[
  {
    "start": 0.06,
    "end": 7.84,
    "text": "This episode is provided by Thomas Allgaier and Frennis, based on the most relevant LinkedIn posts about ICT and tech insights from CW-Eleven & Twelve."
  },
  {
    "start": 8.52,
    "end": 17.18,
    "text": "Frennis supports ICT enterprises in the form of delivering precise ICT market and pricing intelligence that analyst subscriptions and existing databases cannot provide."
  },
  {
    "start": 17.44,
    "end": 19.02,
    "text": "you can find more info in the description."
  },
  {
    "start": 20.28,
    "end": 21.62,
    "text": "Welcome to The Deep Dive everyone."
  },
  {
    "start": 21.8,
    "end": 21.96,
    "text": "Yeah"
  },
  {
    "start": 22.1,
    "end": 23.16,
    "text": "we are so glad your here."
  },
  {
    "start": 23.2,
    "end": 24.56,
    "text": "We've got a lot ground to cover today."
  },
  {
    "start": 27.16,
    "end": 32.8,
    "text": "heavily curated tech and ICT insights from calendar weeks, eleven and twelve of twenty-twenty six."
  },
  {
    "start": 33.04,
    "end": 33.24,
    "text": "Right?"
  },
  {
    "start": 33.32,
    "end": 39.0,
    "text": "And if there is one overarching theme across the market right now it's a massive urgent pivot"
  },
  {
    "start": 39.34,
    "end": 39.7,
    "text": "Exactly!"
  },
  {
    "start": 39.98,
    "end": 42.52,
    "text": "The era just broad hyped up."
  },
  {
    "start": 42.64,
    "end": 45.22,
    "text": "ambition especially around AI is completely over."
  },
  {
    "start": 45.36,
    "end": 45.44,
    "text": "Oh"
  },
  {
    "start": 45.52,
    "end": 46.12,
    "text": "totally over."
  },
  {
    "start": 46.26,
    "end": 47.34,
    "text": "people are tired at the hype."
  },
  {
    "start": 47.54,
    "end": 51.32,
    "text": "Yeah...the focus has completely shifted to deployable operating models."
  },
  {
    "start": 51.52,
    "end": 55.5,
    "text": "It all about execution resilience and rock solid architecture"
  },
  {
    "start": 55.84,
    "end": 58.3,
    "text": "And we're going to unpack that across a few different clusters today."
  },
  {
    "start": 58.7,
    "end": 67.52,
    "text": "We're talking cyber resilience, the maturation of AI security digital sovereignty and quantum computing finally becoming practical"
  },
  {
    "start": 67.7,
    "end": 68.3,
    "text": "which is wild."
  },
  {
    "start": 68.52,
    "end": 72.46,
    "text": "but let's start with Cyber Resilience because the baseline is shifting so fast"
  },
  {
    "start": 72.76,
    "end": 73.0,
    "text": "it Is."
  },
  {
    "start": 73.34,
    "end": 76.3,
    "text": "I saw a post from Brad Fraser That just perfectly captured this."
  },
  {
    "start": 76.78,
    "end": 81.98,
    "text": "he argued that The absolute most expensive word in cybersecurity Today is the word assume"
  },
  {
    "start": 82.28,
    "end": 84.78,
    "text": "oh man Assume, that is so true."
  },
  {
    "start": 84.82,
    "end": 90.2,
    "text": "Wait like assuming your backups work or assuming Your staff won't click that one highly targeted phishing link."
  },
  {
    "start": 90.58,
    "end": 92.08,
    "text": "He says it's a massive business"
  },
  {
    "start": 92.16,
    "end": 92.34,
    "text": "trap."
  },
  {
    "start": 92.6,
    "end": 93.1,
    "text": "It really does."
  },
  {
    "start": 93.2,
    "end": 97.2,
    "text": "I mean verification Is completely changing the defensive playbook before we even hit Q to"
  },
  {
    "start": 97.62,
    "end": 103.08,
    "text": "yeah and Laura Vaughn actually expanded on That exact failure mode specifically looking at compliance."
  },
  {
    "start": 103.32,
    "end": 104.0,
    "text": "okay What did she say?"
  },
  {
    "start": 104.42,
    "end": 110.76,
    "text": "She pointed out that organizations routinely fail because they just treat A cybersecurity framework as The finish line."
  },
  {
    "start": 110.94,
    "end": 114.24,
    "text": "ah yes the classic checkbox compliance."
  },
  {
    "start": 114.76,
    "end": 115.24,
    "text": "Exactly!"
  },
  {
    "start": 115.32,
    "end": 121.36,
    "text": "They get their green scores, they finalize their perfect documentation and then just put it on a shelf until next audit."
  },
  {
    "start": 121.78,
    "end": 129.979,
    "text": "But an audit doesn't actually test if your multi-factor authentication is genuinely enforced across your legacy systems right?"
  },
  {
    "start": 130.44,
    "end": 130.699,
    "text": "Bingo."
  },
  {
    "start": 131.66,
    "end": 136.62,
    "text": "Or If you're backups can restore active database while actively under pressure."
  },
  {
    "start": 137.02,
    "end": 140.26,
    "text": "It creates this really dangerous illusion of security."
  },
  {
    "start": 140.7,
    "end": 143.44,
    "text": "Well, it makes me think about how companies are trying to solve this."
  },
  {
    "start": 144.34,
    "end": 147.06,
    "text": "Like I always look at this through the lens of performance engineering."
  },
  {
    "start": 147.26,
    "end": 148.02,
    "text": "How do you mean?"
  },
  {
    "start": 148.22,
    "end": 153.08,
    "text": "well a lot organizations try to solve these foundational gaps by just going out and buying an AI tool."
  },
  {
    "start": 153.72,
    "end": 158.14,
    "text": "but Think of AI like a massive supercharged formula engine."
