🚀 Welcome to the premiere episode of Security & GRC Decoded! Host Raj Krishnamurthy sits down with Mosi Platt, Senior Security Compliance Engineer at Netflix, to explore his unconventional journey into cybersecurity, governance, risk, and compliance (GRC).

🎙 What You’ll Learn in This Episode:
✅ Mosi’s unique path from IT audits to Netflix
✅ The biggest myths about security governance
✅ Why risk quantification remains a challenge in the industry
✅ The impact of SEC cybersecurity materiality rules
✅ How to shift from risk-based to trust-based security
✅ Strategies to convince executives to invest in GRC

🔹 If you’re a security leader, compliance professional, or tech enthusiast, this episode is packed with insights to help you navigate the evolving GRC landscape.

🔔 Don’t forget to LIKE, SUBSCRIBE, and TURN ON NOTIFICATIONS for more expert insights on security & GRC!

💡 Want to elevate your GRC game? Learn more about how ComplianceCow helps teams navigate security compliance efficiently!

⏱ Timestamps:
0:00 Introduction & Host
0:38 Mosi’s Journey (IT Training to Security Consulting)
6:50 Early Career in Compliance (IT Audits)
10:44 Defining Security & GRC (3 Pillars)
12:38 Myth of Security Governance (CISO Oversight)
14:48 State of GRC Today (Risk Quantification & SEC Regs)
19:30 SEC Cybersecurity Materiality Rules
24:12 Adapting GRC Strategies (People, Process, Tech)
30:10 Building a Security GRC Program (ISO 27001 Steps)
35:00 Risk-Based vs. Trust-Based Security
41:55
Getting Executive Buy-In (Truth vs. Fear)
45:28 Inheriting a GRC Program (Evaluate & Optimize)
49:17 Future of GRC & Digital Transformation
52:37 The Perfect GRC Solution (Automated Compliance)
56:00 Recommended Books & Podcasts
58:30 Final Thoughts & Key Takeaways

📢 Guest Contact Information:
👤 Mosi Platt – Senior Security Compliance Engineer, Netflix
🔗 LinkedIn: https://www.linkedin.com/in/mosi-k-platt/

📖 Books Mentioned:
📌 Investments Unlimited by IT Revolution → https://itrevolution.com/product/investments-unlimited/
📌 Emergency Skin by N.K. Jemisin (Audiobook) → https://www.audible.com/pd/Emergency-Skin-Audiobook/1978650841

🎧 Podcast Recommendations:
🔹 Enterprise Security Weekly → https://www.scworld.com/podcast-show/enterprise-security-weekly
🔹 Cybersecurity Where You Are → https://www.cisecurity.org/insights/podcast

🔗 Additional Resources:
✅ FAIR Risk Management Framework → https://www.fairinstitute.org/fair-risk-management
✅ ISACA Digital Trust Framework → https://www.isaca.org/digital-trust#1
✅ OSSTMM Security Testing Methodology → https://www.isecom.org/OSSTMM.3.pdf

🔥 Subscribe for more Security & GRC insights! 🚀

uhhuh uhh [Music]

hey welcome to security and DRC decoded I’m your host Raj Krishna morti I’m here

today with the awesome mosy plat MOSI plat is 22 plus years in security and GRC industry and he’s currently a senior

security compliance engineer at Netflix MOSI welcome good to be here Raj You’ been

talking about this for a long time so it’s good to uh finally get it started thank you mosy and let’s get let’s

decode so mosy I want to start off was um maybe talking about you how did you start with security and GRC and what has

been the journey so far sure so it’s uh it’s a little bit of

a convoluted story but I’ll try to give you the short the short version so my um

I got first exposed to computers by my uh Aunt who was the first uh computer

teacher for the public school district in Trent New Jersey and so uh

she was the first and so she knew a little bit about computers from college uh but she didn’t really know much so

they gave her computers that she could set up in her own home lab so she could prepare her curriculum and her lesson

plans and she would use her her children and her nephews as her first test students so got exposed to that in

around 1984 and then uh moved to Arkansas uh my

father was in the Air Force so he was stationed in Arkansas and that was around the time that Bill Clinton became

governor and so Arkansas had one of the worst Educational Systems in the US at that time so he it was a big focus of

his campaign and his platform and so the elementary school that uh I was in also had a computer lab

in the gifted and talented classroom that was the only classroom that had it um and so I happened to being gifted and

talented and so got to you know learn basic continue learning basic there um

and play around the computer so that’s how I got exposed to it as a kid and then when I got older um I was

far removed from computers and uh I was working in a grocery store actually and my aunt’s

husband my uncle called me and says you’re not going anywhere in your life working in these Grocery Stores um this

was post 9911 and so he said uh you know country’s in a recession the government is trying to get out of it by training

IT workers you should get in this it training program and have an IT career

and so I I enrolled in the program in New Jersey it was being offered out of the merca County Community College it

was called the New Jersey It Centers uh enrolled in that and I was still working overnight at the grocery store and so I

would normally sleep through the first one or two classes uh because I had been up all night working and uh for the

security track uh it was split into two parts and the first part it was the first class in the morning and so I’m

sleeping trying to sleep in the back of the classroom and the instructor is asking a Class A question and he’s a

loud talker um you know him it’s John VAR from Pivot Point Security and

nobody’s answering the question every time he repeats it he says it louder and I just I can’t sleep because he’s so

loud so I answer the question so that he could just bring his voice down to a normal level so I can you know get my

rest for the rest of the day and so I answer he says oh wow I can’t believe you answered it correctly because you’ve

been sleep this whole time and so then he just walks over to my side of the classroom and just asked me every

question after that for the rest of the class and I can’t go back to sleep so from there we ended up hitting it off

and um when I finished the program in six months he uh offered me a job in his

uh information security consulting firm um which was called Pivot Point Security

so that’s how I got into it it was really just a a string of coincidences um interesting and so when

