1 00:00:02,520 --> 00:00:07,080 Speaker 1: Bloomberg Audio Studios, podcasts, radio news. 2 00:00:07,320 --> 00:00:09,760 Speaker 2: There's so much to talk about right now on this Friday, 3 00:00:09,800 --> 00:00:13,160 Speaker 2: whether it's in the markets or just broader company news 4 00:00:13,240 --> 00:00:15,400 Speaker 2: right now. But one thing I did want to talk 5 00:00:15,400 --> 00:00:19,759 Speaker 2: about is cybersecurity, Scarlett. I mean, cybersecurity is becoming increasingly 6 00:00:20,200 --> 00:00:23,000 Speaker 2: more important, especially as we see a lot of online 7 00:00:23,000 --> 00:00:26,240 Speaker 2: threats ramping up and honestly getting more and more creative. 8 00:00:26,600 --> 00:00:28,360 Speaker 3: Yeah, not a day goes by that you don't hear 9 00:00:28,400 --> 00:00:32,479 Speaker 3: about a country or a company getting hacked by someone 10 00:00:32,600 --> 00:00:34,879 Speaker 3: or some band of people. And you know, at a 11 00:00:34,880 --> 00:00:38,360 Speaker 3: consumer level, obviously it's very concerning when you've got everything 12 00:00:38,400 --> 00:00:40,000 Speaker 3: in your email or in your phone. 13 00:00:40,159 --> 00:00:43,120 Speaker 2: Absolutely with us to talk about this in more is 14 00:00:43,240 --> 00:00:46,280 Speaker 2: Vincent Palette. He's CEO of gen Digital, which trades on 15 00:00:46,320 --> 00:00:49,720 Speaker 2: the NASDAC underticker ge IN. You may be familiar with 16 00:00:49,760 --> 00:00:52,080 Speaker 2: one of its brands, Norton, but we are joined by 17 00:00:52,240 --> 00:00:56,160 Speaker 2: Vincent from Belgium. Actually, Vincent tell us a little bit 18 00:00:56,200 --> 00:00:58,400 Speaker 2: about the current landscape right now as we think about 19 00:00:58,440 --> 00:01:00,600 Speaker 2: protection from CyberSecure threads. 20 00:01:01,840 --> 00:01:05,959 Speaker 1: Yeah, as you've mentioned, the threat landscape is very dynamic 21 00:01:06,040 --> 00:01:09,119 Speaker 1: at a high level now, all enabled by AI, which 22 00:01:09,160 --> 00:01:13,240 Speaker 1: really increased the complexity of the threat, the sophistication of 23 00:01:13,280 --> 00:01:16,560 Speaker 1: the thread the threads and becoming very difficult to detect. 24 00:01:16,600 --> 00:01:19,440 Speaker 1: And you mentioned that the enterprise are being attacked, but 25 00:01:19,520 --> 00:01:22,640 Speaker 1: the enterprise are protecting themselves more and more. So, who 26 00:01:22,680 --> 00:01:25,959 Speaker 1: is less vulnerable in the middle is the consumer and 27 00:01:26,120 --> 00:01:30,160 Speaker 1: whether it's a deep thig, a scam, fishing, leveraging your 28 00:01:30,280 --> 00:01:33,039 Speaker 1: data that they've been breached somewhere else and then capturing 29 00:01:33,080 --> 00:01:37,760 Speaker 1: that to create some damages. The overall damages for the 30 00:01:37,800 --> 00:01:41,360 Speaker 1: consumers in the US alone is over fifteen billion dollars 31 00:01:41,400 --> 00:01:43,640 Speaker 1: and growing double digit these days. 32 00:01:43,560 --> 00:01:45,080 Speaker 4: Pretty incredible growth rate there. 33 00:01:45,120 --> 00:01:48,520 Speaker 3: What are the most common ways that people find their 34 00:01:49,080 --> 00:01:52,480 Speaker 3: data their personal data compromised and what are some of 35 00:01:52,520 --> 00:01:55,240 Speaker 3: the more unusual ways in which it happens. 36 00:01:56,440 --> 00:01:59,120 Speaker 1: I would say that today eighty percent of the threat 37 00:01:59,160 --> 00:02:03,200 Speaker 1: facing consumers are scam or social engineerings. And it's about 38 00:02:03,280 --> 00:02:06,120 Speaker 1: collecting a vast amount of personal data that you have 39 00:02:06,240 --> 00:02:08,440 Speaker 1: in the digital world, whe was it you know it, 40 00:02:08,560 --> 00:02:12,960 Speaker 1: you put them on your own social media websites, or 41 00:02:13,000 --> 00:02:15,440 Speaker 1: whether those data have been breaches as part of you 42 00:02:15,600 --> 00:02:18,639 Speaker 1: shopping online or shopping into a different environment, and then 43 00:02:18,680 --> 00:02:21,480 Speaker 1: the data is being captured sold in the dark web, 44 00:02:22,000 --> 00:02:27,440 Speaker 1: and now with AI tools, very sophisticated personalized emails or 45 00:02:27,520 --> 00:02:31,799 Speaker 1: text are full in consumers. We've detected last quarter over 46 00:02:31,840 --> 00:02:35,400 Speaker 1: one hundred and forty thousand websites that mimic real brand 47 00:02:35,440 --> 00:02:39,160 Speaker 1: website driven by AI, but actually are just meant to 48 00:02:39,240 --> 00:02:41,880 Speaker 1: capture and create financial damages for consumers. 