In this episode of Security & GRC Decoded, Jeevan Singh, Director of Security Engineering at Rippling, chats with Raj Krishnamurthy about how technical depth in your GRC team can be the difference between compliance as a chore and compliance as a driver of real security.

Jeevan unpacks the crucial role that automation and engineering skills play in modern GRC teams, shares why CVSS alone is not enough for managing vulnerabilities effectively, and explores how to foster productive friction between compliance and engineering.

Highlights from this episode include:

  • Why GRC teams need to think and operate like engineers
  • Practical strategies for automating GRC tasks to reduce toil
  • How Jeevan’s experiences at Segment and Rippling shaped his views
  • Secrets to creating a culture of proactive security engineering
  • How technical GRC roles can positively impact your entire organization

👉 Follow Security & GRC Decoded to stay ahead on the latest insights and trends in security, compliance, and risk management.

🎙️ Security & GRC Decoded is brought to you by www.compliancecow.com
Learn how ComplianceCow can elevate your GRC team today!

🚀 Enjoying The Show? Rate and review the podcast to support the show and let us know you’re enjoying the content!

💬 Connect with Jeevan Singh:
💼 LinkedIn: https://www.linkedin.com/in/jeevansecurity/

🌐 Company: https://www.rippling.com/

uhh uhh [Music]

hey hey hey welcome to security and GRC decorder I’m Raj Krishna morti your host

and today we have the awesome Jan Singh as our guest today um Jan is a director

of security engineering at tripling let’s decode uh Jan welcome to the show

thank you I’m really excited to be here Raj um so Jen um before we dive de you

know into detail about you what is one controversial opinion that you hold around security and security engineering

yeah um I don’t know if it’s um controversial to me in general but like

maybe over to the entire Security Org like I really believe that security should be a part of engineering orgs

like and i’ I’ve been at companies where I have reported into maybe the CFO or or

um other parts of the org but I feel that whenever we report into the CTO

um it makes the entire program better it doesn’t matter if you are part of security engineering or GRC or even

security trust um being part of the engineering Bo it sort of forces us a

couple of different things one is it forces all of us to think and act like

Engineers which I think is a great thing for our industry just in general but also it gets us away from being part of

the cost center um I hate being lean my security team I I do want to make sure

that we are part of engineering so we’re not lean we’re thought about as people that actually add um value to the

company I’ve been at one company where we actually had to skew for security as

well which is fantastic like we not only were we not thought about as C centers

we’re actually bringing in money for the business uh our very large Enterprise

customers we provide them a security skew and say hey if you want to ask more security it’s going to add 10% to your

overall purchase but you’ll have access to our incident Response Team have access to all these other uh items which

we were surprised how many companies were extremely happy with that so U maybe not controversial for certain

people but like being part of the engineering work makes better security teams no makes sense and what do you say

to people who who say that it removes the separation of Duties engineering is under constant pressure to for releases

right and security is the is the Gateway function that keeps you safe and uh if

you put them under engineering you’re forced to do things that you would not do otherwise what do you say to something like that yeah I I think if uh

you are part of a good orc that would never happen um so I’ve been a part of a

lot of great organizations where our we would all map into the CTO the

CTO would have to make the decision at the end of the day the CTO does not want to put us his stamp of approval behind

something that may cause harm to the business that they are Executives they understand risk so if we had the choice

of pushing product or avoiding fixing a security vulnerability they’re going to

actually sit down actually understand what’s going on uh and really figure out

um what’s the right way forward and so the tolerance the risk tolerance of the

business they would really understand and make sure that they’re doing the right thing so that one concern at a

previous orc where um we were um reporting to the CTO who reported to um

the CEO um the CTO was going to move on so they’re going to move us under the VP of engineering who was reporting it to

the CEO so our concern was like the CEO was always the mediator and they would

make the right decision for the entire business we’re worried that the BPF engineering might not have the right uh

alignment for prioritization as we would but we were wrong U the VP of engineering was did really care about

security and making sure that um we were delivering the right outcomes in itself

so um I don’t disagree with you Raj there are a lot of bad companies out there a lot of bad leaders just in

general but if you land at a great company that has thoughtful leadership

your your program is going to be tenfold better uh than uh being uh outside of

being outside of the engineering orc got it does the size of the company change your opinion

oh man yeah you’re really getting uh down into

the I’ve been in all sorts of I I think like to the companies that

I’ve been a part of being a part of engineering is the right uh so I’ve been part of 10 15,000 person Orcs um and up

to that scale for sure I I do think that uh everything is fine there um smaller

or I think it’s even better having uh Security in engineering um if you’re talking about 50 or 100,000 people orgs

