In this episode of Security & GRC Decoded, host Raj Krishnamurthy (CEO of ComplianceCow) sits down with Ayoub Fandi, a Staff Security Assurance Engineer at GitLab and co-author of the GRC Engineering Manifesto, for a deep dive into the evolution of GRC through an engineering lens. Ayoub shares how his background in consulting and cloud-native startups led him to question the traditional, checklist-heavy approach to GRC—and why embracing real-time data, automation, and developer-friendly processes is the key to building stronger security and compliance programs.

He also reveals his controversial perspective on external certifications—explaining why they can sometimes feel overrated—and makes the case for continuous, risk-based assurance that truly reflects an organization’s security posture. If you’ve ever felt the “cognitive dissonance” of outdated compliance controls in a modern engineering world, this conversation is a must-listen.

Key Takeaways
✅ Bridging the Gap with Engineering: How GRC teams can embed themselves into developers’ workflows (e.g., JIRA, pull requests) to gain more accurate data and achieve real-time compliance insights.
✅ Continuous vs. Annual Audits: The advantages of leveraging APIs and automation to monitor control effectiveness in near real-time, instead of relying on point-in-time evidence.
✅ Rethinking External Certifications: Why these certifications can be a misleading representation of true security and how GRC professionals can ensure audits deliver real value.
✅ Building a Modern GRC Program: Practical tips on designing policies and controls that align with fast-paced, cloud-native environments—minus the “waterfall mentality.”

Tune in to hear why GRC must evolve alongside today’s DevOps-driven world, and how you can unlock greater efficiency, credibility, and trust by adopting an engineering-first approach to governance, risk, and compliance.

🎙️ Security & GRC Decoded is brought to you by ComplianceCow.

Make sure to rate and review the show to let us know you’re enjoying the content!

Subscribe now for expert insights from industry leaders shaping the future of security & compliance.

🎙️ Follow Ayoub Fandi:
Stay connected with Carlos’s insights and experiences by following him on LinkedIn: https://www.linkedin.com/in/ayoubfandi/

uhh uhh [Music]

hey hey hey welcome to security and grcd Corder I’m Raj Krishna morti your host

and today we have a fantastic guest today a fandy i is a staff security

engineer Assurance engineer at git lab he’s also a co-author of the GRC engineering Manifesto and is a

well-respected figure in the GRC Community welcome are you thank you very much for having me looking forward to

the conversation let’s record want to start off with uh maybe we we’ll start off with with a personal sort of touch

to it so can you share your journey into GRC and what inspired you uh to adopt

engineering to approach to governance risk and compliance so yeah of course uh

so I’ve been in security for about six about six years now um started in Consulting like big four uh bigger kind

of consultancy companies um and because I don’t come from a technical background uh when I started in security I wanted

to to like kind get my building blocks in in terms of understanding how infrastructure Works how development

works and when I started applying like some of the concepts I was learning in

AWS or like doing some courses on software development I was seeing that

applying that in the context of compliance there was like a massive mismatch and so I started in 2018 Cloud

started becoming like a bigger thing um everyone was thinking about edbl Etc and

then you go on ISO and then you see those controls that like you know you need a static list of IP addresses or

you need to integrate security into project management and it felt very waterful it very on Prem and I was

getting more and more like cognitive dissonance it’s like my learning is in one side and like my practice at my job

is a completely different mindset and when I moved to the UK um I I worked at

a very small startup and would build the iso program from scratch and then I was able there to kind of see in a cloud

native context how it can of mix that with compliance and because you know it’s small companies very like

engineering SL prod driven like the BS uh amount they can take is very low so

if you don’t meet them where they are most likely they won’t do it so I started using like jir and like some of

the tools they were using to integrate myself into like the pull requests and how they handled projects and it made me

think like GRC would benefit a lot from having an approach where you bridge the

gap with the engineering stakeholders you work with because it makes GRC faster and more efficient but it also

makes it more accurate and I think that’s where I was seeing like quick wins where they liked me more so I could

get actually the data I need but also at the same time I was getting more like relevant data and I was also getting

closer to like real-time data instead of getting something once a year doing a walk through I could just call an API

and get the data every week or every day if I wanted to which meant I could monitor like how things were operating

more on a continuous basis instead of like once or twice a year so that’s that’s how it kind of started got it got

it so looks like you like challenging status quo so maybe let me ask you this what is one controversial opinion you

have in GRC um I would say like one one controversial opinion I I do hold

is I think like external certifications are extremely overrated um so I would

say they do have a bit of value but I I would say they’re they should just be an

like a positive externality of a well oiled like JY program instead of like the objective of any particular team um

