In this episode of Security & GRC Decoded, host Raj Krishnamurthy, CEO of ComplianceCow, sits down with Carlos Batista—former CISO and AWS Security Engineering Leader—to explore the evolving landscape of security, governance, and risk management.

Carlos shares his journey from leading security in highly regulated industries like banking and energy to championing large-scale security engineering at AWS. Together, they discuss how effective GRC programs can move beyond “checkbox” compliance to become true business enablers—accelerating growth, deepening customer trust, and supporting innovation across the enterprise.

Key takeaways include:
✅ Security Awareness & Practical Investments: Why Carlos believes traditional security awareness can be overrated, and how investing in secure-by-design infrastructure may deliver more value
✅ Third-Party Risk Management: Insights on why TPRM remains fractured, and what it’ll take to move from endless vendor questionnaires to streamlined trust and assurance.
✅ CISO Stress & Leadership: How security leaders can manage the personal and legal pressures of the role, build credibility, and foster healthy collaboration with engineering teams.
✅ Future of GRC: From infrastructure-as-code to automagically patching vulnerabilities—where Carlos sees security, compliance, and governance headed next.

Tune in to hear practical insights, real-world strategies, and a fresh perspective on the intersection of security, compliance, and business success in today’s fast-changing regulatory landscape.

🎙️ Security & GRC Decoded is brought to you by ComplianceCow.

Make sure to like and leave a comment to let us know you’re enjoying the content!

Subscribe now for expert insights from industry leaders shaping the future of security & compliance.

🎙️ Follow Carlos Batista:
Stay connected with Carlos’s insights and experiences by following him on LinkedIn: linkedin.com/in/carlos-m-batista/

Chapters / Timestamps (Approximate):
0:00 – Show Intro
0:30 – Meet Carlos Batista
1:07 – Retirement, traveling, and picking up new hobbies
1:56 – Carlos’s “unpopular opinion” on security awareness
5:47 – Third-party risk management: why it’s still so fractured
11:03 – The stress of being a security leader (and tips to cope)
27:51 – Building a business case for GRC: data, options & credibility
46:29 – Encryption and why we may not need to encrypt “everything”
47:39 – The “dream” security solution: magical patching & beyond
57:17 – Must-have resources & the power of a strong security network
59:56 – Life after CISO: hobbies, health, and staying curious

uhhuh uhh [Music]

welcome to security and GRC decoder I’m your host Raj Krishna morti today we are excited to have the multifaceted Carlos

batitas with us Carlos has had an incredible journey um from serving the United States Marine to Leading security

teams as a two-time ceso and also transitioning into software engineering and development roles in uh in AWS caros

super excited to have you with us welcome hey thanks a lot Raj it’s really great to be here I’m excited to be a

part of the show thank you and so you are retired right now and how’s that going I’m more than

retired right now I’m retired Forever at least that’s the plan and it’s going it’s going fantastic Raj uh it’s been

just over six months and so I am I’m having a great time traveling spending a

lot more time with my wife who also retired three months ago and we’re just having a blast doing again doing a lot

of traveling we love a number of hobbies which we’re really totally diving into like we’re playing more tennis and we’re

reading a lot more so it’s it’s been great Raj um it’s so far been the the

best decision professionally and personally in my life love it love it Carlos I’m I’m I’m going to start off

with something maybe let’s start something different something controversial what is your maybe unpopular opinion about security why

don’t we start with that oh man so you’re going to put me on the spot right at the Geto um okay unpopular opinion

okay so if one jumps out at me and yeah this might be a little controversial or

provocative but I am not convinced that security awareness really delivers all

the value that I think we hope it should it it and so I think I think what I’m

saying is that maybe security awareness is a little overrated and that might be

I don’t know maybe that is a little provocative so let me sort of nuance that a little bit like what I’m what I’m not saying is that security awareness is

useless uh I think you absolutely have to tr have to teach your employees

certain critical things about how to work with your team so for example how to report security incidents because

email is still like very sort of like there’s very much a human factor there you have to sort of teach them how to

use email safely but I have I guess my perspective is that I I would almost

prefer to invest dollars that might have gone into having like a worldclass

security awareness program into actually making the technologies

that they that that your employees integrate with uh as safe as possible and the analogy I like to use is a light

switch so you know today like I fig I don’t think you can see the light switch in that’s right next to me here but

basically um I don’t have to receive training on how to use a light switch safely to prevent from electrocuting

myself engineers and folks who built them built these wonderful things called face plates that help ensure that you

don’t electrocute your yourself when you use them I would prefer to invest

security dollars that are very tight usually into making our tools and

Technologies laptops servers things of that nature safe by default so that

employees don’t have to think about that now you still like I said got to do security awareness because there’s some

things that you can’t put face plates on like email but I would my argument would be that I don’t know that it makes sense

to hire you know like to have like a a major production come in and run do a security skit for your employees and and

spend you know like 5 10 15% of your security budget when you can use those

assets or those Investments to harden your environment to keep your user safe by default does that does that does that

make sense that absolutely makes sense I um I think I’ve been one of those on the receiving head trying to take these

trainings and I you know it’s sort of very painful sometimes yeah and I mean some of them are actually pretty

entertaining I mean if you’ve seen some of them out there they’re really engaging uh they’re they’re almost like

right out of like the office or something like that and you literally wind up laughing but they’re not they’re

they’re not cheap either and so I I think there’s things that you minimally have to do either because it’s the right