I have no idea yeah but like I up to the size of ORS that I’ve been um I I think you know

what no I I do think it should always be under engineering because like we have to we have to think like Engineers like

because because your point is it’s common sense why you know how would the size matter okay yeah exactly no no we

we have to be part of engineering we have to think like Engineers we have to deliver programs like Engineers I get it I get it I love it I love it um maybe

let’s talk about you how did you get started with cyber security J yeah um

this happened at University days so um I was uh I go went to University had a

great friend that uh would skip classes a lot so I’d pick them up at lunch and

uh we’d go to our Labs after that and then one time he’s like Jen uh come in I

want to sort of make sure I want show you something so I went in he loaded up

his laptop and he showed me he had cracked about a third of the engineering uh orgs passwords uh there and I’m like

what the hell is this and then he really explained to me how he did it um and he

didn’t do it for any malicious reason he did it so just to show that he can and uh I wanted to make sure that he

couldn’t crack my password so that sort of a trigger something in my mind um

later in my university life at my fourth year courses I I took on some really

Advanced uh mathematic courses which had the basis of encryption um and that was

really interesting to me um chatted with the Prof there I’m like what are more stuff that I can learn about in this

field and he gave me a couple of books uh and then I stumble upon um Simon

Singh wrote a great book on the history of cryptography talked about way back

preb like in BC era and then all the way up to nigba itself and really

understanding how security was a thought about and felt and that kept on making

me interesting and whenever I joined the workforce um I always uh uh ended up

somehow dealing with security issues so uh my first company was e-commerce and

one time when the logs were looking at it and like how the hell does this individual know

this information like why are they making these sort of requests uh the next company was a company that built

tools for market research and anytime we ran a pentest I would grab the uh results and like I’m fixing all these um

and at that company I got more and more responsibilities I became an engineering manager so I taught my team how to fix

all those evilities then had a couple of teams reporting into me um so I taught them and then at some point I like you

know what it’s easier for just me to teach engineering how to fix abilities uh it’s a lot less than uh so set up

some noon hours where we would show them how to think offensively um so there are

a lot of these great sites way back when um where I showed people that they’re

purposefully vulnerable and how threat actors actually think about when they attack uh the website so around these

lunch and learns and we hired this fantastic VP of security and this

individual is like Jen join my team I’m like uh I don’t know I like this engineering thing uh it’s a lot of fun

um it took him a month but he convinced me to join his team and after that first

day I’m like Ben I’m never going back to engineering the security stuff is it

took me only one day to realize how much I’ve enjoyed it and I I’ve enjoyed it since so I got lucky to actually build

out the security program at that particular company I joined a few more companies after that buil out the

program from scratch so it’s been a fantastic Journey from the security side all right can you maybe paint a picture

of the different aspects of security that you have touched yeah for the vast

majority I’ve spent my time on the application security side um and really Dove deep um uh known for my opinions on

application security um but like been very fortunate that first few companies

that have joined had very small security teams so I worked at that first company

where Ben pulled me over I worked really closely with the privacy and compliance managers um they uh weren’t able to

really speak the engineering language as I was so they would tell me the requirements I would translate it into

engineering um words and architecture and sort of uh be able to work through

that way and because of that that actually gave me such a well- routed experience within security itself so

that company I had to do incident response we notice stuff and I jump jump in really understand what was going on

um I sat down in the room with Auditors and provided them guidance on how engineering work um did a little bit of

privacy stuff uh actually wrote some sock 2 control wording as well there

yeah so uh got a little flavor of everything and that’s really helped me in my career um so I have a lot of

respect for all the different security teams what they bring to the table everyone’s job is hard it’s a hard world

that we lipping in like um dealing with on the compliance side dealing with Auditors um and trying to juggle all

these different uh compliance Frameworks while you’re always lean just in general

usually I feel that GRC teams are quite lean um so and having to always learn

more things that are happening we’re getting all these other new Frameworks in place uh like gdpr is not new but

like there’s always uh new stuff that are coming out and being making that the business is complying to all these

different areas so I’ve been lucky that I’ve been able to have build really good strong relationships with all these

security teams have worked with them in ways that I feel that has provided value

for me um internally for my team but also with them so yeah it’s it’s been

fantastic being able to touch all different aspects of security got it have you worked on uh the was

application security verification standards asvs I haven’t worked on it but I’ve I’ve definitely used it to

inform parts of my program in the past asvs is awesome um I’m based in

Vancouver uh with I involved with OAS Vancouver quite a bit I’ve been um the

co- chapter of the lead for the last about eight years um my um partner in

crime farad um his team is actually involved with making modifications to

asvs interesting yeah so heavily involved with asvs uh my partner is

heavily involved they he does a lot of talks about asps it is a fantastic standard um for just in general for

making sure that you’re program if you really want to understand controls and

implementing controls it’s a great standard to have a look that deep into in itself absolutely would yeah I

totally agree now our podcast is titled security and GRC decoded so I have to

ask you this question what is your view of GRC

there’s a big pause I guess it’s both positive and negative if I’m being honest so I’ve

been at organizations where my GRC teams are sometimes a challenge to work with

uh just because they are non-technical um and they have opinions that don’t fit

well with Engineering orgs in itself uh so they may say hey I think you should

Implement uh service to service authentic indication as a control sure it’s easy to just say that

but actually implementing that is really really difficult in itself uh so you

have to make sure that uh depending on how much Legacy uh infrastructure that you have bringing up to speed so having

that gap of really technical knowledge has been difficult but on the other hand I’ve worked with really highly technical