I joined I only had I was trained in Windows 2000 Network Administration so

and then I had a you know two security classes from John Barry I wasn’t really um going to be somebody you could

send out and build at a you know a high rate for a consulting firm so my first

few projects were related to like building out little you know networks for um small mediumsized businesses and

nonprofits um but why John hired me was because he had was getting a lot of work

from these nonprofits he had partnered with his brother-in-law whose CPA firm

they only specialized in um Catholic or religious

nonprofits uh Indian reservations and um fire

districts and so the aicpa back then had passed this new uh statement on

accounting standards that said that uh all Financial audits had to include an

assessment of it risk and and previously the CPA could just say that they assess

it as a maximum risk but the new standard changed that um where they actually had to do an audit of the it to

support their uh it risk assessment and so he partnered with John VAR and Pivot

Point to do that for his financial audits that his CPA firm was conducting so John was getting all this audit work

that he could no longer manage by himself um and so he brought me in to either help him continue growing the

security work for the business while he did the audit work or for me to eventually get into the audit work to

support that and so um those weren’t even really there was some security aspect for that but they were integrated

audits with financial audits so they were more like it audits um like how are the financial reporting systems um are

they configured properly to ensure the Integrity of the financial

reports that were being filed so that’s how I got started and uh

so we started with these big Catholic nonprofits and from there it was easy to

continue billing me out because I had experience from these this it was a low-risk environment like I remember

like John tells a story about one of his first audits with one of these nonprofits um he’s asking the CIO he’s

going through like the security section of the audit and the CIO is just failing miserably like he can’t answer any

question this is back in like 2002 and uh then John hits a question asks

him about intrusion detection systems and the cio’s face just lights up he’s like oh oh oh yeah yeah we’re good there

we we have intrusion detection and John is stunned because like they didn’t have a firewall they didn’t have any access

control setups he’s like oh okay cool what do you have for your intrusion

detection system and the CIO responded we have ADT for intrusion detection

that’s and that’s gen was like oh man this is as bad as I thought so it was

really lowrisk environment to learn in um so it was great but having the experience with these uh integrated

audits with the financial audits when sarban Oxley got passed after the Enron Scandal it was easy to Pivot to doing

sarban Oxley it AIT work so I got into sarban Oxley it GRC I got into itgc that

way with sarban Oxley um for public companies uh because we had a client

who um they had ernston young that was doing their external audit but they

didn’t they didn’t have any it audit capabilities within their internal audit function they didn’t even have an internal audit function they outsourced

their internal audit and the internal audit from they outsourc to didn’t have it audit capabilities because you know

it was still new back then so um so they brought us in to do the this was when

you at at Pivot Point still yeah it’s in pivot Points this is 20 now we’re in 2003 okay um so that was my first

exposure there uh to doing like a really big it GRC project um and then from

there like sing oxy came out then PCI DSS came out and so this same client

that we did the sing zxy work for they um they owned a bunch of hotel properties um like they were real estate

investment trust and they manage these hotel properties um as part of the as

another part of the business and so when PCI came out they were like hey well we also got to comply with this PCI Data

security standard that’s new and so then I get into the security audits from or assessments from the PCI standpoint and

that that was my first uh security GRC project was pcidss compliance and then

from there you know building up uh reps of doing that for a couple years and then it expanded John had the vision

that hey you know it growth is booming all these uh companies need to provide

Insurance to their customers um and so they’re only going to have the two main ways to do that sock 2 and ISO 27,1 and

that was this is around the time like Thomas Freeman was publishing articles and books about the World is Flat and so

John’s like he thinks the sock 2 is going to be is not going to be sufficient if these comp if the world becomes flatter and so in order to

provide Global Assurance these companies are going to have to start pursuing ISO 270001 and so I pivoted into ISO 270001

and bu built out the the Pivot Point practice for that um you know like John

started started it with like the first two audits or helping the first two clients get prepared for a certification

audit and then I kind of took it over and built it out from there so that’s how I got into security GRC got it

that’s the long conv that’s a fascinating story um I’ve been on John’s podcast as you know but I did not know

this backstory that’s a fascinating backstory from a sleeping student to an IT Auditor to a security GRC auditor and

potentially inter Assurance I mean that’s a fantastic story and I stayed in GRC cuz when I was doing an audit John

said well when you going to try pentesting and I was like sure I was done with the audit work so I tried to pinest one of the clients and I was

terrible at it like I think I got something from like a I found a password

for um I found a password for one employee until I got into their email and that was it it was all I could do

after like six hours so I was like this is this is an awful experience house stay GRC side so mostly I I wanted to

sort of um so Security in GRC looks like it means many things to many people

right why don’t we decode that a little bit what is your definition of security and GRC security GRC can you talk

through us a little bit sure so my security definition is pretty vanilla

and straightforward um especially like when we talk about information security I’ll focus on that

um it’s the confidentiality integrity and availability of information uh very simple that’s what John taught me I

stick with it to the day that’s how isaka defines it so um that’s how I that’s what information security means

to me um the GRC is uh well everyone knows I

think it’s short for governance risk management compliance management and I think uh the governance

part I think a lot of people get they either get confused about um or they

misuse use it to serve their own purposes um and so you know governance

at a very simple level uh is just the evaluation Direction and monitoring of

Enterprise strategy right that’s that’s a really simplified version of the definition from

isaka um risk management is the identification

analysis and treatment of the probable frequency and magnitude of future loss

so that’s my own hybrid definition I’m kind of mashing up ISO 270001 definition

with a fair definition of risk management and then uh compliance

management is really simple it’s just ensuring the adherence to relevant requirements and so you know the