thing to do but sometimes and more importantly because compliance or other regulatory regimes or even customer

contracts require that she do a certain base foundational set of security

awareness I would try to find out what that is make sure you do that and then

before you spend a dollar more ask yourself could that dollar be used to

better Harden the thing that you want to train your employees about so that they can’t make that mistake in the first

place that’s that’s my that makes sense makes sense what is something about um

what we are doing in the industry that has surprised you offet well good question like I’ve I I

have actually been out of like security as my full-time job for almost two and a

half years so I I left uh being a sizo when I joined AWS to go lead some of

their security engineering teams within their their AWS Services um but I think

the thing that really has surprised me the most and and not in a good way is

how fractured third party risk management continues to be I you know I

I still try to keep up with what’s going on and it’s still very evident that security questionnaires still are the

sou theour for how to largely assess a a vendor’s security Readiness to be a to

to be used within a particular company and when I left I it was right around the the very beginning of where I guess

trust centers were beginning to really take a hold as a means to sort of

provide that awareness in a more automated uh online way for poti buyers

to understand where you’re like where you are from an insurance perspective and while I think there is some Traction

in that space Raj I I don’t see it be having the the level of trust you know

unfortunately that I think I would have loved to have seen where whether you’re

a large bank or an energy company or a highly regulated customer of some kind you’re you’re generally able to sort of

absorb those artifacts out of a customer trust Center in some sort of automated fashion and make a an assessment without

sending a bespoke you know three four 500 question questionnaire which is

still I think I think is still you know pretty unfortunate got and and how do you how do you see this um across

Industries and how did you get this perspective um you know it’s funny I

I’ve been on sort of both both sides of the coin I spent the the early the the

earlier half or the first half and and plus of my career in these highly regulated

Industries I spent nearly 10 years over at sunrust Banks now called shist uh one

of the largest banks in the United States uh I also spent some time with GE energy again two highly regulated

businesses and anytime that they are out there to buy anything you have to like

go through a pretty rigorous and robust security regime to ensure that your product can assuredly do what it says it

can do and do it safely so as a buyer I I got to really sort of dive

into what are all the security controls that these vendors or potential vendors have are are they meeting the bar from a

security perspective and it’s when you’re a large company you’re able to sort of really poke these vendors to

make sure that they’re doing the right things and I think that’s a net positive for security on the other hand I spent

the latter part of my career of my security career as a buyer I’m sorry as a vendor working for startups and so

it’s a whole other side of the coin where you’re not a large company with a

high degree of I guess what I would call negotiating like Leverage to be able to

say do whatever you want and so you wind up being the recipient of all of these uh third party risk questionnaires which

if you’re doing enough business can drive your GRC teams wild having to respond to all of them in a bespoke

fashion and making sure that you’re answering of course truthfully but also consistently

across all of these different items and that you’re managing all of the the inevitable follow-up conversations with

each of these prospective buyers to ensure that they’re satisfied with how you’ve answered all those questions it’s a difficult problem to scale to and so

it’s you know again I’m hopeful that the third parties uh that third party risk management will get better I think

there’s a lot of interesting new players in that space who are trying to sort of tie that together to make that Journey

easier both both for buyers and sellers but it’s still a little bit surprising in me Raj that

it’s so fractured as it is today I mean like what’s what’s your perspective um no I I totally agree with

you and I think there’s a lot that needs to be done there I think there’s a lot more progress happening but more to more

to accomplish in that space and I think the large language models and some of the sort of the upcoming Technologies

are certainly going to help in in some of what you’re talking about yeah like I mean you mean like being able to like

use an llm to respond to questionnaires or also to digest and summarize

like okay absolutely yeah um you um you

have an illust had an illustrious career Carlos you’ve been a two-time ceso what do you see as the reality of being a

security leader that most others don’t see I think the thing that jumps out at me is most people don’t realize

how stress or the job that can be for every for everyone in the security organization

but I am speaking specifically towards the like the leaders of that security or

there’s a tremendous amount of pressure to ensure that you and the business are

doing all of the right things to prevent yourselves from having a a a disclosable

incident of some kind and so I think because of that I think unfortunately a

lot of Security leaders really struggle with the stress of being in that role

because it’s a role where in most cases you are you’re pushing a big snowball up

a hill to get the support that you need to make the changes and and the like the

implement the programs that are needed to in your estimation and your team’s estimation to properly protect the

business from a variety of different threats some of which you might control and some of which you don’t and so I I

know that I’ve I’ve gone to B wondering oh man this new threat is out there like what’s the impact to us are

we going to get hit you know like the ones that always jump out at me are these big sort of like third party

incidents or cdes that affect you know infrastructure that you might run and it’s like oh man like okay great I just

learned about this tonight we know that this is already being exploited in the wild am I hit like that’s a that’s

that’s stressful and it’s definitely something that every security leader

needs to learn to sort of accept you know that hey like you’re you’re in a role that you know has a a little bit of

a I guess of this sort of like risk of thinking through like this type of things that can happen to you to the to

the business and so and I think unfortunately another thing that’s sort of come of that is their you know

Security leaders particularly czos now have to consider the potential for

personal or legal liability from you know based on how like the decisions that you make or don’t make during an

incident or or leading up to one so that’s certainly something that you know every security leader needs to think about um there are obviously ways to

help mitigate that through things like dno insurance and other things but it’s

it’s certainly a stressful role that I’m not sure you know a lot of folks appreciate but it’s it’s something that