GRC folks as well and being able to work with them if I felt that it has

accelerated our program um they showed me ways that we can use uh potential sledgehammers with engineering to make

them Drive the pro their programs in the right direction so it’s been a mix bag with folks uh working within GRC um I

don’t mind working with non-technical GRC folks um I’ve had worked with great

A lot of them throughout my career the ones that uh really work well with me are ones that think proactively and

really make sure that I I don’t have to do a fire drill because Auditors are

coming in two weeks and these controls we have gaps in them I hate that I don’t want that if you tell me 6 months nine

months in advance that these are the controls I own this is the expectation these are the evidence that we want

people to sort of have in it itself then it’s uh different uh there um but like

don’t give me a fire drill I don’t want fire drills um I my program is a very um

focused uh and uh I don’t want to get off track of my regular things that I work on so don’t give me fire drills and

how technical do you expect them to be um I I don’t expect them to oh man I was

going to say I don’t expect them to write code but I’ve worked with GRC people that have written code and it’s made their programs so much better as

well so give an example of it uh at a particular company we had a GRC team

that was small like it was a small security team I think we might had 20 25 people in all of security um and uh

there’s a lot of toil on the GRC team they have to do a lot of manual tasks and one of the tasks that they had to do

is that um when a customer requested uh access to our pent test like the

executive summary for a pent test they want to um Watermark it so that we know

if it leaks who was the one that actually accidentally leaked it or purposefully leaked it so they would go

in they would go into the tool and sort of like um do it and it just it was just

so manual is so painful and as we started growing there were more and more and more requests in itself so um what

they ended up doing is they hired what they call the GRC workflow engineer um it just to really reduce the toil um on

the team reduce all that manual work and at first um they set up a page um so

anyone on the sales side if they needed that documentation they say okay this is

a documentation for this client this particular email address of this client and it would um input that information 5

minutes later it has all of the documentation that they need um all with water marks so sales team was

self-serving it at some point uh they felt that you know what a certain side

customer they’re always going to need this sort of information so they actually built it into the software itself like okay why even bother

salespeople on this if these uh customers actually need it um let’s build it into the application and they

made it to available in the application so you have to be a certain size I have to have certain license with us but they

made it self serve so that these individuals never have to even bother sales they can get the information

themselves so I really enjoy working with those type of individuals that are

understanding like this is while it is adding value um and we’re getting things

that our customers need it’s not really adding value they could do much more important GRC work itself so being able

to automate some these simple workflows I don’t expect them to write code good enough to put it into the app itself but

if they’re able to create that page uh and be able to automate a little bit of work so that they don’t have to do it

and the sales people can self-service themselves I think that’s fantastic in itself okay and what do what do you

think is the perception of leaders especially in Tech forward companies yeah and what is their view of GRC

in there’s a I’ll answer this in two fold one is like I do see leaders um

especially like as you mentioned Tech forward companies they are now thinking

of GRC as an engineering or type of org as well they do want to hire security

Engineers for the GRC they they want to make sure that we’re automating um

evidence collection or reducing that uh toil and pain that these GRC folks have

in it in itself um but like uh also in tech for companies

uh it always feels that GRC is sort of on the sidelines in

itself um you do your thing um if you have problems reach out to us otherwise just I want to make sure I get my sock

to accreditation ISO whatever other ones uh um PCI just leave me alone uh sort of

situation only bubble things up if there’s a problem um I actually

um I don’t like that like uh I I’d really enjoy partnering with uh GRC

because uh I feel that working together having a singular security uh Vision

Focus can really drive both the security engineering program and GRC program let

me give you an example we talked a little bit about uh service to service authentication so um I love having

organizations where they have these hard difficult controls um to implement uh

but it makes the entire program much better to do but before we get to like

service to service there are a bunch of steps along the way and I do want our compliance uh colleagues to sort of

ensure that we’re consistently um incrementally getting better with our application itself and

maybe we don’t start with service to service we start very low on the total pole do we have TLS and and okay we’re

doing that well we keep moving it up up up uh to make sure that we’re getting to

the place where we need to and I I want to make sure I partner with uh uh compliance to make that happen another

pet peeve that I have is like um a lot of companies they don’t delete client

data especially after customers Churn it annoys me to no end like there we have a