and I think if you work in GRC and you’ve been through a couple of audits you know how much art there is instead

of like science into it and you know we can talk about scope manipulation the way you design your controls for sock 2

like there’s so many ways through which you can make it less and less like Assurance driven so then when your

customers are looking at it they don’t really see what’s behind it but you that went through the audit you actually know

that the value it holds is is fairly low and I think another type of stakeholders that know is like the control owners so

sometimes you prepare for an audit so you ask questions to maybe the head for a sec or or maybe like someone that

works in in Engineering in the type of question you ask they not related to what they do in the day-to-day or were

the actual risk like risky areas are for them so they answer your questions but also think this is not accurate this

this does not all value so I think for me I think it’s fairly overrated uh you

know some people might disagree which is which is perfectly fine with me as well you know have you know share share with

all like the comments you have on like why you think they’re like be underrated or like fairly

rated got it you you have some very strong opinions a so what is your view

of GRC and how do you think it differs from the traditional interpretations and

why so for me so if I want to split like I think GRC is when you say GRC I think

we often mean compliance I would say like if I had to do a split I would say 60% compliance maybe 30% risk and

governance is just like you know 10% it could be zero Europe um it’s just like having policies having maybe an

awareness program and maybe a fishing campaign once a year so it’s like for me it’s very compliance driven and I think

the main issue we often hear about security versus compliance debates it’s a very hot like debated Topic in our

industry and I would say like the way of view GRC is for me the guard rail that

ensures your security program is like you you have an accurate view of how

your program is running and I think it’s fairly far from how it is right now and

I think the main issue there is because it’s so compliance driven when the security or as a whole they’re trying to

let’s say win a fight you know something where it’s very challenging for them to get like executive buying I was thinking

of like MFA for instance right or like Lo local admin rights so they need

everyone they can to help kind of push the envelope for the security team

because it’s such like it it increases the risk posture by so much but often GRC they not in these

conversations because what they think is like is this directly related to like a requirement we have from a compliance

perspective okay no you do whatever you want yeah we we don’t actually care

about the outcome because the outcome is not relevant for our job and I think we need to make security outcomes relevant

for GRC beautifully sir and for me that’s like that’s what’s going to

change change the approach making compliance just an externality instead of the whole purpose of the team got it

got it now I actually came across your GRC engineering Manifesto A couple of months ago loved it now for for our

audience can you sort of what inspired you to write co-author this GRC engineering Manifesto can you describe

that a little bit and most importantly what hope do you expect to have on the industry and the community so in terms

of like the Genesis I think so kind of a pool of practitioners who all like kind of doing Jass engineering

stuff in our own companies companies of different size different challenges but we all were like you know relatively

like fairly big technology companies um and what we saw is like our we we didn’t

like no one codified the approach that we thought was relevant for GRC as of that time so when we’re

speaking about J engineering some people might think we think about integrating

the engineering teams with JC and some other people might think it’s like

making JC processes like more engineering driven so there’s like different ways of thinking about it so

what I wanted to do is like have a you know it’s just an it’s to try we tried to like codify

some of what we thought was like relevant and like almost Universal in the context of like J engineering so

like being more product driven seeing Jersey as a product being more focused on systems thinking so some of these

things that for us are like kind of lackluster in how we practice currently

and we wanted to like make it almost as like key Milestones when you’re thinking about G GS engineering like you need to

have these in mind when you think about this so for us that was the the first

thing I think another thing is almost like marketing tool I think GRC is often

seen as like the less interesting area to work on in security maybe like less

shiny than like maybe you know pentesting or even like clse working at appsec Etc so we also wanted

to highlight how interesting ji could be if you thought about the problems in a different way um and for us like it also

helps kind of close the skill Gap a bit just because if we have more like technically minded people or even like

software Engineers that interested in like working in our field we can make like a massive impact in the industry as

a whole because a lot of people that work Jers because of their background most

likely they can’t like interact with apis and like build some of the stuff we need to build that practice and I think

kind of either getting people to be more technically minded or having technical people join our industry like both of

both of these outcomes for us is a massive win just because I I I think our industry like has most of its main core

principles that Dat Back to the en run days like I had at least 20 years old so we wanted to like kind of have all of

these Concepts that you know shook the world in terms of like the devop revolution Etc have it in in the context

of of DRC so in terms of also like the the value for for us I think it’s we we

we really wanted to have like DRC engineering as a way to have a a program

that is not driven by compliance as I said but more driven by risk like for us uh a proper JC

program as compliance is just one of the outcomes that you get a couple times a year the way you run your program on the

day-to-day is by being risk-based because by by following the risk approach you know the trade-offs of

every decision and you have to prioritize using all the data you have internally to know which like which

