CyberWire Daily - US midterms conclude without cyber interference. NATO on cyber defense. New APT41 activity identified. Russia’s FSB and SVR continue cyberespionage. Trends in phishing and API risks.
Episode Date: November 10, 2022There’s no sign that cyberattacks affected US vote counts. NATO meets to discuss the Atlantic Alliance’s Cyber Defense Pledge. A new APT41 subgroup has been identified. FSB phishing impersonates U...kraine's SSCIP. A look at Cozy Bear's use of credential roaming. Caleb Barlow shares tips on removing implicit bias from your hiring process. Our guests are Valerie Abend and Lisa O'Connor from Accenture with a look at the difference in how women and men pursue the top cyber leadership roles. And an update on Phishing trends and API threats. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/217 Selected reading. Statement from CISA Director Easterly on the Security of the 2022 Elections (Cybersecurity and Infrastructure Security Agency): No ‘Specific or Credible’ Cyber Threats Affected Integrity of Midterms, CISA Says (Nextgov.com) U.S. vote counting unaffected by cyberattacks, officials say (PBS NewsHour) What's 'Putin's chef' cooking up with talk on US meddling? (AP NEWS) NATO’s 2022 Cyber Defense Pledge Conference - United States Department of State (United States Department of State) Japan joins NATO cyber defense centre (Telecoms Tech News) China casts wary eye as Japan signs up for Nato cybersecurity platform (South China Morning Post) Hack the Real Box: APT41’s New Subgroup Earth Longzhi (Trend Micro) New hacking group uses custom 'Symatic' Cobalt Strike loaders (BleepingComputer) They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming (Mandiant) APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network (The Hacker News) CAUTION‼️ russian hackers are sending emails with malicious links from the SSSCIP (State Service of Special Communications and Information Protection of Ukraine) Russian hackers send out emails under the name of Ukraine's State Service of Special Communications and Information Protection (Yahoo) Research Report | The State of Email Security 2022 (Tessian) DevOps Tools & Infrastructure Under Attack (Wallarm) Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyber Wire Network, powered by N2K.
Air Transat presents two friends traveling in Europe for the first time and feeling some pretty big emotions.
This coffee is so good. How do they make it so rich and tasty?
Those paintings we saw today weren't prints. They were the actual paintings.
I have never seen tomatoes like this.
How are they so red?
With flight deals starting at just $589,
it's time for you to see what Europe has to offer.
Don't worry.
You can handle it.
Visit airtransat.com for details.
Conditions apply.
AirTransat.
Travel moves us.
Hey, everybody.
Dave here.
Have you ever wondered where your personal information is lurking online?
Like many of you, I was concerned about my data being sold by data brokers.
So I decided to try Delete.me.
I have to say, Delete.me is a game changer.
Within days of signing up, they started removing my personal information from hundreds of data brokers.
I finally have peace of mind knowing my data privacy is protected.
Delete.me's team does all the work for you with detailed reports so you know exactly what's been done.
Take control of your data and keep your private life private by signing up for Delete.me.
Now at a special discount for our listeners.
private by signing up for Delete Me. Now at a special discount for our listeners,
today get 20% off your Delete Me plan when you go to joindeleteme.com slash n2k and use promo code n2k at checkout. The only way to get 20% off is to go to joindeleteme.com slash n2k and enter code
n2k at checkout. That's joindeleteme.com slash N2K, code N2K.
Election Day has come and gone,
and there's no sign that cyber attacks affected U.S. vote counts.
NATO meets to discuss the Atlantic Alliance's cyber defense pledge.
A new APT41 subgroup has been identified.
FSB phishing impersonates Ukraine's SSCIP.
A look at Cozy Bear's use of credential roaming.
Caleb Barlow shares tips on removing implicit bias from your hiring process.
Our guests are Valerie Abend and Lisa O'Connor from Accenture with a look at the difference in how women and men pursue the top cyber leadership roles.
And an update on phishing trends and API threats.
From the CyberWire studios at DataTribe, I'm Dave Bittner with your CyberWire summary for Thursday, November 10th, 2022. So the U.S. midterm elections are all over.
There's still some counting to be done, but it appears that no effective cyber attacks on election infrastructure materialized.
Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency,
said yesterday, we have seen no evidence that any voting system deleted or lost votes,
changed votes, or was in any way compromised in any race in the country. Minor DDoS incidents
were reported in a few jurisdictions, the PBS NewsHour reports, but these seem in no case to have affected the voting
infrastructure itself. In particular, the Russian interference Yevgeny Progozhin promised at the
11th hour didn't show up. Seems the Yankees do indeed have the goods on him, to the extent that
he's been sanctioned and that he's made an appearance on American Wanted posters. We trust Mr. Pogosian
is taking his vacations in a nice place where there's no extradition treaty with the U.S.
Representatives of NATO's member countries have been meeting in Rome yesterday and today
to review and renew the Atlantic Alliance's cyber defense pledge. Most of the proceedings have been
closed to the public,
but the U.S. State Department announced yesterday that cybersecurity for the energy sector is figuring prominently on the agenda, and some of this morning's keynotes are publicly available.
We sat in virtually on one of them by U.S. Deputy National Security Advisor Ann Neuberger.
She began by noting that NATO has remained relevant
as the world and the technology in it have evolved. NATO has consistently evolved to face these forces
of modern technology. Indeed, in 2016, our leaders came together and committed to ensure, and I quote,
the alliance keeps pace with the fast-evolving cyber threat landscape
and that our nations will be capable of defending themselves in cyberspace as they do in air, on land, and on sea.
She stressed that recent experience has highlighted the importance of cybersecurity preparedness and partnership.
Through his brutal war in Ukraine, Putin sought to split NATO.
But thanks to our close work around this table, he will get exactly the opposite – a more
unified NATO, stronger defenses, and a more resolute transatlantic community.
We have seen in Ukraine the importance of preparedness and strengthening our cyber defenses before attack.
Ukraine has in many cases been able to successfully defend against sophisticated cyber attacks
due to the work that was done before the Russian invasion this past February.
Ukraine took to heart the lessons it learned in 2014 about the power of cyber attacks
in modern conflict. Through partnerships with many of the countries in the room, as well as with the
private sector, Ukraine has been able to continue to improve its cyber capability, and the world has
been reminded of the importance of standing in support of partners when they are victims of cyber This is not only a wartime lesson.
As Neuberger went on to say,
effective international partnerships are necessary to defend against transnational threats,
and such threats are endemic in cyberspace.
We committed to developing a NATO capability to more effectively enable allies to help other
allies in their times of need. NATO, as Ms. Neuberger said this morning, is getting ready
to welcome two new members, Sweden and Finland, but the Atlantic Alliance is also working closely
with friendly nations who are well outside NATO's original geographical scope.
Prominent among those friendly nations is Japan,
which last Friday announced that it would be joining NATO's Cooperative Cyber Defense Center of Excellence.
Beijing has taken note and isn't particularly happy with the development,
seeing it as a fundamentally unfriendly gesture aimed at China.
The South China Morning Post quotes a spokesman for the People's Republic's Foreign Ministry
who complained,
The Asia-Pacific region is not the geographic domain of the North Atlantic,
and there is no need to establish an Asia-Pacific version of NATO.
The spokesman Zhao Lishan added,
What we have seen is that in recent years NATO
has continuously strengthened its ties with Asia-Pacific countries. What is NATO's intention?
The international community, especially countries in the Asia-Pacific region,
should maintain a high degree of vigilance. Researchers at Trend Micro have identified a
new subgroup of ABT41, the threat
actor associated with the Chinese government. They're calling the group Earth Long Xi and
attribute two long-running campaigns to it, stating, since it first started being active in 2020,
Earth Long Xi's long-running campaign can be divided into two based on the range of time and
toolset. During its first campaign, deployed from 2020 to 2021, Earth Longji targeted the government,
infrastructure, and health industries in Taiwan and the banking sector in China. In its second
campaign, from 2021 to 2022, the group targeted high-profile victims in the defense, aviation, insurance,
and urban development industries in Taiwan, China, Thailand, Malaysia, Indonesia, Pakistan,
and Ukraine. Spear phishing has been the primary attack vector.
Ukraine's State Service of Special Communications and Information Protection
warned yesterday of a phishing campaign that's
sending malicious emails impersonating the SSCIP. They stated, specialists from the government's
computer emergency response team of Ukraine have recorded a mass distribution of emails
with malicious links allegedly under the name of the State Service of Special Communications
and Information Protection of Ukraine. This activity is associated with the hacker group UAC-0010, Armageddon. As the warning goes on to
note, Armageddon is associated with Russia's FSB. They are among the most active groups that have
been attacking Ukraine since the beginning of Russia's full-scale military invasion.