Enterprise determines what requirements are relevant and so that would be part of compliance management that identification of what requirements do

we care about do we want to provide Assurance against um got it and then just demonstrating

that you said something very interesting you said governance many people misuse I

don’t know did you say most people misuse what do you mean by that can you double click on that so like you know

governance is something that comes from it’s top down and so you know there’s a lot of

discussion nowadays about uh how do cesos get to sit at the at the table with the board or with the you know

cesos have seen the title but are they really part of the SE suite and so you hear things about like security

governance but if the security Executives don’t have a seat at the

board or the board isn’t really um evaluating directing and monitoring

security strategy that’s that’s not really security governance and so people talk about security governance at a lower

level like from the Security executive down and and I know like the the iso

standard 27014 makes space for that but it’s not what it’s not governance in the

s in the traditional sense and how it’s really thought of in in a corporate sense right it’s not a governing body

right that is overseeing the management of security um when most people talk about security govern that’s not that’s

not how it’s that’s not how it’s discussed um because the governing body security Executives don’t really have a

lot of access to or or the governing body doesn’t provide that much oversight

to the security Executives okay so the way you described it if I were to rephrase governance is

about managing the percent risk management is about potenti managing the potential future and compliance is about

reporting is that a fair categorization the only the only thing I would change

on that is you know isaka does a very good job of distinguishing the

governance and management are separate processes yep right and so I wouldn’t so

just that just because of that I wouldn’t include Management in the definition of governance um cuz that

that could lead to confusion got it got it so what do you think is happening in

the security GRC industry today it has been a very mature industry right but what what what is your take on it MOS

what what do you see happening so I think we kind of touched on part one big problem I think one big thing that’s

happening is this security governance being more myth than reality I think there’s a lot of aspirational security governance where you know people talk

about cuz you know they say like work for the job you want not the job you have and so I think that kind of

influences a lot of what’s going on with security governance um people want to

uh they want to have a seat at the board or they want to be on the board right or they want to be in that se Suite um and

so they talk about security governance if it’s really happening that way even though it’s not so it’s more

aspirational uh that’s one thing that’s happening I think on the risk you know security risk management side I think

there’s a big struggle to evolve the state-ofthe-art from qualitative to

quantitative analysis so you know I mentioned I had my own like hybrid definition that you know mashes up ISO

27,5 and uh Fair um but that’s so that’s kind of even

exemplary of that um and so I I don’t know I I hope it’s going to resolve in

that we get the state-of-the-art consensus for quantitative analysis but I like I’ve talked with with vendors or

or even standard bodies that are ambivalent um or they don’t

know how the the smoke is going to settle on that Battlefield and so they’re just kind of waiting um before

they move forward um to see which way it goes and then uh and then you can even

see debates on uh LinkedIn like once you become like a fair member or you start following the fair Institute online you

just get all of these debates in your feed of people you know taking shots at

quantitative risk analysis or you know or it’s adherence like you know uh or

even creators or thought leaders like Jack Jones or The cenia Institute right

um or Doug hubber and Richard cson right and so it’s it’s a really it’s still

contested it’s I don’t think that debate has been settled yet and then on the uh security compliance management side it’s

undergoing digital transformation um but it’s a digital transformation that lags behind the digital transformation that

it and Engineering went through right in the last decade got it no you I think you’ve

talked about do you think the new cyber security SEC materiality rules put

greater emphasis on quantification on the this

quantification yeah so you

know I would have to say no because they explicitly state that you can’t just use

quantitative analysis to meet the requirements right um and so I I would

say they don’t but that hasn’t stopped uh risk quants from trying to leverage

it and capitalize on it um so like Fair came out with the fair materiality assessment model specifically intended

for compliance with the SEC materiality rules yep um but the rule itself is very

clear right like there was that’s another example of the debate right they was the debate about that when they were

working on the ru making and they settled on the final language that doesn’t stipulate quantitative analysis

um so so you’re still you’re saying that it’s still very subjective it has qualitative and quantitative aspects to

it yeah and you know and I understand PRI like there’s I you can’t just have a purely

quantitative uh analysis um for things like that right there’s qualitative aspect to the there’s qualitative

context that needs to be considered or to put the quantitative analysis in the context you need qualitative assessment

right or you need to look at qualitative results um so you know the SEC was kind

of in a tough spot there but I think the industry or the practitioners let me not

say the industry um the practitioners need to come to a consensus best practice on how those two go together

and I think that’s the tension that’s unresolved got it got it so I think you talked about some of the challenges with

security governance security risk management security compliance how in your view how do you

think the the security and GRC teams and the practitioners should react and adapt

to these changes or to these to these new challenges

so you know I try to I try to think about these things in terms of know people process

and technology and then it goes back to my training with John VAR um and so I think from a people

standpoint I think the professionals have to be versatile right and and by

versatile I mean they need to have a well-rounded skill set that covers you know governance risk management and