  },
  {
    "start": 158.26,
    "end": 158.4,
    "text": "Okay"
  },
  {
    "start": 158.52,
    "end": 159.26,
    "text": "i like this analogy"
  },
  {
    "start": 159.68,
    "end": 167.78,
    "text": "if You take that f-one engine And drop It into A car with The rusted Out chassis you know Crack Steering Column and Literally No brakes!"
  },
  {
    "start": 168.14,
    "end": 169.06,
    "text": "You're not wheeling the race."
  },
  {
    "start": 169.34,
    "end": 171.98,
    "text": "no You're just going to crash into a wall at two hundred miles an hour."
  },
  {
    "start": 172.2,
    "end": 175.58,
    "text": "Yeah, Marcel Velika actually pointed this out in his recent analysis."
  },
  {
    "start": 175.64,
    "end": 179.46,
    "text": "he said AI will absolutely not fix a weak security architecture."
  },
  {
    "start": 179.9,
    "end": 182.18,
    "text": "Right it just makes the weakness execute faster."
  },
  {
    "start": 182.36,
    "end": 186.72,
    "text": "Exactly real capability requires the strict non-negotiable sequence."
  },
  {
    "start": 187.2,
    "end": 194.26,
    "text": "first you have to build the architecture Then you establish visibility, detection response recovery and automation."
  },
  {
    "start": 195.0,
    "end": 198.26,
    "text": "And then only after all of that is functioning seamlessly."
  },
  {
    "start": 198.52,
    "end": 200.14,
    "text": "do you layer in the AI?"
  },
  {
    "start": 200.5,
    "end": 207.58,
    "text": "because otherwise if your underlying detection logic is flawed adding a I just generates false positives at machine speed."
  },
  {
    "start": 207.68,
    "end": 211.28,
    "text": "yeah it Just completely buries Your security team an alert noise."
  },
  {
    "start": 211.68,
    "end": 218.74,
    "text": "and speaking of noise Sarah Flutch highlighted A really fascinating point from Bryson Bort's recent session at S four by twenty six"
  },
  {
    "start": 219.26,
    "end": 220.7,
    "text": "about operational technology."
  },
  {
    "start": 220.84,
    "end": 222.16,
    "text": "Yeah, OT visibility."
  },
  {
    "start": 222.7,
    "end": 226.68,
    "text": "so think of manufacturing floors power grids water treatment plants that kind of stuff."
  },
  {
    "start": 226.76,
    "end": 233.22,
    "text": "right board argues that aiming for one hundred percent asset visibility in ot environments is actually vastly overrated."
  },
  {
    "start": 233.7,
    "end": 236.86,
    "text": "wait really i feel like everyone is always pushing for total visibility."
  },
  {
    "start": 236.96,
    "end": 242.04,
    "text": "I know it's totally counterintuitive but his point is that visibility is useless if it's not actionable."
  },
  {
    "start": 242.1,
    "end": 242.82,
    "text": "okay that makes sense."
  },
  {
    "start": 243.7,
    "end": 255.36,
    "text": "Knowing a vulnerable, obscure programmable logic controller exists on your factory floor doesn't help you if you physically lack the operational capability to patch it or isolate."
  },
  {
    "start": 255.66,
    "end": 256.839,
    "text": "So what's the alternative then?"
  },
  {
    "start": 257.519,
    "end": 259.16,
    "text": "He suggests flipping the script entirely."
  },
  {
    "start": 259.399,
    "end": 262.78,
    "text": "focus on one hundred percent visibility in your IT network instead"
  },
  {
    "start": 263.0,
    "end": 264.38,
    "text": "because that's The Gateway"
  },
  {
    "start": 264.58,
    "end": 265.04,
    "text": "exactly."
  },
  {
    "start": 265.54,
    "end": 268.96,
    "text": "That is almost always how attackers reach the OT environment in the first place."
  },
  {
    "start": 269.6,
    "end": 271.16,
    "text": "so You locked down the IT side."
  },
  {
    "start": 271.56,
    "end": 273.06,
    "text": "What about the Factory Floor itself?"
  },
  {
    "start": 273.4,
    "end": 277.4,
    "text": "Instead of mapping every single asset, you establish strategic control points."
  },
  {
    "start": 277.46,
    "end": 280.7,
    "text": "You build level three perimeters basically tripwires."
  },
  {
    "start": 281.82,
    "end": 282.12,
    "text": "I see."
  },
  {
    "start": 282.2,
    "end": 289.88,
    "text": "yeah so even if a perimeter firewall eventually fails the attacker is forced to interact with that tripwire which creates a highly actionable alert"
  },
  {
    "start": 289.98,
    "end": 291.48,
    "text": "Which gives you the exact signal?"
  },
  {
    "start": 291.56,
    "end": 294.9,
    "text": "You need to respond and we need those trip wires more than ever right now"
  },
  {
    "start": 294.96,
    "end": 296.12,
    "text": "because it's silent threats."
  },
  {
    "start": 296.48,
    "end": 301.02,
    "text": "Yeah Threat actors are moving away from that noisy smash and grab ransomware."
  },
  {
    "start": 301.24,
    "end": 303.26,
    "text": "They're moving towards silent pre-positioning."
  },
  {
    "start": 304.14,
    "end": 309.06,
    "text": "Christopher Clark shared a deeply concerning report recently about the Iranian threat group Seedworm"
  },
  {
    "start": 309.4,
    "end": 310.62,
    "text": "Also known as Muddy Water, right?"
  },
  {
    "start": 310.92,
    "end": 311.18,
    "text": "Yes!"
  },
  {
    "start": 311.36,
    "end": 311.88,
    "text": "Muddy water."
  },
  {
    "start": 312.44,
    "end": 320.18,
    "text": "they Are quietly embedding this malware called Dindor inside critical infrastructure across The US & Israel."
  },
  {
    "start": 320.54,
    "end": 321.0,
    "text": "Just waiting"
  },
  {
    "start": 321.26,
    "end": 325.24,
    "text": "just waiting but the mechanism they used to hide is what makes it so wild."