I I certainly have thought about and struggled with personally no thank you thank you you’re absolutely right um I

think I had an opportunity to read in Flight about the um uh the state of New

York versus Timothy Brown on solar winds it’s it’s unbelievable the level of stress that you like you talked about

that’s on Security leaders today yeah it’s see you know it kind of puts it puts some Security leaders in a

you know a position where they they need to ask questions that they never really had to think about before like hey like

what you know what legal protections do I have from the companies I work for do I need to consider my own personal

liability protection in case things go aride I mean the Tim Brown case is an obvious example there are others of

course so it’s it’s something to consider now do you see this varying the

stress levels varying across Industries you been in different Industries do they remind the same they go up or down

what’s your take I didn’t quite get the first part of your question Raj you the stress levels and the as as a

security um I mean so I I feel like

my my personal take is the overall stress level I don’t think changes I

think what changes is what you’re stressed about okay and so I you know in

some of like larger more highly regulated environments or financial services environments I was you know

there’s there’s a level of stress or kind of dealing with the constant the the audit and Regulatory Frameworks and

all of the various constituents that want to evaluate your security and so if

you work at a large bank you probably have to deal with internal Auditors external Auditors internal operational

risk Regulatory Compliance and Regulatory audits you’ll have to deal with your board and so and that’s to say

nothing about Finance or other groups that also want a perspective on your security program and so you have to

manage those relationships and and that work carefully because if not you you you run the risk of spending more time

talking to about your security program than actually leading the organization

and essentially delivering the program and so that’s that’s a challenge that a

lot of a lot of leaders um especially those in like in highly regulated environments have to struggle with on

the flip side and I’ll sort of be brief here when you don’t have that like really big like sort of regulatory

framework you probably don’t have the resources you don’t have as many resources at your disposal to affect a

strong sec program so you’re thinking more along the lines of hey are we doing all the right things to keep bad guys

out we’re trying to move super fast as a startup company you know I don’t want to say we’re taking shortcuts but we are

moving fast and so you need to like you’re also thinking very very

thoughtfully about how do I may help the the organization and the business make the right choices around

security without imposing a level of friction that essentially halts or slows

down the the ability to gain and retain business so it’s a whole other sort of thing to think about and how do you keep your

team motivated through this yeah you got to understand your team um this is just my opinion I I I

feel any good leader takes the time to get to know their team um and not

necessarily like being buddy buddy and like you know going out for drinks all that or at all but but understanding

what really sort of like makes them happy what are they driving to why are they in this job what do they want what

makes them happy and and that changes from person to person for some folks it’s you know hey I want to be

challenged I want to do complicated thoughtful like Innovative work for others it’s stability I want to be able

to just do it do a good job for a place that’s going to you know make sure that they take care of me because I have a family to feed and a family to take care

of for others it’s money and that’s okay you know we we kind of talk about oh you

know money shouldn’t be it’s okay to say I’m motivated by compensation that’s perfectly fine understanding what those

things are I think is really vital for a need effective leader sort of like drive

to keeping the team moving forward and so once you sort of have a sense of what

those things are you look for those things and opportunities that sort of appeal to those motivations to help

Inspire the team as a whole towards moving to whatever goal you’re you’re trying to get the team to towards moving

got it got it and how do you so I I think one uh in all this you’re not just talking about defending right you have

to also deliver value how do you how do you manage that Carlos and how do you know that you have arrived man that’s a

that’s a really like tough and tricky one um I think I learned so much more

about what it means to really deliver when I moved over to AWS and I I was now

expected to deliver product features product releases on a timeline so when

you have a big conference like AWS reinvent there’s

some certain releases that tend to happen around that time or before that time and so it’s a pretty clear line in

the road of where what you’re trying to deliver to so think so one of the things that I really sort of got to build some

some muscles on was sort of delivering on a very tight on very tight timelines

and and and through that in order to be able to do that effectively you’ve got to build and have engineering discipline

like really understanding what it takes Raj to build something and build it like

how long is it going to take to build this new API um and so in my pure

security days it might have been okay for a team to say yeah we think it’s going to take us you know couple Sprints

to build that API tested and and release it into prod and then you get into the weeds and it’s like oh my God it’s

really like eight weeks because I didn’t properly we didn’t really think about this particular dependency or this other

team that needs to review things before they anything gets loaded up on their API Gateway or what have you and so

that’s the I think that’s one of the things that I I I felt that I really had to sort of like figure out with my in my

time of AWS is really understanding and Diving deep into when Engineers say x

amount of time okay walk me through why we think that’s the right number because

there aren’t too many many opportunities to like add slack to a project you know

once you got things right now what I will say and I loved this about AWS was

that security was truly job zero okay you know what I mean by that is I mean

everything I just said about delivering things on a deadline super important no

one baded an eye if something needed to slip because of a security problem it

was it was always the best decision to make sure that hey we need to get that thing done securely and so that was um

that was great to see from my time there and I I I don’t necessarily want to turn this into a like an AWS love show but

that’s something that I definitely really admired and appreciated about AWS and how they think about security

engineering as it relates to security which is something that is candidly a bit of a you know can be a challenge in

other organizations where you know you will get tough questions or about like well can that can we fix that security

vulnerability in a followup release or a fast follow and the answer may still be no we have we have to wait but there’s a

lot you may have to sort of manage that conversation a little bit more actively got it and how do you

see the what do you see as the role of governance risk and compliance as we talk about this guy from a security