compliance management so they’ve got to understand governance they’ve got to understand you know quantitative risk

analysis and be able to put it in a qualitative context um they’ve got to understand how

to identify relevant uh requirements that not only create value not only I’m

sorry not only protect the value of the business but also create value for the the business or the organization right

that they’re working for or supporting um so that versatility I think is is crucial

and uh another part on that compliance management skill set is you know it’s Harmon izing internal and external

requirements right like how do we make an external requirement relevant internally and how do we make an

internal requirement uh relevant to external stakeholders uh from a process

standpoint you know I think it’s given

the problems with security governance you know being a little bit more aspirational than uh than reality a

concrete reality um and security governance is a big input to the risk management and

compliance management I think like any uh it or technology problem input

validation becomes crucial right like if your requirements are coming from security governance but you’re getting

bad security governance output you’ve got to make sure you distinguish the bad output um from the good output so that

you can actually create a relevant security program a risk management compliance Management program

um so that’s that’s I think that’s key um and then you know maybe even and I think

what ends up having with a lot of Security Programs is when you are providing your own governance input

because you aren’t getting it from a governing body to provide it um like who

who checks the Checker right like like if you’re if you’re self- serving your your governance well who’s saying

whether or not that governance is appropriate um and I think that’s another big problem with security

governance is being so immature right now um so imput validation right like somebody may have to tell the Security

executive that you know I have a colleague that uses this phrase a lot that their baby is ugly like hey this

strategy is no good um and then uh devops I think you know I

mentioned the security compliance management going undergoing a digital transformation I think we know devops

was a great tool for digital transformation um last decade um and I

think it needs to be just as vital a tool this decade for security compliance which means you know security compliance

got exposed to it in the last decade is they were trying to figure out how they could provide Assurance with this new

this new mode of operating uh but you know I used to have a saying when I was

a consultant like those who can do those who can’t teach and those who can’t teach

audit and so I think compliance professional need to make that transition from being able to audit

something to being able to do something when it comes to devops and I think that is the tough part of the digital

transformation security compliance right now and then from a technology

standpoint I think uh security compliance or security GRC programs they

need they need flexible platforms they can work on um because they have to cover the three lines right uh they’ve

got to cover the first line the second line there first line would be the operators the second line would be the

compliance professionals who are evaluating the output from the operations teams um to make to hold them

accountable and then the third line is providing Assurance to the the stakeholders right at the governing body

level which would be your board uh your executive management your external

stakeholders uh and those three lines work very differently right like first line is in the weeds second line you

know they have that 10,000 foot view you know tend to be more Jack of all trades know know a little about a lot um and

then the third line is very focused right they only care about what they need to care about like what do they

absolutely need to trust for the decision that they need to make with the Assurance they’re given and that’s all they care about um and so because of the

those different approaches is how they like to work in the GRC with GRC information is very different and so the

platforms need to be flexible enough to allow that got it got it so if if somebody

were to ask you how do you build a security GRC program today and add Assurance to it right how

would you build a program today then what is typically being taught or what is the common know what would your

answer be to that so my My First Response might be is

probably be like a muscle memory like a reflexive response um because I I did it

so much when I was a consultant and so it’s and it’s still my default um and so it’s really just a

simplified version of the the management processes that they outline in ISO 270001 standard and so the way I

simplify it is you’ve got to have for any any security GRC program needs to

have these seven simple business processes in order to provide assurance and build trust with stakeholders right

so you got to have context um so you got to understand what you’re securing and

why secondly you’ve got to you got to have

leadership right you’ve got to have a vision so of okay this is the thing we’re trying to secure how should it be secured right in

order to satisfy our why and so you know that typically gets expressing things like you know uh

security policies uh allocation of roles and responsibilities and things like that

right so now you know what you need to secure you understand how it should be secured

then you come in the next process which is planning which is

um how do we implement this vision for how we should secure our

information and right now where we are in our state of practice it’s uh it’s

typically risk-based planning right um I think that needs to evolve to be uh

trust based planning but there’s we’re immature in that we don’t have good um

we don’t really have a consensus best practices for doing that right now um so that’s that that that’s something that’s

in development but you’ve got to have either risk-based or trust-based planning process that identifies what

your objectives are for implementing this vision of security once you have your planning

your next process is support what do we need to have in place to execute this plan for the security GRC program right

and so that needs to cover things like what resources are required um for the people that are going to be executing this plan what competencies are

required uh what awareness do the stakeholders need to have of this program as we execute it as we execute

this plan uh what communication needs to be in place to keep the practitioners

and the stakeholders in sync and then what documentation or you know do we need to have as as records so everyone

can at any time come and get the information that they need as we ex as to execute this plan

you’ve got that in place then you can get into the operations of it this is simply the execution of the plan right

you know what you need to do to implement the security Vision um You’

got the re you got the support in place to execute it and now just go executing it right and that’s just your standard

project management yep right um after you your operation

process you have to have a performance evaluation process that says Hey how well did we do implementing this vision

for a security GRC that was set by leadership and then the final process is

Improvement which says where you fell short of implementing the vision you

have corrective actions or continuous improvements to close that Gap um and

then if things changed in the context from the time you started executing the plan to the time you did

your performance evaluation well what improvements do we need to make or changes do we need to make to account for the changes in

context and those are and then you know those seven processes are you know cyclical and uh sometimes they run in

parallel but if you have those seven processes I think you can uh you can build out a pretty