  },
  {
    "start": 325.8,
    "end": 330.46,
    "text": "They are running this malware inside the Dino JavaScript runtime."
  },
  {
    "start": 330.62,
    "end": 330.98,
    "text": "Oh wow!"
  },
  {
    "start": 331.6,
    "end": 337.16,
    "text": "For anyone listening who isn't familiar, Dino is normally a highly secure totally legitimate environment."
  },
  {
    "start": 337.3,
    "end": 341.26,
    "text": "Right developers use it to execute javascript outside of a web browser."
  },
  {
    "start": 341.48,
    "end": 344.36,
    "text": "So because its a trusted tool security platforms just ignore"
  },
  {
    "start": 344.64,
    "end": 349.1,
    "text": "exactly Most endpoint detection and response platforms, the EDRs."
  },
  {
    "start": 349.62,
    "end": 351.56,
    "text": "they basically just whitelisted by default."
  },
  {
    "start": 351.62,
    "end": 354.16,
    "text": "They don't monitor the processes happening inside it Man."
  },
  {
    "start": 354.24,
    "end": 357.54,
    "text": "so the attackers blend perfectly into normal administrative traffic."
  },
  {
    "start": 357.68,
    "end": 357.86,
    "text": "Yeah!"
  },
  {
    "start": 357.96,
    "end": 359.06,
    "text": "They are practically invisible."
  },
  {
    "start": 359.44,
    "end": 365.72,
    "text": "And when you look at your own organization's vendor list You really have to consider the implications of these silent threats"
  },
  {
    "start": 365.82,
    "end": 367.52,
    "text": "Because you inherit their vulnerabilities."
  },
  {
    "start": 367.6,
    "end": 367.72,
    "text": "Yep"
  },
  {
    "start": 368.32,
    "end": 372.68,
    "text": "Luke Irwin noted recently that you inherently adopt your vendors blast radius."
  },
  {
    "start": 372.82,
    "end": 372.9,
    "text": "That"
  },
  {
    "start": 372.94,
    "end": 373.6,
    "text": "is a great term."
  },
  {
    "start": 373.96,
    "end": 374.94,
    "text": "It IS Thread."
  },
  {
    "start": 375.02,
    "end": 381.76,
    "text": "actors know that breaching a massive well-defended enterprise is hard, but breaching their midsize logistics vendor."
  },
  {
    "start": 381.9,
    "end": 385.24,
    "text": "The vendor with the stretch IT department running legacy software?"
  },
  {
    "start": 385.38,
    "end": 385.86,
    "text": "Exactly!"
  },
  {
    "start": 386.12,
    "end": 387.02,
    "text": "It's incredibly easy."
  },
  {
    "start": 387.2,
    "end": 393.28,
    "text": "so if you are not actively verifying your supply chain architecture You're literally just outsourcing your risk."
  },
  {
    "start": 393.58,
    "end": 396.88,
    "text": "And in some sectors That risk isn't just financial anymore."
  },
  {
    "start": 397.58,
    "end": 401.08,
    "text": "Robby Munga made this really stark observation regarding health care."
  },
  {
    "start": 401.3,
    "end": 401.5,
    "text": "What did"
  },
  {
    "start": 401.54,
    "end": 401.84,
    "text": "he say?"
  },
  {
    "start": 402.28,
    "end": 407.64,
    "text": "He said cyberrisk and hospital is now, quite literally a patient safety risk."
  },
  {
    "start": 408.14,
    "end": 409.86,
    "text": "It's a continuity of care problem?"
  },
  {
    "start": 409.98,
    "end": 410.32,
    "text": "Wow!"
  },
  {
    "start": 410.64,
    "end": 411.86,
    "text": "Yeah that's entirely true."
  },
  {
    "start": 412.18,
    "end": 417.54,
    "text": "So he is advocating for what he calls a minimum viable hospital mindset."
  },
  {
    "start": 417.82,
    "end": 419.16,
    "text": "Minimum viable hospital?"
  },
  {
    "start": 419.24,
    "end": 420.24,
    "text": "Okay What does it look like?"
  },
  {
    "start": 420.52,
    "end": 423.08,
    "text": "It means fundamentally re-architecting your workflows."
  },
  {
    "start": 423.14,
    "end": 432.7,
    "text": "to answer one question What are the absolute minimum offline capabilities required to keep patients alive when the digital systems are completely compromised?"
  },
  {
    "start": 432.76,
    "end": 437.02,
    "text": "That is terrifying, but it's the exact conversation boardrooms need to be having right now."
  },
  {
    "start": 437.32,
    "end": 437.82,
    "text": "Absolutely"
  },
  {
    "start": 438.32,
    "end": 444.06,
    "text": "because the challenge is human defenders just cannot scale fast enough To counter these attacks anymore."
  },
  {
    "start": 444.46,
    "end": 449.22,
    "text": "no especially Because the attackers are super charging their efforts with AI automation."
  },
  {
    "start": 449.42,
    "end": 450.82,
    "text": "Yeah Let's transition into that."
  },
  {
    "start": 450.92,
    "end": 451.16,
    "text": "theme."
  },
  {
    "start": 451.24,
    "end": 453.42,
    "text": "two a I security matures"
  },
  {
    "start": 453.7,
    "end": 454.02,
    "text": "bright."
  },
  {
    "start": 454.36,
    "end": 459.82,
    "text": "Matthew Rosenquist recently shared this Interpol report, and the numbers are just staggering."
  },
  {
    "start": 460.48,
    "end": 466.1,
    "text": "AI-enhanced fraud is now four hundred fifty percent more effective than traditional methods."
  },
  {
    "start": 466.18,
    "end": 467.62,
    "text": "Four hundred fifty per cent?"
  },
  {
    "start": 468.44,
    "end": 469.28,
    "text": "That's an epidemic!"
