Well, good afternoon and good day to everyone joining. We really appreciate it. It looks like we've got a great, group on our webinar today, over a hundred and fifty folks. So thank you all so much for joining. My name is Chris Scully. I will be your host today. I'm an account executive and a sales lead here at Innerworks, and, I am office out of, the great city of Oklahoma City, Oklahoma, and, GoFundr. So thank you guys for all joining. I'll give you a little snapshot about who we are, but today, we are really pleased to bring you one of our best partners, in the cybersecurity segment, and that's ArmorPoint. And so, we're really glad you guys are all here. We've got an outstanding, webinar planned for you today with John Crowley coming in from ArmorPoint today. So, just a couple housekeeping issues. We do encourage everyone, to put any questions you may have in the q and a, feature of your Zoom call here. We will actually have a, a spot at the very end of our webinar today for q and a. So John will go through his slides today, do some training. Feel free to, as we go, be putting your questions in there. And then at the end, I will facilitate, as many of those questions as we can get to time allowed back to John and allow him to to answer those as we go. So please be utilizing that. It's also always fun in the in the chat if you wanna put, and I think some of you already started doing that, putting where you're calling in from today. It's great to see, people from all over, the country and all over the globe, actually. So we really, again, appreciate everybody's attendance. So, again, we'll get started on that, and and John's driving our slides today, but I'm gonna give you just a kind of a very quick update. I know there was, you guys all saw there is, some gifts and some drawings to be had today. So let me let me very quickly kinda remind you of what that looks like if you were one of the twenty first people to register and join us live, and we'll we'll go through the the data after this and see who that is. But you'll be receiving a twenty five dollar gift card as a thank you. So, again, we really appreciate that. That'll probably take a few business days for that to to come at you if you were one of those first, folks. And then all live attendees who participate, in at least one of the Zoom polls, and you'll see these polls as we go through, completing the webinar survey at the end, will be entered into a raffle. And we've got some some pretty cool prizes today, summer giveaway price pack, a Getty cooler, a waterproof JBL speaker, an REI gift card. So, again, thank you guys for all doing. We know your time is valuable. We wanna recognize and show you how much we appreciate you guys. So thanks everybody again for attending. So, let me dive right in. So Innerworks, as I mentioned, I'm actually out of Oklahoma City, Oklahoma. Our headquarters is in Stillwater, Oklahoma. However, we have a global footprint. We've been around for nearly twenty five years. We are truly an end to end IT solutions, provider. We're we are, very strong in the managed services piece, of the house, but we can do a lot of things. And I won't read you all of the words on these slides, so I I welcome you guys to to investigate. If you need a partner, if you need IT, assistance, we are glad to help you no matter where you're at. Again, so here's, a kind of a list again, IT solutions, data analytics, experience platforms, and enablement. So we appreciate everybody. And if, again, if you need help, let us know as we go, through this today. But with that, time is precious. So one of again, one of our great partners that we work with a lot and that we serve a lot of customers and clients with is ArmorPoint. And so I'm gonna turn it over, to mister John Crowley who's joined us. John is a trusted adviser to business and technology leaders, looking to strengthen their cybersecurity posture without the burden of building a solution from scratch. And with nearly a decade of experience in the industry, he's helped hundreds of organizations design scalable, right sized security programs that deliver real protection and measurable value at ArmorPoint. John works closely with partners to bring effective cyber security solutions to the market, and his deep understanding of both the channel ecosystem and the evolving threat landscape allows him to connect the dots between what the clients need and how partners like Innerworks can deliver. So John brings a practical partner first perspective to every conversation, and he helps stakeholders cut through the noise and focus on what truly moves the needle in cybersecurity. So we're really lucky to have John here today. I've worked with John for a long time, outstanding individual. And so, John, with that, I will let you, get into what the folks came for today. So thanks again for coming. Absolutely. Thanks, Chris. Well, welcome, everyone, and thanks a bunch for for showing up today. Have a quite a bit to cover. We'll we'll try to make this interactive as possible too and try to have some fun with this webinar as we go through. We have some polls and some questions out there that we'll we'll be thrown out there just to get some feedback. But, ultimately, you know, today, what I wanna talk to you about is really a a a smarter cybersecurity approach, with within our works and