problems you’re trying to remediate because you can’t do everything and you actually focus on

problems that do exist instead of just focusing what in the list of requirements from your compliance uh

standard which might not even be problems at your company maybe you already cleared everything so I think

it’s for me like it’s having a more like Risk uh driven program is super relevant

because compliance is almost like um like professional inventory team very

good at recording a lot of stuff right like we get so many observations from or like issues that come up of audits maybe

we don’t even have any right so good like no qualification or sock to perfect it doesn’t mean there’s no problem in

the company and being so driven by you know we we we collect everything we get

all that data and then you know that data we don’t really know what to do with it it makes us once again like

completely because if you pass a sht from a compliance perspective you you did your job but like if you working in

incident response like how can you say you did your job there’s always new incident that happened like the attack

surface might like increase every single day so they not like there’s no specific

outcome they’re driven by they driven by risk right they focus on the areas where like attacks are most likely and they

reduce the potential impact or the potential probability on these on these specific like attack vectors whereas us

we don’t have that so we want like just engineering the approach want to move towards that because that also where we

speak the same language as the other security teams because they all work towards like vague

outcomes right being more secure but we have very defined outcomes which is like certifications as attestations but I

think it’s like almost like a false flag we think we achieve something but we

just like humster in the wheel which just going again and again and again so that’s for me like we want to go from

being like data gatherers and like just like filling out databases to being

people that actually help push the envelope on the remediation side beautifully said okay got it now I think

you’re pointing to something very interesting right because I think the I the word data gatherers is a fantastic

word so beyond data gatherers I think you’re also pointing to the mismatch In Cadence right with what for example the

devops team operate and what the GRC team operates so what is your view on how do we integrate GRC with Dev sov

yeah that’s that’s a great question because I think um I think Dev ups and devups I think it impacted GRC a lot

more uh um I think it had a bit impact because like the way we produce software

changed dramatically um and especially like the number of things handled by developers like increased as well like

we have like the split between production and development changed a bit and um I think like when we think about

devops and Dev Ops we think about you know cicd pipeline that’s one of the main things we think about and that’s

where most of the like code is produced and then it’ll be tested and then like deployed from there

and in terms of like us in GRC we still think about like a software development

project I like those Gates that you need to go through and then at each gate you might have a check and then if you pass

that check you go to the next gate and we’re a bit like une easy with like this

whole process being almost completely automated with no human involved and no one to like you know put that St of

approval before it goes to like deployment and I think it forces us to

change because we won’t revert back to something before defc cups to satisfy

GRC it’s not going to happen so we have to go with whatever is going on right now which is making software quicker

more efficient like you’re faster to like make sure you’re ahead of your competitors in your industry and in this

context like GRC when you think about the cicd pipeline you need to understand

where you need to know what’s happening and like tools like policy as code are super helpful because like let’s say you

go on mode and then you have the build of like the the the after the push

there’s the build and then when the build happens you want to check for specific things right you want to check maybe there’s no secrets you want to

check maybe that you know you use like if it’s like maybe infrastructure code you want to check that you know

encryption is like by default enabled for like all the buckets that are going to be like spun up so for all these

things it’s easier than ever because everything is declarative so there’s

like literally a a recipe book like a terraform plan that you can check and

you know which lines you care about and this is so powerful because before it

was happening almost in a black box and then you had the output and then you had to be involved either super early in the

design phase or way late when it’s already shipped but now the way things are built is like by

saying like build me this kubernetes cluster which means you can be involved

in a more meaningful way because you can change the recipe book but for that you need to understand

the recipe right so that’s the thing where there’s like also this mis patch of skills like you need to understand what terraform is and like now we don’t

go like the console to like create a new VM like you state what you want and then

anytime the desired State like is not with the real state it changes so we

destroy infrastructure and we re build a new one and I think this this mindset shift that

needs to happen is super helpful for us because when everything is written down

you have traceability you have audit everything is in potentially Version Control which means you can know what

change how it changed for GC it’s a m of information everything is in there the

only thing you need is to get the right like amount of skill to understand how

these things work and like polics code might be complex but maybe you can start even just like learning how your team

uses terraform and kind of understanding like okay like just tell me which lines as a security person I should know about

and they say this is what the one about access control this is the one about encryption and just getting this this

first steps you already way ahead of most GRC teams and you can have an

impact on actually making like your software development pipeline a lot more secure and also you still satisfy all

the controls you need to for compliance so it’s like it’s like complete wiwin no absolutely in fact uh it is very

interesting one of our previous guest Carlos Batista made the statement he said we are moving from the idea of

