Risky Business - Risky Biz Soap Box: Why Mastercard became a cybersecurity vendor

Episode Date: October 16, 2025

In this sponsored Soap Box edition of the Risky Business podcast, host Patrick Gray chats with Mastercard’s Executive Vice President and Head of Security Solutions, Jo...han Gerber, about how the card brand thinks about cybersecurity and why it’s aggressively investing in the space. After listening to this interview you’ll understand why the credit card company spent $2.65b on threat intelligence vendor Recorded Future! This episode is also available on Youtube. Show notes

Transcript
Discussion (0)
Starting point is 00:00:00 Hey everyone and welcome to another soapbox edition of the Risky Business Podcast. My name's Patrick Gray. As regular listeners know, each edition of the Soapbox podcast is sponsored. And that means that everyone you hear in one of these soapbox editions, they paid to be here. And this edition of the Soapbox podcast is brought to you by MasterCard, which is a real sign of the times. Because, you know, when we think MasterCard, we think credit cards. brand. We don't think cybersecurity vendor. But that is kind of changing. I mean, they're always going to be a card brand first, right? But they are increasingly offering cybersecurity related
Starting point is 00:00:42 threat intelligence and services to various, what would you call them, stakeholders, I guess, in their ecosystem. You know, they even bought Recorded Future. They announced that deal in December 2024. $2.65 billion they paid for Recorded Future, which is a, you know, a fairly large threat intelligence company. So why is MasterCard getting into cyber security? Or why is MasterCard in cybersecurity? Because it has been in the cybers for a little while now. So joining me to explain it all is Johann Gerber,
Starting point is 00:01:16 who is the Executive Vice President of Security Solutions for MasterCard. And yeah, he really joined me to talk about why it is that a card brand is getting involved in the threat intelligence and cybersecurity game. So, yeah, really, at a fundamental level, as Johan's about to explain, it comes down to the fact that if you want to prevent fraud, you know, it's one thing to be able to do it at the transaction layer, but really you kind of have to shift left a bit. And, you know, cyber threat intelligence is a good way to do that. So here is Johann Gerber explaining that. I do hope you enjoy this conversation. When we get to the final transaction, it's almost too late to prevent fraud.
Starting point is 00:01:57 If you really want to be preventative and be proactive, you need to move upstream and you need to look beyond the transaction. And so in a world where everything is connected and we are being represented by machines or things, be it an IoT device or a phone or an actual machine, the two biggest problems that I think we need to understand and resolve is are you where you say you are, which is an identity problem? And is this device authorized to do what it's trying to do,
Starting point is 00:02:23 which is in essence the cyber problem that most of us face and CISO land every single day. And so that's at the essence of why cyber became so important to us. And so we have a traditional CSO in the organization who looks after protecting what we call the house, which is MasterCard. But then we've got this global network where we connect three and a half billion consumer who carries a card with our logo on, 150 billion, well, sorry, million merchants or businesses where you can use that card, about 22,000, 23,000 finance institutions in the middle. as you look at that connected ecosystem, how do we go and protect beyond just our house?
Starting point is 00:03:00 And that's really where my focus is in that area. That's where cyber is becoming a big problem for us. You know, every time somebody hacks into a business and steal your data, sells it on the dark web, it becomes a problem eventually for us in our brand, in the integrity of our brand. And so cyber just became one of those things for us. I almost get to the point where
Starting point is 00:03:19 how can you be in the online business without having a cyber capability? And that's really where that came into The threat intel component of it was, how do we become more proactive? How do we understand where the threat actors are going, especially in the world where geopolitics are playing a much bigger role for us? So how are you positioned to actually be able to execute on a bunch of this, right? Because look, I'll be completely honest.
Starting point is 00:03:42 My knowledge of the credit card ecosystem is not great. You know, I understand that you have the card brands like MasterCard visa, whatnot. But then you have the sort of issuing banks. And I have no idea even what sort of data, MasterCard, it's. as a card brand can see when there are these transactions happening online. So, you know, okay, you've got this amazing threat intelligence capability. You develop it. You've got all of this good information.
Starting point is 00:04:05 Is this stuff that you can apply yourself to transactions as they happen? I mean, you already mentioned that, you know, we need to sort of shift left in disrupting the fraud cycle. But I guess I'm asking, what do you do with all of this wonderful information that you're collecting? How do you then turn that information into fraud prevention? So maybe let me just debunk a few myths around the data that we see. So for instance, when the data that travels or traverses our network, you know, we don't see who you are.
