And the Senior Vice President and gm about networking security business. Lets just jump right into it. We normally think about pandemic science and strategies, this was an election 2020, the security election. We all know people are working loom home and theres a lot of impact to working, not to mention the one here but really the telework designed for and make sure security but how is this going . It is a pretty big undertaking. S i am pleased with how prepared we were, weve already made a number of decisions so that we are averaging services for most of our, the normal daytoday business operations, emails and so forth so that means transitions are pretty efficient. We have to learn how to do a better job using the collaboration to replace Conference Room meetings, some of the biggest areas that were challenges and good opportunities is to figure out how we do our work and we are in this television posture, we couldnt do it the same way as we did before. We have to figure out different ways current information month during as much work as we could and on a number of things. Given that is we serve the rest of the agencies as well as other constituencies, many of us prepared for teleworking for a different variety of reasons so figuring out how to quickly reprioritize engagements we were helping those agencies in the department secure themselves as they were moving into those environments that Mission Temple to suggest newew priorities was intense for the first 30 to 60 days. Now weve all across the board have dropped into the new norm normal. Getting used to this, meeting facetoface, how is it with cisco . I think we saw our customers go through a few stages. Stage onero was aggregate capacy on things like bpm, companies that had workforces that were relatively distributive and they seem like it was pretty straightforward. Large consulting firms, they kind of have the capacity but about our customers and financial services, and we go from normally having 150,000 people on the bpm . A massive scale and working on supply chain issues with our suppliers and it started in china and Southeast Asia so we have had we get our customers up from the perspective . Stage two was okay, what additional controls and how do we really think what controls are most important for me in this environment . Things like mfa, we saw a spike in terms of that usage is customers with thinking in terms of how do i identify the user securely . Sweettalk things like that pickup. Things that were easy e additios to the classic security environment for the workforces. We are kind of now things that i want to think about more broadly and change a bit of the Security Control and things like how do i do that even though they are no longer on my network . If you like we are in the stage now of revisiting the controls are lasting versus things that maybe were not critical. What you just described, technology and procurement lessons learned, what investments should we learn from . Maybe they would be scaled to different and be done different ways so really, the next question, share with the audience what youve seen as a result of this movement and what technology is critical in the stages you described . It is this journey the industry has in general, more and more valuable and i like it because one is the time valued for customers goes together. We talkor about getting customes of inn minutes, not hours or weeks so that has been a big focus. The things not just in the day but things like security that are easy to deploy at large and we turned out Companies Need to tell the investments weve been making a product guy like me, we didnt have visibility to Customers Using our products. It helps us in terms of that back so for us, immediately see what features are being used, how long it is taking for certain days, if we add new capability, but the learning curve looks like so to me it is tremendously valuable. This is new with covid if you look at the last company and security, the last Six Companies weve acquired have all been cloud as a cervix technology and that is something i dont expect. Anytime soon but covid just put an emphasis on being something that is a good thing for the industry as a whole and technology provider. Appreciate that perspective. Brad, what are your thoughts on that . Well, insufficiencies, right . Some of the things that have led to efficiencies want all that Technology Oriented my fear. One of the things that forced us to focus more, maybe we can do all of thef things, we focus on the most important things, we focus our dialogue and most important things and i have to translate it into process improvements. 14 getting information. When those go away or are more challenged and were left with kind of scheduled virtual conferences where were not physically together and were only in this virtual room for a period of time the process change that weve done at least as weve documented, prepared for meetings better, weve put in things we might have communicated verbally. It feels like writing takes longer than the speaking of itthings but they endure more and there communicated to r staff in ways that they can read them so i found this combination of focusing our efforts and improving our business processes really conform to the virtual skills that we have had led to imbetter mission alignment, better mission can indication, better focus on inclusivity and in most cases we are able to execute on the important thingsprobably as successfully as we would have or more successfully maybe and had we all been together. On the Technology