contractual obligation obviously it’s usually lower on the priority uh to do

that because um it’s sort of like a no victim crime uh if nothing happens if we don’t have a breach but the moment we

have a breach there’s all heal Breaks Loose because we’re housing data that we shouldn’t have in itself and I love

working with compliance to highlight that to the executive team letting working with them especially on the risk

side and having the uh the executive team understand the risk of having

housing sort of that sort of data um and working with them to make cases is for

getting that sort of work done and prioritized in our backlog so I do feel

that working tightly with the GRC GRC team we can actually move forward with

uh our good security initiatives that we want to do um and I definitely don’t want them to feel that they should be

sidelined we should come work together and sort of figure out what are the needs of the business and how do we always incrementally improve our

security pro got it got I I I think what basically what you’re saying is a security L compliance program

changes the perception for the better yes you had earlier talked about when we charted up earlier is that you said you

don’t see compliances to be a finished line can you double click on that yeah it’s just like what we’ve just been

talking about like I feel that uh compliance is both the starting line and

uh the middle line uh Midway to the race and then the end of the race and then we

push it forward we keep changing the goal post with compliance um it’s I I

love starting um compliance regimes with really really easy targets for

engineering um it’s really hard to just say okay we’re going to go from zero to security to 100% security um it it

doesn’t happen it’s hard it’s really hard it causes a lot of friction within the business um my first uh security

role we went from zero trust principles to five trust principles for our sock 2

it was a pain it was a very difficult ult it caused a lot of uh challenges um

and eventually we came out of it doing really well so um and similarly I I want

to make sure that I’m partnering with our compliance or to understand what controls that we should put in place and

keep challenging engineering year over year to get better and better so we

talked about a little bit about uh uh couple of different girls let’s talk about secrets secrets is a a thing that

bothers it to me to no end making sure that like we leak Secrets every company

leaks secrets so um let’s make sure that we take steps on avoiding it so first

step might be having detections in place and that’s it like that’s our goal have detections in place and we’ll build a

program to rotate Secrets whenever we notice a new one get leaked uh next one might be centralizing our secrets let’s

make sure that we put it into the centralized door um where we are um it’s harder for to leak in itself maybe the

third part of it is like we should be rotating Secrets maybe no secret should be more than a year old or 6 months old

whatever it is but we would leverage our compliance regime um to say okay this is

the Baseline let’s continue building up uh to make sure that we’re doing better and better and better for our program

itself so definitely want to establish a low Baseline just at the beginning like detecting Secrets is not a hard thing to

do um and it’s easy for everyone to understand why it’s important U and then getting to the fact that autor rotating

Secrets maybe at the very end every time we push to production we autor rotate all of our secrets so that could be like

the very high high part and just making way all the way there I love being able

to work with our compliance Partners uh to actually make that happen got it so what I’m hearing you say is that

compliance and correct me if I’m wrong compliance gives you an organizing set of principles around how we can manage

security but it also gives you a baseline from which you can continue to keep expanding and it is sort of a

reinforcing Loop right I mean you do better compliance you do better security and we each challenge each other in a

very interesting I mean it is friction but it a healthy friction yes I love that it is healthy friction we should be

I enjoy having friction amongst uh security teams um and I I feel that

having healthy friction having healthy discussion about what is right is always important

uh in itself like um we compliance may feel that we want to do something um but

given our product security program we know that it’s impossible to implement at this point when we sort of figure out

what’s the middle ground that we can work with that that friction is required um and not just like compliance and

appsec but also compliance with our infrastructure security compliance with our incident response program

I want that healthy friction I want compliance to always challenge us on the things that we are working on and I

don’t want us to push back on compliance as well and say hey this is not the right time or this is not the right way of approaching this problem got it that

makes sense you I think you have talked a great deal about good security engineering um and security engineering

as a discipline how do you think it solves GRC problems oh this is a good

one um so when we think about GRC we really think

about um just the compliance regimes that we are influence under or the stock

to controls that we have um I I I really want grst to move beyond that I want

them to be um talk a little bit about them being technical I wanted them to actually be somewhat like Engineers

themselves so when you have a sock to I don’t want us to think about okay I have

to Ping these individuals to get the evidence let me review the evidence this evidence isn’t good enough let me ping

these individuals again I rather have a partnership where um why we talk about

um a particular subject um like uh access control that’s in typical a lot

of these compliance once a quarter we should be reviewing people that have access to a particular tool and

validating that uh it looks good or not while when we fully automate that uh

particular process um let’s make sure that uh um either we have to collect

evidence so let’s have screenshots um and make sure that we drop it into a central location and maybe a slack dm

with me and compliance and me putting a thumbs up emoji saying this looks good

these are the right people as a part of it definitely continue raising the power when it comes to automation so that want

compliance people to have have I don’t want them to do manual work

that doesn’t really provide value to the business I want them to actually dig deeper so if we say that we are actually