Starting point is 00:04:35 We only see the 16 digit number that's on your card. And often that's represented by a token if it's an online transaction. We don't see what you buy. So we have no idea what's in the basket that you buy. We see the amount. We see the name of the business where you buy, the date time. There's a whole bunch of data around that. but there's very little, there's basically almost no PII data in terms of other than card numbers,
Starting point is 00:04:57 which is considered PII, but it's not your name or your address or anything like that. That doesn't flow over our network. That stops at a point before it hits our network. But where we see the cyber attacks happen could be a couple of places. We have cybercriminals that will do brute force attacks on our network to try to numerate valid card numbers in order to find them to then go and make counterfeit cards and go and use them. that's one. We have places where criminals have tried and successfully hacked into banks and actually put a piece of malware in front of their authorization system. Do they just approve
Starting point is 00:05:30 a bunch of ATM transactions? In fact, there's a very famous case dating back to 2013, which I think was at a lot of media attention where the criminals reached as a financial institution in the Middle East, put a piece of malware in front of their system, and every ATM transaction that came in was just approved. And they had 300 people, in 26 countries all heating ATMs at the same time. And they pull out a whole bunch of money. So there's all sorts of attacks that are coming in. I think it was 9 million bucks, if I remember correctly.
Starting point is 00:05:59 It was 40 million. It was 5 million in the first four minutes. So yeah, so they hit them at scale. And so you see that happen. Now other places where this becomes relevant is let's say we have, you know, a criminal who just stole, you know, a thousand or a million card numbers out there and they're offering it for sale on the dark web. When that card number now gets sold and try to get used on our network, that intelligence for us is extremely helpful.
Starting point is 00:06:26 Because now we can make sure that, you know, you get a new card in your hand. We block the criminals from actually executing that transaction because every time they're successful, there's a whole process now of getting you your money back, making sure all the stuff is restored. That takes time. It takes money. It takes effort. So being proactive on that space, very important. At the same time, one of the things that we've learned is that the criminal community, they go through a great lens. to either hack into existing businesses or establish businesses with fake credentials to supply the demand for test transactions.
Starting point is 00:06:57 Every time somebody tries to sell or buy a card number on the dark web in one of these marketplaces, one of the services they offer is to run a test transaction. And those test transactions have to cross our network. So how do we find these things? How do we know about them? And they just shut them down. So there's a lot of application for our thread intel
Starting point is 00:07:15 that comes in into our systems. And the last thing that I will mention is just helping our banks understand what kind of threats are moving around our network. So, for instance, if we see an attack happening in Brazil, how do I make sure that that attack cannot immediately evolve to the United States or to Japan or to Australia or South Africa or wherever? So that's where we use a lot of this intel and then also in our network with very advanced systems and AI to just make sure it doesn't spread. and we can be as pre-operative as possible. I mean, everything that you've just described, though, seems to revolve around lists of card numbers detecting when there's strange patterns
Starting point is 00:07:57 with things like transactions and whatnot. I guess where I'm curious, because that's the fraud discipline. I've always thought this sort of payment card fraud and bank fraud stuff. It's like this parallel discipline to pure cybersecurity, if you will, where you've got your own sort of TTPs, you've got your own detections, but it's like the indicators, the data is all very different to, say, trying to determine when a, you know, file hash might be bad or an IP might be bad or whatnot, you know. So where are you, as I understand it, you're moving more towards that sort of, you know, complete picture, cyber, less just about card numbers. You know, how do you then start gluing all of this together where you've got the insights that you're developing from just doing detections on payment data,
Starting point is 00:08:44 streams, whatever, you know, however you want to phrase it. But then you've also got this threat research going on, which is looking at what's happening on the wider internet. Like, how do you start to bring those together? Because I'd imagine, you know, that threat research is really useful to you, but you're not really best position to execute on that. Like, is this a case where you start sharing with banks or like, you know, why don't you just tell us how it all works?
