In this episode, Raj Krishnamurthy interviews Shobhit Mehta, Director of Security and Compliance at Headspace, to uncover valuable insights into the evolving world of Governance, Risk, and Compliance (GRC). Shobhit shares his controversial perspective on GRC teams overburdening themselves, emphasizing the need for GRC professionals to expand their technical expertise and embrace a product management mindset.

The conversation dives into proactive strategies for GRC success, the importance of integrating privacy into compliance frameworks, and actionable tips for achieving High Trust certification on a budget. Shobhit also reflects on how his endurance sports journey has shaped his approach to discipline and resilience in both his personal and professional life.

Tune in to learn how automation, innovation, and strategic thinking can transform your GRC efforts.

Key Takeaways:
✅ GRC teams often overburden themselves with audits.
✅ Embracing a product manager mindset helps GRC teams drive security initiatives.
✅ Technical knowledge empowers GRC professionals to enhance security programs.
✅ Changing perceptions of GRC within organizations is crucial for success.
✅ Proactive strategies can elevate GRC’s role and reputation.
✅ Integrating privacy into GRC frameworks strengthens compliance efforts.
✅ High Trust certification is achievable on a budget.
✅ Automation can significantly improve GRC efficiency and reduce redundancy.
✅ Overlapping audit timelines minimizes disruption and streamlines processes.
✅ Discipline from endurance sports fosters focus, resilience, and growth.

Listen now to gain actionable insights and elevate your GRC strategy.

🎙️ Security & GRC Decoded is brought to you by ComplianceCow.

Learn More About How ComplianceCow Can Help Your GRC Team Today!

🚀 Enjoying The Show?! 🚀
Make sure to rate and review the show to let us know you’re enjoying the content!
Subscribe now for expert insights from industry leaders shaping the future of security & compliance.

Learn More / Connect with Shobhit Mehta
If you enjoyed this conversation and want to dive deeper into Shobhit Mehta’s insights on GRC, cybersecurity, and building effective security programs, connect with him directly:
💼 LinkedIn: https://www.linkedin.com/in/shobhitmehta/
🌐 Company: https://www.headspace.com/

uh-huh Uh-huh [Music]

Welcome to security and GRC decoded I’m your host Raj Krishna Morti and we are here to decode with the awesome show Ma

today Shvid is a director in security and compliance at Headspace Headspace is a mental uh health and wellness company

in San Francisco He’s an accomplished u security and GRC professional author

blogger and an endurance analyst and maybe shave you should tell us if there is anything more that I’m missing He has

an extraordinary story His story is nothing short of inspirational and his journey into cyber security So welcome

to the show Thank you Raj for the amazing introduction I I don’t think I

could have done that better myself Thanks for that Yeah thank you So maybe I’ll start let’s start with

something with maybe let’s do the shock and awesome thing right what is one controversial opinion that you hold on

security or GRC I have been in the industry for 14 years Raj and I think I have seen companies of all sizes and

shapes I have been with companies with 5,000 people team all in information

security and when I joined my current company it was just me and our CES at the time and through all that experience

I realized that there is always this opportunity to streamline the work that we do and more often than not GRC teams

tend to overburden themselves just for the sake of running through audits throughout the year So I would I think

that’s something that I have seen through many different forums I advise a few companies via this venture capital

firm that I work with and every now and then they have to work on five different audits and they have different timelines

for each of them and then I ask them why and they don’t have an answer and I think that’s something that that I have

as a controversial opinion that GC teams tend to overburden themselves which they

should not and there is always opportunity to streamline which they they can always always do in whatever

they are doing I I I think that’s a very interesting point and I really want to come back and talk about what they can

do right and and sort of what is the basis on which you’re making some of those uh statements and how we can help

them Uh let me uh why don’t we start about you uh maybe let’s talk about what

has been your journey into cyber security and GRC I did my bachelor’s in 2011 in computer

science and throughout my undergrad I was doing coding I was creating websites

for some of the best companies in the world and I was partnering with many many companies on building this websites

and when I joined this company called HSBC my goal was to do development but

it so happened that in India when you get hired you don’t have a choice that what you want to do and for the first

four years of my life Raj I did information security and I had no idea what I was doing I was creating metrics

and dashboards and like I mentioned in the past we had a team of 5,000 people doing information security all over the

world for ACPC And to me at that point it made no sense that what I was doing and I was pleading my manager to go back

to coding I just wanted to learn Java and I wanted to do like create this web applications on a higher scale but that

didn’t happen and I I was I was lost for the first four years and then I switched

gears I went to financial risk management which is the broader umbrella of information security I did that for

two years and then I realized that I didn’t like that either So I went back to the drawing board and that time I had

a conversation with one of my mentors that hey I feel I’m lost I don’t like information security even though I did

that for four years I don’t like operational risk even though I did that for two years What’s next for me i have

my entire career and life in front of me and he gave me this advice that I think you should probably go back to the

drawing board and maybe what you want to do is to pursue masters in something that you would want to do for the next