ArmorPoints partnership together. And I think, you know, we've been partner now for for many years, and we've seen organizations of all shapes and sizes have so many different types of challenges. And, you know, I feel like we've we've really designed something together that allows us to truly protect, our our customers. And so before we go too far into it, though, I I would love to, just start with a quick poll. And I think this is a a great opportunity for two things. One, it's a great opportunity for everyone to get to see how the polls work and and have some fun with it. But then also, I'm genuinely curious, you know, how everyone today is really monitoring their alerts. I already have some answers coming in quickly. Internal SOC, very nice. Very nice. Outsourced MSSPs. Let's see. I'm curious to see which one will be the winner. Outsourced MSP and then internal SOC playing pretty close. We got some folks out there that are are manually reviewing logs and alerts, which is really never ever a fun time. So shout out to those that answered manual review. I'm sure you had some sleepless nights. Alrighty. I'll give it another thirty seconds here. See if any more answers come in. Wow. Neck and neck internal SOC and outsourced MSSPs. Awesome. I'm just I'm excited to see that there are, organizations and people here today that, you know, have have already looked into, you know, building their own SOC internally and, otherwise, you know, outsourcing it. And there's there's compliments and challenges and, with both options, but, great to see at least folks here are definitely already doing something about it. So I'm gonna go ahead and, stop the poll here. And there we go. So it looked like the internal SOC actually took, the poll here with, forty one percent of answers were internal SOC, thirty eight percent of answers were outsourced MSSP. So great to see. Good mix in here. So I'll move along here, though. Chris already really stole a lot of my thunder, but, I'll quickly introduce myself and my my role. But, yes. So I'm John Crowley. I'm one of the senior account executives here with ArmorPoint. I work very closely with the InterWorks teams and a lot of our most strategic partners to help design, cybersecurity solutions and help, build these solutions for their clients as well. I've been with ArmorPoint now for about seven years, and most of my background expertise is on in managed services and cybersecurity. So in case you haven't you don't know exactly who ArmorPoint is, allow me to just shed a little bit of light on that. ArmorPoint, I I put us in the category of cybersecurity as a service. And the reason I do that is because, one, managed SOC services, having that team that is helping organizations monitor and protect their environments, that is the centerpiece of what we do on a daily basis. However, I I see us as cybersecurity as a service because there's there's so many other areas in cybersecurity that, we are able to help organizations. So, really, what's important to me personally is being able to come to the table and understand an organization's true challenges and help identify how we can help solve those specific challenges. And so I get further down in some of these slides. I'll dive a little bit deeper into what I mean by that, but I'll I'll still continue to keep it a high level for this. Over the years, you know, we've been trusted by industry leaders, across the board. And the reason why I I truly like, showing the NASCAR slide, it's not just a marketing, telling me I have to. The reason I like showing this is because it it demonstrates that we're able to help an organization regardless of who you are, what vertical you're in. We help organizations everything from the SMBs to enterprise, from higher education to retail. We've designed solutions for, like I mentioned, organizations of all shapes and sizes. And over the years, we've, you know, we've won a tremendous amount of rewards to recognize our cybersecurity programs, to recognize our service excellence, our security team, and and our platform that we've designed as a whole. And as I mentioned earlier with, cybersecurity as a service, you know, I I really like to emphasize cybersecurity program management. And because regard you know, when we talk to organizations, they're they're always at a different stage of their cybersecurity journey. And so at our point, we believe in the fact that we need to not just come in with one solution. I wanna be able to be a cybersecurity partner for these organizations and make sure that we're helping them at whatever stage they're at. And so, like I mentioned, managed SOC services really is the centerpiece of what we do, and I'll talk a little bit more about that today. But just know that when we when we get into any engagement, the first question is how can we help? So let's let's dive a little bit into, you know, why I wanted to talk to everybody about what's going on in today's land threat landscape. And so cyberattacks truly are no longer rare. I I almost wish we had a poll. We wouldn't do this to you, but we wish we had a poll to say how many organizations here today have already experienced a cyber attack, and, you know, what did that look like. And we really noticed that it it's not, just a matter of if anymore. It truly is when. And these cyber attacks, you