Starting point is 00:09:08 We do. So we do a lot of sharing with the banks. We also do a lot of sharing with the government. One of our biggest missions is, you know, if you look at Mascot as a company, we do well when economies do well. You know, we do well when governments are doing well, when economies doing well, when people spend and they use it. So we go to great efforts to work with governments, especially when we see threats. So, for instance, if you think about what we did with Recorded Future, I mean, they bring more than 47 sovereign governments as part of their client list. this allows us to connect data between the banks, between governments, around the world
Starting point is 00:09:44 in order to help figure out how these attacks works. Because ransomware, for instance, ransomware per se may not be a big threat to the actual payment ecosystem, well, to our specific transaction network. But every time one of our businesses gets attacked, they cannot do transactions anymore that loses a bunch of data of their clients and all those transactions that gets used later on by criminals, that is how the cyber and the fraud world are fusing more and more. And we actually see several financial institutions around the world that are actually merging their fraud and financial crime systems where they see-so office, because they're
Starting point is 00:10:19 all looking for these patterns. You know, cybercrime and fraud nowadays is almost impossible to disconnect the two. A lot of scam attacks, for instance, he's been perpetrated by using deep fakes, hacking into doing social engineering, the same things we see with attacks on fishing attacks. Very similar attacks is being deployed across both of them. So we see a lot of patterns and a lot of similar groups behind the scenes that are doing the same things. That intelligence be able to share that through not just the banking system, but broader. So for instance, if you take what we've done with recorded future, I mean, we're not turning that into a financial services company.
Starting point is 00:10:58 In fact, we still want to expand its footprint because we think the financial industry is learning a tremendous amount about all the attacks that's coming that we can provide to the whole world and the same to government as well. Risk Recon is another company we acquired, which is a third-party risk management assessment piece. The first thing we did with that is when we bought that company, we deployed it across every single finance institution on the world, as well as about 13 million of the highest transaction processing businesses out there, and we started establishing a baseline of all the vulnerabilities that we see across our network. now we can use that data to inform the CSOs at all of our banks, say these are the commonalities,
Starting point is 00:11:37 and now if you overlay that with thread intel, we've got the vulnerabilities, we can see through the threat intel which vulnerabilities are being exploited, and we can help our CSOs in the banks much sooner to kind of prioritize which ones they should fix. So there's a transaction layer which I talked about, but there's also an ecosystem, they call it hygiene, that we're trying to work and fix it, say, how do we just raise the bar of cybersecurity across those that are connected to our network? Well, I guess that's why I was asking about, you know, how are you in a position to be able to execute on threat intelligence, right? Because you're really not.
Starting point is 00:12:09 It's not like you are seeing the originating IPs of transactions. It's not like you are able to understand if a merchant website has skimmer code in it or whatever. You might be able to see, hey, there's a lot of dodgy transactions coming from this merchant, which might imply that there's been a compromise. But you don't have that visibility. The banks are much better position for this. And, you know, the banks and the merchants are much better position for this. So is this the idea here to sort of unify this fraud intelligence and cyber threat intel, sort of package it up and offer it to, is it the vendors, sorry, is it the merchants and the banks?
Starting point is 00:12:45 Or is it just the banks? Or like, what's the plan here? It's both. And through the acquisition of recorded future, we actually do get insights into the merchant websites that have got scheming devices on them. And in fact, you know, just in July, we started. actually disabling through law enforcement and, you know, relationships with companies like Shadow Server to actually take down some of those underlying infrastructure below them just to stop some of those scheming efforts as well. So this allows us to offer a package to merchants
Starting point is 00:13:14 to work closer with companies like Shadow Server, law enforcement, you know, the administrators of a lot of the directory services, just to start taking down some of these criminal pieces as well. Or in that move to move up, you know, a little bit more proactive and upstream and not wait for this until it hits our transaction network, because by that time, you're fighting with one ad behind you back to your point. I don't see the IP address. I don't see, I always see a very limited set of data. So all of this is giving us that ability to see more of this and then to be proactive and just keep it away from the system to start with. That's a very important. That's a good observation that you've had there. Yeah. Now, you mentioned ransomware too. I'm curious about
Starting point is 00:13:52 this. You mentioned ransomware and about how it looked like that's just bad for everybody. It's bad for the, you know, for people who are in your ecosystem. And as you mentioned, You literally have billions of cards out there. I mean, I'm a mastercard holder, right? Like, pretty much everyone I know has well. Glad to hear that. Yeah, well, I mean, it's hard not to be, right? Like, let's be honest.