uh 20 30 years of your life and at that time I already gave my GRE GMAT

everything that I had to give for this admission and uh just as luck would have

it one of my friend at the time was preparing for this MS and information security and I applied for the same with

very little hope that I would get in but fortunately I got in and I did my

masters in information assurance and cyber security at Northeastern and that

really really opened the horizon that I had in my mind for information security when I was working for ASBC I was only

preparing metrics and dashboards and even though I was looking at all these number of incidents that were being reported by archer and I was working on

access management and I was working on this different audits and I was working on this segregation of duties project I

did not understand the business rational for it Raj and that even though I was learning all of that I didn’t really

make sense of how that’s enabling the business so when I joined this program

the the mast’s program in Boston at at northeastern that opened my horizon and

for the first year I learned so much about all the different facets of information security that it’s not just

about access management of segregation of duties but there is like red teaming and blue teaming and purple teaming and

threat modeling and bug hunting and I was exploring all of that and after one year I had the opportunity to work with

PayPal and then I did my summer internship went back to college throughout the second year I worked with

Fidelity Investments on one of their startups where I had the opportunity to build the entire security program from

scratch and I think that was my initiation into information security and that’s where I really learned how it

what it meant to build the entire security program from a scratch So that’s that’s like my

journey and I’m sure we have talked about this for such a long time in multiple forums that Hadspace has been

an amazing amazing place to build this program from scratch When I joined I had an amazing amazing mentor He is still a

dear friend and he taught me all these different uh aspects of security right from GRC to application security

infrastructure security privacy engineering you name it and I think I did pretty much all of that in my

current role so no that’s a fascinating journey engineer to maybe an operator of

some sort but he went into operational risk management financial risk management and then he just dived into

the different aspects of security and you know um security engineering security operations That’s a fascinating

story What is your view of security and GRC and the intersection i truly believe

that GRC is the product manager for the information security team and I’ll explain that why Um let’s let’s take

this in a broader company perspective product team they decide what features they want to build and then they decide

that okay this engineers are going to work on this particular project or features and they are like driving the

engineering team in some sense similarly if you look at it for the information security team GRC is doing audits all

the time they have this ability to go and speak to all these different individuals in the engineering team in

the product team in the legal team privacy team and figure out what’s going on across the company and they are the

ones who are interfacing with the auditor tors as well So I truly believe that GRC has this this immense

superpower that they can go to anybody ask them hey can you speak about this particular process for 15 minutes how

are we doing our socks audits or how are we doing our uh user access reviews for this financial application and so on so

forth and I I think GRC is like the product manager now they have been

through all these different functions they have spoken about all these different processes to this individuals

and they have a very good understanding on where we are doing good and where we are doing bad and I think it’s it’s on

the GRC team to figure out because of course they have limited capacity and bandwidth it’s on them to figure out

okay this is the project that I want to work on or focus on for the next year and I’ll give you an example let’s say

security awareness training if people are not doing security awareness training the GRC team has a view of that

that hey our employees are not doing their awareness trainings on time and we should be focusing on that a little bit

more They can make that as a project to kind of go and have reach out to this

individuals and say hey can you do this this trainings Similarly they are also managing all the vulnerabilities because

they run the vulnerability management program And if they see that engineers are not doing their job properly on

fixing that code or high critical vulnerabilities then they will be the product manager and they can reach out

to them saying hey I want to make sure that you are fixing this vulnerabilities in a timely manner So uh that’s my view

of information security and GRC Of course GRC has a superpower to reach out to all these different team and ask as

many questions as they can without worrying about the consequences of that happening later Got it So you’re saying

GRC has a holistic view into all things security all things application

engineering and and by by superpower they are able to look at this much more broadly and are able to act on it

Correct Okay Now that what do you think should be the how technical should these

the GRC team be what’s your opinion of that i always tell my team that your

engineers will love you a lot more if you go to them and tell them hey we need

the let’s say if there’s an audit request and the audit says you need the screenshot of firewall and you go back

to your engineering team and ask them that can you give me that screenshot I think your engineers will love you a lot more if you tell them that I need this

kind of security groups and they don’t need to worry about what the f that we’re talking about Similarly if you

know about GitHub branch protection and you can go and ask engineers exactly what you asked for that will be truly

amazing rather than you letting them know that hey we need some screenshot for branch protection and whatn not And

this is something that I I favor a lot that folks in GRC have to go beyond GRC

to flourish in their career And I take my own example for the first let’s say seven eight years of my career I only

did GRC I only knew GRC and that would have restricted me so much if I had done

only GRC only focused on audits It’s good to know five different frameworks but that has to stop somewhere They’re

like the requirements are pretty much the same except a few and uh it’s it’s on the individual to make sure that

they’re taking a holistic view of their career and going beyond GRC Raj I’m a huge proponent of continuous learning

and uh encourage everybody in GRC to look beyond what they are doing at the moment

and look beyond audits uh and make sure that they are learning about uh

GRC about different facets of security and not just focusing on GRC No I think

I I I love it So what you’re basically saying is not only does it make us the

the GRC professionals more productive it also helps to build the social capital within the company for them to go get

their job done right because you’re respected more you’re trusted more uh and maybe you can go faster um farther