effective security GRC and insurance program

um and I think what one thing that’s different we already talked about is you

know we should try to shift from a risk-based plan to a trust based

plan um so and I maybe actually I’ll explain why I think that’s an important shift that needs to be made yep I think

think what really got me thinking about I was always thought about this there’s this open source security testing

methodology manual from uh Icom and Pete Herzog and so in uh I want to say it was

probably version three or four they introduced these trust principles into

the the uh Austin and and I thought it was

fascinating and then they came up with a trust score and the way they articulated it it made

so much sense like because Assurance is about trust but we focus on when we F focus on

risk the risk side of it we’re focused on making people we’re building people’s trust by giving them assurance that the

bad things that can happen are diminished sufficiently diminished right or

controlled as opposed to tell them what which is kind of an indirect way of providing uh TR building Trust whereas

why not just have a direct way of building trust by hey what do you need to trust this

output and tell you whether or not that what you what you need is what you got um interesting and so and I think

that becomes really important now with artificial intelligence right

because if AI if like like so with these Genai models right

um if the large language models or the neural networks operate in sort of a

black box and it’s not really understood how the output is

created right but we need to trust the output well trying to focus on uh a

risk-based approach to that could be a never-ending

exercise but we can absolutely enumerate what we need to trust the output can you

can you elaborate on that why do you think it’s going to be a never-ending exercise well I mean because in order

if it’s if it’s a black box if you’re getting output from a black box how can you enumerate all the risks you won you

don’t know right right um and so it’s it

becomes to me it becomes insufficient got it um from a Security Management

standpoint right like you’ll never really know if you did a good job managing the risk um and so that puts so

how can you how much insurance can you provide right right they I think it’ll always be questioned um whereas if you

take that trust based approach and you just start with this is what I know I need to trust it and you can debate

whether or not that trust is whether you set the right level of trust right but that’s on the stakeholder not on the

trust provider right um so I I think it becomes more management I think it

becomes more realistic um and then the other thing I think that gets lost

when building out security gr building out or operating security GRC programs

is uh value creation I think it’s lost you know we Security in general tends to

over index on value protection um but uh

you know no business survives on protection alone right at some point the business needs to create value to

survive and security is no different um if security is not creating value

uh then at some point you know and sometimes you know some Security Programs struggle with this now right they be find themselves just you know

finding it hard to justify their existence right or at the very least their budget right um so you’re finding

ways to focus on value creation like and that and that goes back to that context process of understanding the why right

and if that why that that why needs to be focused on both value creation and

protection and if you have that then it should be easy Downstream to focus on value creation throughout those other

six processes got it and by value creation do you mean both internal and external so for example custom Val right

how do you create value for for all the stakeholders right and like I think a stakeholders in I got this from um

Harvard Business Review but you know you have uh sh you

know stakeholders could be you know shareholders right would be one set of stakeholder um the communities that the Enterprises

operates in is another set of stakeholders the vendors and partner ecosystem that all Enterprise need to

deliver their services uh would be another stakeholder the employees themselves is uh is one set of

stakeholders and then uh the fifth one I am drawing a blank on oh is the right

the the governing body right the board right the in in the executive management

so um oh no I’m sorry I left that customers

customers is the one that I left out um and so how do you create value for all those

stakeholders right um so because if you if you’re internal employees if you’re not creating value for them why are they

going to keep working to deliver the services to satisfy those external stakeholders right so I think you have

to have a balance got I think those are very interesting insights M trust BAS and not

just risk based I think there may be an intros section but your point is fundamentally shift your perspective on

how you how you want to manage the security GRC program two is focus on not

just value protection um which even then sometimes is very difficult to articulate today but Focus also on value

creation and not just for internal stakeholders but also for external stakeholders I think that’s brilliant uh

do you have any insights in terms of you know how you would go about sort of thinking about that TR based risk based

and value creation

so for trust based risk base um the trust based side is still immature um

but it is developing like isaka came out with this digital trust uh framework uh

I want to say two years ago uh they launched it and so I think that’s a start um like

you know the the OSS TMM has their uh trust assessments that they’ve created

um but I I don’t think we’ve gotten to like a set of consensus best practices yet and and I think both of those things

were created um while created to be flexible um we I don’t think we have

enough um I don’t think we’ve had enough practice yet to determine if they hold

up when applied to artificial int Ence right like are they actually giving

are they actually valuable in creating trust in these systems and these processes um that we need so I think we

need I think we need just need more time to apply apply them um and then fine-tune them right and improve them so

that we can actually get to some consensus um on the trust based versus the risk based thing but those are those

are the places where I would start um if I wanted to to apply a trust based approach God I I think those are

fantastic insights M and I think one challenge I think anybody listening to this program is going to be how do I get

the money resources time budget and all this right so how do you go about

convincing the Security leaders and Executives right on on how to go about

such a program any any advice on insights there how do you build a business case

yeah you know I think the first thing I always go back to when

it comes to building a business cases you know and this may seem very basic and simple but sometimes uh well you

know they like I have some family say common sense ain’t ain’t always common but uh is lead with truth and not

hyperbole um and I I learned that lesson a hard way uh in a Consulting engagement

we were Consulting for a um a municipal agency that uh they handled uh they were

the they provided the financial services for the municipality so they handed the financial service the fintech for the municipality right all the financial

services technology this agency was responsible for and so they were um

replacing the uh the financial management system for for the

municipality um and so uh we did a we came in and did

a security assessment of it in including a pintest um and the pintest we got root