Click Ops to gitops right and and that’s a sort of I think that’s a that’s a

that’s a beautiful thing that you said so what do you see as the biggest challenges in building a GRC engineering

program and how can you how can organizations overcome that so I would

say uh for me I see couple I would say a big one for me is the background of most

of the GRC management director/ heads of I think the the way so if you think

about uh Engineering Management most of the time an engineering manager have has been a manage uh an engineer in the past

and then they moved to management so they share the same context same terminology they understand the work if

you move towards a more jar engineering approach you might come across your manager as someone that is more from the

traditional side of JC maybe they came through big four in it audit socks and then they moved to like typical view we

say uh we see uh in in in our industry the issue with that is there’s often a

politics office politics stuff happening where there’s a loss of control at least partial loss of control because some of

the expertise is not in the hands of management it’s in the hands of potentially like an IC that does this

work that that helps like forward the program I would say that in this case like Automation and

like ging time in the way you do GRC it’s also something that might be seen as like if you make it more efficient

maybe I don’t need as much headcount which might like I might lose some power as well in terms of I might be less like

properly Saed for my objectives and stuff and like there I think they’re

like legit stuff like that you can point out but I don’t think they’re like relevant if you think about it

holistically if you’re if you’re like ahead of and you want to run your GC program most likely you’ve bed heads

with the other heads of or the other leadership because they couldn’t give you like the screenshot you wanted or

did they were not fast enough to prepare for the audit because people they have other deadlines from other stuff and I

don’t really get why they have to jump on all these things what they could just like you know just call this API get

that data and then be done with it so by having an engineering approach what you

do is like you acknowledge that your GRC work is creating toil for everyone

else because I think it’s something we forget like not everyone in in the company like is is here to like satisfy

like compliance requirements they have jobs right they they do lots of things right and their their role is not to

just to be available for you when you need them for like a walkthr or something and just engineering

understands that getting the single social Tru where it is and pulling that

information in a more like autonomous way is actually making also work easier

for them because less contact switch like less opportunity for you to mess things up because hey you take a

screenshot maybe it didn’t take the right one maybe they toggled something off so it it creates um a context where

everyone is is feeling like they’re like respected in terms of like my time is

valuable like you know I have all priorities which means then when you need them for an actual

remediation then they’ll be available because if 90% of the time you spend

with control on nerves is for walkthroughs and requesting like screenshots instead of remediating some

stuff that were found then you’re not really advancing the program you’re just keeping the same thing running but it’s

not moving the needle and if you win that time that is not avilable to them when you actually need help on like you

know some cloud stuff and sometimes you need the might of compliance or the might of risk to help the infract team

and then in this case because they know you’ve like kind of made everything you could to not like like bother them as

much and like be as autonomous as you can they they see the good intent and they see that you do don’t the best

maybe maybe in some cases it’s more likely that you get the wins you need because you know you work with humans

you don’t work with machines so there’s also this aspect that you need to think about so I think

that that’s one of the challenges I see and I think potentially you know you if you think about it you frame it the right way I don’t think that’s that’s as

much of an issue go I I think you you talked about your working with

humans um and how do you think the GRC engineering enables that

relationship um relationship building mod stakeholders so I would say

the a good like positive externality of dur engineering is you win time right

you spend less time or like you know stuff that is not avilable especially like evidence collection some stuff that can take a lot of time what do you use

this extra time for right what’s the what’s the you know what’s the ad like maybe you win a day a week or something

I think what you need to do is to build those bridges with the other teams because the issue we have in GRC is

we’re very wary of the scope we have because most of our work is manual so we

can’t only we can only test so much when all the testing is happening in like Google Sheets and Google

dos when we actually can test more because we use you know a machine driven

approach to testing then in this case we can actually have a scope that mirrors a

bit more the actual production scope and not the compliance scope that is like you know um kind of artificially kept

small so in this case like you want to build like stronger relationship with

the application security team because maybe like it’s very tough for them to go past s maybe they have S scanning but

they want to go deeper they want to go like do a bit more like secret detection maybe like more Dynamic testing but they

can’t get to the heads of engineering and stuff because they say it’s all about speed it’s all about delivery like

want to make sure we can ship quicker like in this case like having you kind of highlighting some of the compliance

requirements but also like kind of building those relationships where you say hey like what we can do maybe for

step is have some tests that run but that don’t like we just record the

violations hey from from a compliance perspective we want to record stuff first so we have the violations recorded

but it’s not stopping like software from being shipped and then you can like kind

of have those calls maybe you educate them on like look at everything we found we didn’t stop like the the deployment

but look at everything that was found just beforehand and kind of going through that with them and you know

everyone sensible like sees everything and they want to understand like is it is it actually like dangerous I see some

criticals in there and that’s where we can then go to the risk-based approach and say hey in collaboration with the

application security team we’re working on like these five super important milestones we want to hit for this year

and one of them is like related to a lot of vulnerabilities you’ve had and hey

like this this fix like you can work with the team and you can actually like help absc go towards their own goals by

being that kind of conduit and you’re seen as neutral because you’re not directly relation in relationship with

them but at the same time you’re seen as trustworthy because you have that background of like hey there’s also like