You are absolutely right that that should be the goal for every GRC professional that how can I go beyond

the realm of GRC which I’m really comfortable with and even if they are doing 10 different audits the

requirements are going to be the same but it’s on them to push their career and learn about application security

infra privacy and so forth though so they can be a holistic GC professional

or security professional at the same time like you mentioned build some social capital and you speak the language of business or engineering when

need be no that’s beautiful now how Do you think others perceive GRC how do the

leaders perceive GRC how do the security teams perceive GRC how does the rest of the organization perceive GRC what is

your what is your take i’ll start with my own opinion When I started with GRC I

thought it’s just audits that GRC is equal to audits And I think that’s a perception that leaders have as well

When we go to this leaders and we say okay GRC I think there are few things that come to mind Okay do we have

software certification and do we have uh software testation and do we have the customer are we completing the customer

questionnaires on time or are we doing the vendor assessments on time and so forth But GRC really has this power to

reach out and ask engineers this questions where they are being a lot

more thoughtful and go beyond GRC and I I’ll give you an example as well I don’t think any audit as of yet asks for the

um secure SST or DST or software composition analysis or those type of

controls I don’t think any audit speaks about do you have a bug bounty program I

don’t think any audit talks about threat modeling that do you have a formal process for threat modeling I don’t

think any audit talks about your relationship with the wider forum and do you have a security insider program or

something like that in your organization and we have to change that perception

that we do audits that’s our bread and butter as GRC professionals but at the same time there is so much we could do

in terms of uh going beyond GRC and learning about threat modeling and doing

that learning about text reviews and doing that learning about product feature requirements that are coming up

and partnering with legal and privacy teams and I think we we need to change that perspective for the business as

well that when they look at GRC it’s not just about audits it’s much much more than that even though audit is the bread

and butter that we have to work on and we have to pass those audits to make sure that we are building trust with our customers and making sure that we are

having all this revenue streams open we are not being a blocker for the sales team we have to go beyond that and

change that perception that GRC is not just audits There’s a world beyond that

that we need to work on Yeah Now I think that’s a brilliant point So you’re saying GRC is just beyond an annual

audit ritual right checking the boxes once a year it doesn’t cut it Um and I

think you talked about some of the things that you can go do to change the perception but especially with the leadership team and the security teams

how do GRC prof are there other things GRC professionals can do to change those perceptions

there are few things we we have done in in my current talk that that I think any any GC team could do The first thing is

the security awareness training revamp and I’m pretty sure that all of us we have to do some sort of security

awareness training in our organizations and more often than not like you mentioned there are checkbox activities

Raj people don’t really pay attention those security awareness trainings they think this is an annual activity and

it’s there for everybody to do in that learning management system that you created but I wrote about this that each

organization is so different Raj for example when I was at PayPal the security awareness training at PayPal was exactly the same as Fidelity and

that made no sense because the business is so different Same is the case with HSBC that the training at HSBC was

exactly the same as Douche Bank but that made no sense If I ask or if I talk about the current org the security

awareness training at headsp space would be completely different for the security awareness training that compliance cow

and those are some of the things you could do proactively that okay we have to do security awareness training how

can we make it more effective how can we be more proactive in making sure that employees know what they are and they

aren’t supposed to do and not play the blame game later that hey you did this and that shouldn’t be the case for

example let’s Say if a company they don’t allow sharing PHI on Slack it’s very individual to that company and some

companies may allow it some companies may not allow it but the employees if I’m a new joiner I would know until

unless you tell me and the first thing that you need to do is to complete the security event training to learn what is allowed and what is not allowed So

things like that we could we could always always do to make sure that we are building that that repo that we are

doing a lot more with the entire company and we are of course the the leaders of

the company do that training as well and they can see that we are being more proactive I see Uh there is one more thing which is very close to my heart

that we started this uh process at uh at headsp space where we do product risk

reviews before a single line of code is written And what it truly means is we

started this project where not just a GRC team or the engineering team We have folks from the legal team the privacy

team the compliance team the application security team and infrastructure team Review all the PRDs review all the major

text specs that are being created and provide feedback even before a single line of code is written uh that uh I

haven’t seen that happen in the previous orgs that I work with but that is something that GC team could do and that

will help reduce the risk of having those those bugs or issues at a later

end when the code is returned when the features are developed and all of those you’re not just shifting security left

you’re shifting security privacy legal compliance care everything to the left which is the ideal secure threat

modeling in my my uh view No I think that’s a brilliant point So the way you answered this question is that you’re

saying how do we change perception of the leadership team and what I’m hearing you say is that the best way to do is

start doing things right do things that can be more proactive start doing things

that show up right where people notice a very palpable change right and that gets

you better uh correct is okay no that is that is a fantastic how do you you talked about privacy how do you see and