Starting point is 00:14:10 But when you mentioned ransomware, you know, I sort of got curious because, you know, obviously Recorded Future has done a lot of work around ransomware and all sorts of cyber threat intel, even state actor-based stuff. You know, as a payment card company, I mean, do you have any interest in keeping that size? of the threat intel practice going because you've said oh absolutely because warm and fuzzies and you know feels good but like is that really a concrete business case for you i mean to what extent do you see this push as being mastercard getting into the cyber security business as opposed to getting into the securing payments business yeah look if you if you if you listen to how we
Starting point is 00:14:56 explained the services side of MasterCard. So our cybersecurity business is part of what we call our services division that we have. And ultimately, the goal here is that we provide services that will ultimately differentiate the MasterCard brand, make it more secure, make it more safe, make it more profitable, make it easier to use for our consumers, easier to use to accept for our businesses. That will allow us to expand our business, which means we get more cards out there, more customers, we grow that $3.5 billion to something more than that. And that you get this flywheel of effect. So ultimately, this all has got to do with how do we create the pave the road for for mascot to become a bigger brand and to continuously grow our business.
Starting point is 00:15:39 Security in this online system is foundational to that. And that's why, you know, us helping our small businesses with ransomware attacks, preventing them from ransomware attacks, builds relations between us and them, helps us to create a more secure environment where they can continue to do their businesses. Because like I told you, every time a business can successfully perform a transaction, that's where we benefit. So it's in our interest to make sure that we kind of protect businesses. Small businesses, for instance, is one where we are particularly concerned. In a world of AI, where attacks can be automated and, you know, you can set an agent to try and penetrate these businesses. So criminals will have the ability
Starting point is 00:16:16 to scale. Somebody needs to help these small businesses. For us, every small business is potentially a business that will accept our cards. So it's in our interest to kind of protect those business system, make sure that they can protect themselves from ransomware attacks. So for us, it's a very real business piece. Now, I can see why you're going to look at this and say, this doesn't feel like a true cyber thing. But for us, ultimately, the trust and integrity in this online ecosystem is fundamental to our future success in a world where everything is connected. I actually take a happier view on the impact AI is going to have on small business security. I did a fascinating interview recently with one of my sponsors.
Starting point is 00:16:56 who works with a AI-based, like, SOC agent. They make an AI-based SOC agent. And his opinion is, finally, small to medium businesses are actually going to be able to access a lot more detection technology and whatnot because it's going to be automated by AI. Like, it might not be as good as the enterprise stuff, but it'll be something. And that's the first time we can actually say that.
Starting point is 00:17:18 Now, look, speaking of emerging threats, you know, you just mentioned AI there. I feel like in some ways AI has already changed. some stuff, but like the true impact of AI on criminality is like yet to be borne out. As things are today, though, like currently, not looking to the future, but right now, you know, what would you say the major problems are? You know, when it comes to the, you know, online criminal ecosystem because, you know, in your position, you're sitting on top of recorded future and Mastercard data.
Starting point is 00:17:51 So I'd imagine you'd have some good insights there. Yeah, look, some of the biggest phrase we have today. still, I almost say, you know, just the basic security things. If people just do the basics, right, we can already prevent a big chunk of them. I have to say ransomware pro for me is probably still one of the largest problems out there that folks are facing. The other piece that is coming through very clearly today is the fusion between, the lines are really becoming very gray between cyber fraud and financial crimes.
Starting point is 00:18:22 Criminals are using cyber elements to get access to data, to all, order to scam you. And once they have that money, they need to wash the money through the banking ecosystem. So the lines are grayed out. And in addition to that, we have nation states that are, you know, all this geopolitical fractions that we have around the world. It feels like cyber is somehow becoming weaponized in the hands of some of the nation states. A lot of the technologies coming into the hands also of criminals. And so again, the lines are blurring, which is why the collaboration we have with governments and so forth are also so important. But those are some of the things. threats that for me are very, very concerning. Ransomware is still on the rise. We see more
Starting point is 00:19:01 advanced technology coming into the hands of threat actors that are deploying them, not just for criminal activity, but also for other types of activities as well. And somehow the financial industry, you know, in many countries, we are considered critical infrastructure because you operate a big chunk of the economy as well. So you have that role as you see a tax coming from you, some of them with criminal intent, some of them with other. other intentions. And so that's, that's some of the threats that I see will persist and that worries me most now. Future weight, we can talk about that. I think AI will definitely feature there. I mean, it's interesting what you said about how some of this financial, the blurring
Starting point is 00:19:41 of the lines between financial crime and cyber crime. I know what you mean there. Like, you look at these online, fake online casino kits that you can license, re-skin, and then you're using dodgy ad networks and stuff to try to pull people into your, you know, fake casino. I mean, there's no actual hacking involved there, but there's a million terms of service violations, some shady browser tricks. Like, it's a blurry line. You know, and what happens here is the criminal activity creates a market for the cybercriminals to sell more of their goods.