on at every level of the stack um and in my in my compliance my

controls assessment I found like big- time deficiencies in the change management process and so we’re writing you know I

write up the audit report I had just gotten my uh cisa my certified Information Systems auditor

certification from my saaka and I so I’m fresh out of the classes and so every I’m cesa by the book and one of the

things they teach you is purpose of the audit report is to shock management into

action and so I write this inflammatory Auto report like and I had like even

even the fonts for each section they were like 24 Point fonts for for the section headings just to shock

management into action and so um John tried to tone it down a

bit um but you know I’m hitting him with you know cesa uh practice book chapter

and verse and he’s like okay all right all right we’ll try it we’ll try it and

um and even the contractor that brought us in because we were subcontracted they looked at it and they were like hey I

mean look the guy’s got a point I mean like look you had root on the admin desktops like this the system was owned

from in to end like this maybe this is what it needs to be and so we go into the meeting and

somebody at the at this ass the executives in this meeting opens up the report before the meeting starts and

flips to the table of contents and says oh this is going to be a fun meeting and

then someone else says you think the first page of the table of account is interesting wait till you see the second

page and uh and then one of the uh key stakeholders turns to the executive for

the agency I’m sorry the executive for the agency turns to one of the stakeholders uh for the project um the

one that was actually funding it and said you set me up because they’re the ones that brought us into the assessment

and so the meeting went terribly so after the meeting like it’s me it’s John

and it’s the uh the the uh the project manager who brought us in we’re sitting

and we’re having like Glenn levit Scotch to come up with a rescue plan like how do we rescue this engagement and uh I remember he the

project manager um wrote down on the napkin at this bar Glenn livet rescue or

Glenn livet plan um we sketch it out but and and it worked we ended up you know

getting things back on track they they ended up not kicking us out and they kept bringing us back for more work and

when I came in for the second engagement I was really nervous because I hadn’t really seen anybody since the first one you know had like kind of went down in

flames in that meeting um they got hostile and uh the

assistant executive director introduced me to the uh technology leader for this new project we’re working on and she

says I want to introduce you to MOSI and here’s what you need to know MOSI will always tell you the truth even if it’s

not in his best interest because his little firm came in here and they gave us a report that was

politically awful but they told us the truth anyway even it could have cost

them all millions of dollars in business with the municipality so you can always trust what they say is going to be the

truth so that’s the first step I think is lead with truth um is always you’re always going to be in Solid Ground even

if it’s painful right um and in the end when people re when that truth resonates

right people will know what they need to do um and understand it so while I me my

execution of shock management into action could have been better in the end it did get management to take action

right so leave with truth um not hyperboy so that’s why I could have I should have toned it down a bit because I really like amped it up it was like

reading like tabloid headlines it was it was awful um no no need do you stay

exactly um so I think so leave with truth and not hyperbole um but the the

other thing is and I think what really saved this is we didn’t just go into that meeting with these

inflammatory headlines but we had solutions that we proposed y um for those identified problems and so like

you know so never if if you’re leading with truth and that truth may be painful to swallow

um don’t bring someone the problem without a solution right um and you know I hear from other

colleagues that uh that that happens a lot in these in these meetings where

people are trying to present to Executive teams um where the the you know the first question is so what what

do I do about it right and then the and the the response could be like hemming and Hauling and or the well it depends

right I think you got to have a clear solution that you propose um and then I

think you and then the final thing think you got to be able to demonstrate value creation for that from that solution

whether it’s direct or indirect so whether it’ll directly address some uh third you know some customer security

requirement right for a deal that you really want to close or that’s important for a group of customers a class of

customers or accounts that are important to the organization or if it’s indirect uh value where it will

um indirect value that will uh enable enable people to move up the value chain

right so like especially we talked about compliance going through this digital transformation and a lot of people try

to think about it in terms of automating manual processes right for the purpose of Saving Time right and eliminating

redundant task or tedious tasks and I don’t really think that the value there comes from

the elimination of time and it not that there isn’t some value there there is but I don’t think

anybody can really communicate very well because like none of us are really punching the clock right so we

don’t have good mechanisms for tracking time spent exactly um and I’ve tried a lot of them as a consultant who worked

on billable hours like like everything from having like things that monitor how long I had executables running or

windows open on my laptop uh to you know starting timers and J tickets right so

nobody has that so that date is not reliable um or it’s only reliable to a certain extent um but I think the value

of it comes from elevating people from to a higher

level of work so for example instead of just collecting like the the mundane task of collecting evidence from a

system elevating them from doing the collection to doing the evaluation of the evidence right so just instead of just

providing you know evidence that the information exists an evaluation of what

is the information telling us yeah right like where is the signal and all this noise got it and what should we do about

it and then that kind of reinforces the other thing of now maybe you can propose a better solution if you have a better sense of the problem that was identified

in the evidence you collected right got it no I I think that is that is very very interesting Mery so what would you

say to somebody who is who’s inheriting a program right I mean this has been there happening for some time now you’re

asking them to sort of change the tires while driving right how do you how they inter and how they go about this