perspective as a sizo I always thought of GRC as the foundation of the entire

security program you you can’t yeah like you really can’t the whole point in my

opinion of GRC is you know first and foremost to set the bar to understand

what is the company’s risk tolerance as it relates to cyber security risks where

the business is in relation to managing those that those tolerances so putting

together a maturity assessment to understand like where you are compared to where you think you should be and if

you don’t have that like I I feel like a security program just sort of running around like the blind leaving the blind

a little bit you know like you’re you don’t know what’s good enough so then you’re going to have engineers and

others on one day or managers on one day just going of going you know hey I think this is what we should do from a

security perspective and then two weeks later for another project it’s oh I think it’s this thing over here and that

leads to confusion it leads to Lost trust across the engineering teams as a

whole because they see you as like sort of evaluating things with a different perspective you’re going to get asked

outright wait a second you just told this team over here that they didn’t have to do all that and now you’re

telling us that we’re doing basically the same thing you’re telling us that we have to go do that um that’s that’s not

right and so you’re going to wind up losing credibility with your stakeholders uh so to me governance is

kind of where the where it starts you know they’re the team that that UND you know again working with the technical

peers and security working with engineering and it and most importantly working with the business line as well

and top management to understand hey this is where we need to be and understanding that what was good enough

at one company may not be good enough at another or may be candidly too good at

this particular company and so that’s the that’s the job of a strong GRC leader is to help the sizo

and help the executive team understand what is the bar based on current threats

current risks and where the company’s sort of like what the estate looks like uh from a security perspective got no

that that absolutely make sense and so I I think I’m sure the listeners are the question that is running through their

mind is how do we Define this good enough is that any any advice it’s it’s

different from every other sort of like company or business and I I think again

it sort of boils back down to understanding what is the company’s

tolerance for for cyber risks so one thing that’s sort of helped me is rather

than walking into a meeting with a COO or a CFO or the CEO and saying hey what

do you think our cyber risis tolerance is probably I mean I don’t know maybe it goes far for those but I what I have

done instead of doing that is I’ve tried to come in with some understanding of what the business does into those

conversations so meeting with the cfo’s direct reports a couple of them or a few of the chief Revenue officers reports or

a few a few of the other CEO directs in engineering and it and try to understand

the business and understand the technology and have a perspective to walk into the the cfo’s office I’ll use

just pick on that for on that role for a bit and say hey look I’ve been here for 4 weeks 6 weeks whatever the number is

here is my sort of here’s how I think our views some of the most critical risks to this business what’s your

perspective on that and then kind of getting from that from that point of view hopefully by then you already have

some opinion on how the company’s security maturity is going so you’re doing you’re assessing what identity and

risk looks like what the governance program looks like you know sort of vulnerability Management program is in

place Etc incident response and it’s from that that I think you can come into

that conversation and say look okay great I think we’re aligned or maybe we’re not and that’s okay I from my

perspective I’m going to do some more digging because I do think that we have some you know potential gaps to what we

think those risk tolerances are and what I’d love to do is come back to you and the rest of the executive team and walk

you through that person perspective because as we look into the remainder of

this year or even next year if it’s budget season I want to make sure that I have your alignment on how we sort of

think about our security Investments and program to help align with those risks because um we we may need to make some

changes we may need to do some things that we’re not or stop some things that we are doing all right now and how do

you communicate those security needs to those Executives to those to the board

uh in addition to what whatever re talk to about yeah like um so I mean one one

of the things that I look for from my leaders is options you know so like it’s

very easy to come in and say hey this sucks right like I mean we’ve done it

before like that’s terrible why are we doing that great okay and it’s it’s less

easy to say here’s what we should do and that’s great that we that folks

do that too but what I like when it comes to like all right we need to spend money maybe a lot of money to fix this

or hire people what’s even better sometimes especially for the for the tougher problems that have more

ambiguity or greater cost is to come in and say here’s the problem that sucks

and here’s like the the best way the the Cadillac Escalade way to fix that

problem and here’s the you know perhaps maybe the the Lexus or mid tier uh and

then if we have to here’s the um you know Economy based vehicle way to fix

that issue and then we can also always just do nothing but then talk through like what are the benefits options the

pros and cons if you will yeah exactly of like what okay well this is what we get out of doing that this is what we

get out of doing that so that we can come in and make rational decisions

about what to do and then through that what I’ve what I’ve tried to do particularly in my in my two sizo roles

was I I try to sort of like figure out like how do we take these risks these

Topline sort of material fundamental what I you what I would call existential risks to the business from a

cyber perspective and how do I sort of model or quantify some of those risks I

mean it’s easy to say well the likelihood of that risk is low but the impact of that risk is high great that

works for a lot of folks what I prefer to do is try to model or quantify that a

step further can we even though there is some ambiguity it’s not perfect can we

somehow come up with a some some kind of a percentage around what that likelihood looks like can we identify based on you

know conversations with Finance conversations with legal can we identify a dollar value or a potential dollar

value of that bad thing happening and then through that you can then sort of

pivot off of how you feel about your controls around that thing and then do some you know some basic modeling you

know so you can do something like a like a Monte Carlo simulation to sort of take a thousand different scenarios of the

bad things happening and looking at all right are these are these risks really

fundamental and are they really low low likelihood high impact based on those

things and so at the executive team level I’ve I’ve always felt that Executives tend to

appreciate the that level of diligence or rigor around sort of how to how to think about

those risks rather than just coming in with a a nine box diagram um and so that’s that’s kind of