Side though covid has forced everyone else to accelerate our adoption of crowd Services Just as jeff mentioned so there were things we had to process we might have done slower that weve done more quickly and we are seeing efficiencies that come from a Cloud Service that may have been an Enterprise Service before and all the kinds of maintenance and other things that go along with that. That is not optional right now but always to some degree less productive waiver than we would have woliked to have. So that acceleration of Mission Performance or workflow systems and all of the kinds of things that make the business work, we didnt gain those efficiencies in a couple of weeks because they have, weve accelerated some of that cloud migration. Its taken us months to put those things in place but we are seeing the games and seeing the benefits now and thats a huge priority for me when i came in is that we really moved much more aggressively into the cloud and just this boost has really helped make that requirement and make that an obvious strategy for us to engage in exactly the way you describe the benefit is its challenging the way we think and listening to you talk about this , maybe its a feature that weve added to zoom or other video chat conferences it would be accidental meet at the water cooler feature where you go into a certain status and somebody randomly pops up and you have that conversation that we really miss. Maybe thats a new feature that we can have changes the way we work. It would be uncomfortable im sure but that, those are interactions we need to stimulate and we all recognize how valuable those are but also what you described is the conversations persist now much better than where welldocumented and thats a huge challenge when youre in the meeting is the conversations persist outside and i agree thats a big benefit we are seeing. So brian, i wanted to stay with you for this next question. You talk about adoption of sound based technology, what about the adoption of zero trust . Thats one of the things thats a multifaceted approach to embrace zero trust, its not just one thing you do. It takes across your entire enterprise stack and how you approach your engineering writ large. So tell me about your perspective on how we, how zero trust will accelerate us through this as well. Its part and parcel to Everything Else were doing in terms of moving to the cloud and moving to software as a service. It changes the nature of both this perimeter and environment that you can control and everything inside that perimeter and inside of the environment you include that you can trust. That hasnt been real for a long time. So thats been kind of central model that things were architected in. Now that departments and agencies, companies have moved so many sthings to Cloud Services, to software as a service, it forces us, it requires usto rethink the nature of trust. At some point something hasto be trusted. Theres no way around that. So zero trust is kind of the tangent. Were getting there and so we published just actually in the last few weeks our trusted Internet Connection 3. 0 guidance. Were trying to give departments and agencies guidance and flexibility and encourage them to move 20 trust architectures. Which involve a lot by the way, there is no solar bullet product that you can use with zero trust and zero trust is philosophical and architectural as much as it is product so it has to be built and conceived and across the enterprise, and it will take time to get there but its a serious push for us from a study perspective. From a best practices and architecture, from evaluating products with agencies as well as, i think this is going to be a significant part of what the agencies do over the coming years as we move more of those services into the cloud. Thanks brian. Just. I would secondeverything brian just said. I think what weve seen is definitely trust is an approach, thats all response, thats how we talk about it at cisco as well. Weve seen some of these technologiesthat underpin that approach. Weve seen just this massive spike up and i talked about you acquired a Company Called duo security. Really we thought we had one of the most capable approaches from the zero trust in protecting users and devices so as i mentioned earlier thats one of the things, its the single largest increase. That is tied but those two things really just took off as part of this process. One thing is i think its forced customers to reevaluate, the perimeter was already distributed. We were already thinking about it but it was already there so this was a nice wakeup call and we saw this real interest in not just the user but its a user device and how do i check the posture of that device and really what we seen is zero trust can have a model where the user, the end user, not thesecurity professionals but the endusers themselves can participate in the cyber hiding of the organization. And thats part of the thing weve really tried to stress and i think the users, im not in the office and i cant rely necessarily on all the controls that might have been there if i were sitting in the agency or wherever. Im working from home and thats i think that a nice wakeup call and if you have the right products that help users understand, is my iphone on the right level and getting that feedback would be another thing that things are positive for this industry and hopefully we will carry that forward even post. It might not be quite as strange in the new world order as it has been. One of the things you hit on is the risk to the