And again, I get audited this on an annual basis, if not more

24:26

frequently.

24:28

Got a bunch of tools we used.

24:31

Needless to say, time I won't read through them.

24:33

But I'm on the hook for our audits.

24:39

So auditors will look at our ISMS.

24:43

Let me see if I can pull this up real quick.

24:45

Here's my SMS.

24:46

This is what I built here.

24:47

All right, this is 120 separate policies that cover

24:52

everything from--

24:54

we got statement of applicability, segregation of

24:56

duties, guidelines, your threat and

24:58

intelligence process, your information asset inventory.

25:02

And yeah, it really sucks when you have to pull these up,

25:05

read through them one by one with the auditor.

25:07

This is what got me through my ISO.

25:11

Hold up.

25:15

So yeah.

25:18

Get back in this.

25:20

Let's see if I can do this.

25:26

Oh no.

25:30

One more second.

25:31

Excuse me.

25:32

Oh no, I did it.

25:36

I think I closed the wrong window.

25:39

Do you know how to pull that back up?

25:43

I think we might have to--

25:46

Just move on.

25:47

Or just open it back up.

25:48

Yeah.

25:49

This guy.

25:50

[INAUDIBLE]

25:51

OK.

25:52

Thank you guys.

25:55

Yeah.

25:56

Drag it over.

25:57

OK.

25:58

That's my show.

26:00

I didn't expect that to happen.

26:03

That's what I get for not trying to do.

26:05

All right, here we go.

26:07

Yeah, the double.

26:08

Yeah.

26:09

OK, cool.

26:10

[INAUDIBLE]

26:11

[INAUDIBLE]

26:18

All right, let me finish this.

26:20

I'm almost done.

26:21

OK, I was--

26:21

Yeah, I got my last slide here.

26:23

Last slide here, right.

26:25

We built our models.

26:27

Alex just talked about this.

26:28

We sell post them, right?

26:29

We have a subset of features that may leverage

26:32

J&M models like case summarization, responses cis.

26:36

Use those models are optional.

26:37

Some of my customers are very suspicious of J&M AI.

26:40

And I will not tell you they're wrong, right?

26:42

It's how you choose to deal with the data security

26:45

inside your organization.

26:47

So if you don't like them, we'll lead those features off.

26:49

Look, no J&M AI, right?

26:51

Then it was just models running on my hardware.

26:54

We can also swap those model providers.

26:57

Open AI, chat GPT, anthropic cloud,

26:59

and when the process of building some home-built models

27:02

on AWS BreadWalk.

27:04

Can you take a raise?

27:06

Scared is not just a checkbox.

27:08

This is the foundation of trust in our enterprise.

27:11

We understand the importance of your data.

27:13

And we spend a lot of time, effort, and money

27:16

keeping it secure.

27:18

You have a comprehensive security architecture

27:21

to keep your trust, maintain protection of that data,

27:25

and have a multilayer, defense and depth approach

27:27

to maintain assurance.

27:30

Please, contact us if you've got any information.

27:34

Thank you guys for your attention.

27:35

I hope I didn't get too fast.

27:37

If you have any questions, now's the time.

27:39

[BLANK_AUDIO]