how I thought about it Raj um now having said that when I’ve talked to the board

I have found that it actually you actually do need to find a way to synthesize that back into something

that’s a little more quickly digestible by a board audience typically a sisso

most you know might get somewhere between 15 to 30 minutes a quarter maybe a month with the board point is it’s not

a lot of time to walk them through a complicated quantitative risk model listing out your risk register and all

these different possible things that can happen sort of like really speak to those big existential risks you know six

seven8 nine maybe and talk about those at the board level and yes perhaps using

some kind of nine box based on your quantitative model I think that’s

brilliant actually a brilliant to look at it so start with a quantitative model

but simplify it and bring a qualitative approach to this as well so that people across the broad can understand these

risks and relate to these risks beautiful I’m going to flip the question the other way as a sees so what

information do you want to be presented with and what typically do you see as the challenges when when you get this

information yeah I I I like I I think the thing that jumps out at me is the again making sure that you’ve thought

through multiple approaches to the problem so I mentioned different options

for different types of problems it sort of shows me that you have um you’ve sort

of like asked yourself the tough questions about like is this the right thing to do so it’s I’ve done it I’ve

I’ve seen a problem and said oh my God we have to fix this by doing this specific thing and it’s so it’s very

easy to arrive to that and there maybe a number of biases that sort of drive you to that I think sort of challenging

yourself with wait are there other ways to fix this issue I think is a is something that I particularly value from

my engineers and leaders and obviously coming with data so instead of just saying tprm is broken well okay great we

I think we know that tell me why how long is it taking us on average to respond to a customer questionnaire how

long is it taking our own diligence when we evaluate our own vendors um what can

we and then what can we do to bring that bring that number down what are some different options that that we have so I

tend to appreciate data and options when having uh when I when I think about the

the data or the things that come from my team because we are in the risk

management business not the risk avoidance business there’s no such thing

as that and so being able to be thought like thoughtful and critical about our own sort of perspectives and biases is

something that I’ve always appreciated from you again my team got and how do

you for a security manager or a GRC manager how can they go about building a

business case for budget and resources as they you know and as a leader what would your sort of can you give us some

tangible advice in terms of how we can think about it uh yeah so I think like I like I said earlier I think one of the

biggest most important jobs of a GRC function and a security team is to sort

of set the bar and so understanding all right these are the risks that we have this is where

we are in terms of managing those risks and here’s this Gap how do like the the

the GRC teams that I see that are really good at that are really Adept at describing what that Gap is and how this

thing helps close that Gap so in the you know some of the like the last couple

scissor roles that I held what we would try to do is illustrate how that

quantitatively and say hey look we take making up a number $100,000 and we spend

it towards solving this particular security problem with tools process people here is how we feel the

likelihood of that event might change or how the impact of that event might

change because we’re able to detect it sooner remediate it sooner so the blast radius is perhaps a little smaller

that’s the thing that I’ve I’ve noticed that I think GRC teams are that are good

at at sort of selling are really that the other thing that I think um is is I

be super gifted and um like I almost want to call out one of your previous

guests um mosy plot uh for doing this uh super well was really understanding the

voice of the customer so like mosy and I I had I had the privilege of working with mosy at a

company called bettercloud and mosy led all of GRC for for bettercloud and one

of the things that he was just brilliant at was uh talking to customers about what do they need and

and sort of fing that as a great feed feedback loop into the strategy the

security strategy of the company to sort of feed them like hey you know um we probably can you know we’re getting

really good feedback from customers and Prospects that we should really be think

thinking about Key Management perhaps in this way or logging and monitoring in

that way or identity in that way you know are these things worth considering

and so having customer signal I think is vital for for GRC teams to sort of add

as another sort of thing in the toolbox when you thinking about what to invest in or how to get um how to get support

for what that GRC function needs they feels they need to achieve their mission

or to enable the business no I I love what you’re saying I think basically I mean the idea that you can reinforce GRC

teams can reinforce the security team even in building a business case right and throughout the process I think it’s

a sort of a brilliant way to think about maybe how we can build a better business case how we can create much more

tangible outcomes yeah and it also it also increases credibility with the

business when you’re taking the time to understand customer

signal and so because it’s sort of like it positions the GRC function you mean

the compliance people the audit people like they’re actually talking to our customers and understanding like what

they need to adopt our product more or purchase us that’s pretty powerful and

it definitely opened a lot of doors not just for for mosy in the specific instance but also for for me and the

rest the our security team uh when the engineers knew that hey like you’re

somebody who who understands the technology is customer focused or

customer obsessed to use the Amazon uh speak that really speaks a lot to the um

Again The credibility of a GRC leader when they’re willing to sort of pick up the phone and talk to customers not a

lot of gr folks do that got you you um um so you have a very interesting set of

experiences Carlos you have been on the you have been a security practitioner you’ve been a c so you’ve also been a

security uh um sort of on the engineering side right software development and Engineering how do you

build trust with the engineering teams it takes time it’s a it’s it’s not

something that comes overnight engineering teams have a lot on their

plate they’ve got got they’ve got a ton of stuff to build not a lot of time to build it and and

they being a little provocative here they often don’t have the time to answer a bunch of security questions from the

governance and compliance team and so I I think like one of the things that

really jumps out at me in terms of how to build credability is transparency you

know like we we um there’s a lot of audits and things that come from the

various these various funnels right so customers and prospective customers you’re always going to get inspected by

your customers all the time in one way or another with a few exceptions but one

thing you’re always going to know especially if you’re in a B2B business or a SAS business is you’re probably

going to have pretty good line of sight to when you’re going to renew your sock 2 type 2 to when you’re going to uh when

it’s time to renew PCI compliance or when you’re going to have um a regulatory audit you know from the