know, they're they're getting much smarter. Right? And that's why we wanted to talk about smarter cybersecurity. If there really is one thing for you all to take away from today, it's that, you know, smarter attacks require smarter defense. And so that's why this was taken I I I gathered this information from several different sort, sources, but some of these numbers are just outrageous. And one of the one of the scariest ones to me, honestly, is this two hundred and seventy seven days average time to identify and contain a breach. That's, you know, nearly nine months. And we see this time and time again where organizations have already been breached and they don't know it. They don't have the capabilities to detect it potentially, and, you know, they don't have necessarily the team that knows how to step in and and and what to do about it. So this is why this is super important. This costs organizations millions of dollars. This has put organizations, you know, out of business. And so, you know, we see this, and and we wanna make sure that we're helping everyone as much as possible to get ahead of this. And so, you know, the other thing is cyber attacks today aren't just more frequent, they're more sophisticated. And so, you know, attackers are today, they're leveraging AI to mimic real user behaviors. They're bypassing anomaly detection. They're even writing convincing phishing emails that even trained users will fall for. So, you know and once they're inside, they move laterally. They're laterally. They're mapping out your systems. They're elevating accesses, and they're continuing to stay undetected for months. And so, you know, how does this happen ultimately? And this is where I see most organizations are are really falling short. One of them primarily is gonna be overwhelmed security teams. Right? So I saw some of the folks on the last poll mentioned that, you know, they have their own internal SOC. I'd I'd love to personally, I'd love to learn more about that and and how you guys are keeping up with some of this. But we see this time and time again where organizations that do have some security team members are becoming to get overwhelmed with the, excessive amount of alerts, and that ultimately leads to alert fatigue and missed threats. And so that's how we're gonna start seeing some of these attacks getting in or bypass because they're they're overwhelmed. The other big one we're seeing time and time again, I'm sure the audience can attest to this as well, but disconnected tool sets. When you have a maybe a cybersecurity platform that is doing one component of cybersecurity and then you have a different cybersecurity platform taking care of another one and they're not talking to each other or not correlating together, there's a potential for mis threats, excessive alerting, and just generalized, you know, disconnected tool sets are creating a problem for organizations. And then overall, just, you know, compliance gaps. You know, we're continuously seeing this where organizations are, you know, pressured to meet specific frameworks. They don't end up implementing tools necessarily correctly, and it it creates a problem in itself. And so, you know, this ultimately is where SIEM and SOC solutions become essential. Ultimately, you can't defend what you can't see. So you need a, you know, a modern a modern SIEM essentially that can act as the central nervous system, if you will, for your whole cybersecurity strategy, ingesting logs and telemetry from across your entire environment, whether it's your endpoints, your servers, your cloud, your network devices, and taking that into a centralized system that can provide us alerts and threat detections in real time. And so for our next poll here, I'd love to hear, you know, on average, how many alerts does your team investigate each week? And I'm really excited to see the folks that mentioned, they have an internal team. I'd love to hear how many they're investigating each week. Not sure. That's a fair answer. Seeing quite a few answers coming in here. Ten ten to fifty looks like it's taken the lead so far. Got quite a few with fifty one to two hundred. Can understand that. And quite a few with more than two hundred alerts. Yep. Ten ten to fifty looks like it's taken the the the number one choice here so far, but, fifty one to two hundred, not too far behind it. And, you know, depending on the size of the organization, what types of tools you're using, how tuned is that tool. You know, you could see a slew anything from hundreds of alerts to ten to fifty. So it really just depends on what all you have out there. Alright. I think for this one, we can end the poll, but it looks like ten to fifty really, really, took it. Fifty percent of the answers went to end the poll and went to ten to fifty. Share results. Alright. Alright. So for this next piece here, you know, I I'd I'd like to talk a little bit more about, a full cybersecurity program, right, and and what that looks like. And sometimes the easiest way for me to explain this to, different types of of people. Regardless if you're extremely technical or not technical at all, I feel like this really resonates with just about anybody. And so, you know, one of the easiest way to explain what your cybersecurity strategy should look like and what you should do about it, it's sometimes