landscape, has it changed or do we complete prioritization of certain risks . Id like to hear yourthoughts on that jeff. Obviously some of the landscape has changed but there were already people teleworking and people with their own devices that brought their devices to work. Although situations still apply but now just the proliferation of it , that risk was much higher on the register. Talking to our research team, they almost 400 researchers and its interesting. Youve actually seen those statistical differences in terms of the post covid versus preauntran12a. Now, there are things like theres covid themed attacks so in terms of the how im trying to issue, those have changed a bit. Johns hopkins threats, the Johns Hopkins threat etc. Or covid map. But really the things that weve seen, the types of underlying malware technologies have just potentially stayed the same area so there are clearly when im in the office, when im sitting behind a security stack that we have their there are some differences that i think it was a stale issue in termsof the amount of distributed. By a kind of core, i dont think theres really a quart of thechange in the threat landscape. Is there any state needs, are there new risks from the service or are we prioritizing existing rest based on the new normal. I think i agree with pretty much everything jeff said maybe with a little bit of nuance that we have been, we have been advising the department of agencies to patch again for a year now. Weve been a number of critical vpn vulnerabilities. That vpn now has gone from 10 percent of your enterprise traffic to maybe 95 percent of your internet traffic and weve moved past vpn so i think that went in one sense is not new and in another sense maybe theres no more attacks than there used to be but the locus is the vpn now so our adversaries know where we are and how we are working. And so thats where they go. I think the other thing is as weve embraced all the tools for collaborating and working remotely , then in this configuration of those tools has also presented kind of a new venue risk, and a new attack services and we quickly moved from a hosted Microsoft Exchange two obviously the five and you miss some of the best practices and configurations then youve exposed any number of things weve seen so we published something in a couple of months ago looking at hearing 27 to 2019 vulnerabilities in 2020. Its not just the magnitude of vulnerability or whatever but the ones that were splitting and the known surprise is that the big shift in 2020 was the shift towards exploiting officers 65 and put vpn. Those vulnerabilities in particular. Whereas in the previous it was microsoft technologies and things alongthose lines. So a shift those vulnerabilities are still there theres still a valid tool that our adversaries are using but they provide their focus just as we have shifted the way that we work. I know were short on time ill get everybodys favorite part, the predicting the future. And clearly were in a transformation time, this opportunity is driving some transformation. We talkedabout clearly on our discussion here today. Im hoping that the plastic tent i using my pharmacy goes away. Nearly thats not a method that we authenticate who i am or it helps with my wellbeing in the pharmacy. So what you think that the pandemic will go to the m4. Whats that you say based on this and it needs to go, it just hasnt been a focus for your security. You want to get us started and then brian. Ill go quick. I think it may not go away im working right now. Ive got employee protection on my laptop. Im using nfa. Weve got dns. And we as the on the application i go to im not on the vpn. Im not on vpn fair amount of my working so i think if you think about where users are and what applications are going to have to start rethinking what access pattern looks like to be efficient and capable. Im a technology guy so these are the things i think about but maybe Remote Access over the year. Brian, your thoughts, closing. I think were going to ship away from agencies are going to shift from a way of working where we had to be in one place or a couple of places and those places relied heavily on onsite information. I think what we are already learning right now is how much insight we can get from commercial information. The gap between classified information and commercial information but we have the opportunity to rethink the way we work and where we work. If we can work remotely right now we dont need to hire out all our employees from the Capital Region and dont need all of our employees to have topsecret clearances that are not accessing topsecret information and we can leverage commercial data and open source data effectively for a larger part of our mission and those things are going to open up a whole new workforce and reduce facility costs and i think it gives us the opportunity to really accelerate innovation. Whatever to say brian, youre predicting the end of the workforcepanel and Discussion Panel at events. Hallelujah. Thanks brian, thanks jeff. We really had a great time youre with this panel and i appreciate everybodys efforts. Thank you. Thank you. Earlier today President Trump announced rain. Thank you very much. A few moments ago i hosted a historical meeting between benjamin that and yahoo of israel and King Ahmad Al Khalifa of bahrain. Both leaders expressed their condolences as well. To the american people. On this very very tragic, horrible event that took place september 11 area and they very much meant and i want to thank them. Theres no more