I think um so one thing I started to realize and

this is you know this realization kind of started in uh conversations with you um it’s probably what 18 months ago now

is uh is I realized like okay the first a

tool I I needed a better tool or a better approach to identify where the

security compliance program is and where does it need to be and a lot of times

that looks like like a maturity model um but the maturity model wasn’t really sufficient for what for the answers I

was looking for the insights I was looking for like maybe the context I was looking for so as I was thinking about I

thought about it in this idea of these four quadrants of security compliance I think I’ve seen it before the the static

and the friendly and the adversary adversary and the friendly and the static and the dynamic assessments right

yeah so there’s AIS of Engagement and environment right and so how do

stakeholders how does the third line engage with the compliance program is it adversarial or is it friendly and then

what is the environment for the scope of the compliance program right is it a static environment or is it a dynamic

environment and thinking of it that way gave me and I it gave me a better way to

figure out okay this is what the program was designed for and is that still fit for purpose

and if not why not and what is and so I think a lot of

organizations uh their compliance programs were you know created in the time where the environments were static

right like I remember um like I was thinking about like that Municipal I

started out like Finance reporting systems right doing it audits with them and it was routine that the best

practice was you don’t update the revenue generating systems but once a

year right and everything was designed to not touch the revenue generating systems unless it was absolutely

necessary and so like a lot of compliance programs were built around that mindset is these are the uh

sensitive systems for compliance and so we don’t touch this environment the the

whole goal is to control it to the point that nothing changes because every change leads all this additional compliance work y um but now that we

went through digital transformation right we introduced these different concepts of working you know from

waterfall to Agile and and devops the environments become more dynamic they

went from being you know these controlled systems uh in someone’s building to these systems in someone

else’s building managed by their staff right um up to a certain point of the

stack you know the things have become more Dynamic and the compliance programs need to adjust for that and also um it

went from you know I talked about how when I first got into security GRC um

and the decision for the consulting firm was to focus on ISO 2701 because the world was becoming flat uh from a global

business standpoint and that also adds dynamism to the environment right so instead of just having to comply with

domestic requirements for doing business now you have to comply with International requirements for doing business or if you’re looking to expand

into other markets what are the requirements for those markets or if you’re trying to grow your total addressable Market to different

customers well what are the requirements for those customers as compared to the you know the typical customer that the

business was created to serve so all that dynamism I think um you have to

understand that and if you and if you don’t then you’d be tough figuring it out or it definitely be tough to figure out how you create value if you don’t

understand why your why what trust people need from your program in the first place absolutely ABS I I think

there’s a lot of wisdom that you pack in there most and if somebody wants to look at that is there a place where they can

go look at the the four quadrant Matrix uh yeah so I did actually did a

presentation um with my boss at Netflix Charles naatu uh we did a a presentation

for uh cers um they do this engage speaker series and so uh you can go to

their YouTube channel and we’ll put a link on the podcast but thank you that’s that’s sort of actually fantastic most

you know I sincerely appreciate it um what would you

tell the younger self mosy or I think sort of differently put right if a new

for a new person who’s entering into the security and GRC program to the security compliance engineer to the GRC analyst

what would your advice be right um and where where can they get started especially in environment where they say

we have it all automated right to to the example that you were giving earlier right we we have you know we have the

intrusion prevention system system things like that how what do you what do you what do you advise them where do where can they get

started I would if they have everything automated and they passed the audit

right and as far as they’re concerned or maybe as far as their bosses are concerned right everything is good with

compliance um I think I would now you can take

things to another level right and now you can start to Pivot to some of these areas or these ideas that we talked

about that are less mature or less understood or practice like you know can you pivot from a value

protection model to a value creation model right so um how do you make your

program more valuable um how do you drive things forward for your stakeholders uh in terms of uh providing

value to employees customers you know suppliers and partners you shareholders

and communities and uh another thing I would do is if if you’ve got everything

automated and you’re passing the audits then maybe you can also try to make that

pivot from risk based to trust based right like if you got a good handled of controlling things from going

wrong how do you get assurance that things are going right

yep yep now I think that is fantastic mercy and

um we are approaching almost at the end of the program and given sort of all the wealth

of the experience that you have if you were to dream of a security

GRC solution what would that look like what would those attributes

be o so I think it kind of goes back to one

thing I said earlier is at a fundamental level it would have a you know user interface and uh a user

experience that engages those key stakeholders where they like to work right so that first line second line and

third line that we talked about those you know employees shareholders communities suppliers um it would it

would it would start there uh customers and and that is an ambitious asking of itself I know that’s like a

utopian idea that you serve all those different populations in a way that makes them all happy um but that that

would be my dream uh so that that’s one thing um and then more specifically I I

I you know I think about it in the terms of those seven processes um and so like from a context standpoint I would love

to have like sensors that you know gather and process contextual information um maybe in a way similar to

what we see with threaten intelligence Services um they’re taking a whole this ocean of information and then it

distills it down into things that are relevant um so I would love to have something

automatically sense and gather context um and distill it for the separate the signal from the

noise separate the signal from the noise that’s right right

um and then uh but I mean but broader than just like thread Intel you things

like hey like we talk about those four quadrants like what are changes in the environment right what are some

regulatory issues that are going on or what is these customer complaints in this region um got where do we see

moments of Truth failing right and we want to change the trust narrative there right all that kind of context right at

a at a business or organizational level and Community level um so um from a

leadership standpoint I I would love to have a platform that had uh you know

workflows that made it simple for leadership to adjust strategy you know

make additions to the strategy based on that distilled contextual information that we got now from this dream platform

um and I would I would love it if we could even automate you know the recommendations for you know policy

positions or allocation roles and responsibilities right like hopefully from some Trust AI