I know you’re a privacy practitioner as well how do you see privacy fitting into this security and GRC I think the realm

of GRC is over It has to be GRC and privacy Raj some organizations have this

luxury of having a separate privacy team and a privacy engineering team per se and some organizations are not that big

that they have a separate privacy team all together and again go back to the previous point that GC teams need to go

beyond what they’re doing day in day out and they have to be much more proactive and one of the the the ideal streams

from there is having privacy in the bucket of GRC So I would say for a

smaller company GRC and privacy go hand in hand they go in parallel and in my

view the privacy team or the privacy engineering team which I manage is like

the business analyst for the engineering team and I would phrase it in such a way

that let’s say if there’s a requirement from GDPR and CCPA that we have to delete the accounts in a certain fashion

the engineers don’t need to know all the privacy language at the same time privacy team may or may not speak the

language of engineering but GR RC team has this luxury of knowing all the engineering systems that are in used all

the data pipelines and systems where we store PIP PHI and at the same time they

can speak the language of privacy given their knowledge in that realm and they can translate those requirements from

the privacy team in a much more effective fashion for the engineering team So that would be my approach of

looking at privacy There are always so many things that are coming up from many

many different avenues App the Apple app

store they had a requirement couple of years back that all the applications which are allowing users to create their

account from the application should allow the users to delete account from the application as well Now who is uh

the primary team to drive that conversation i don’t know So it obviously falls onto GRC and we should

be driving that conversation Uh there’s this requirement from Google that all the data that we are collecting from the

application should be in the should be filled for Google Play Store And again who is responsible for facilitating that

converation if the GRC doesn’t do that I don’t know uh and there are always like

this this different changes or regulations coming up in HIPPA and GDPR and CCPA and I think it’s on the the

onus of making sure that all of things are being done is on the privacy engineering teams

okay that makes sense you are an expert on high trust um

and I actually have listened to your speech on high trust and besides SF I believe you gave it last year or the

year before I’m I’m not that was in 21 Raj I think that was the first time we met Yeah Yeah Yeah Yeah Yeah That was a

brilliant presentation and maybe we’ll put a link to that presentation um in the podcast as well So what was it like

to get Hyra certified what challenges did you face what would your advice be for anybody who’s aspiring to get Hyra

certified either either because they want to get Hyra certified like you are in the health business or because they

want to anchor use Hitrust as a harmonized framework right across multiple other frameworks What would

your advice be so I’ll answer your question in two parts First what the what’s the effort

that it took to achieve high trust and what it meant for us as a company and then secondly if you’re starting your

security program from the scratch should you look at high trust from the very beginning I’ll take the first question

first that it when we started this journey Raj I was at that time a manager

I used to ask him hey what’s our next goal this company is asking us for software audit and attestation report uh

we wanted to do high trust but do you think we’re ready for it and at that time I had no idea about high trust in

2020 I never heard of it and at one point of time we just decided that we are going to pursue high trust and

achieve that and there were some contractual requirements which required us to achieve high trust within that

year in 2020 when I joined the company and I I at that time we were only three

people in the entire team one person was doing it we Me and my manager at the time we were doing security And when we

looked at high trust there were like 350 odd requirements in 19 different domains

ranging from privacy to policies and procedures to mobile device management to portable devices and how you’re

managing those to your application security just name it And they had a requirement for that And I think that

was the most transformational part of my entire career I learned so much I did

the entire gap assessment what we have what we don’t have wrote all those policies with autoative sources and and

so forth and that that actually when I was speaking to peers in the industry

they were like it’s going to take at least half a million dollars for you to achieve high trust and you’re going to

take at least two years to complete it but with the amount of work that we did we were able to complete that within

100k including the cost of the audit by using a lot of open-source uh tools and

by using doing a lot of documentation early on and so forth and we completed the audit within 9 months So I I was I

was talking to the auditors and they were mentioning that hey you should be presenting it somewhere because the work

or the amount of work you did is not just hard work it’s a lot of smart work as well and people ought to know that

there high trust is I it’s it’s not a sprint is not a marathon it’s an

ultramarathon but you could do that if you persevere and be smart in your training so that was the the the idea

behind behind and presenting that in the conference and it was surreal I mean we

we unlocked so many deals we had to complete so many lesser questionnaires because of that because we had the

certification and everybody was able to uh accept the highest certification and

the second part of your question is if I’m a company which is starting their

compliance journey should I start with highest altogether and I would say I will probably do something different uh

if I have to go back in time I would probably start with sock 2 plus highrust because sock 2 has this flexibility

where they allow you to inherit the controls of high trust but not have the high trust certification which is which

is kind of odd some companies have the requirement that you need to have certification but there are other organizations which are okay if you do

sock two plus high trust or you have a sock to a test station from the auditor so I would rather advise companies to go

from there if they don’t have the the budget or if they don’t have the the manual capacity to do those audits

that’s another mechanism where they can start if they want to have high trust in their compl science uh repository but

not do the full Hydra certification and and is it because to do the full Hyra certification it’s going to cost you

more in terms of audit effort uh why

would you say that highest alliance so there are three things that that come into picture when

you talk about hyrarch first is you have to have your my CSF instance from

hyr amount they have different versions of my CS yeah tiers for my CSF but it’s

going to cost you at least 15 to 17k then even if you take the bare minimum high trust certification requirements

it’s going to be security controls plus HIPPA because the entire purpose of hyras is to show your companies or you

show your customers that you are complying with HIPPA requirements if you do that that’s going to be around around 300 plus controls in your highest and

the auditor will cost you based on on the number of uh or the scope of your

your certification So it’s going to be at least 60 70k at at the bare minimum

to have the the audit fee And then of course you will have to have a lot of tools in place if you want to do that