  },
  {
    "start": 469.44,
    "end": 469.5,
    "text": "It"
  },
  {
    "start": 469.6,
    "end": 473.9,
    "text": "is—and the sheer scale of that increase really comes down to the adaptive learning loop"
  },
  {
    "start": 474.1,
    "end": 475.8,
    "text": "Right —the AI learning from its mistakes"
  },
  {
    "start": 475.92,
    "end": 476.38,
    "text": "Exactly!"
  },
  {
    "start": 476.8,
    "end": 479.46,
    "text": "Criminals are utilizing massive computing scales."
  },
  {
    "start": 479.74,
    "end": 482.9,
    "text": "every single failed scam serves as training data."
  },
  {
    "start": 483.32,
    "end": 485.46,
    "text": "So if a deep fake voice clone fails... Or, If"
  },
  {
    "start": 485.52,
    "end": 488.5,
    "text": "a spearfishing email doesn't bypass the target's skepticism."
  },
  {
    "start": 488.9,
    "end": 498.7,
    "text": "The AI instantly analyzes why it failed It refines its tone It adjusts timing and generates more persuasive variant for next ten thousand targets."
  },
  {
    "start": 498.78,
    "end": 501.18,
    "text": "It is evolving social engineering at machine speed."
  },
  {
    "start": 502.08,
    "end": 505.26,
    "text": "How do you even fight an adversary that iterates quickly?"
  },
  {
    "start": 505.76,
    "end": 507.62,
    "text": "Human reaction times are basically useless."
  },
  {
    "start": 507.7,
    "end": 509.82,
    "text": "You have to fight machines with machines There no other way."
  },
  {
    "start": 510.82,
    "end": 520.24,
    "text": "Harpreet Sidhu announced that Accenture is heavily expanding their agentic AI-powered managed extended detection and response, they're MXDR for Microsoft."
  },
  {
    "start": 520.4,
    "end": 521.88,
    "text": "Okay so autonomous defense?"
  },
  {
    "start": 521.96,
    "end": 530.96,
    "text": "Yeah the objective is to deploy defensive AI agents that autonomously handle routine threat scenarios and actually execute proactive remediation without"
  },
  {
    "start": 531.02,
    "end": 532.58,
    "text": "waiting for a human to click approve"
  },
  {
    "start": 532.8,
    "end": 533.3,
    "text": "exactly."
  },
  {
    "start": 533.86,
    "end": 540.58,
    "text": "Vasu Jackal at RSAC reinforced this too stating autonomous."
  },
  {
    "start": 540.62,
    "end": 540.96,
    "text": "But wait,"
  },
  {
    "start": 541.36,
    "end": 548.38,
    "text": "handing the keys of your enterprise security over to Autonomous AI agents that requires an airtight framework of trust?"
  },
  {
    "start": 548.54,
    "end": 548.66,
    "text": "Oh"
  },
  {
    "start": 548.86,
    "end": 550.38,
    "text": "massive governance reality check!"
  },
  {
    "start": 550.48,
    "end": 554.98,
    "text": "Yeah because deploying these large language models is no longer a localized experimental free-for all"
  },
  {
    "start": 555.12,
    "end": 555.56,
    "text": "not at all."
  },
  {
    "start": 555.98,
    "end": 559.56,
    "text": "Christopher Apolla highlighted a huge shift in public sector deployment recently"
  },
  {
    "start": 559.74,
    "end": 560.8,
    "text": "with USAI platform."
  },
  {
    "start": 560.86,
    "end": 566.58,
    "text": "right yep NIST and the GSA are partnering to evaluate AI tools through this USI Platform"
  },
  {
    "start": 566.9,
    "end": 569.74,
    "text": "which fundamentally changes the compliance landscape."
  },
  {
    "start": 570.06,
    "end": 579.34,
    "text": "It really does, because now before an AI tool can touch federal operations it must be systematically measured for security reliability and bias."
  },
  {
    "start": 579.86,
    "end": 586.16,
    "text": "It's essentially an authority to operate in ATO specifically tailored for AI systems"
  },
  {
    "start": 586.32,
    "end": 593.4,
    "text": "Exactly And look regardless of the shifting political currents or whatever recent executive orders are driving tech policy right Now."
  },
  {
    "start": 594.04,
    "end": 598.54,
    "text": "The pure governance risk and compliance impact is absolute"
  },
  {
    "start": 598.86,
    "end": 604.72,
    "text": "Right, you can't just plug in off-the-shelf AI model into a sensitive workflow anymore without rigorous standardized vetting."
  },
  {
    "start": 604.96,
    "end": 611.28,
    "text": "And that rigorous vetting is becoming mandatory everywhere because AI's embedding itself to the very core of business operations too?"
  },
  {
    "start": 611.58,
    "end": 618.76,
    "text": "Yeah Sandra Veller pointed out we are officially entering an era of agentic ERP with systems like SAP Egentic"
  },
  {
    "start": 618.88,
    "end": 620.26,
    "text": "ERP, that's a huge shift."
  },
  {
    "start": 620.4,
    "end": 620.48,
    "text": "It"
  },
  {
    "start": 620.58,
    "end": 620.82,
    "text": "is!"
  },
  {
    "start": 620.96,
    "end": 627.38,
    "text": "AI is transitioning from being just this helpful little chatbot on the periphery to The actual operating layer of the enterprise."
  },
  {
    "start": 627.46,
    "end": 630.02,
    "text": "it's actively guiding supply chains and financial decisions."
  },
  {
    "start": 630.24,
    "end": 636.3,
    "text": "right but she points out That when these integrations fail they rarely fail because the underlying algorithm Is bad."
  },
  {
    "start": 636.8,
    "end": 637.48,
    "text": "why do they fail them?"
  },
  {
    "start": 638.02,
    "end": 641.14,
    "text": "They fail because the organization's data is siloed."
  },
  {
    "start": 641.6,
    "end": 648.96,
    "text": "Ownership is ambiguous, internal processes are disconnected... You basically have to fix your operating model before AI can optimize"
  },
  {
    "start": 649.02,
    "end": 649.1,
    "text": "it."