Source um from a planning standpoint you know I

think as this is a dream but even my my dream is still limited anchored in

reality a little bit um I would love to have workflows in the system to support quantitative risk and Trust management

because you know I don’t think we’re settled there yet um I I’ll pick quantitative over qualitative um and you

know maybe in in my dream it be something to kind of mash together the fair controls analytics model and the

open- source security testing methodology manual trust principes approach or trust assessment approach

maybe something mashes those together um and of course you know automated

recommendations for you know like objectives and key results to measure the risk and Trust management I think

would be fantastic uh from a support standpoint I would want Integrations uh out the wazo right like

Integrations with the accounting system so that we can for our resource management um a procurement platform um

the hris um you know for that resource and competency management um whatever the

communication platforms are for the like the email platform the uh chat Ops

platform or collaboration platforms uh the Knowledge Management platform so that I can cover the awareness U coms

and the document management right so I would want integration with those uh for operations I would want to

have an integration with the project management system right so that people if people have a way they like to work

the system doesn’t step on their toes for that right it it fits right in um and then uh for performance

evaluation you know we you know nowadays the talk is like data Fabrics so you know it’s got to have like a data Fabric

and some business intelligence for metrics and Reporting um because you know dealing with a lot of data and like

you said we’ve got to find a way to get signal out of all the noise um

and then from an improvement standpoint U you know just a workflow for

corrective action and continuous Improvement where it has but it’s got that human in the loop where maybe it’s

an automatically generated recommendation and Remediation where possible right if we really got our our

stuff together our asset management and configuration management together um but that human in the loop that says yes

this is what we want to do or tweak it as possible before we push those changes you know into operation

you definitely do have a dream I think you dream a lot m i mean I was not expecting a you gave me a scientific

breakdown of of sort of your dream from GRC Solution that’s fantastic I I love

it um it’s almost like you you want to build an autonomous GRC Solution that’s what it looks like or an agentic GRC

platform yeah right but with yeah agentic with you know with humans in the loops at these key checkpoints

absolutely absolutely no mostly I think this is been a lot of fun and I wanted to sort of end the um end the podcast

with this question I know you are a fantastic reader you’re a voracious reader are there any um podcasts Audi

books books that you read listen that you can share with our listeners and why

and what what is that that is I mean maybe if you can describe why you like them I think few of them that would be

super helpful sure so you know I’ve I think these days I’m more of a raous

listener than reader because a lot of my consumption is switch to audio

um but uh from a book standpoint uh I think you know we talked about security

compliance undergoing its own digital transformation and you know how that’s been influenced it needs to be follow

some of the lessons learned from devops I think there’s a it revolution has a great book on that um Investments

unlimited from the same group that published the devops handbook um the Phoenix project I think the invest

unlimited book is y excellent um and then on the from a book

stamp on the I have a fiction book that I always recommend to people um it’s a

short story by my my currently favorite uh sci-fi author in K Json it’s called

emergency skin uhhuh and it’s a short story about uh about a human who comes back to Earth

after uh her people have left the Earth because of climate catastrophes and just

general degradation of living conditions on the planet and they come back to the planet for resources and it’s a short

story about what they find when they come back and I I I won’t ruin it for anybody but it’s an it’s just an amazing

story about um what humanity is capable

of with cooperation and it’s also wickedly funny

because like and I that’s why I recommend the audio book because the narrator just the the the way they in

tone certain phrases it’s it’s I don’t know I think they had to intend for it to be comedic but it’s it’s hilarious

the some of the things that the it’s a the human that comes back they have an AI assisting them on their trip and so

like the things that the AI says to the human this just hilarious that you have this machines perspective and this human

perspective was this book written to you know oh this probably came out three

years ago maybe three or four years ago okay um it was um audible commissioned

these the series of short stories um and so that’s and so you know they they were marketing it and so they push it to me

in my audible uh app so I stumbled on it but it’s so it’s fantastic really the

the the the the jewel of it is the story about human what is capable when Humanity cooperates

so I think that’s an inspiring story um and then I say I do more listening

than reading so uh big on podcast and so uh I think the podcast I

from a security standpoint the podcast I probably get the most from is Enterprise security weekly which the the main host

is Adrien sarria and so they do a great job of you know reporting on the industry in terms

of uh startups Acquisitions mergers um but then they also summarize you know

articles about thought leadership um and and now they’ve expanded it with

uh I think Darwin Salazar is his name so now that he’s been added they they also

cover reporting on uh product or technology capabilities that announcements so like new products new

features um Darwin does a great job bringing that so I it’s a really comprehensive podcast um that really

keeps me up to date on where things are in the industry and from a practitioner standpoint

and then I think to compliment that is uh the center for Internet Security started a podcast which they have now

over a 100 episodes of is a cyber security where you are and you know I think I’ve talked

earlier about um meeting people where they’re at that where the stakeholders

are um and so that’s kind of the intent of that podcast and that’s how they talk about cyber security and I think they do

a fantastic job of it um got it Sean ainson is the ceso there and he’s one of the smartest people I ever work with

absolutely absolutely agree cyber security so absolutely I I I I think MOSI we will

get the links from you and we’ll put them on the podcast the the comment section mosie um thanks for being part

you know being part of the security and GRC and you have truly decoded security and GRC I think it is nothing short of

an inspirational podcast for me and I’m sure our listeners will agree as well so thank you very much for for for thanks

for letting me ramble on rer I appreciate [Applause]

[Music]

Listen on your favorite platform and stay updated with the latest insights, stories, and interviews.

CCM NERO graphic

Want to see how we can help your team or project?

Book a Demo