Criminals are usually exploiting topics that are sensitive and important for Ukrainians.
The most common payload the campaign delivers is an information stealer.
Mandiant describes a cyber espionage campaign carried out earlier this year by APT29,
Cozy Bear, a unit of Russia's SVR Foreign Intelligence Service. CozyBear fished its way
into a European diplomatic organization's networks and subsequently abused Windows
credential roaming feature. Mandiant says, the use of credential roaming in an organization
allows attackers and red teams to abuse the saved credentials for the purposes of privilege escalation.
Two noteworthy trend studies appeared this morning.
In the first, a study of phishing, security firm Tessian has found that 94% of organizations in the U.S.
reported being targeted by spear phishing attacks in 2022.
The majority of phishing attacks involved attempts to impersonate legitimate email addresses.
And ransomware remains high on the list of what the spear phishing delivers. 92% of organizations
reported that they'd been targeted by phishing emails that attempted to launch ransomware attacks,
and 10% of respondents said their organizations had received over 450 email-based ransomware
attacks since January 2022. In the second study, security researchers at Wallarm released their
Quarter 3 2022 API Threat Stats Report this morning, giving a look into this quarter's API
vulnerabilities and exploits. Among the more interesting findings was how compressed
the timeline has become between CVE disclosure and proof-of-concept exploit publication.
They now tend to occur, the report says, on the same day, which should affect
organizations' mitigation planning. That is, don't sleep on applying patches.
And a final note for our listeners.
Tomorrow is Veterans Day in the U.S.,
and a day marked for special remembrance in many other countries around the world.
We won't be publishing on the holiday, but we invite you, wherever you are,
to spare a thought for all the veterans of all nations
who've served with honor and bravery and in good faith.
Coming up after the break,
Caleb Barlow shares tips on removing implicit bias from your hiring process.
And our guests, Valerie Abend and Lisa O'Connor from Accenture,
have a look at the difference in how women and men pursue the top cyber leadership roles.
Stay with us.
Do you know the status of your compliance controls right now?
Like, right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs, we rely on point-in-time
checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility
into their controls with Vanta. Here's the gist.
Vanta brings automation to evidence collection across 30 frameworks,
like SOC 2 and ISO 27001.
They also centralize key workflows like policies, access reviews, and reporting,
and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC.
Get $1,000 off Vanta when you go to vanta.com slash cyber.
That's vanta.com slash cyber for $1,000 off.
And now, a message from Black Cloak.
Did you know the easiest way for cybercriminals to bypass your company's defenses is by targeting your executives and their families at home?
Black Cloak's award-winning digital executive protection platform
secures their personal devices,
home networks, and connected lives. Because when executives are compromised at home,
your company is at risk. In fact, over one-third of new members discover they've already been breached. Protect your executives and their families 24-7, 365 with Black Cloak. Learn more
at blackcloak.io.
The team at Accenture recently published a report called Rising to the Top, which examines
the difference in how women and men pursue the top cyber leadership roles and some hurdles to overcome.
Joining me to discuss the report are two women in leadership positions at Accenture,
Valerie Abend, Global Cyber Strategy Lead and Senior Managing Director at Accenture,
and Lisa O'Connor, Global Lead of Cybersecurity R&D at Accenture. Valerie Abend is up first.
As the Accenture Cybersecurity Forum Women's Council,
our mission, and as we point out, there's a real challenge, particularly with these women in cyber,
at getting them to the top of the field and making sure that we have equal representation
at that top level. Lisa, what's your perspective? Yeah, so it's funny because women are 50% of the workforce, yet in cybersecurity, we're 25% of the workforce.
And if you really look at the women in leadership roles, we're going down to 17%.
And so we have a talent problem in keeping diverse talent in cybersecurity.
keeping diverse talent in cybersecurity. And that has a real impact for us in terms of innovation,
in terms of creative teams and creative teams that can keep up with the adversary.
So this is a real intrinsic problem to cybersecurity talent at large and how we're ready for national defense and for defending our companies.