Starting point is 00:20:19 so the need for data to fish or to do social engineering creates a market for stolen data of personal data so people are hacking into hotel systems into hospital systems to get as much personal data as they can that becomes a very lucrative business for the cyber criminals that's been bought by the they call them the fraud criminals to execute their crimes and then it's being offered if you go to the dark web now the range of services
Starting point is 00:20:49 It's all the way from hacking in a box to money laundering in a box, you know, and we'll do all of this for you as a managed service. And so there's a flywheel of demand being created here where those lines are really, really criss-crossing. A lot of the data that gets offered on the dark web marketplaces are being pumped into AI models to create deep fakes to create fishing scams and so forth that eventually then extract different other things. So it really has become, they kind of feed of each other almost. Yeah, it's interesting because earlier you mentioned identity, right? And do you, have you made an acquisition in the identity space?
Starting point is 00:21:28 Because I was literally just chatting with a, with a identity verification company yesterday, recording an interview for them, which was really about how they try to, you know, scan, do live capture of government ID, live capture of a face, use various signals and whatnot. I mean, I know that the card brands have various. extra verification steps to profile devices and whatever but I haven't seen much around that you know around technology to identify a person using like live capture or whatever is that is that something you're looking at and if not why not like how are you thinking about the identity problem because in my mind there is no solution to that problem you can do things to minimize the amount of fraud that would be prevented if you know if you were doing that sort of
Starting point is 00:22:16 stuff, but you can never fully solve it. So I'm really curious to know what you're thinking about all of that. It's a tough problem, I think I won't lie. We did an acquisition a couple of years ago of a company called Eccara. And what they've done is they've built a very large identity graph. And so we're not so much concerned around you and your specific identity, but we are concerned around or we are concerned around the attributes that surrounds your identity. So for instance, I'm Johan. I've got five email addresses. two home addresses, you know, three phone numbers, and we create this graph of how these things,
Starting point is 00:22:53 and the future we will build this out with, you've got so many agents that you use to buy things or that does things on your behalf. And so when you apply for a bank account or you apply to open up an account that any business, to create a business relationship with anybody out there, we look at the attributes that you put in in addition to your identity.
Starting point is 00:23:10 So, for instance, the address that you put in, we will say, what is the integrity of this address association with your identity. Is that been well established over many years? Is it something that's brand new? The phone number, you know, we've never seen this phone number associated with your name and your address. There's something wrong. This may be a synthetic identity. So we've got these signals of risk. But as you pointed out, as you pointed out, there's an entire underground marketplace for fools. And what a full is, it's all of that information, right? So this is
Starting point is 00:23:36 why I'm curious about how you're thinking about it, because criminals really have adapted to those sorts of checks, right? And to go the next level, it's like, it gets, gets hot. It gets really hard. And so you have to do, you have to do that and you have to look at more granular because one of those elements, ultimately, if I take over your identity, I need something that will give me control, something like an email address or something where that's different that the notifications goes to me instead of to the real person. So we look for those anomalies. It's not easy. There's no, there's no solar bullet for the stuff. But you put that in, you put device IDs in and you start binding these things. So if I, if I also,
Starting point is 00:24:15 know your typical, you know, I've got, I don't know how many devices, 20 of them, let's say, the more integrity we have around the established relationships between your identity and the things that you use around it, the attributes, the devices, the more we can help give you a smooth path. And remember, when it comes to fraud, prevention, and the same is for cyber. It's not always identifying the bad stuff. It's also identifying what we know is good and give those good transactions is a really happy path. So a big part of our efforts around fraud detection is also how do I detect what's good? And if it's good, how do I make sure your transaction is as smooth, as frictionless as possible versus then I create a smaller bucket of high-risk transactions, which I then
Starting point is 00:24:57 have to disseminate. How do I deal with this? Which is very similar to the way in which we deal with cyber things, right? There is the stuff that I know that's good. There's the stuff that's high risk. And then I have to prioritize my high risk and start working from the highest priority. Fraud is not very, very different, which is why I think we see this. interesting interaction of similar technologies being applied, similar methods. They have different data, but there's a lot of similarities and synergies between those two worlds. I mean, it's interesting when I think about it, what you're most concerned with is making sure that an established identity is correct. And really, when it comes to like live capture and stuff, that's about establishing the identity in the first place.