Department of Financial Services in New York because you do business in New York you know when these things are going to

happen you might even know when some of your biggest customers are going to audit you because you can reach out to them and say hey for 2025 are you going

like can you tell me like roughly like your Rhythm for audits for next year and so with that one of the things that we

tried to put together back that which I thought was fairly successful was we put together a an audit calendar wow um for

the engineering team um and for ourselves so we understood like what the

you know like like the the Rhythm was going to come in from all these different types of audits but it’s super

helpful to understand what that Cadence is going to look like and when you share with the

engineers and you say look nine months from now I’m going to need like you know one of your engineers for a few hours a

week for for two or three weeks to help answer a lot of these questions that

that helps buy some credibility and some trust that you’ve you’ve got your back together and you’re not a GRC leader

running around like a chicken with with it head cut off doesn’t know what’s going on and is constantly just coming

in with the fire drill of the week on some audit that needs a question answered by Friday at 400 p.m. and

that’ll work a couple times but do it enough and you’ll start to lose friends in the engineering side so that’s one

thing that jumps out at me Raj uh the other thing is the GRC folks that I

think are really successful with engineering teams take the time to understand the

tech got it you know like take the time to understand hey like if you’re running

a microservices environment on Spring brute or something like that or on kubernetes that you take the time to

understand kubernetes fundamentals that you take the time to understand you know what a devops pipeline looks like and

how could a GRC function potentially integrate with that or ask questions of

that pipeline without having to go pick up the phone or slack and and ask someone a question those I I think in in my

experience or observation engineering teams appreciate when they don’t have to dump

things down or distill things you know at a super super high level and can speak to you on their terms and you get

it uh like you don’t have to I’m not saying you got a no jva and you’ve got to like like truly understand every

possible component of the k8s or kubernetes ecosystem system that’s not what I’m mean but like understanding

like what the fundamentals are in in in your whatever your your engineering

team’s stack happens to be boy you’re going to get you’re going to win a lot of points pretty quickly and it I I

think it helps to relate with Engineers fairly quick you know quickly as well right and understand their pain

points yeah it’s just it’s it’s it’s it just makes the conversation go smoother and I mean similarly like you

could almost make that same argument with uh AO speaking of Finance speaking

of marketing like no you don’t have to know how to like file the the the quarterly

statement you know for for the business but you do need to understand you know a basic balance sheet income statement you

got to understand like basic fundamental Financial questions about how the business brings in money and how they

think about that Revenue stream you know so you know basic concepts like ARR and whatnot it makes sense to understand

those things because it makes the conversation just go better absolutely absolutely um where do you see the the

industry heading and how should Security leaders you think should adapt to The Changing Times that’s a good one um oh

so I mean obviously AI is a thing we could probably have a whole other conversation about that I’m not going to

spend too much time there AI is changing everything including our space we got to

get smart about it full stop so moving along the the other thing that is sort of a minor thing that I think I think

folks are beginning to understand but let me not is what I call click Ops or

that’s not just my term it’s been around um is kind of going away and what I mean by click Ops is this sort of like it’s a

sort of like a jargon to say hey like doing things via like implementing changes in production via the console

via a graphic user interface or even the command line just you know popping open a shell and adding typing a command and

doing something that’s going to largely go away in favor of um infrastructure is

code policy is code where you’re actually creating a a PR or a CR that

gets reviewed by multiple folks and commented on and merg into some devops pipeline to implement that change

because especially as we continue to sort of shift towards the cloud or at least shift some workloads towards the

cloud that’s really the one of the best most fundamental ways to assert that

changes are or if not immutable less mutable because once that pipeline runs

again it get things get reverted and so the that’s sort of my take on that is if

you’re a someone in security who’s been doing this as long as I have you probably need to start understanding and

learning about how to automate changes to devices to infrastructure through

code um versus you know making changes in a console somewhere at better Cloud

even identity specific changes went through a PR like if you needed access to gcp nobody’s going to another console

and adding an I am user for you and adding you to some role like that’s we just didn’t do that um those changes

went through a you know PR process reviewed by at least one other person on the engineering team and merged in um

and so that’s you know just that’s just how I think the the industry from an infrastructure perspective and maybe

even from a GRC and identity and other point of view is going too no I think

that’s brilliant how do we from click Ops to getups is what I’m hearing that’s

brilliant right yes I love that that’s that’s exactly what I mean Raj I I I hope it’s

I think things are going in that direction and so I’m I’m I’m a big fan of it I’m going to use thats the good