I think it's fair to say there's recognition that this is an issue. And as Valerie
mentioned, there have been efforts to address this. I mean, is this a matter of sometimes things
just take time or is that an excuse? Well, I'll say that I think everybody has good intent,
but what they need is more information about how to make this intentional
and how that becomes part of the fabric of not just their talent recruitment and retention,
but intentional on how they programmatically actually help them grow and get into the top spot.
actually help them grow and get into the top spot.
And that doesn't just happen by accident.
That happens with really strong support,
sponsorship at the top of the house across the C-suite.
And it happens by actually looking at what makes these programs successful and how you position diverse talent to actually get the visibility, get the mentorship,
and actually get the opportunity to apply for, be recruited for, promote themselves into,
voice their interest in being at that top layer of cybersecurity in the chief information security
officer role. Lisa, why do you suppose that we're seeing this filtering happen?
That even when women are taking their place in organizations,
they're not making it all the way to the top.
Right. That's exactly what we wanted to answer in this latest piece of research,
Rise to the Top.
And that is really looking at how people, men and women, rise to the
top position of CISO. So we studied that. We asked men and women about their journey to CISO.
How did they announce their candidacy? How did they put their hat into the ring?
What were the tactics that they used to go after those positions and to make their intentions known? And also, how did they get the
CISO position? So tapping into the success of our ACF CISOs, men and women, we learned about some
differences between how they rise and what tactics they use and what they overestimated and underestimated
the importance of in that journey. And some of the insights from that are pretty startling.
We found that men were much more likely,
57% more likely to rise within the organization
that they were already in,
where women were much more likely to gain a CISO role
outside of their organization
and make their candidacy known outside.
And that was kind of surprising. So we double-clicked on that and we looked at some of
the other behaviors. Well, let's dig into that. I mean, what are some of the other insights that
you all discovered? Yeah. So one of the things, while men rose quickly, more directly, I should
say, in their organizations, they did not rise more quickly. Women actually
moved forward quickly within six months, secured a position where for men, it was more likely 12
months, which made us think and kind of said, well, why is that? These women are clearly very
qualified. They're getting positions right away. What is it about their behavior or maybe how
they're announcing their candidacy that they're overthinking this potentially and going through and looking to meet all the qualifications in those roles.
So we have tremendously ready candidates, but they're making their candidacy known much later.
Valerie, speaking about mentorship, I mean, what can some of the folks who have risen to those top levels, how do they make sure that they're not closing the door behind themselves?
attention, actually put it in your performance achievement goals that you are not only sponsoring somebody, which means giving them voice about how great they are in rooms that that person
doesn't have access to, but also putting it into your succession plan. And that should actually be
part of how we hold our senior executives accountable. Who is going to be the next you and how are you helping to sponsor and mentor that person
and get support just even beyond you?
I spent, as does Lisa, a lot of time not just with women and helping them get a visibility
and understanding of what it takes to next level, but I actually introduced them to an
awful lot of people
who can also help them.
And I think that's incredibly important
that they have a council of people
who advise them as they get to the top.
And that was actually one of our recommendations
to the women is that you actually
don't just depend on one person.
You have essentially your own council of advisors.
Lisa, where does this begin? I mean, is this a matter of, do we need to do better with outreach to young women who are
growing up or coming up through school to make sure they're exposed to role models,
that they see this as a possibility? Absolutely. The sooner we are inclusive in our language and how we talk about these roles, how we
talk about the cybersecurity industry, more people are going to see themselves in cyber.
And that's so important for younger girls.
Women, I remember when I was going through school, I was one of six women in a class
of 120 engineers.
And that we'd love to change, right? And we change that by
really making sure our language is inclusive. We have leadership representation. We're showing
young girls and women what leadership looks like and showing that we're out there.
The other part of it too, is we think about position descriptions. This is a simple one companies can do. When we're writing position descriptions, those should also be gender neutral without bias
and putting the essential things in there that we need from a CISO. One of the things that we
found in what women overestimated was the amount of technical skills knowledge that were needed
for the role.
Because what got you to this point may have been the technical,
but what's valued in the CISO role
is that problem solving, the communication skills,
the other things that are so relevant
to the C-level and to the board.
And so how we're writing those position descriptions
is really important that we are able to align
to the criteria and say, we got that
and put our hat in the ring.