For example you need a mobile device management tool You have to have uh an ADR You have to have um something that

can block the the portable devices and uh USBs you have to do a lot of work on

privacy and you have to create all those policies So if you don’t have that background of creating policies and

having authoritative sources it’s you are going to hire a consultant It’s going to cost you So I would rather say

that if you are starting your compliance journey and you have the budget and you have the contractual agreement then go

with it But if not then probably uh there are better avenues to do that Okay

And I I remember I think if I remember right your your title was aptly I mean your presentation was aptly titled

achieve high risk on a budget isn’t that correct am I right yeah Yeah achieving on a budget and I think my first slide

was that we achieved higher certification under 100K and 9 months

and you may not believe that but I still receive emails from people and people reach out on LinkedIn asking for the

templates or asking for some guidance on because they are studying on their height journey and they want to learn

about all the opensource tools that we used rather than buying a tool that only

serves the purpose of audit It just doesn’t make sense I know you’re a blogger Is there a blog that talks about

what opensource tools you use to achieve high trust on a budget i think the B

sites team they posted the link of the entire uh talk and within that talk I think there there is a link to slides as

well and in the appendex I do have list of all the open source tools that we use uh for example we used defect dojo for

vulnerability management rather than buying some shiny tool at the time because we didn’t have the budget for that and we used many

different MacBook settings to achieve some of the requirements rather than buying uh a different tool which will do

pretty much the same thing So I I think I do have a list of appendix in the in the slides as well and if your audience

is interested they can always reach out to me on LinkedIn or just uh send me a note and I’ll be happy to help them with

the uh repository All right thank you I know that’s helpful Uh let me you

talked about um GRC going beyond audits Maybe I want to double click on that I

think you talked briefly about threat modeling security awareness training PR

reviews was a very interesting point that you made Anything that you want to add or add more color to that how do we

go how do we do GRC beyond just thinking about audits there is always this

opportunity to have continuous engagement with the wider team and I

think that’s something that GS teams focus on just building that culture of security and I’ll give you an example

the headsp space we have this program called security insider program and what essentially means that rather than

having us doing all the work for security for all these different teams we have this individuals from different

teams who are the volunteers and in some sense the extension of the security team and they are like your first point of

contact for anything that you need related to security So consider this You

join a new company or you join Headspace You have no idea about what you are or aren’t supposed to do Rather than

reaching out to the security team or sending a note to IT help what you can do is to you can reach out to the the

security insiders in your own company who are working with you day in day out and they should be able to guide you a

lot better and faster than getting a response from the security team That’s something that I think could be could be

done just to build that culture of security The other thing that I would highly highly emphasize all the the the

audience members that are listening to this is figure out do you really need to have so many different audit timelines

for each of those audits Sometimes it’s a compliance requirement sometimes it’s a regulator requirement or sometimes

it’s a customer requirement Then you have to have all the statisticians active all the time But you always you

can always always play with the with the timelines and and make sure that they overlap as much as they can So you are

not doing one audit in Q1 then going back to the engineering team doing another audit in Q2 and then going back

to the engineering team and asking for evidences in Q3 which are all going to be different Let’s overlap all of them

And there is always this opportunity if you work with your auditors and treat them your friends and let them know that

this is the the final output that you want to have They will help you achieve

those objectives So I think that that’s something that I would want um all your

audience members to think about that how they can they can overlap all those different audit timelines and and make

sure that they are not uh doing audits throughout the year Got it So do you

plan on an audit calendar early at the beginning of the year beginning of the fiscal year is that how you approach

this yeah Yeah we we do the same thing And uh sometimes you may have to have a bridge letter or sometimes you have a

shorter duration software report which is all all feasible You just have to be very open with your auditor that this is

the goal that you’re setting for yourself and you want to make sure that they overlap as much as they can So when

you create your audit calendar make sure that if you’re receiving some population from a

different uh team That population can be used not just for one sock to audit or

ISO audit They can be used for sock 2 plus ISO plus highrust plus cyber

essentials whatever audits you’re doing and it should it should be work really well Yeah Okay Um high trust also has

mapping as a harmonized framework has mapping for ISO has mappings for uh NIST

853 PCIDSS uh 3.2.14.0 Right right now

do you use highress as a common framework to accomplish or do you have to do separate work for each of these

attestations or certifications you can do either uh you can take high

trust and you can have all those authoritative sources in the scope of the audit but that’s going to increase a

lot in terms of cost for the entire certification And I think if you are

trying to do high trust it’s okay to have one or two authoritative sources But some companies for example if you

are doing a PCI audit some companies may want to see your attestation and they want to see your final certification

that you receive from the auditor and not rely on the high trust if you even if you have PCI as the alternative

source So it depends on company what they are trying to do and what are the customer requirements Um for example