deleting customer data I want them to go and check look at

databases is the data actually deleted or are we saying it delet it is deleted

um let’s look at the code um is everything implemented correctly are we hitting all the data stores like you are

deleting in your postgress uh uh database but what about S3 what about snowflake what about all these other

different areas I want our uh GRC Partners to be able to really dive much

deeper uh than just the control wording itself I want them to be able to um

potential would be like creating those verification scripts so um let me create

some SQL scripts just to say that hey this particular tenant this tenant ID um let me see if it actually is deleted in

this uh data store and creating those scripts and validating have those audit Trails these technical audit trails to

validate these uh items itself I feel that that would be much more beneficial

and interesting for JC folks themselves rather than having conversations and

making sure that uh like um without being able to really dive that in that

technical depth uh to saying that yeah everything looks fine engineer said they’ve done it I trust that they’ve

done it so do you say that then GRC the way you’re describing it GRC becomes an

observability function to security engineering and other maybe other parts of the organization as well I I think it

would be one of the capabilities that they have so um one yeah for sure like

uh it would be nice that they can um trust but verify yeah trust but verify

be able to do that be able to and like it feels like man I I feel like it sort

of like a quality assurance uh part of the organization like validating that we are doing the things that we have stated

that we’re doing but also like having the better conversations just in general

so um understanding um one of the one of my favorite privacy managers that I’ve

ever worked with um was so technical that was actually providing architecture

advice uh for um privacy and say hey um we are are we have we have architecture

set up this way if we change uh the architecture in this way um and we reduce where we’re pushing out Pi I

think it’s going to be easier for uh data delici or um if a customer or individual wants a right to be forgotten

um be able to implement that it would be nice if GRC can do that sort of stuff

being able to provide solutions to the business saying hey um the way that we’re building this functionality is

going to be problematic it’ll be better if we think about building in this way because uh it will help ensure

that we adhere to this Australian uh law that we have to adhere to um so being

able to influence architecture because for us as security engineering we only really look at we only look at the

security aspect of things um typically we do threat modeling a lot of us use stride and that’s our box that we work

in um we’re not nearly as familiar with CCPA gdpr uh all these other different

regimes that we have to sort of align to it’d be nice to have a GRC architech that can come in and say hey um these

are the controls that we should be like these are our socer controls these are our contractual obligations that we have

in our MSA this is how we should be actually thinking about building the tooling and functionality in our system

and being being able to be another member that can help uh inform engineering how they should be building

their application that’s a very interesting perspective so what you’re basically saying is that just like

security looks at different aspects of business and products you’re saying GRC should also

look at from a slightly different perspective right uh you are more about protecting and the GRC teams you want

them to help you understand what this means in terms of the controll landscape the regulation and the standard so on and so forth but they have to be I think

going back to your previous point they have to be equally technical in order to be able to understand this and also to

be able to contribute back to security and other parts of the organization so you’re you’re essentially advocating

that there has to be a strong relationship between not just between GRC and security but also between GRC

and engineering and GRC and product management and all that stuff yeah exactly um right now we do have security

Architects that sort of are informed but they’re not nearly as informed as the GRC individuals of all of these controls

I would love to have a GRC architect archetype uh there where they’re very

informed with all of the contractual obligation regulatory requirements and

is able to really dive deep with engineering um in itself so got it you’re talking about a very strong

culture and I think one of the earlier conversations um you had talked about sort of a nodejs vulnerability example

do you remember that yeah okay can you maybe for our for for our audience can you double click on that so that yeah

let me give a lot more Contex next so um we talked a lot about toil um and things

that provide a lot of toil and um this is that segment uh company previous company that I worked at um on our ciso

Colleen there um she’s like is there a way to sort of automate threat modeling

how do we reduce the toil for auto U for threat modeling so threat modeling could

be a cumbersome Pro uh project like depending on like how large the feature

that we build it could be a m-day thing that we do or it could be a small if it’s small feature it’s easy to push out

in an hour or two so I sat down um with my naivity I like yeah this should be

doable and why I just train Engineers to do it so um I started sitting down I

mapped out uh some trainings that I think that would have worked for engineering um beta tested it um and I

got a commentary from engineering about the training it read did a couple of times and I got the training into a

really good place so um our initial goal was to go out and reduce the amount of

threat models that we have to do and push that responsibility a lot more on

the engineering teams so I spent the first couple of quarters uh training engineering and then the next part the

next phase is that the observation phase I’m going to let them do the threat model we’ll be in the same uh meeting

with them but we’re going to observe how they’re approaching it and if they miss any critical or high vulnerabilities