Ops um I I’m going to ask you to we your dream hat on what would your dream

security solution look like maybe you can take a very specific example A Dream security solution so

like what do you mean like I I can I can just invent something and not worry about like anything like just money Mone

like money is No Object I can just man uh I think we’ll suspend reality for the

time being so yeah it’s like I’m trying to like okay let’s have um let’s think here I

think if there was one thing that jumps out at me is I’d love to be able in addition to like solving tprm but I

won’t get into that is I’d love to be able to solve vulnerability

management I I I just you know thinking back to when I was doing this stuff the amount of calories that my teams and I

and infrastructure engineers application Engineers governance folks would spend

responding to and remediating the constant plethora of vulnerabilities that would come in I think I try to

figure out a way to automatically like when a cve comes out just instantly

patch everything or reinstantiate everything running a like a um a

non-vulnerable version of the thing because we just spend so much time on patch management and and not just from a

perspective of patching the things but also talking about what we’re doing like

I the the one of the things that that drove me wild near the end of my pure security career was every time a like a

big sort of like new cycle vulnerability get got out there was the inevitable like 30 40 50 different inquiries from

various customers asking hey have you seen this vulnerability that just came out today can you tell us about what

your current exposure to that vulnerability is if you’re exposed like when are you going to be patched and what are the things that you’re doing to

mitigate your exposure while you’re waiting to be patched and can you let us know when you’re fully patched and then and so that’s a lot of

churn and Bing in the nice yeah I don’t know how how I would solve that um I I

think the it’s again I feel like just sort of throwing reality out the window if there are a way to either

magically uh patch or remediate things as soon as they came out without any impact any impact to uh production

availability I think that’d be pretty cool and interesting or if there are a way to at least immediately say all

right in my estate I I run open SSL whatever. blank but it’s this issue is

non- exploitable in my environment because at X Y and Z other mitigating

controls and I only need to worry about this small portion of my environment and I go patch that immediately that’s that

those are the things that would be interesting in me Raj um I’m curious what about you like what’s uh what would be your dream solution besides the one

that you’re building which no I I think some of what you talked about is very very close to our heart I so essentially

we believe that GRC is an observability layer for security some of what I mean and it’s a onew punch for us and if if

if we can automate infrastructure as code and we can do cloud formation templates and kubernetes manifest why

can’t we automate Services right whether it is GRC Services whether you’re running an assessment whether you’re

collecting evidence whether you’re creating a graph model whether you’re asking questions whatever they are right

why can’t they be automated as code as well right and why can’t they run through to your point from a click Ops

to a gitops model is I is something that we are very very passionate about that allows you to sort of make it much

faster reduce the cost the incremental cost of getting these things done and most important brings the team together

right whether they are Engineers working on their sort of job right and and to how do you sort of get all the way from

there to the Auditors for a much more effective risk assessment at the speed of devops um I I certainly would love to

live in that World um so it’s it’s a tough problem I I mean I I recognize

that it sounds like you do too it’s just I I just hen back to just the amount of energy that we would put into just

maintaining a a strong a strong posture from a vulnerability management perspective in light of the just the

bombardment of cves that just constantly come in it’s it’s a big absolutely you’re absolutely right um um we started

with a provocative question do you have any other uh unpopular opinions

that oh oh man so okay so I’m just going to be super like unpopular on this podcast and it’s fine um but the thing

that while I was thinking about the awareness question or the awar unpopular

opinion I H I don’t know I have I I almost want to think about this more but

I am I am not completely convinced that we

have to encrypt everything you know it’s a it’s sort of like one of

these you know it’s one of these being provocative yeah well it’s I mean think

about it like I mean so I mean there is a performance cost to encrypting everything but there’s another cost too

and that cost is around Key Management right like you’ve got to protect the keys you got to store them somewhere you

got to rotate them uh you’ve got to protect how you call them in your code

um and Sue and and not everybody does that and that’s just you know the way it is and so it’s like it’s it’s just easy

to say it’s just easier to encrypt everything right but it’s maybe not like

and so this is again where governance I think has a really good say here to say what the bar is yeah maybe maybe you do

need to encrypt uh all of your like customer data with pii do you need to

encrypt the pencil sharpening system or the lunch menu application or maybe not

because the cost to sort of manage all that encryption over time just may not be worth it and then also even if you

are encrypting make sure that that’s not like the fun like the the the only real

pillar of your security program because let’s face it in many breaches where the

bad guys get in they typically also get your keys uh not always but you know if they

have root in your like Cloud environment they might also have access to those

keys to decrypt everything uh now there’s there’s exceptions to that you know if you have a you know fips 41 you

know like fips 142 I mean level three uh HSM you you

hold you you you you control your own keys in your own on-prem environment maybe a different story uh but it’s just

you know you should be thoughtfully asking whether or not it’s worth it to

encrypt everything got it and and how do you convince if if we can extend that question how do you convince your

Auditors when you take a provocative stand like that it’s uh so again it boils down to

your your governance program Auditors aren’t there to necessarily tell you

exactly what to do in my experience Auditors are there to ensure that you’re doing what you say you’re

doing they’re auditing your program not necessarily the the veracity of the

controls you chose that’s that’s been my experience unless you’re doing something that is just completely Beyond The Pale

you know like uh well no we don’t give passwords to people we give admin to everybody and um we don’t really worry

about any of that that’s Auditors are going to have some like pointed questions about what are you doing but and so going back to your

question I think a a governance function with that point of view could say

something like well we have a security standard that said that classifies data based on certain types of risks and we

consider the pencil sharpening application to be non-public data and we

don’t require encryption on non-public data therefore this application doesn’t require

encryption that’s that’s one approach to sort of help defend why you wouldn’t do

that to an aor who would then come to M like audit your security program who would then look at these artifacts and

go oh yeah your policy says this your standard says that and you’re and what you’re actually doing it aligns with

that therefore you’re good to go um you are um an acious reader as I understand

uh uh I don’t know about that I’m read now that I that I stopped

working uh but I I don’t know that I’m not one of those like I think Bill Gates reads something like 50 or 60 books a