Risk there’s compliance like we report these things to the board like there’s like this way through which you can

build those bridges that benefit like security but also benefit the other security teams so they they they can

they can also have another Ally that is like has the same goal but also

comes from like a different perspective so it’s often because sometimes when security is the Department of no every

team like infra infra might H infras sake uh engineering might have application security so that on every

side they might not like the direct counterparts but you’re coming as like almost like you know neutral third party

and then you can also can of help in in in some of these uh some of these programs that need like to to be pushed

forward to increase security got it do you get any push back from these teams

and how do you handle them so I would say you you might get pushed back um but

I would say the the way you should do it is you should deliver wins before you

ask for stuff so like before you you come across and say we need to focus on

this thing like this is super critical it should almost be like months or year

where where you don’t do anything other than like record what’s happening and

almost like evangelize you need to educate and I think what you can do is like if you work in conjunction with

your upsc team instead of just doing like security awareness like work on secure code training work on like some

bug Bounty programs internally work on some hackathons there’s lots of ways through which you can build that trust

with no strings attached and then when you actually need something from them

from security perspective like the trust is buil it it’s like if you just come

for like specific requests like it’s it seen as like not genuine and it’s very

easy to tell whereas if you actually care about like the developer experience and you actually make efforts when you

choose security tooling find one that’s not disruptive that really integrates well with what how they work maybe like

you know that fits well with the Ides or like the way you the cicd tool you use like I think not under under estimating

how important like their experience as like working as a developer or as like a

cloud engineer if you disrupt it like a lot with your security they either like

hate you or circumvent it and you lose in both ways so it’s sometimes you might

actually have to like lose a bit of like Security in the short term to ensure you

get Buy in because you didn’t disrupt their their workflow too much so I think you can’t just enforce everything I

think sometimes it’s you you have to say no you have to be direct but sometimes

it’s not it’s not the best way to get to your that desired outcome got it now I want to double click on the quick wins

what do you think can be the potential quick WIS for organization adopting the

GRC engineering practice so I would say like one very uh like Crystal Clear one

is like reporting I would say like in GRC uh very bad at getting good

dashboard and Reporting in place um because the data is all over the place it’s not structured so it could be like

documents could be in PDFs could be in in XLS files um so because it’s not like

machine readable in one easy format to pars and then maybe share with like a bi

tool or whatever we have often like very manual ways of uh reporting to executive

and and and leadership as well so I think with just engineering with thinking like everything should be in a

machine readable format it’s almost like we replace XLS with Json or you know we

have a SQL database so in this case when you have everything in a way that is

easily easy to parse it’s also super easy from that to build dashboards and

when you need to get to your information everything flows neatly because everything is like has a purpose and

everything has been designed with like proper data schema Etc whereas when you have have to like copy do a video cup

here and then like put it back into a PDF that you share in like a Google slid like it gets all over the place and

there’s like so many different ways for you to like introduce human error or like you know inaccuracies so that’s

that’s one way I would say that like the other way is through having that single source of truth I think um when you work

in J engineering the goal is to get almost like a data Lake where all of data lives in one place so you pull from

all the systems and that data instead of living in three four different places it

only lives in one place so it makes reporting easier but also it ensures that risk and compliance has the same

data because we see silos often in GRC and even if JC is only a subset of

security often risk and compliance they don’t communicate as much and that creates like top five risks or top 10

risks is the register is in one way and then the risks that were identified in

the audits is completely different list and none of that is communicated because they speak to different people and they

care about different things and I think when you start using the same data and you think about data in the same way you

might actually pull information that was like gathered by compliance for your

program because it’s in the same place so then it’s easier for you to speak the same language to use the Ser terminology

to think about risk to think about like issues which potentially like Fosters more collaboration and ensures like

holistically you can have like a more accurate vision of your program got it better reporting single source of Truth

maybe two quick wins that organizations absolutely we are in 2025 and I don’t

think we can have a podcast without talking about generative Ai and large language models absolutely so what do

you see as the role um in in advancing GRC generic and what do you particularly

see are their limitations so I would say like um like J of AI and especially like 2025 is the

the year of AI agents okay it’s the the buzz word for 2025 so yeah so I would

say the the value out of AI is it completely kind of follows the Mantra of

J engineering because the goal is anything that is relatively deterministic simple but cumbersome for