I’ll hint to them I won’t tell them what they’re missing I’ll hint to them so they’ll learn about it um it’s sort of

how I learned how to threat model I’d have very senior security people that would say hey did you consider this what

about that um do you think there could be authentication vulnerability in this particular area and so prompt those

prompts helped me really expand my knowledge in it so we did the observation uh with uh most of the teams

and the next one was uh next phase is sort of just validating uh that they’ve done it correctly so a few of the team

made to the validation stage where um they would do the threat model I will look at the artifacts and just validate

that they found all the critical and high vulnerabilities so um that was a goal

reduce the amount of work that we’re doing and help engineering be able to self-service this and they can move

faster and we didn’t have to do as much um and what happened during that is what

I didn’t realize is how once you tell engineering what to look for um first

they’re way better at threat modeling than you are as a security engineer they know exactly where to dive because

they’re closer to the problem they’re closer to the problem it may take they’ve been working on that for

quarters or years that particular feature space and for me it may take me

months to dive that deep into the code to really understand how things are working and what problems might arise

from it so once we tune them how to look at things things they’re able to do much better robust threat models than we were

and the second part is that once they understood the things that were concerned with they automatically started doing those things so the

example the node.js example we had one service that had had multiple services that node.js so uh one

particular winter day node um alerted that hey we’re we have a fix for a high

priority vulnerability um whenever you have time please patch it up so one of

our one of our engineering managers on the East Coast noticed that and he like

okay this is actually important Let Me patch mine up he patched his up checked the source code to see if there were any

other instances of it there are two other instances he created tickets for those two engineering teams and got

commitment that they’ll patch it in the either by end of day or the end of the next day and this all happened while we

most of us security Engineers were on the West Coast we were still sleeping um so all this

happened and uh he informed us afterwards like hey we noted this don’t worry everything’s taken care of I fixed

mine these two individuals will fix theirs shortly and we should be resilient to this particular

vulnerability and it just it was mindblowing at that point like uh as you

it when you work with a really high caliber engineering team and they’re really passionate about the quality of

their code and you show them what are the things that we are concerned with they will start becoming concerned with

it and they will actually do the work as well so that’s one of many examples that I experienced that segment I love your

story and I think that’s a brilliant story and I think the take away for me number one I want to do a big shout out to Colleen she’s a fantastic leader in

the space right I I’ve been advocating this for for a for a long time but what I love in your story particularly is

that you’re you’re not talking just about security as a as a partner to engineering partner to product

management you’re almost talking about security as being a coach the investment that you make upfront pays dividends

right significantly later I think is the is the story that I’m taking away from this example yeah 100% we invested a lot

on security training that segment uh and it paid a lot of dividends so we had a

session called think like an attacker so when Engineers on board they had a few days of training uh just overall

training um and one uh we had two security sessions so one was think like

attacker where we you can uh use burp Suite or you can use the tools within

your browser and we talked about the biggest vulnerabilities that we had at seg at the time and concerns of these

particular vulnerabilities and we showed folks how to exploit those vulnerabilities how do act attackers

actually think about that and then a couple of days later the second part of that session is secure code review you

know those five vulnerabilities that we exploited uh two days earlier let’s show you how you can actually

discover them as part of a code review and how to think about uh remediations for them so um we had that built in but

we also built in the training because it was interesting and fun and engaging and people the first interaction that we

have with the secur team was light fun and they weren’t afraid to come to us

they came to us for a lot of different things and this is the culture that Colleen set up is that no we are we want

to be partners but we also want to coach and Mentor you to think about things the right way and we are not the boogy man

you can come to us uh even if it’s not fully a security thing come to us we’ll figure it out and we’ll partner with the

right parts of the organization to do the right thing for the business so building up with that sort of culture

really made it really easy for Segment to have a very very strong security posture in itself got it and how do you

what is your view of security from a risk management perspective

yeah um so I have a lot of philosophies when it comes to this uh I I can take some

examples of maybe we can talk about a very tangible example right about so you talked about vulnerability management

and you talk about how that translates to risk right perfect and how to bring in leadership into this so maybe you can

you can touch on that yeah uh let’s talk about vulnerabilities I love vulnerabilities uh well I love fixing vulnerabilities uh

let’s just say that so um I came into Rippling and one of my first things that

I typically do whenever I come into organization I look at the vulnerability data or just look at security tooling

data that way it helps me inform my program where should I invest a lot of

my time into um if I see certain classes of vulnerabilities maybe make sense for us to build out uh help build the secure

pay path so that Engineers never have to worry about that particular type of availability in itself so came into