year maybe more um I’m closer to more like 15 or something not not not a

voracious reader but I will say that like being retired it makes it easier to

read more is there is there anything that you would recommend books podcast any

resources uh anything that you would recommend for our audience yeah like uh so today I just

finished the 3body problem by sishu um there’s a Netflix series on it

I actually saw it before I read this book The the book is fantastic I I’ve

already bought the the the other two books and they’re amazing uh but to and

there’s a lot of great books out there on cyber security and Leadership and um I won’t necessarily speak until like any

particular one but to answer your question more directly as it relates to security I think the thing that really

benefited me in my career was the was having a

network you know like but getting to know others in the industry getting out

there and building relationships with your peers with others that you may that

you see as aspirational peers with others that you can learn from that may be a little bit more Junior and I I’ve

to me that is the by far the most valuable thing that I ever had in my

career where I can reach out to my peers and say hey I I got this problem like

you know I’ll anonymize it to make to obviously protect confidentiality but the like how are you thinking through

this issue and there are a ton of uh slack groups Discord groups uh Reddit is

actually still I think fairly useful you know for a number of things in terms of

like understanding how others think through problems leverage those networks and build them you know on your own it’s

it’s going to become super valuable especially as you um uh I guess like uh

get promoted up the chain if you will at the sizzle level there are a number of

really good uh like you know closed slack groups out there that I still continue to be a part of that are

absolutely Tip Top in in thinking and being able to go to these groups with a fair degree of um

you know Charter House Rules or TLP protocol pick your confidentiality regime to be able to talk about things

fairly uh you know confident like like confidentially and get some really good

perspective on how to think about that problem that’s the thing that jumps to

me man is like build relationships build your network the problems that you’re dealing with someone else is dealing

with it totally no

absolutely no that’s brilliant how do you spend your retirement now Carlos um I so um you know it’s funny

like like I said I just H 6 months those first three months Raj I I got up like whenever I wanted to like at 10:00 in

the morning I’d like pour a big bowl of like frot Loops or Cocoa Puffs and just sit in front of the TV and just watch TV

all day and do nothing it was great uh now that I’m 6 months in I I definitely

find myself um wanting to sort of make sure that I’m staying busy and so what I

what I’ve fortunately i’ I’ve got a number of hobbies and things that I enjoy doing uh I enjoy like I said

tennis my wife and I we play a fair bit uh I enjoy trying to stay fit so

exercising I actually draw on my own uh so it’s um yeah I I I learned how to

draw as a kid and I picked it back up for real like in the last few years uh there are a couple other things I do I

you know I enjoy music I play a little piano or at least that’s what like that’s what I like to tell myself uh so

but yeah I it’s things like that that keep me engaged and keep my mind busy and going I I’ve also found that I still

I still love cyber security I still love technology and so I I I definitely still

you know find some time here and there to read about it stay on top of what’s going on I like experimenting and

playing with some of the tech that’s out there so you know I still maintain my uh my cloud accounts with AWS and I still

log in on occasion and puts around so I have plenty to keep me busy Raj um so

that’s that’s more or less what’s up to I’m super glad to get now do these Hobbies help you with your stress level

when you were when you were a ciso they did man um and that’s that’s

another sort of tidbit I would recommend anybody in in this business do is find

Outlets uh to sort of manage that stress because it’s very easy to uh you know

self-medicate or find other unhealthy ways to to manage you know through that

so for me it was always extremely therapeutic to to draw um when you know for example like

just to like it was just so relaxing and cathartic to just sit there and draw and then sometimes uh playing tennis you

know you’re mad at something or like frustrated about something at work you can get out there and just hit that ball as hard as you can and that’s another

way to relieve some some pent up stress so that’s that’s a that’s a I’m glad you

mentioned that because that’s a really I think important thing for anybody in security maybe even most Industries to

have is find an outlet find something that you love to do and and and find the

time to do that on your for yourself on the side got it got it and we almost at

the end of the segment Carlos and I I want to ask you any final advice words of wisdom for our audience and for

Security leaders out there I think what I just said might have been it um like really just sort of

finding that outlet uh for for what you’re doing I mean there’s a lot of things there’s a lot of sort of like

things you want to make sure that you’re doing around making sure that you’re you’re enabling the business you’re not

you know here here I guess I’ll put it this way the thing that I used to tell

my teams was that look the business has a choice in who and where they get their

security from it’s right now like they’re choosing to use us because we

are helping enable them to like grow the business achieve their mission

the the company’s purpose whatever that happens to be when we stop doing that

the company’s going to realize they have this choice and they can always choose differently they can CH they can choose

to have a a managed Services security provider provide all their security or Outsource the security team elsewhere or

just replace the team entirely um and that’s something that you know definitely a szo has to

consider I’ve seen SOS um walked out the door because

they’re considered blockers or just you know obstructionists is is the word I

use and so make sure that you think about that like the you know just consider that hey

the end of the day security is here to sort of help the business move forward

um not there for its own sake and I I think I think a lot of uh really smart

Security Professionals have gotten caught up in that trap in the past um um

to their detriment from defending to delivering as you as you said in the beginning

yeah I’m I’m super glad to have had this conversation Carlos thank you very much you have a great day no no thank you Raj

I really enjoyed this it was great to to catch up with you so I I appreciate it and uh thanks again thank you

[Music]

a

Listen on your favorite platform and stay updated with the latest insights, stories, and interviews.

CCM NERO graphic

Want to see how we can help your team or project?

Book a Demo