  },
  {
    "start": 649.34,
    "end": 650.42,
    "text": "That makes perfect sense."
  },
  {
    "start": 650.58,
    "end": 650.7,
    "text": "Yeah"
  },
  {
    "start": 651.12,
    "end": 660.24,
    "text": "And you know if AI agents act as a literal operating system for core business and government functions It raises an urgent strategic question"
  },
  {
    "start": 660.4,
    "end": 660.84,
    "text": "Which is?"
  },
  {
    "start": 661.0,
    "end": 661.06,
    "text": "Who"
  },
  {
    "start": 661.2,
    "end": 664.04,
    "text": "actually governs that data feeding those agents?"
  },
  {
    "start": 664.98,
    "end": 665.26,
    "text": "Yes."
  },
  {
    "start": 665.36,
    "end": 671.34,
    "text": "This operational reality is driving a massive shift in the boardroom regarding digital sovereignty, which is our third theme today."
  },
  {
    "start": 671.48,
    "end": 673.68,
    "text": "and it's not just about data localization anymore?"
  },
  {
    "start": 673.76,
    "end": 674.0,
    "text": "Is it"
  },
  {
    "start": 674.34,
    "end": 674.4,
    "text": "no?"
  },
  {
    "start": 674.72,
    "end": 679.8,
    "text": "Andy Lane noted that European leaders have moved way past Just asking where my data physically located."
  },
  {
    "start": 679.9,
    "end": 680.62,
    "text": "It's about control"
  },
  {
    "start": 680.84,
    "end": 681.24,
    "text": "exactly."
  },
  {
    "start": 681.96,
    "end": 683.48,
    "text": "The demands are now about governance."
  },
  {
    "start": 684.12,
    "end": 685.16,
    "text": "who controls access?"
  },
  {
    "start": 685.98,
    "end": 691.02,
    "text": "How does a nation adopt hyper scale AI without creating an unbreakable dependency on a foreign vendor?"
  },
  {
    "start": 691.46,
    "end": 694.4,
    "text": "Sovereignty is no longer about geographic isolation."
  },
  {
    "start": 694.52,
    "end": 697.28,
    "text": "It's about transparency and operational control"
  },
  {
    "start": 697.64,
    "end": 703.28,
    "text": "And we're seeing two drastically different approaches to executing that control on a national level right now."
  },
  {
    "start": 703.64,
    "end": 711.68,
    "text": "Yeah, let's talk about Estonia first because hofford elfson recently analyzed their approach through peak Their health in information systems center."
  },
  {
    "start": 711.86,
    "end": 714.44,
    "text": "the stony is always so ahead of the curve On this stuff."
  },
  {
    "start": 714.54,
    "end": 715.26,
    "text": "they really are."
  },
  {
    "start": 715.36,
    "end": 716.98,
    "text": "and what is absolutely wild?"
  },
  {
    "start": 717.04,
    "end": 717.4,
    "text": "About those?"
  },
  {
    "start": 717.48,
    "end": 723.38,
    "text": "strategy deliberately employs zero in-house developers."
  },
  {
    "start": 723.5,
    "end": 723.86,
    "text": "Wait, really?"
  },
  {
    "start": 724.24,
    "end": 726.38,
    "text": "Zero for a national digital health system."
  },
  {
    "start": 726.56,
    "end": 730.8,
    "text": "Zero, they only employ architects product owners and data quality specialists."
  },
  {
    "start": 730.98,
    "end": 731.88,
    "text": "That is fascinating."
  },
  {
    "start": 731.98,
    "end": 732.08,
    "text": "their"
  },
  {
    "start": 732.16,
    "end": 739.26,
    "text": "entire System Is built on procuring thin while They retain strict absolute control over the architecture And The Data Standards"
  },
  {
    "start": 739.42,
    "end": 743.28,
    "text": "so they achieve Sovereignty Through Radical Transparency Rather Than Building A walled Garden."
  },
  {
    "start": 743.48,
    "end": 744.08,
    "text": "Exactly"
  },
  {
    "start": 744.74,
    "end": 752.46,
    "text": "Citizens Can log into the system and see a Clear Immutable Log of exactly who has access Their Medical Data when They Access it and why"
  },
  {
    "start": 752.9,
    "end": 757.2,
    "text": "And because that trust architecture is so robust, the buy-in is incredible."
  },
  {
    "start": 757.54,
    "end": 758.28,
    "text": "Only what?"
  },
  {
    "start": 758.5,
    "end": 759.52,
    "text": "Zero point zero."
  },
  {
    "start": 759.64,
    "end": 762.2,
    "text": "two percent of Estonians have chosen to opt out of data sharing."
  },
  {
    "start": 762.28,
    "end": 762.44,
    "text": "Yep,"
  },
  {
    "start": 762.66,
    "end": 763.24,
    "text": "zero point zero."
  },
  {
    "start": 763.32,
    "end": 763.8,
    "text": "Two percent."
  },
  {
    "start": 764.0,
    "end": 767.48,
    "text": "they built trust by proving The citizen holds the ultimate access controls."
  },
  {
    "start": 767.78,
    "end": 774.64,
    "text": "okay now contrast That architectural approach with the heavy Regulatory approach we are seeing unfold in Brazil right Now."
  },
  {
    "start": 774.82,
    "end": 777.3,
    "text": "oh...the new ECA digital law."
  },
  {
    "start": 778.0,
    "end": 780.6,
    "text": "Renda Mathias Fernandez shared some great insights on this."
  },
  {
    "start": 781.16,
    "end": 785.38,
    "text": "Yeah, Brazil is effectively trying to end the digital Wild West for minors."
  },
  {
    "start": 785.92,
    "end": 790.82,
    "text": "They are treating digital platforms as a literal public health issue which"
  },
  {
    "start": 790.86,
    "end": 792.16,
    "text": "has huge paradigm shift."