Rippling look at the data data wasn’t in a good place so I couldn’t rely on the data in itself our vulnerability Q had

um vulnerabilities but it also had tasks in there I I don’t know why there were tasks in there um there also what I call

like I there were vulnerabilties so large that I would have consider them as risks instead so the first thing that we

did was that we cleaned up that vulnerability cue in itself so um and we actually defined what is the

vulnerability so um defining a vulnerability made it

easier for make us to align and clean up the cube um one of the things that I really wanted to ensure is that

vulnerability should be bite-sized it shouldn’t be if uh vulnerability would take three months to fix no one’s going

to fix that it it’s just not going to get done so I rather move that to the risk Cube um and then coordinate and

make sure that we work well with the engineering team to figure out how do we actually schedule that

work but Vil should B size and I typically said should be less than a Sprint um and a Sprint at Rippling for

some of the teams were two weeks so anything that’s of that size or smaller is totally okay to be V abilities um

also we talked about the severity standard um uh in order to get anything fixed everything had to be a critical or

a high and I’m like this is not how a vulnerabil not all vulnerabilities are critical or high so we created a

severity standard so me and Le on the team and this is not CVSs so you don’t like oh yeah okay oh I

think you’re triggering me so so philosophically there are uh a

bunch of different ways that you can actually measure severity um so we did it a bunch of different ways at uh

Rippling my biggest thing is I love using cwss barely anyone has heard of it uh

hopefully your audience will now learn a little bit more CWS s’s common weakness scoring system and I love it because it

talks about the system and the weakness in the system whereas CVSs talks about the strength of the vulnerability it

doesn’t take account to all the controls that might be in place um within that system so we do that for any of our

manually discovered vulnerabilities so threat modeling bug Bounty pent test uh

internally discovered stuff we run cwss on it for any for security tooling vul

ities so SCA s all those maybe SCA secrets and all that sort of stuff sast

is a little bit different um we would actually uh what we did was we ran a few

of those through cwss and we would try to figure out an automatic way of actually scoring it and we did a hybrid

CVSs epss that came close to matching it so uh it was good that way and then last

one was sort of like Mis just for the sake of our audience cbss is the exploit probability

yes okay exactly yeah which is uh fairly newish uh um that a lot of the security

tools are now using so what’s the actual exploit probability for this particular

um vulnerability and then security M configurations we just categorize them so I want to make sure that this was

accurate and we cleaned up the vulnerability CU removed anything that was not a vulnerability either based on

the size of the fix or the nature of the actual ticket um we made sure that all

of the severities were correct and lo and behold engineering when they trusted

that these are actual vulnerabilities they started fixing them on their own um it was very surprising to me uh

initially when I saw that I’m like I didn’t even prompt their VPS to start they automatically just started fixing

this because they trusted it they looked at it again with their lens and like this is actually a critical let me get

that resolve this is actually a high this I’m going to prioritize it in RQ and so um that trust and I feel that

security should always like once you lose Faith or trust in a security tool or security process you’re just going to

ignore things that come out of it so security has to be synonymous with trust in

general yeah yeah so like leveraging that

vulnerabil is starting get fixed but then I started working really closely like I want to make sure I’m working

within the engineers work um space in itself so they have operational meetings

I started joining the ones with uh a lot of the VPS uh being there um we made uh

the vulnerability metrics a gold standard and saying okay these are the ones that we want to sort of track just in general and Engineers all started

using um that and they were able to follow the process uh there itself so

hooking into the process that they’re familiar with made sure that we were moving the right direction um for

no I actually I love I think the the there is a fantastic Golden Nugget I think what you’re basically saying is

that I think security goes beyond and and pardon if this is a wrong analogy

preaching from the pulpit right and you will you will have to go be there with the engineering team understand what

resonates with them what makes sense to them right and these jargons don’t mean anything much right because CVSs

whatever they are but I think that makes absolute sense and you have to sort of meet them on their own terms

yeah you nailed it um one of the things that uh coming into Rippling uh my

predecessor uh Alberto he mentioned Jen just don’t say things observe Rippling

is very different from typical companies that you’re at um it works a little bit differently and that was great advice

from him but I also learned that at other organizations as well just a lot of time we shouldn’t just do things we

should observe we should interview engine or stakeholders and really understand how things work and then we

come up with a process that doesn’t add friction it actually reduces friction it’s easier to do the right thing and

harder to do the wrong thing in itself and you’ll start noticing things will move in the right direction itself I

love it you are a big proponent of threat models and in fact you talked about that a little bit so what how do

you think this the approach to threat modeling what is the effect of that on the GRC

teams yeah um I think it goes back to really thinking about reducing risk

overall um so uh when I think about um

GRC a big component is risk in the GRC and so I want to make sure that whenever

we do threat model we want to really consider risk in itself so one of the

programs that I’ve ran in the past is like um I know that at uh particular or

um I had concerns that we had very few risks in certain areas and what I wanted

my security Engineers to do is go sit in bed into those areas talk to people that

are um there and like especially people that are um either senior like a

director or senior director or someone that’s been there for more than five years they will know where all the

bodies are buried um and they might not re recognize that is a body but they will know where it’s buried once you

start talking to them having conversations and asking them um of those things so really understanding

where the risks are within the organization and then adding that back to the risk register so and with respect

to the risk register we Al also want to make sure that we are right sizing the work there as well um and making sure