That's Lisa O'Connor from Accenture, joined by her colleague, Valerie Aben.
The report is titled Rising to the Top.
And joining me once again is Caleb Barlow.
He is the founder and CEO at Silete.
Caleb, it's always great to welcome you back.
You know, we have this ongoing conversation about the challenges when it comes to hiring good folks in cybersecurity.
And I know this is something that you've had your eye on lately.
What do you want to share with us today?
Well, you know, if we look at kind of the numbers here,
we had, you know, 1 million open security jobs here in the U.S.
It's now down to about 700,000.
And that's a stat from CyberSeek.org, right?
Which, you know, we've mentioned that site before.
It's a great site to go check things out.
Well, okay, 700,000 open jobs. There's 1 million employed people in the United States
in cybersecurity. So you can go run the ratios here. We can't fill the jobs.
But here's what's also interesting, Dave. We talk about problems like diversity. We need to bring
more women into the workplace. We need to bring more underrepresented minorities in the workplace. And I think we're doing a better job. We're
certainly not there yet, but we really have an accessibility problem in cybersecurity.
You know, if I get calls from recruiters all the time, we're like, hey, Caleb, I've got a tough
role I'm trying to fill. Do you know anyone in your network that meets this criteria? And I'm
like, well, what's the company looking
for? And they'll go down this list that is almost comical. Hey, I'm looking for a threat hunter.
I want him to have 20 years of experience. Okay, first of all, no threat hunter has 20 years of
experience. I'd like to have worked for a Silicon Valley company before, like a Facebook or a
Twitter or someplace where they really understand growth. And, oh, and it'd be great also if, you know, they're a diverse candidate.
And you sit back and kind of laugh and you're like, you are never going to find that person.
And if you do, it's going to cost you a fortune, right? What I don't hear happening is people going
out and saying, hey, you know, I need someone that has this type of
background, this type of experience, you know, like a threat hunter. I need someone with really
good investigative skills that's really good at repetitive tasks and, you know, is a self-starter
and self-motivator. Okay, that's probably looking for somebody you're going to find that's going to
be very successful in the role. And the issue here is often implicit bias, right? We have this idea of what the ideal
candidate looks like. And I would argue that we could fill those 700,000 open jobs if we started
thinking as companies about accessibility. How accessible are we to looking at people that might
be one degree of separation from perfect? How accessible are we to say, hey, let's go hire somebody
that maybe is going to need three months of training?
And part of the problem here is we arm up recruiters in the words we use.
So if you say something like, if you pitch to a recruiter,
hey, I want a high energy individual with that Silicon Valley experience,
what they hear, if they hear high energy, they hear, oh, it's got to be under 30. They hear Silicon Valley experience, you know, what they hear, if they
hear high energy, they hear, oh, it's got to be under 30. They hear Silicon Valley experience,
they limit it to a few companies, right? And unfortunately, what happens is the person doing
that sorting of resumes often doesn't have cybersecurity experience. They're not the
partner you talk to on the phone. Or it's even automated, you know?
And so people don't even make it
to having a human being look at the candidate.
And what's happening here is the implicit bias
that you unwittingly have forced into the system
is sorting resumes.
So here's a couple of things that I've been trying lately
that seem to really work.
And these are going to sound a little bold.
First of all, take your pool of resumes, however you get it, and remove all photos from the resumes.
The minute you remove photos, you remove so much implicit bias because you don't see age.
You don't see, you know, ethnicity.
You don't see, you know, whether somebody's male or female.
Also remove the names from the resume.
Do you really care what somebody's name is when you're hiring them?
No.
But again, you remove the ethnic or, you know, kind of whether someone's male or female the minute you remove the names.
Now, add them back later in the process because you need to know who to call.
But in that first sort, get rid of the pictures, get rid of the names, and remove all experience over 10 years old. And honestly, do I really care
where you worked 10 years ago? But what happens again is whoever's doing that sort picks up the
resume, looks at the experience and goes, oh my gosh, this person's in their 60s. Or maybe this
person's even in their 40s. Forget it, right? Look at the last 10 years. What has the person's in their 60s or, you know, maybe this person's even in their 40s. Forget it, right?