Starting point is 00:25:34 And that's up to the card issue and not you, right? So everything that you've just said that makes sense. That is up to the card issue. Correct. Yeah. Yeah. So look, you know, loathe to talk. about it in some ways, but we've touched on it a couple of times, which is the future of AI in criminality. Like, do you have any concrete sort of feelings about where that's going and what sort of
Starting point is 00:25:55 challenges it's going to present in financial crime in particular? Because everyone's got an opinion, but I figure someone who's worked at MasterCard for 25 years and has your job, probably going to be a more educated guest than most. Patrick, I'm actually, believe it or not, fairly optimistic. as long as people invest in AI in the right ways as well. Look, there's no doubt that criminals will benefit, they're already benefiting from this. You know, if you just look at the progress that's been made,
Starting point is 00:26:23 if you look at Hacker 1, you know, the bots now are the best red teams. So we know they can read the CVEs, they can translate them into attack vectors, and they can start hitting them, and they can adjust the fly. We've seen examples in the world of red teams, but we've also seen real examples in the world out there
Starting point is 00:26:40 where criminals have used. use AI effectively to do this. Now, the same way AI can be used on the inside, you mentioned this a little bit about small businesses, getting a sock or something that can be in my system, identify those vulnerabilities and then automatically go and patch them. I do believe this is going to be a great way for us in a much better defensive mode to automate things in a much better way. So I'm very optimistic when it comes to that. Yeah, it removes some of the asymmetry. I think that's something that the doomers forget, right? Is that. that it sort of levels the playing field a little bit,
Starting point is 00:27:15 a little bit more, but between attackers and defenders. I remember, like, it was even a couple of years ago when, you know, a good friend of mine was saying, well, I mean, you know, the vuln research that these models will eventually be able to do, there's going to be an explosion in O'Day, and I'm like, well, there's going to be an explosion in patching. Exactly, exactly.
Starting point is 00:27:32 So it's, there's going to be a period of disruption followed by like a new equilibrium that's probably us in a better place, is my opinion. I'll give you a real good example. So Recorded Future has a malware sandbox. And so we get all these samples of the malware in there. And then we extract the signatures. Now we've got AI that automatically writes your IRA queries for you and then go threat hunting.
Starting point is 00:27:54 So in a similar way, we can react way faster. You know, as long as we actually invest in AI in the right ways to do this. So I'm optimistic that this will allow us, and this is to your point, the way in which small businesses can benefit from this. The problem we have to solve, though, is how do we get into the small businesses at scale. And this is where I think the collaboration with, you know, telcos, hosting providers, all of those, we'll all have to come together to collectively do this and enable these technologies to actually operate on within the environments of which these small businesses
Starting point is 00:28:27 operate. That's something that we ourselves sees as a big task for us ahead to actually bring the right parties to the table to enable this at scale. I can tell you, I've been, I've lost half my hair in trying to get access to small businesses to actually pay attention that cyber is a problem. Many of them just stick their heads in the sense like it won't happen to me. My business is too small. It's irrelevant. They forget that everything is automated. Criminals will just deploy these crawlers and they will attack you. But I do think we have tech on the other side that can defend us way better and more
Starting point is 00:28:58 effective. It will remain in arms race, but it's not a doomsday scenario as far as I'm concerned. Well, everything that you just described in terms of like, you know, getting AI to write a arrow rule and then go threat hunting with it. I mean, I think I heard recently someone on a podcast describing AI as like automation of simple, you know, simple brain tasks, sort of in the same way that factory robots automated simple manual labor tasks. So manual labor didn't disappear because we had factory assembly lines with robots on them and, you know, intellectual labor, if you will, won't disappear because we have AI models. We just won't have to do the mind-numbingly repetitive, annoying stuff, like writing Yarra rules and then figuring out how to query large
Starting point is 00:29:42 data sets with them. Exactly right. And the same will be true for patching, right? The stuff that probably most people hate most. The question in my head is, will our AI models have access to the right data to automate and be more sophisticated than just the simplified rules exactly what you said? So a lot of that's going to be an action of how we design this and what we give action and how we can safeguard those things, not to go out of control. But I feel, feel the power is there for both the attackers and the defenders, and there's a lot of promise in there that the defenders can be way more sophisticated and let our security professionals really focus on some of the more advanced things out there that needs human attention.
Starting point is 00:30:23 Okay, well, Johann Gerber, we're going to wrap it up there. It's been fascinating to talk to you, you know, the latest cybersecurity company, MasterCard. It's a bit strange, really, a bit of a sign of the times. A pleasure to chat with you. Really appreciated your insights. Thanks for joining me. I appreciate that. Thank you so much for having us, Patrick.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.