49 00:02:43,080 --> 00:02:47,200 Speaker 2: How is Gen Digital leveraging AI just to push productivity 50 00:02:47,240 --> 00:02:49,160 Speaker 2: forward at the company as we think about it in 51 00:02:49,360 --> 00:02:51,720 Speaker 2: relation to cybersecurity. 52 00:02:51,919 --> 00:02:53,880 Speaker 1: As a topic of the day of course, right, So 53 00:02:54,240 --> 00:02:57,760 Speaker 1: not only is the AI is a threat from being 54 00:02:57,840 --> 00:03:00,520 Speaker 1: used by hackers a threat for consumers, but we also 55 00:03:00,639 --> 00:03:04,800 Speaker 1: add Gen Digital using AI to protect our consumers. So 56 00:03:04,800 --> 00:03:07,519 Speaker 1: we're the first one to come with the full model 57 00:03:07,560 --> 00:03:10,840 Speaker 1: for anti scam and being able to detect real time 58 00:03:11,320 --> 00:03:14,320 Speaker 1: scams as they hit either your text, your voice or 59 00:03:14,320 --> 00:03:17,880 Speaker 1: your emails. And now we embedding that more into cheap 60 00:03:17,919 --> 00:03:21,200 Speaker 1: manufacturers to create deep fake solutions and really making sure 61 00:03:21,240 --> 00:03:24,040 Speaker 1: we can detect what's the problem of the day, what's 62 00:03:24,080 --> 00:03:27,000 Speaker 1: the reality? Is this message real or not? Is this 63 00:03:27,200 --> 00:03:29,640 Speaker 1: video real or not? It's this voice real or not? 64 00:03:30,400 --> 00:03:35,800 Speaker 1: And we heavily investing into moving our over threat protection 65 00:03:35,920 --> 00:03:39,120 Speaker 1: into an AI powered threat thread detection. 66 00:03:40,120 --> 00:03:44,000 Speaker 3: So, in terms of companies and consumers spending on protection 67 00:03:44,280 --> 00:03:48,560 Speaker 3: from the cybersecurity threats, what have you observed so far 68 00:03:48,680 --> 00:03:52,000 Speaker 3: in twenty twenty five. You know, we know that earning 69 00:03:52,000 --> 00:03:54,320 Speaker 3: the season has gone pretty well for most companies. 70 00:03:54,480 --> 00:03:56,240 Speaker 4: You have just reported results as well. 71 00:03:56,360 --> 00:03:59,640 Speaker 3: Your second quarter just VPS beat anless estimates by a 72 00:03:59,680 --> 00:04:02,600 Speaker 3: penny and your second quarter revenue coming in slightly higher 73 00:04:02,600 --> 00:04:06,120 Speaker 3: than what was anticipated. Are companies growing their spending on 74 00:04:06,160 --> 00:04:09,800 Speaker 3: cybersecurity at a stable rate or has that picked up? 75 00:04:09,840 --> 00:04:12,160 Speaker 3: Do you see them pulling back a little bit if 76 00:04:12,160 --> 00:04:13,720 Speaker 3: the economy starts going south a bit. 77 00:04:14,880 --> 00:04:17,839 Speaker 1: No, Definitely, people are investing more into making sure that 78 00:04:17,880 --> 00:04:21,479 Speaker 1: the defense is becoming more and more sophisticated to address 79 00:04:21,520 --> 00:04:24,720 Speaker 1: the over threat landscape. You've seen our report. You mentioned 80 00:04:24,720 --> 00:04:28,480 Speaker 1: that we had another outstanding quarter beaten race here in 81 00:04:28,560 --> 00:04:31,760 Speaker 1: Q two that followed another beat and race in Q one. 82 00:04:32,680 --> 00:04:36,400 Speaker 1: As we're developing not only the protection of security, but 83 00:04:36,600 --> 00:04:39,800 Speaker 1: enable the consumer to be secure, to be private, to 84 00:04:39,920 --> 00:04:43,120 Speaker 1: also manage the identity and their reputations, we are expanding 85 00:04:43,200 --> 00:04:45,599 Speaker 1: the pie if you want, and that has enabled us 86 00:04:45,640 --> 00:04:49,440 Speaker 1: to post it another quota at about twenty five percent growth, 87 00:04:49,440 --> 00:04:52,440 Speaker 1: which the help of our most recent acquisition, which is 88 00:04:52,520 --> 00:04:55,280 Speaker 1: leading into the financial wellness. As you protect your data, 89 00:04:55,320 --> 00:04:58,000 Speaker 1: you want to protect your financial position. You also want 90 00:04:58,040 --> 00:05:00,479 Speaker 1: to help consumer manage and grow that position. 