easiest to just relate it to your your house and how you protect your home. And so thinking about your home for a moment, you know, there's really three main ways that you are gonna protect your home or business. And without all three, you are not truly protected. And so those three key areas are protection, detection, and remediation or response. And so thinking about your home for a second here, how do we protect our houses? Right? We we have exterior lights. We have window locks, door locks. Right? These are all things that we are doing today to help us prevent somebody from breaking in. However, just like in in in cyber the world, in the real world is the same. Everyone knows that if I really wanted to get in there, I could kick in the front door. I could break a window. I can get in there if I really wanted to. So what measures do we have in our house to help us detect if somebody does bypass our prevention? Right? And that's where we use things like motion sensors, video cameras, neighborhood watch. These are all things that we're doing today to help us detect if there's an intrusion. However, detection's kinda pointless if you don't have some form of response. Right? And so when we're thinking about response or remediation in in in our worlds, at our homes, right, people have, you know, security monitoring and response that automate notifications to the authorities. Some people have weapons. Some people have dogs. You there's different ways that we can automate, the the just our home protection overall. And so with that same strategy, your business needs to implement a similar approach to having a full full ecosystem that is cohesive and working together that can protect your overall business. And now diving into the business here as it relates, you know, from a protection standpoint, this is things like, you know, software patching, firewalls, cybersecurity awareness program, antivirus. These are all things that we're doing today in our business to help us prevent somebody from breaking in. But just like in the real world, in cybersecurity in your business, it's the same things. People, these hackers, bad actors know how to bypass your your traditional prevention protocols. And so we need to take it that next step. And so from a business standpoint, from your we need to start thinking about how are we going to leverage, you know, AI and and machine learning to help us detect if somebody bypasses our prevention. That's where you'll see SIM, IDS, log man monitoring threat intelligence. All of these things are are components and tool sets that we that are leveraged to help us detect in real time if somebody is bypassing our prevention. But, again, detection is sort of pointless if we don't have some form of response. And so from a remediation response standpoint, that's where, you know, forensic investigations, twenty four seven SOC monitoring, incident management, these are all components that help us turn this into a cohesive cybersecurity program to ensure that you're being protected at every layer of your environment and you have team of cybersecurity professionals that are standing behind it. So, again, thinking about, you know, smarter attacks require smarter defense, that's really what ArmorPoint provides within our works is really anything from the protection all the way through the remediation. That's where we come into play. So just thinking about, you know, your overall house and where you feel your business or house is the weakest. Right? Are are your doors locked? Are you, do you have advanced camera systems? Do you have people watching? What are those risks? Right? And so, again, this is another point where I feel it's so important to be able to come to the table and say, you know, where is your house feel the weakest? Is it overall risk? Is it the security monitoring? And so that way we can help. So I guess a a poll question for everybody. You know, what do you think is your biggest visibility gap in today? Network? User behavior is a good one. Yep. Seeing the the the network is kinda taken away, with the poll on this one. Quite a few answers are coming in. So far, it looks like network is fifty six percent of the answers. Not not too surprised, to be honest. Cloud, for sure, you know, there's as everyone continues to migrate to the cloud and and do more of that, there's, tons of ways to get visibility and, definitely ways that, you know, we provide visibility in the cloud. But definitely something that is, a big focus, I think, across the board. Yeah. Network took it away in my opinion. A you know, most of the results are in already, but, the network, fifty seven percent of answers. So I'll go ahead and end this poll and share the results. So not too surprised. You know, they've we've there's a lot of different endpoint protections out there. There's a lot of different things that can help you make sure you have visibility into endpoints. But, ultimately, you know, the network is is a is a big it it really lacks visibility in a lot of ways. Right? And how does it all correlate together? Just because we're seeing something at the network layer, but how is it, you know, attacking or how what is it acting like? Those components from a networking standpoint, we see as a, you know, organization's lack of visibility there quite a bit. So not surprised to see