humans to do you can have an AI agent to do part of these tasks to liberate some

time to focus on like high leverage activities so typically I think like two big eras for me is like typical like Gap

assessments or way through which like you would test maybe your controls against NSF to get like a score or

whatever like a maturity level if you can just get all of dump all of your information almost as if you doing like

self audit information and then like a n agent would go through everything and

test it for you and check wherever your gaps are Etc I think it’s useful because

you need to do that but it’s mostly a documentation exercise

it’s a way to understand if you have everything neat but it won’t tell you as much but it still can take like probably

weeks if you do it with an external firm and it’s of course you pay for it as well and it might be like relatively

expensive so insourcing that potentially or using company that does that through AI agents I think is is one win and

another one for me is anything related to third party risk I think there’s a

massive issue there for me like of course everyone loves to trash questionnaires okay it’s a well-known

like Trope at this point but even if we don’t speak about questionnaire just like what how do you assess your vendors

how do you ensure your vendors like there you can actually trust them in your supply chain and I think the way AI

could be used is you know often you send a questionnaire or whatever an

assessment and then you record the results and then you kind of hold them in a place and then maybe you just say

yeah the vendor is fine we use that vendor the issue with that is you don’t

really know like your attack surface around supply chain you have no vision

because you send potentially like a very standard questionnaire and most likely you don’t actually check the results

because there’s 600 questions maybe you check only what they said no and they could lie as well which is which is an

issue and I think when we come at a time of trust centers where company is love to now kind of showcase bits of their

security programs in a specific website that is that can be queried like having

a way for an AI to pass through like all of your vendor stress centers and bring you that kind of third party risk

posture that is a living thing so you could have like regularly checks of like

hey this vendor just changed like now they don’t use OCTA they use a different way of doing doing SSO or oh this vendor

it’s been almost 2 weeks since like their so to expired and there’s not the new one that hasn’t been uploaded yet

and you could focus on the controls you care about and you can ask the AI agent to check for like SSO to check for

changes to like the way they do encryption or like you know anything like this and you could get like regular

feedback and wherever it’s not matching anymore you can just reach out to you know the P contact you had at a vendor

and in this case like you actually can have almost a dashboard of all the vendors and poal weakness areas and you

could manage hundreds of vendors that way so I don’t know if that exists but that’s a way through which I see AI like

making it a lot easier for you to like manage your vendors which is like most most likely your biggest attack surface

got and I think you’re almost making a case for GRC being an orchestrator of

Agents I don’t know whether to call them GRC agents or security agents but some sort of Agents right and and to go

execute and collect the data and standardize and normalize them and all that stuff yeah yeah I think we can have

that role just because with pull from all the other teams we almost have like we like except maybe for the ceso with

the only team that has all of the pieces of the puzzle because we need to the

other teams are very focused on the vertical so someone that works in Cloud maybe don’t doesn’t really know what’s

happening in instant response or some of the other teams so because we get that complete picture maybe what the best team to be the orus Traders no that’s so

you also run a GRC engineering podcast are you and I I love it I listen to it

um what can you share with our listeners some key insights about building a strong uh GRC

engineering practice that you gain through those podcast discussions absolutely absolutely so we had quite a

bit guests different different backgrounds uh different stag as well in their programs I would say if I had to

pick a couple I think the first one is to really get a list of what you want to

achieve from J engineering I think uh people they because now we have the compliance automation space so people

see some fairly like uh obvious ways through which you can like make your

program more effective so of course it’s like related to evidence collection most likely but I would say in your specific

context maybe it’s not the thing you should be focusing on so for example um I think it was uh with a um used to head

just engineering at Zoom uh we spoke about access control so typically like some companies they might need to have

those J engineering resources focusing on how you do access reviews on a quarterly basis right so maybe making

that more effective because maybe there’s hundreds of controls uh hundreds of systems outside of your um SSO

platform you need to track in a different way but maybe you need to Federate everything so you can manage it

in one way and sometimes like being able to pull from everything and having a central console it it might take a

couple of months but it might like make your job way way easier it also like helps actually like improve your

security just above and beyond just compliance so I say that’s one of the insights like really having a plan

another one I would say is like when you think about Bird versus bu um it’s not

clearcut so I think people like the idea of building because it looks cool cuz

it’s like coding stuff from scratch you’re like you know like you going into Uncharted Territory I think uh we had

this with a couple of guests I think you if if you have a plan sometimes like

build is not the right place sometimes you need to buy um especially if you’re smaller your Tex stack is very standard

like in these cases why weent the wheel because what people forget is like you

buy a tool so you pay the price for the tool but also when you build like you you pay for it because you spend