91 00:05:01,920 --> 00:05:04,440 Speaker 2: So we're headed into the holiday season, do you all 92 00:05:04,480 --> 00:05:06,840 Speaker 2: tend to see any sort of uptick in terms of 93 00:05:06,880 --> 00:05:11,039 Speaker 2: cybersecurity threads or maybe identity theft even and if so, 94 00:05:11,120 --> 00:05:12,919 Speaker 2: how can consumers protect themselves. 95 00:05:13,800 --> 00:05:18,039 Speaker 1: It's definitely a higher risk season. Obviously, everybody wants to 96 00:05:18,080 --> 00:05:21,800 Speaker 1: go out and shop more, dine more, and that's at 97 00:05:21,880 --> 00:05:24,680 Speaker 1: every point in time you're exposing you personal data out. 98 00:05:24,760 --> 00:05:28,120 Speaker 1: So we constantly educate our customers to make sure that 99 00:05:28,160 --> 00:05:30,560 Speaker 1: these days they are really controlling where do they put 100 00:05:30,560 --> 00:05:33,880 Speaker 1: their credit cards, which website they go and shop from, 101 00:05:34,400 --> 00:05:38,560 Speaker 1: and making sure they use our anti scan detection tools 102 00:05:38,560 --> 00:05:40,360 Speaker 1: and models to make sure we can detect where the 103 00:05:40,440 --> 00:05:43,960 Speaker 1: risk is. But definitely we advise everyone to be cautious. 104 00:05:44,040 --> 00:05:46,599 Speaker 1: These days, harkers are out there and trying to collect 105 00:05:46,680 --> 00:05:48,240 Speaker 1: you personal digital footprint. 106 00:05:49,839 --> 00:05:51,359 Speaker 4: Does people's infatuation with. 107 00:05:53,440 --> 00:05:58,560 Speaker 3: Cryptocurrency, bitcoin, digital wallets, does that increase the likelihood that 108 00:05:58,680 --> 00:06:01,600 Speaker 3: they might be a target of of cyber attacks. 109 00:06:02,960 --> 00:06:07,280 Speaker 1: I would say that the overall penetration of your digital footprint, 110 00:06:07,520 --> 00:06:10,920 Speaker 1: your life becoming more and more a digital life, and 111 00:06:11,040 --> 00:06:13,560 Speaker 1: the middle of payments that you mentioned is just another 112 00:06:13,640 --> 00:06:16,640 Speaker 1: sign of moving more online, which then creates, of course 113 00:06:16,720 --> 00:06:19,640 Speaker 1: also more risk to be to be to be to 114 00:06:19,680 --> 00:06:23,000 Speaker 1: be attacked. So the overall trend is to move more 115 00:06:23,040 --> 00:06:27,680 Speaker 1: online in many different dimensions, including uh the method of payments. 116 00:06:29,120 --> 00:06:33,039 Speaker 2: What's your strategy for rebuilding or maintaining trust at a 117 00:06:33,080 --> 00:06:37,840 Speaker 2: time where cybersecurity failures continue to make headlines. 118 00:06:38,600 --> 00:06:42,320 Speaker 1: And it's not only cybersecurity failure, it's only also a 119 00:06:42,360 --> 00:06:45,479 Speaker 1: time where with a I it's difficult to detect what's 120 00:06:45,560 --> 00:06:48,760 Speaker 1: reality and what's a fake. So so there're still a 121 00:06:48,839 --> 00:06:53,240 Speaker 1: reality we're discussing and so definitely trying to making sure 122 00:06:53,279 --> 00:06:55,960 Speaker 1: we equip our consumers in our tools with deep fake 123 00:06:56,040 --> 00:06:59,440 Speaker 1: detection and ability to really see what is produced by 124 00:06:59,480 --> 00:07:03,200 Speaker 1: a machine use what is a natural piece of content 125 00:07:03,400 --> 00:07:05,960 Speaker 1: is an important needs that we're trying to address. 126 00:07:06,760 --> 00:07:07,799 Speaker 4: All right, good stuff. 127 00:07:07,880 --> 00:07:10,960 Speaker 3: Really appreciate your joining us today with your recap of 128 00:07:11,000 --> 00:07:13,040 Speaker 3: your results and to give us kind of the overview 129 00:07:13,080 --> 00:07:15,680 Speaker 3: of what it looks like here in the cyber security space. 130 00:07:15,760 --> 00:07:19,360 Speaker 3: Vincent Palette is chairman and CEO of Gen Digital