that take it away. So with that said, you know, let me dive into a little bit more about really what is our endpoint. And so our point is a centralized and fully managed cybersecurity solution, and we have designed our own SIEM platform, from the ground up many, many years ago. And this truly goes beyond what your traditional SIEM solutions are. It's to me, it's a security operations platform. And it's because it's designed to ensure that we are getting that complete visibility across the board, centralizing all of that that that data and those events together and helping us detect threats in real time. And in addition to that, it's even a collaboration tool. We have we work with some MSSPs that leverage our our security operations platform in the background, and they're able to collaborate right within the tool with each other on these events. And so it is so much more than just what a traditional SIM solution looks like. And that's why, it helps us, you know, detect those threats in real time and and be efficient with those. And so I really do truly like this statement where, you know, SIM detects, SOC defends, ArmorPoint does both. With all the tool sets in the world, right, allowing us to get all of these various threat detections, if we don't have a team of cybersecurity professionals that are standing behind it and know what to do about it, they're they're generally worthless. Right? It's it's just like going back to the house analogy where, great, we have all the detections now, but what do we do about it? And so the our SOC team's twenty four seven, three sixty five, hundred percent US based. Those are the teams those are the analysts. Those are the threat intelligence analysts that are stepping in and helping our customers do something about it and know what to do about it. So like I mentioned earlier, you know, if you do take away one thing from this, it it really is that smarter attacks now require smarter defense. And so it it's not just about alerts. It's about clarity, correlation, and coordinated response. Right? And and that's how you go from detecting an incident to actually stopping it. Taking it the next layer deeper for you, and I won't I won't dive into this too much here. But, ultimately, this is how you know, this is the topology of ArmorPoint and and really what it makes up and some of the various components. And so on the left, this is really what is part of our solution. This is the back end of our solution, and this is what we're after. And so we're trying to ensure that we have a mechanism to help us detect and get visibility into anything on the environment, whether it's the network, get making sure we have that complete visibility, threat detection, and correlation, whether it's your endpoints, your servers, and then obviously anything in the cloud. And making sure that it's all centralized and set and centered into one place so we can be as efficient as possible. And, the the last piece a couple of last pieces here, for especially for those folks on the call today that mentioned that they're using, leveraging your own internal SOC, I know for us, just from a collaboration standpoint overall, we've rolled out we've even rolled out our ArmorPoint mobile application. And so this really is for those SOC team members that are on the go, get real time alerts, streamline incident management, and just enhances overall collaboration, amongst SOC teams and allows us to, again, be more be more efficient and respond to attacks faster. Last one of our last polls here for the team, is so if if you could outsource one part of your cybersecurity program, what would it be? Lot of answers coming in fast. There there's one answer that definitely is, the the number one as of right now. Alright. We're getting close here. I I actually had one in mind that I would have done and then but I think the one that's winning right now actually trumps that answer, and I can I'll explain why once this is done. Alright. I'll give it another ten, fifteen seconds. Alright. That should be good. I'm gonna go ahead and end the poll now, and I'll share the results. So, I personally, I my mind immediately went to alert triaging because it is it is very, it it it's just there can be a lot. And so but, really, like I mentioned, threat detection response trumps that. Right? And so if I was to outsource something, I would just want all of that that whole piece completely removed and and outsourced completely. I can totally agree with that. Compliance reporting, never something that is too fun. There are a lot of tools out there that help make it easier, especially, like, what we what we do here is to help with some of those pieces. And, a couple people have decided to say nothing. We want to keep it in house. Awesome. If that's great. Have the tools. Have the people. Not not surprised. So awesome. I I really appreciate everyone attending that part. Overall, you know, just last couple of things here and, you know, we we we've saved some time here for everybody. But, you know, overall, if you're having challenges, in cybersecurity as a whole, and you're looking to make your life easier, have the conversation with us. We're happy to help. We're happy to even if, we're happy to provide guidance. We're happy to provide, really anything we can to help organizations today. Please feel free to reach