engineering hours so it has a cost in terms of like human hours and people often forget that time like it’s it’s a

free time but you pay these people and often you pay them fairly well so if they can be focused on something else

and that tool can take part of the job I I think it’s something that people need

to think a bit a bit more because often they’re like super quick to jump on like the the build Ben wagon but it it like

you really need to think about the pros and cons for your company so I would say like that’s to too big and the last one

is you need to be friends with your engineers I think it’s one of the first steps is like building that bridge is

like it’s almost like coffee chats right it’s like hey uh infate guy hey can can

you just jump on a call 30 minutes I want to ask you some questions about like encryption in or like you you talk

to someone in UPS like I want to do how would we do SS like how does it work and I think like you need to be friends with

these people before like partner with them and when you friend with someone

and like it’s it’s someone like you trust and you’ve had conversations when you actually need help and when you need

to understand something with like a specific purpose in mind they’ll get you the answer they even if they don’t have

the answer they know who has the answer and getting like those almost those champions for JC inside of Security Org

is is very like underrated and I think be Engineering in a vacuum without all

of those blocks like being built first I think it’s a re recipe for disaster because when you need access to a tool

and you need have privilege access like to pull that information they say who are you what do you need who like no

like you need to almost pitch us first but if I know you I know what you’re building we’ve been chatting for months

like of course I know what you’re trying to do here and I actually completely agree with your approach and it’s a lot easier to get people internally to also

help you win and and get the access you need to like kind of Kickstart some of those uh jar engineering initiatives

absolutely I think you almost need to have them on sweet dial so um

what would you advise or what would you um aspiring uh professionals who are trying

to specialize in GRC engineering so a couple of things I

would say I would say depends where you come from so if you’re currently a software engineer and you come from that

side I would say that the best way is to learn more about DRC and learn about JC issues so of course you can listen to

this podcast can probably listen to JC engineering podcast as well I think you need to learn the terminology how things

work in compliance because uh a big problem we have is GRC people they’re

not used to work with software Engineers so translating business requirements for JC into technical requirements for a

developer is very challenging because someone that works in depth doesn’t really understand like GRC issues and

it’s tough for us to like go from hey like you know audits to assessments to

whatever and get that into like a uml diagram that works from someone that you know needs to run like a Sprint planning

so I think we need to think more like product more like engineering from the Jersy side so when you come as a Dev you

need to get that additional knowledge of the context of JY if you if you currently work as like a jersey

practitioner I would say that what you need to do is like the first is probably awareness so I would say you need to

like get you your feet weet a little bit in all of these different topics so we’re thinking like infrastructure scope

cicd pipelines it is very easy like to get the first building blocks like you can watch some YouTube videos you can go

through a couple of courses it it’s like what you need first is like just the terminology understanding and what the

security considerations I should have when thinking about this topic once you have these three then you can go on the

coffee chat route and speak with whoever handles this at your company because what you need as quickly as possible is

to get company relevant context because that what gets you to like thinking about problems that you can solve for

your company and once you have that and you have that context and you spoke to the engineers in in place I think that’s

where you can start thinking with them about what problems you can solve

because like maybe you saw some best practice and some of the course you did and you do do that at your company and

maybe you’re like why and they’re maybe they were explaining hey we architectured the application in a bit

of a weird way so we can’t really have that in place so then you doing ex like extra research to understand like in our

context maybe we have to do more perimeter and you start thinking in a way through which like you have the

engineering mindset in a way that you can use to solve jari problems so I think that’s that’s for building BLS I

think like scripting knowledge and everything I think it’s helpful but I think it’s easier to find someone to

script you something to find someone to think holistically about the issue I

think scripts they don’t solve J problems what solved problems to have that like holistic and systems thinking

approach and then you know what to script and what not to script because like maybe you need to buy once again

instead of building or maybe you need like some let give you an example like sometimes you want to test a control

maybe related to Cloud infrastructure and you want to go on like a audit manager or like use a artifact some of

those tools right or security Hub but maybe instead the infect team uses a

cloud tool maybe they use whz or whatever that actually does some of those tested test natively and they

already compute all the data you just need to pull the test results out and in this case you save a lot of time because

you don’t have to run these test and do everything maybe what you just need to do is to learn how to pull that data out

of the single source of truth right now and to get that for your JY team so if

you don’t think about the problem who handles the problem from a technical side how do they work what systems they

use and just think about like scripting my way out of stuff you might just end up spinning your wheels and spending

like valuable time or like low leverage tasks that the potential problem got it got no I I so the there is a recent post

in which you sort of make this point as well where you’re saying that this change is not only technical it’s a

mindset and you have to look at holistically and you point to GRC architecture and GRC program as a whole

so I want to double click on that um if you will can you describe that a little bit why do you think this is a mind

shift change and how do you want to approach this yeah so because G

engineering I think is is very appealing um especially for people that are in the industry and have had some of the

hurdles uh in terms of like you know kind of making stuff more ready for death say Ops Etc but I think it’s it’s

part of a solution that you need to think about as the whole program so JC is not only compliance only is also risk

you know you evidence collection doesn’t impact risk right aot of these actions they’re not related to risk but a we run

program is risk based so what are think about when I think

about jury architecture is like almost like you need a way to understand like

compliance activities governance activities risk activities how do they all interact and engineering and