HIPPA if you have HIPPA as the authoritative source in hydrris then you don’t need to do do a different HIPPA

certification you can just use the hydrust and leverage that but if you are using PCI or if you have to comply with

PCI then it might be better to have a separate certification altogether rather than trying to include that in high

trust Okay got it You talked about um a culture of security How do you see

automation fitting into this culture of security

it’s the most important thing that any JC team should be thinking about that

how do they they automate the amount of effort that they’re putting in into

um making sure that they’re not doing redundant work and again I’ll go back to this point and I have seen companies Raj

from my experience they are still using Google Drive to store all the evidences

and what they say this is like the real world scenario I’m advising one company at the moment and what they’re doing is

they have all this evidences for PCI ISO sock 2 in different G drive folders and

those folders are in the range of thousands and the engineering team every time they have to reach out to an

engineering team and ask for the evidences they ask so what did we provide last time and there is no way

that the engineering team should be thinking what we provided the auditor last time and think from the beginning

that okay this is the certificate or the evidence that I need to provide this time It’s so easy to have all of those

in a Jira or a spreadsheet or some some sort of project management tool where

the instant team can go and leverage the same audits Now with the automation

tools that becomes a lot more easier for two aspects First you can have cross

mapping with different compliance frameworks Rather than having three different certifications or uh

requirements for three different certifications you have just one requirement which is labeled for three audits and you produce just one evidence

for for that And secondly if you are using the tool diligently such as

compliance score or other tools in the industry it just helps to collect all those evidences automatically after you

integrate them and you can free up all your time to do the other stuff that you want to do as part of the GRC team So I

I think it’s essential for any company to think about all those automations that they can bring to the table uh

there are many companies right now I mean JNA of course we talked about this in a separate uh channel that uh there

are AI agents now which are bringing the the the evidences for you and you don’t

need to do anything there are a agents now who are fixing the gaps that you have and you don’t need to do anything

there are YC companies which are building their entire models on this this mechanism that you just give us the

instance access our AI agent will figure out and they will find the gap with the sock tools requirements and your

instances and they will fix it for you So I think all this this this different

automations and generative AI agents they enable the GRC teams to be a lot

more productive than they currently are and then focus on other stuff like building the culture of security working

closely with the engine and product teams and so forth Got no I I think that makes absolute

sense Um and how do you see um you talked about

early on that the GRC teams are getting overwhelmed and some of this is brought upon by themselves That was the point

that you made in your controversial statement I want to bring that back here So in some ways I’m interpreting that to

say that we can do a lot more than what we are doing right now Is that a fair statement to make absolutely Yes Yeah

And in some ways so how do you how do you um so in some ways you are creating a constraint and how do these

constraints maybe you can talk about a little bit how what sort of constraints would you create in your world to go

back to your controversial statement and how do you think that promotes innovation well if you have the GC road map and in

that road map you have just the four audits that you want to work on then

it’s going to be pretty easy for you to just focus on those four audits but if you have limited bandwidth which is the

constraint in this case limited budget but you want to do a lot more and explore different objectives then that

will create a lot more and this comes to this principle that the amount of effort

can be managed with the amount of time that you’re dedicating to a particular thing to do if I dedicate something to

be done in two weeks I’ll do that in two weeks if I’m dedicating same project two

days I’ll do that in two days and it’s the same thing if I have a team of four people who are doing only audits they

will do only audits But at the same time if I have this huge list of things that

I want to do and accomplish which are not just audits they would do all of that and we would do all of that So

that’s the the the constraint part that I would talk about and maybe think about the growth as a

professional as well um and not just focus on doing audits for for the

company Got it I think that reinforces the other point that you were talking about about

the culture of security right and automation So your point is that if we automate more and take care of the

mundane redundant stuff that allows you to focus on a lot more other things effectively right and think beyond just

audits I think that’s the core part of what you’re and you can do more with less which is obviously understandable

through automation but your point is that that has to be that pushes the perspective and perceptions on GRC and

that establishes and creates a better security posture for company as a whole

That’s correct Yeah I think you phrased it better than me This is all you’re saying This is all

you’re saying This is like you do automation you free up time and then you have all this available time to do

amazing other stuff that you could and uh enhance your skill set and grow as a

professional So I think you summarized it better than me Yep No this is that is

fantastic Um um let’s talk about I want to come back to your personal journey

because I think you wrote this um I think several weeks ago and if I remember right I read on your LinkedIn

you said you couldn’t speak one full sentence in English until you were age 20 I’m not going to ask you how old you