out to us. We have, hundreds of cybersecurity risk management experts, whether they're on the SOC team or they're specific to risk management. And so I I truly believe that what sets us apart is being able to come to the table and say, you know, how can we help and bring the right folks to the table, to help organizations at whatever stage of their cybersecurity journey they're in. And so I guess with that said, Chris, I can pass it back over to you, my friend. Outstanding. Well, thank you, John. Yeah. We've got several good questions in the q and a that I'm gonna just kinda tee them up to you, John, and and, and let you answer them. In fact, I will I will probably answer them in reverse order in case they came in early and then you covered it. We'll just kinda go from back to front here. So, first question. So what kind of return on investment can organizations expect from implementing your solutions? Or, John, how do you kinda measure ROI? It's a great question. It it it is a great question. And probably the hardest thing to answer in this question is it how what would it cost if you were breached? Right? And so that's something that everyone has to think about, is not only what does it cost, to have the people come in and get you out of it, but what does it do to reputation, and those components. So some of those are are only you can measure those, and I've I've sat down with tons of organizations and helped them measure that. But that is the first step. Right? Going beyond that, though, it may you've taken it a step backwards and something easier. You know, what is the cost to have all of these tool sets in place to help you detect threats in real time and then add the amount of people to operate that and watch that twenty four seven. Right? So that is, obviously, you know, an expense. And, you know, with us, we try to make it much simpler. We we try to make it, much more affordable. And so that way, organizations don't have to do that because not only is that time consuming, it's it's very difficult. Trust me, we this is exactly what we do. And, you know, cybersecurity analysts, sometimes it can be a a revolving door. So that's really across the board, and so it can be challenging in that sense. So hopefully, that answers that question. But, again, I'd I'd be happy to dive more into that, whenever. Sounds good. Another question here. I know you mentioned it at a high level, but do you offer training programs for employees to enhance their cybersecurity awareness? Maybe paint a picture of what that looks like. Yeah. Yeah. Absolutely. We do. And so I I think, I actually like to call it human risk management. It's it's equally as important, you know, to have tool sets in place, but it's equally as important to have, training and awareness and education to our end users because at the end of the day, they still are the weakest link, and they need to be trained on what to look out for, what you know, in the event they do see something, what should they do about it? And that even goes a step further into, like, having policies and trainings on those policies. So, definitely an area that that we can help with. Fantastic. Another question. How often do you conduct security audits and PIN testing? On ourselves? Wasn't wasn't specific. I think maybe maybe it's even a part of the process or recommendation. Yeah. So, all the time on ourselves, every day. But, we've we've helped hundreds of organizations with, penetration testing, whether it's, you know, part of your compliance, your risk assessments. We go as far as helping with, BIAs, BCPs, so, a business impact analysis as well as building business continuity planning and instant response planning. So definitely something that is, in the wheelhouse and, something we we would help with. K. Fantastic. Let's see. Maybe here we go. And I again, I think you talked about a little bit, but what is your incident response process in the event of a security breach? Yeah. So so it depends actually. But we do go to the extent of, you know, full remediation, full quarantining, stepping in, standing up, stand up emergency call bridges, you you know, reaching out to the clients, helping with every step of the way, essentially. Really, that's probably something that even sets us apart in the market overall is, to the extent that we help with, instant response and and and, just incident management overall. K. Let's talk about emerging emerging threats. How how does ArmorPoint plan to evolve its offerings in response to emerging threats? Yeah. So a great question. I almost feel like every single week, we are releasing new features and functionality to help address emerging threats. And not only that, but also to make our teams more efficient. Obviously, with the advancements of AI and everything there, automation and and and and AI is becoming, you know, the main topic of of the evolution of our point right now, making sure that we have automated workflow engines pre you know, fully built out, having AI built into the system itself to really help with efficiency and overall, threats. K. And maybe just speak a little more to, how does ArmorPoint ensure the security and integrity of customer data? Mhmm. That's a a extremely long winded answer, I guess, I'd have to give. But, you know, we are SOC two type two certified. We're HIPAA high-tech