my name is grace jacobson, the director of operations group, and i'm k entity, south task stream, audience, a bench for me. thanks for having me. on m. k. tell me more field chief security officer for the americas for palo alto networks and also retired the special agent to handle. so i know you're going to have questions. if you're watching on youtube, you can put your questions or comments or concerns to i. cybersecurity experts. jump into the comments section. i be part of today show. let me start with katie and jeff, this is a question for all of you. i really want to understand what actually is a run. so where attack they take many forms, case east on. yeah, i think what you brought up the beginning of the show. a great example last are and there's this message. and ransomware attack is when an adversary logs into a network, they gain illegitimate access. and they basically say, unless you pay us, you can't get your files back. that's a traditional ransomware attack. but what we've seen as these adversary is, are changing things up a little bit. and so for example, increasingly in the