  },
  {
    "start": 792.26,
    "end": 793.6,
    "text": "what do they actually banning?"
  },
  {
    "start": 793.84,
    "end": 796.28,
    "text": "They're legally banning The Addiction Engine Wow!"
  },
  {
    "start": 796.42,
    "end": 800.74,
    "text": "Meaning infinite scrolling and default autoplay Are completely prohibited from miners."
  },
  {
    "start": 801.42,
    "end": 806.46,
    "text": "There also outlawing behavioral profiling For targeted advertising aimed at children."
  },
  {
    "start": 806.52,
    "end": 806.74,
    "text": "That's"
  },
  {
    "start": 806.86,
    "end": 809.0,
    "text": "massive But how did you enforce that?"
  },
  {
    "start": 809.06,
    "end": 810.32,
    "text": "You have know who was a miner."
  },
  {
    "start": 810.74,
    "end": 812.96,
    "text": "That is the most consequential part of legislation."
  },
  {
    "start": 813.58,
    "end": 815.88,
    "text": "It's end-of self declared age verification."
  },
  {
    "start": 816.7,
    "end": 821.24,
    "text": "Platforms must now implement reliable, auditable methods to prove a user s age."
  },
  {
    "start": 821.56,
    "end": 825.78,
    "text": "And that has ignited profound debate between protection and privacy?"
  },
  {
    "start": 826.08,
    "end": 827.08,
    "text": "A huge debate!"
  },
  {
    "start": 827.56,
    "end": 834.7,
    "text": "Because to reliably verify age online systems generally require government ID or biometric scan"
  },
  {
    "start": 835.46,
    "end": 841.54,
    "text": "And parents and child safety advocates are saying, look this is a necessary step to defang predatory algorithms."
  },
  {
    "start": 841.7,
    "end": 842.12,
    "text": "Exactly."
  },
  {
    "start": 842.54,
    "end": 847.24,
    "text": "but on the flip side privacy advocates argue that effectively ends online anonymity."
  },
  {
    "start": 847.44,
    "end": 847.54,
    "text": "Yeah"
  },
  {
    "start": 847.6,
    "end": 851.16,
    "text": "they argue it forces every single user into surveillance architecture."
  },
  {
    "start": 851.22,
    "end": 852.38,
    "text": "just browse internet."
  },
  {
    "start": 852.52,
    "end": 856.96,
    "text": "It really is defining clash over what digital sovereignty actually costs individual."
  },
  {
    "start": 857.18,
    "end": 865.64,
    "text": "But while those massive policy debates play out, the technical standards required to actually operationalize data sovereignty are quietly falling into place."
  },
  {
    "start": 865.82,
    "end": 867.46,
    "text": "You're talking about the new EU standard?"
  },
  {
    "start": 867.6,
    "end": 867.78,
    "text": "Yeah."
  },
  {
    "start": 868.08,
    "end": 878.02,
    "text": "Stefan Schwalhm highlighted this major milestone—the publication of the new CENTS-OneEtwoSixFour Standard for Ida's Qualified Ledger Trust Services."
  },
  {
    "start": 878.2,
    "end": 878.96,
    "text": "That is a mouthful!"
  },
  {
    "start": 879.06,
    "end": 879.84,
    "text": "What does it do?"
  },
  {
    "start": 880.54,
    "end": 886.68,
    "text": "Prior to this standard, if you used a blockchain or distributed ledger... ...to track a sensitive supply chain across European borders."
  },
  {
    "start": 886.72,
    "end": 886.84,
    "text": "Which"
  },
  {
    "start": 886.9,
    "end": 887.98,
    "text": "a lot of companies want to do!"
  },
  {
    "start": 888.48,
    "end": 894.3,
    "text": "Right but it was incredibly difficult to prove the legal validity.. ..of those transactions under EU law."
  },
  {
    "start": 894.48,
    "end": 897.0,
    "text": "Ah I see This standard bridges that gap."
  },
  {
    "start": 897.48,
    "end": 902.6,
    "text": "It makes blockchain legally binding and usable in highly regulated European environments."
  },
  {
    "start": 902.98,
    "end": 911.22,
    "text": "So it paves the way for innovations like digital product passport where you need absolute sovereign trust in decentralized data exactly."
  },
  {
    "start": 911.76,
    "end": 917.46,
    "text": "but you know protecting our sovereign data today relies entirely on the mathematical complexity of modern cryptography."
  },
  {
    "start": 917.62,
    "end": 922.08,
    "text": "yes and that brings us back to the threat we discussed at the very beginning of this deep dive"
  },
  {
    "start": 922.24,
    "end": 922.72,
    "text": "quantum."
  },
  {
    "start": 923.2,
    "end": 926.9,
    "text": "Yes, theme four The rapidly accelerating timeline."
  },
  {
    "start": 929.0,
    "end": 932.38,
    "text": "Dennis E. Lieber issued a really stark warning about this, he said."
  },
  {
    "start": 932.44,
    "end": 934.2,
    "text": "quantum computing is not future problem."
  },
  {
    "start": 934.42,
    "end": 936.34,
    "text": "it's present day security deadline"
  },
  {
    "start": 936.54,
    "end": 939.6,
    "text": "Because of the store now decrypt later strategy?"
  },
  {
    "start": 939.84,
    "end": 946.96,
    "text": "Exactly Threat actors are harvesting encrypted proprietary data financial records state secrets today just scooping all up"
  },
  {
    "start": 947.04,
    "end": 948.28,
    "text": "Just putting in cold storage."
  },
  {
    "start": 948.36,
    "end": 954.38,
    "text": "so if you have data that must remain confidential for next ten to fifteen years your clock has effectively already run out."
  },
  {
    "start": 954.66,
    "end": 957.76,
    "text": "The infrastructure keeping its safe is living on borrowed time."