Look at the last 10 years. What has the person done in the last 10 years? And, you know, if you really want to get into this too, remove, you know, remove school and degree. I mean, and this one's
a little more controversial because some people will tell you, hey, look, you know, we know that
there's certain backgrounds, certain degrees that are going to really empower people. But again, I think if you think about accessibility, I don't really care
whether someone has a degree in electrical engineering, computer science, or they figured
it out after five years of working at the FBI and they figured cybersecurity out and they've only
got a GED. I don't know if I really care. So if you remove those things from the resume,
what you have is someone's capabilities and experience
and use that for your first sort
to get rid of that implicit bias.
You know, I remember speaking with someone
who had a whole lot of success
recruiting folks who had a background as a jazz musician.
And he said, because they are used to collaborating
in real time with a group of like-minded people with a varied set of skills, right? And they have
great improvisational problem-solving skills. And they have imagination.
Right. Yes, they are creative people. And it doesn't take as long to train people up as I think a lot of people think.
Would you agree with that?
Well, here's a good example.
Let's take a sales manager, right?
Yeah.
You know, I get this one all the time.
Hey, I'm looking for a sales executive.
They need to have, you know, they've got to be a great team builder and mentor.
They've got to understand the sales process.
They've got to be great at cadencing their people and teaching them.
And they need to have all this cybersecurity experience. And I'm like,
really? Because the problem is, you just limited your
scope of people to a very narrow pool the minute you told me
that they've got to have, and most people say, well, they've got to have cybersecurity
experience on Threat Intel. I'm like, okay, that probably limits it down to about five people in the universe.
Really, maybe we should go with this
and say, go find me an exceptional sales leader
that's maybe worked on some other technology product and let me
onboard them over the course of four or five months
where they're going to learn the cyber
piece of this. And if you go hire the right kind of skill that knows how to learn new things,
that's probably going to be an exceptional sales leader. But what do people do?
They go out and hire that person that has the skill. They pay twice as much money for them.
And they leave in a year and a half because your buddy down the street at the other company is
after the same thing and they go recruit them away for you and everybody just keeps paying them more money.
Yeah. We need to move away from that rockstar mentality, I think, in a lot of areas.
Well, again, it comes back to accessibility. And maybe we need to retool the metrics where,
you know, the metric today is we're often looking at underrepresented minorities when we
look at hiring. And we should still look at that. But maybe the bigger metric needs to be,
let's look at how many people we've moved into the field in our hiring. And my guess is,
if you focus on that, you're also going to fix your personal problem.
All right. Well, Kayla Barlow, thanks for joining us.
Cyber threats are evolving every second, and staying ahead is more than just a challenge.
It's a necessity.
That's why we're thrilled to partner with ThreatLocker,
a cybersecurity solution trusted by businesses worldwide.
ThreatLocker is a full suite of solutions designed to give you total control,
stopping unauthorized applications, securing sensitive data,
and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com
today to see how a default deny approach can keep your company safe and compliant.
Clear your schedule for you time with a handcrafted espresso beverage from Starbucks.
Clear your schedule for you time with a handcrafted espresso beverage from Starbucks.
Savor the new small and mighty Cortado.
Cozy up with the familiar flavors of pistachio.
Or shake up your mood with an iced brown sugar oat shaken espresso.
Whatever you choose, your espresso will be handcrafted with care at Starbucks. And that's The Cyber Wire. produced in Maryland out of the startup studios of DataTribe, where they're co-building the next generation of cybersecurity teams and technologies. Our amazing CyberWire team is Elliot Peltzman,
Trey Hester, Brandon Karp, Eliana White, Puru Prakash, Liz Ervin, Rachel Gelfand, Tim Nodar,
Joe Kerrigan, Carol Terrio, Maria Vermatsis, Ben Yellen, Nick Bilecki, Gina Johnson, Bennett Moe,
Catherine Murphy, Janine Daly, Chris Russell, John Petrick, Jennifer Iben, Rick Howard, Peter Kilpie, Simone Petrella, and I'm Dave Bittner.
Thanks for listening. We'll see you back here tomorrow. Thank you. AI and data products platform comes in. With Domo, you can channel AI and data
into innovative uses that deliver measurable impact.
Secure AI agents connect, prepare,
and automate your data workflows,
helping you gain insights, receive alerts,
and act with ease through guided apps
tailored to your role.
Data is hard.
Domo is easy.
Learn more at ai.domo.com Learn more at ai.domo.com.
That's ai.domo.com.