are right that’s not going to uh but but it is very fascinating and I really

really want to maybe can you double click on that I want to know about show and I want this to be an inspirational

talk right especially to those people who don’t have access right and they are not in the Silicon Valley they are not

in the New York city right and they may be somewhere in India they may be some other in sort of in a suburban or rural

place in the Americas right so the question is that how can what obstacles have you overcome and how what advice

would you give the young people listening out there I I’ll share a brief background about

why I wrote that post in the first place because I was looking at my own journey and many many people rather after I

wrote the book they reach out to me and they ask for my advice and I I was just thinking it through that it just started

the year I had an amazing 2024 but if I go back 20 years back uh I was uh born

in a middle-ass family my parents they didn’t have the education that they

desired but they focused on my education but I went to Hindi middle school and I people who are from India they could

relate that when you go to Hindi med school everything that you learn about is in Hindi and that was my mother

tongue And even in college I went to a tier n college in uh in Dor Uh and I

even in college we were not speaking in English It was just like we were speaking in Hindi And until I entered

the workforce uh in 20 uh 2011 when I was 20 years old I could not speak like

a full sentence in English and have a conversation in English like I’m having with you at the moment even though I

could like learn and understand and do all of that That was really hard for me

because my base was in Hindi and that actually gave me a lot of uh I put a lot

of restrictions on myself that I couldn’t speak to some of the people who were coming from like on-site people who

were coming to India and meet our team and I this is something that I developed

over a period of time and I I learned that if I put in the hard work and do the hard work then I can achieve

anything I want and I always People reach out to me and they tell me you are an inspiration I the way I say it is

inspiration is don’t look at me as your inspiration If I do something wrong tomorrow would I still be your

inspiration no Don’t look at me as the motivation or the motivational speaker

I’m not that either because if I don’t do something tomorrow would you stop stop quitting that as well no I think it

all comes back to discipline And I truly believe that my journey started in 2017

after I moved to the US And at that time I had no other option but to speak in English And I just I think that was the

most monumental moment in my career when I moved here And uh I was given all

these opportunities and I think that that changed me as a person not just in

a professional setting but also the personal individual that I was And in 2020 when I joined this company

headspace ginger we were like three people in the team and all the gyms

closed because of co and I started running in at embarcado in San Francisco

and uh that time I was I I had no idea that I’m going to do ultramarathons in

the future but I loved it so much and I got so disciplined that I started doing ultramarathons and so forth So it’s just

that you have to build that discipline and everything will fall in place That’s

the message that I wanted to give that no matter where you are in your life at this point of time you will be able to

achieve a lot more if you just be persistent and discipline in whatever you want to do That was the message I

wanted to leave with the readers after that post Yeah No that’s an amazing

story Um Now coming back to you’re an

endurance athlete and you talked about it I think that discipline I don’t know how you do this

but maybe what made you take up um ultramarathon and uh and particularly

how has it helped you with in your professional journey so like I mentioned when I was growing

up I didn’t do a lot of athletics I was perhaps the most dull boy in our school

at the time and I didn’t run and I didn’t do any athletics I didn’t play

sports and I tell this to to everybody now who reaches out that uh every body

part in my every part in my body is very fresh because I didn’t use them when I was younger So like like I said when I

was in in 2020 when everything closed down I started running on Embarko and I

just loved it so much that I did the San Francisco marathon and I was looking at all these different folks who were doing

ultramarathons at the time and I got into the running scene in San Francisco So I created this this small club within

the community and we started preparing for the shorter runs and uh we used to do this trail running and right across

my my apartment we had an amazing amazing trail It’s called Mount Sutra in San Francisco And I used to go there and

run And I discovered there are places where you could run on trails for hours

and hours and miles and miles And they had like ultra runs on trails and that

got me hooked as well It’s for the first time I felt the runner’s high and I’ve

been persistent with that The current format that I follow is for the first three quarters of my year I work really

really hard on everything that I want to do The next quarter I just relax I just

plan for the next year Look at my my calendar what I want to do in the next

year That that’s how I structure my life For first three quarters it’s all about

the professional personal setting as much as I can And then the last quarter is all with the the the family and

spending time with them as much as I can Yeah Oh that is very nice That’s very nice Um show I I think no podcast is

complete nowadays without talking about generative AI So what do you see as the

implication of generative AI and large language models and security and GRC

the way I think about Gen AI and security I divide that into three different buckets Uh first is the

security for Gen AI you are developing all these large image models and you

have to secure them from poisoning and from output validation and so on so forth That’s the the first piece that

how do we secure gen AI as a whole The second bucket is gen AI for security

that we are creating this amazing amazing technology How do we use that for security the example of that would

be creating the sock analysts We are seeing a lot of companies right now which are claiming that they be your

level one level two sock analyst And there are some companies which are currently doing threat modeling and they

will be like okay you don’t need to do anything You just give us your PD and text break and we will do the threat

modeling for you So that’s the second aspect of it And the third one is the security for gen AI threats And the way