  },
  {
    "start": 957.94,
    "end": 962.14,
    "text": "And that inflection point is arriving so much faster than most people anticipated?"
  },
  {
    "start": 962.22,
    "end": 965.32,
    "text": "Yeah, Mayor Pellani pointed to twenty-twenty six as the year."
  },
  {
    "start": 965.42,
    "end": 971.3,
    "text": "quantum is expected to demonstrably beat classical supercomputers in live production environments"
  },
  {
    "start": 971.76,
    "end": 979.7,
    "text": "specifically for challenges like optimizing global supply chains in real time, or simulating molecular structures for drug discovery."
  },
  {
    "start": 979.96,
    "end": 980.12,
    "text": "Right"
  },
  {
    "start": 980.18,
    "end": 982.86,
    "text": "the hard science is officially transitioning out of the laboratory"
  },
  {
    "start": 983.12,
    "end": 986.66,
    "text": "I met Othmani and Scott Crowder shared this breakthrough from IBM."
  },
  {
    "start": 986.78,
    "end": 988.16,
    "text": "that just blew my mind."
  },
  {
    "start": 988.36,
    "end": 989.9,
    "text": "The magnetic material simulation?"
  },
  {
    "start": 989.96,
    "end": 990.22,
    "text": "Yes!"
  },
  {
    "start": 990.84,
    "end": 997.6,
    "text": "IBM successfully ran a quantum simulation Of A Real Complex Magnetic Material Known as KCUF-III."
  },
  {
    "start": 997.92,
    "end": 1002.6,
    "text": "Okay For the listener put into perspective why simulating a magnetic material actually matters"
  },
  {
    "start": 1002.72,
    "end": 1002.92,
    "text": "Sure."
  },
  {
    "start": 1003.12,
    "end": 1013.88,
    "text": "so Trying to simulate complex molecular interactions on a classical computer is basically like trying to map the exact position of every single grain of sand on a beach using a pocket calculator."
  },
  {
    "start": 1014.12,
    "end": 1014.32,
    "text": "Right,"
  },
  {
    "start": 1014.48,
    "end": 1015.66,
    "text": "variables are just too vast"
  },
  {
    "start": 1015.98,
    "end": 1025.44,
    "text": "Exactly, but IBM's quantum simulation perfectly matched the data from highly expensive real-world physical neutron scattering experiments."
  },
  {
    "start": 1025.579,
    "end": 1030.579,
    "text": "Wow We are officially moving past the phase of running theoretical toy problems."
  },
  {
    "start": 1030.98,
    "end": 1036.16,
    "text": "we're actually replacing physical material science testing with Quantum calculation."
  },
  {
    "start": 1036.319,
    "end": 1042.28,
    "text": "that is incredible and The hardware race to support these calculations is expanding so dramatically right now."
  },
  {
    "start": 1042.619,
    "end": 1047.92,
    "text": "Yeah, Yossi Matias announced that Google Quantum AI is running a dual-track hardware strategy now."
  },
  {
    "start": 1048.02,
    "end": 1048.28,
    "text": "Right!"
  },
  {
    "start": 1048.5,
    "end": 1052.12,
    "text": "Historically they focused really heavily on superconducting quivits which"
  },
  {
    "start": 1052.2,
    "end": 1057.54,
    "text": "they note scale incredibly well in time meaning They can execute millions of operations at microsecond speeds."
  },
  {
    "start": 1057.78,
    "end": 1062.14,
    "text": "but Now they are aggressively expanding into neutral atom quivots Which scale incredibly?"
  },
  {
    "start": 1062.22,
    "end": 1063.0,
    "text": "Well and space"
  },
  {
    "start": 1063.22,
    "end": 1063.4,
    "text": "okay?"
  },
  {
    "start": 1063.54,
    "end": 1065.32,
    "text": "explain That to me scaling in space."
  },
  {
    "start": 1065.4,
    "end": 1070.42,
    "text": "the traditional microchips even quantum ones Are limited by physical wiring and cooling constraints."
  },
  {
    "start": 1070.5,
    "end": 1079.02,
    "text": "right with neutral atoms you are literally using lasers to hold individual atoms in place within a three-dimensional grid, in a vacuum."
  },
  {
    "start": 1079.38,
    "end": 1080.58,
    "text": "That sounds like science fiction!"
  },
  {
    "start": 1080.98,
    "end": 1089.8,
    "text": "I know... but you can pack thousands of these quibbets together with highly flexible connectivity completely bypassing the traditional wiring bottlenecks."
  },
  {
    "start": 1090.46,
    "end": 1098.78,
    "text": "So by running both superconducting and neutral atom tracks, Google is cross-pollinating the engineering to overcome physical limitations of scaling."
  },
  {
    "start": 1098.96,
    "end": 1099.62,
    "text": "Exactly!"
  },
  {
    "start": 1100.02,
    "end": 1102.72,
    "text": "And the broader ecosystem is gearing up for this scale too."
  },
  {
    "start": 1103.48,
    "end": 1107.5,
    "text": "Resonage Body & Philip Brown highlighted that Cisco was partnering with Atom Computing..."
  },
  {
    "start": 1107.78,
    "end": 1110.18,
    "text": "To architect actual networking infrastructure right?"
  },
  {
    "start": 1110.22,
    "end": 1110.34,
    "text": "Yeah"
  },
  {
    "start": 1110.5,
    "end": 1114.92,
    "text": "The Networking required to connect distributed heterogeneous quantum data centers"
  },
  {
    "start": 1115.16,
    "end": 1119.56,
    "text": "Okay But we do need to pause here and inject a hard reality check into this momentum."
  },
  {
    "start": 1119.74,
    "end": 1120.36,
    "text": "Always good idea!"
  },
  {
    "start": 1120.78,
    "end": 1126.84,
    "text": "As incredible as these breakthroughs are, David Lindthicom offered very sobering perspective for enterprise leaders."
  },
  {
    "start": 1127.02,
    "end": 1132.66,
    "text": "For the vast majority of companies measurable bottom line business value from quantum is still years away."