Automation in of itself doesn’t give you that you need it to automate properly but automation is not giving

you that you need to think about it ahead of time and that’s why of course like now I know in software engineer Architects get a

bad rep because we don’t like those n coding Architects Etc but think about more maybe a staff engineer or like a

tech lead okay more like a nicer term to think about someone that does architecture when you have a complete

view of your systems you know like the points of failure you know where you might have like only oneway connections

you know like where like maybe you change this like the magnitude and then like the system breaks down and you need

to like architecture in different way and I think when you think about J engineering you introduce engineering

elements into JY program which means you introduce like failure noes as well right because right now failure nodes

are maybe like hey I’m copying this like couple of sales from Excel into a different like you know because

everything is manual the fair no is like I need to redo it again or whatever now when you think about systems as like

more engineering then in this case there’s like the human element sometimes is not there anymore so they have to be

differently and what I think about the architecture is like how all of the Jurassic activities interact with one

another and you can understand the highest value ones and from these highest value ones which ones I actually

need to automate first and which one maybe I don’t need to automate maybe because doesn’t take as much time it’s

only couple times a year or maybe actually like the human element is critical in this context so for all

these things you can actually have a hierarchy and know like okay this is what I need to focus on this is what I

need to automate first if we only start with your engineering we might like see hey evidence collection takes so much

time boring I hate it let’s automate it but maybe you spend six months on something that was not the actual

priority so that’s that that’s that’s how I think about it when I think about like architecture versus versus

engineering got it take a step back look at them holistically allows you to prioritize to focus and potentially Even

build a business case right yes yes absolutely abely we are at the end of the segment are you um are there any

books podcast people mentors that have had a lasting impact on you can you share anything that for our for our

listeners so I would say um anyone that is involved in the Josh engineering

Manifesto I think are people you should probably like uh kind of link up with of course like Charles Charles is like

Legend um Charles at Netflix absolutely um so he’s um I think so of course I had

him on the podcast but I think he’s someone that really Champions that approach to to jaran has been for quite

a bit of time um so I would say it’s it’s it’s valuable resources like people

that were involved J engineering I would say also of course uh I think this podcast will also probably be a great

resource uh because I think you understand uh jar engineering fairly well uh through your work as well and

that I definitely think you you kind of think about it in a similar way as as we do uh in in in the field so I think for

sure it’s a it’s a great thing to uh to to regularly listen to and I would

say the resources you also need is like just just getting your technical acument a bit better so I would say like just if

you like books read books about you know I like like some of the O’Reilly books or like mading publication some of those

like technical um technical book publishers like sometimes I read the first couple of chapters from like

um designing like uh data incentive applications so I read a book I read just a couple of chapters just to get

like some of the context and I think you need a lot of curiosity to like succeed

in the ji engineering mindset because if you’re an engineering side like technology moves super fast yeah people

that work as like software devs and stuff like they have to keep their skill sharp every six months every year

because like today is like python tomorrow is rust then is Zig then is whatever I get change all the time and I

think like you need to be on that side like you need to also understand that you need to keep your your skill shot

because your company’s moving so maybe you don’t know about it but they re architected some stuff and then they use

different tool and then maybe they change like some of the way they do like uh like shipping or whatever so by

keeping like uh uh sometime during the week to understand like how the industry is moving as a whole you’ll also be more

effective like following how your company is doing because your company is probably also moving at that pace so

like just overall like kind of you know some some Channel I like H ner he has um a channel on backing engineering on

YouTube he does like fairly easy to understand videos around databases and stuff like this but there’s hundreds of

channels that does like similar stuff but I would say like just be like be

more Curious on the technical side I love it and this has been a

fantastic fascinating conversation I super happy to to had

this with you uh thank you very much yeah no worries no worries glad to uh to have partake in this conversation really

enjoyed it as well [Applause]

[Music]

Listen on your favorite platform and stay updated with the latest insights, stories, and interviews.

CCM NERO graphic

Want to see how we can help your team or project?

Book a Demo