certified. We have a primary data center that is in Phoenix, Arizona. That is our our primary data center. We own everything down to the back of generators. We also have geographically redundant data centers, across the US. And, the the other the rest of that answer would have to be super long winded, and I don't wanna take up too much time with that one. Good deal. Let's see. Oh, here's a good one. You you mentioned the training a moment ago that you guys can offer. Is the training, accessible from all over the world? Yes. Yeah. Yep. We have we work with, companies across the globe. We have customers in China. We have customer a lot of customers in Europe. We actually even have our own, data center in Europe I'm sorry, in Ireland, specifically, for GDPR purposes. So when we work with organizations over there that have to, adhere to GDPR, we have a dedicated data center for them as well. Perfect. And let's see here. Let's do one more question, and then I'm John, I'm just gonna kinda open it up to you if there's anything we didn't cover, any of the questions maybe that you get frequently that weren't asked today. But, one one last question here. What what role does automation play in your cybersecurity strategy? Yeah. Good good good question. Automation needs to play a a a role, a very specific role. However, do not only rely on automation. You know, we have something we call a, a human verification process. And so what that means is ultimately, yes, there's going to be automation that is going to help us respond faster, and detect things quicker, obviously. But we can trust that, but we have to still verify. And so we need to make sure that our our that's why we have the SOC team that is taking it that step further. From and I'll I'll give you an example of automation. So with an EDR toolset, when, let's say, somebody clicks on malware, the automation the EDR is gonna step in. It's gonna block it, and it's gonna say, hey. I detected this. I blocked it. Have a nice day. So that's great and all. We need that piece. However, where human verification comes into play is taking it that next step. I don't that's great that it can tell me it blocked it, but I wanna understand where did the risk of this ultimately live. How did it get here? And so that's where, you know, we need to be able to take it that next step and and be able to, not just rely on automation. Outstanding. Great questions. I I really appreciate all the questions, to be honest. Yeah. Yeah. And then I'm gonna let you kinda, John, kinda finish with anything, you know, that we didn't talk about or any questions. But before we do that, maybe remind everybody, you know, what's how do how do what's step one? Like, if on the other side of this webinar, if they wanna learn more about about ArmorPoint, they want a conversation, you know, what would what would that flow look like? Once they reach out to me or they reach out to you and and we engage with them, what could they expect on their side from from ArmorPoint? Yeah. Awesome question. Honestly, step one is let let's set up a thirty minute conversation. Like I mentioned at the beginning, I one of the things I'm gonna say is, you know, how can we help? Where where are your challenges? Where does it hurt? And so that's probably the first conversation. And through that, we're able to identify, things maybe we should focus on and, you know, areas that you may or may not need the most help, and that's probably where we look to focus. Following up step would be, you know, then bringing the right people for the job essentially to the table and and really diving into it much deeper. So, yeah, definitely reach out to us. If there's anything you need help with from a cybersecurity standpoint, we're we're happy to set up those calls with everybody. Yeah. Absolutely. And the slide that everybody's looking at right now is John's email, direct email. You can contact him or mine, either one. If, and, again, even beyond just the security conversation, if you're needing some help, from an IT standpoint, I can certainly help you with that. But, John, before we kinda close out today, is there anything we didn't cover or anything you'd like to to to reiterate from the presentation? No. I I I think, the the main thing for me really just, thanks everyone so much for for joining us and participating in all of the polls. That made I've personally, I feel like that made the the webinar a lot more eventful. So I definitely appreciate everyone's participation. We had a lot of people, you know, filling out the questions and whatnot. So thanks again, everybody. Yeah. Well, thank you, John. We really appreciate it. And, again, everybody that was joined, you know, again, from a gift standpoint, there'll there'll be some gift cards coming out to to some folks that were first to join, and then everybody that participated today will be in a raffle. So if your name is drawn there, you'll hear from us soon on that. But it looks like we had people from all over the country join us today, over a hundred and fifty some, folks. And so, again, your time is precious. We really appreciate everybody joining. Thank you, John, again, for your expertise and your partnership with Innerworks. And with that, everyone have a great rest of your day, and we will talk to you next time. Thank you. Thanks, everyone. Appreciate it.