  },
  {
    "start": 1132.98,
    "end": 1133.06,
    "text": "Ah"
  },
  {
    "start": 1133.44,
    "end": 1134.78,
    "text": "yeah because of error rates"
  },
  {
    "start": 1134.9,
    "end": 1140.14,
    "text": "The error rate in quantum calculations remain massive shortle And there's severe physical limits."
  },
  {
    "start": 1140.34,
    "end": 1141.9,
    "text": "scaling systems reliably"
  },
  {
    "start": 1142.28,
    "end": 1143.9,
    "text": "Not mention talent shortage"
  },
  {
    "start": 1144.36,
    "end": 1148.86,
    "text": "Exactly, Amit Singhi made a similar point regarding India's quantum ambitions."
  },
  {
    "start": 1149.46,
    "end": 1159.02,
    "text": "A nation or company might have the strategic desire to lead in quantum but you cannot simply hire a deployment-ready quantum engineer off the street."
  },
  {
    "start": 1159.4,
    "end": 1159.48,
    "text": "No!"
  },
  {
    "start": 1159.6,
    "end": 1162.34,
    "text": "The workforce required to scale this just does not exist."
  },
  {
    "start": 1162.4,
    "end": 1162.52,
    "text": "yet"
  },
  {
    "start": 1162.76,
    "end": 1163.44,
    "text": "It really doesn't."
  },
  {
    "start": 1163.66,
    "end": 1170.84,
    "text": "But I will say...the bridge between theoretical power of quantum and practical reality lies in integration."
  },
  {
    "start": 1171.1,
    "end": 1175.2,
    "text": "Right, Mauritian Mijakovic highlighted IBM's new blueprint for this."
  },
  {
    "start": 1175.4,
    "end": 1178.5,
    "text": "The quantum-centric supercomputing, or QCSC?"
  },
  {
    "start": 1178.86,
    "end": 1179.0,
    "text": "Yeah"
  },
  {
    "start": 1179.38,
    "end": 1184.56,
    "text": "the future architecture is not a standalone quantum computer sitting in his siloed freezing basement."
  },
  {
    "start": 1184.92,
    "end": 1190.84,
    "text": "no it's a seamless tight integration between quantum processors and classical high performance computing."
  },
  {
    "start": 1191.24,
    "end": 1201.36,
    "text": ".The classical computers orchestrate the broader workflow they manage the data pipelines only the impossible, highly complex mathematical variables to the quantum processor."
  },
  {
    "start": 1201.5,
    "end": 1207.0,
    "text": "Exactly it's a hybrid approach and looking at the entire landscape we've covered today The through line is actually really clear."
  },
  {
    "start": 1207.44,
    "end": 1213.84,
    "text": "It is We are moving from world of assumed security into reality of verified resilience"
  },
  {
    "start": 1216.08,
    "end": 1220.14,
    "text": "from a peripheral tool into the autonomous operating layer of the enterprise."
  },
  {
    "start": 1220.22,
    "end": 1224.22,
    "text": "We're seeing nations redefine sovereignty around data governance, and"
  },
  {
    "start": 1224.32,
    "end": 1229.88,
    "text": "we are witnessing quantum computing transition from theoretical physics in to deployable engineering."
  },
  {
    "start": 1230.06,
    "end": 1231.78,
    "text": "It's massive massive shift"
  },
  {
    "start": 1231.94,
    "end": 1232.5,
    "text": "it really is."
  },
  {
    "start": 1233.0,
    "end": 1239.82,
    "text": "And as you listener process these shifts I want you consider this final thought regarding architecture trust currently built"
  },
  {
    "start": 1240.48,
    "end": 1240.54,
    "text": "on"
  },
  {
    "start": 1240.94,
    "end": 1246.48,
    "text": "We are rushing to deploy agentic AI that autonomously manages our core enterprise systems."
  },
  {
    "start": 1246.6,
    "end": 1246.82,
    "text": "Right?"
  },
  {
    "start": 1247.18,
    "end": 1253.54,
    "text": "Simultaneously, we are integrating quantum computers into our data centers to handle mathematical variables."
  },
  {
    "start": 1253.7,
    "end": 1263.14,
    "text": "classical systems cannot process What happens in the near future when those autonomous AI agents are tasked with orchestrating and optimizing those quantum workflows."
  },
  {
    "start": 1263.34,
    "end": 1273.22,
    "text": "Oh wow Who audits the AIs decision-making process When the underlying quanta math that relies on is quite literally beyond Classical human comprehension?"
  },
  {
    "start": 1273.44,
    "end": 1274.64,
    "text": "That's a chilling thought."
  },
  {
    "start": 1275.04,
    "end": 1279.66,
    "text": "We are automating the future, but we may soon not even understand the math."
  },
  {
    "start": 1279.78,
    "end": 1281.92,
    "text": "We're trusting something to chew on"
  },
  {
    "start": 1282.26,
    "end": 1283.36,
    "text": "definitely something a chew-on."
  },
  {
    "start": 1284.18,
    "end": 1285.74,
    "text": "Well that is all the time we have for today."
  },
  {
    "start": 1286.08,
    "end": 1289.08,
    "text": "if you enjoyed this episode new episodes drop every two weeks."
  },
  {
    "start": 1289.4,
    "end": 1298.94,
    "text": "Also check out our other editions on cloud defense tech digital products and services artificial intelligence sustainability in green ICT Defense Tech and"
  },
  {
    "start": 1299.06,
    "end": 1299.56,
    "text": "HealthTech."
  },
  {
    "start": 1299.8,
    "end": 1301.88,
    "text": "Thank you so much for joining us on this deep dive."
  },
  {
    "start": 1302.34,
    "end": 1304.96,
    "text": "Stay curious, question your assumptions and we will"
  },
  {
    "start": 1307.98,
    "end": 1308.36,
    "text": "see."
  }
]