I think about that is what would be the threats that could be presented with the amazing technology that we are building

Uh for example the defakes It’s so hard at the moment to figure out which of the

videos are real which of the videos are deep fakes Uh the second aspect of that would be fishing email the fishing the

the quality of fishing email has changed tremendously over the last year and I’m

speaking to all this email security vendors and they are still trying to figure out a common or good path to

prevent the companies from that so that’s how I think about security for

genai security from genai and then how we can use that for preventing threats

that are being generated from this this technology there are many things that are happening Right now I’m currently

contributing to this white paper with OASP Uh it’s for the AI agents So the

way it works is OASP already has the top 10 for LLM that if you’re building a top

10 or you’re building a technology which uses LLM then you should be considering all these different risks that OAS has

already highlighted The subsequent part to that is now you want to build an agent on top of that

LLM and how do you prevent that LLM agent to or not be malicious So that’s

something that we’re working on I think the the most common theme that comes across when I speak to different peers

is how we are doing the authentication and authorization of those AI agents

Let’s say in the near future you have an AI agent I have an AI agent and how they would be working together to fix the uh

to to not interfere in each other’s authorization Uh the second aspect of

that would be a privilege What can they do when they think about the AI agents

and if they do decide to let’s say go beyond their realm do we have a quilt switch for those kind of AI agents and

so forth so that’s still under consideration your audience can always reach out and

I’ll be more than happy to let loot them in the working group Uh there are many many industry peers and experts who are

working in on this OAS top 10 for AI agents which is still in uh in private

beta Yeah No makes sense It makes sense Now I think one of the challenges that I see is that traditionally cyber

security has been a very deterministic principle right i mean you it is evidence-based

analysis You you want to very specifically know which users have MFA enabled which users don’t have MFA

enabled right which systems have logging enabled logging and monitoring enabled which systems don’t But generative AI

typically has been a very probabilistic model It is right large models are inherently probabilistic So how do you

sort of so there is a myth and the reality of genai and what it can do and

I think the there is a it is the maturity is significantly improving but how do you see the balance between the

myth and reality what is myth and what is reality is there anything that you want to talk about

it’s very very easy to build an application on based on genai raj for a

team of five people or five individuals but it’s very very hard to scale those

applications And that’s something that people don’t often understand that it’s easy to create a wrapper on open AAI charge

model and you will be able to create an application that’s like when you read post on LinkedIn that I just created an

application for $30 that’s what they are doing create an application for themselves but it’s really hard to build

on those applications and make it usable and accessible and scalable for companies or enterprises with thousands

of employees of users That’s the distinction that that I want to make that that the myth versus the reality

It’s easy but it still needs a lot of inputs and guardrails Um one example

would be if you’re creating an application which is only for a few people you may not pay a lot of attention to guardrails which is the

foundation for security But if you’re creating an application which is let’s say a mental health coach per se you

have to put guard rails because there are millions of users who will be using your application in the near future And

if you don’t put the guardrails from the very beginning it’s going to be very hard for the genai to work properly and

it will be giving out malicious output and whatnot So that’s the distinction

that I want to make that it’s easy to make an application on gen AI for a

small scale or for a personal project but the scale of doing that for millions

of users is very different We are reaching almost at the end of our podcast Um

show you are an author and are there any podcast audio books books you read

listen to and you know please feel free to give a shout out to your books as well Anything that you want our

listeners to know i see a lot of security blogs uh right now and some of them are very

superficial but I really really love the blog by Bruce Schneider That’s like my

go-to blog I always he is one of the best individuals in security He invented

the brypt algorithm I had a chance to meet him once when I was in uh Boston and he came to our college to give a

lecture and um I think uh that’s the blog that I would recommend all security

professionals to to read Uh it’s it’s very foundational It speaks a lot about

different facets of security It’s called Schneider on security uh podcast I’m not

a huge fan of podcast and the this is again one philosophy that I have that the source of knowledge is books is

greater than blogs is greater than audio books is greater than uh the podcast the

podcasts are there at the very end I think it’s more of a uh tail end of my source of knowledge

but I would highly recommend this one book it’s called security architecture

in engineering I think uh by one of the British authors I forgot the name but that book really helped me a lot in

learning a lot about security engineering and what it really means Those two two resources I would highly

recommend to to the audience Yeah And hopefully this podcast changes your perspective on the picking order podcast

being the last I I did listen to the previous four podcast Raj and there was

so much knowledge from different folks There was Abhai and other people you had

on the podcast I listened to those and that really really got me hooked on how different companies are doing security

in GRC engineering at scale I think that was a very very nicely listen Yeah No

thank you Thank you Appreciate it Chid thank you very much and it was a

fascinating conversation and I uh no matter what you said you will continue to be an inspiration a fantastic

inspirational story into cyber security Uh thank you Thank you Raj

[Music]

Listen on your favorite platform and stay updated with the latest insights, stories, and interviews.

CCM NERO graphic

Want to see how we can help your team or project?

Book a Demo