that we’re selecting the right risks uh in itself so I I’ve seen a lot of risk

registers where they are not they just add a lot of things to the risk register

and they don’t really provide guidance on a way to move forward in itself we don’t have to fix a risk in in totality

that that’s not what we need to do what we need to do is actually chip away at it to make it less um less exploitable

or less impactful than other risks in the risk Cube so we do it very simply at

uh uh Rippling it’s simple but it’s very effective um we look at lightly hood and

impact and we just measure those things one to five scale and uh we just times

those numbers so uh impact of five and likelihood of five will give you 25

which will be the worst type of uh vulnerability ever log for Shell would be a great example of that particular

risk there or like a likelihood of One impact of one would be things that you don’t probably won’t be prioritizing so

we based our top 10 on there a top 10 risks and we work really closely with

our VPS and our CTO so that they understand our top risks but also um we

are actively working on it so one of the cool things that we’ve done here at ripling is that we have a corly meeting

with uh we have uh five or we have a six VP of engineering that we’ve just hired

and uh what we do is we have a corly secur security posture meeting so first

we talk about vulnerabilities and so I should also talk what the stakeholders security leadership is there um the VP

is there our CTO there and we have a really good conversation about the security posture within that particular

organization some of the good things that um have landed but also the challenges that we see and concerns that

we have in the future and what it’s done is really expose these risks to people that

are typically not in the risk register day in day out and it’s really helped us drive a lot more um tooling or risk

reduction in particular areas so um can’t give you any exact uh examples but

like uh I remember from the last time we did it my CTO wasn’t aware of a

particular risk um and we sat down laid out our concerns and like yep we are

definitely concerned about this now um next quarter we’re going to schedule working and we did we scheduled the work

in into it and we’re working uh right from it so being able to really work closely with people that are able to

impact and um change how we do things and showing them the technical concerns

that we have within their space has and having good leaders as well that are

receptive to these uh conversations has really moved the needle like I I want to

say like I’ve never seen a collaboration like I have at Rippling and it’s really

moved things a lot faster than I have at other programs no I think that is brilliant like the question and I think

what he what he seem to have done my guess is that many struggle

right to bring the engineering leaders and the product leaders into this conversation what would your advice be

to them what do you tell them um this is hard this is a very hard

uh problem to solve I’ve been very lucky so the engineering leadership team at ripling is probably the best that I’ve

ever worked with just in general um they care deeply about uh the business they

care deeply about the quality of the app itself so it wasn’t too hard to make

this happen on our side um what I I recommend this to all of the security

Engineers that I work with uh or like or whoever have reached out understand who

are the right leaders in our ecosystem life is way too short to work

for companies or leaders that don’t get it understand who are the great leaders we

talked a little bit about Colleen she’s amazing my first uh security uh VP Ben

was amazing these are the people that you should gravitate towards and find ways to get into their organizations and

understand how to do security well um and like just by being in their uh

atmosphere or their ecosystem you’ll become better at what you do as well you just all of it will rub off on you in

itself so work for a great Security leaders work for great uh engineering

leaders and like things will work out well like also great praise to Duncan

for making this happen at ripling he’s been able to really dive deep with these

engineering leaders making sure he has those thoughtful conversations and the E team so that they are aware of all these

concerns and really be able to facilitate have that really close collaboration and I I would actually do

a big shout out to you Jan you are a fantastic leader in this space and if anybody listening here um they have to

reach out to you maybe we’ll put a maybe we can describe how they can reach out to you we I I I take random LinkedIn

from everyone so unless you’re a vendor then I might put you on pause but like

uh my I’ve been very blessed at being in security I really believe that my life

changed when I joined security I’m much happier the problems are way harder I’m much happier

um and that was all because of the first few people that I interacted with insecurity so I had my team at Vision

critical Ben Sweeney Fazil all these folks that uh I interacted with that

made me better at becoming a security engineer but also the community uh the security Community Bar None is the

strongest uh community in the technical space we all are going through challenges and problems and we all help

each other so being in that space and having everyone really help me coach me

get to where I am I love doing that so if you are on LinkedIn you have any questions feel free to reach out shoot

me a DM it might take me a couple of days to get back to you but I’ll definitely get back to you um and uh

provide you my op I have no shortage of opinions I’ll provide you some of my opinions sure so I think you’ve talked a

lot about J about the security being a coach GRC being a coach the alignment of

security GRC product with product product and Engineering so culture plays an

important role in everything that you just talked about so maybe let’s double click on that a little bit how do you

build that culture yeah I think everything starts with strong leadership

um having a good Vision um so I know that the first few things that I do

whenever I join an organization is really understand what are the short-term and long-term goals for the

organization and I align my goals my priorities for product security with

respect to that so um I give example of last year looking at the security and

engineering team goals U I came in and I set up a few themes for the product

security team I set up uh operational excellence um I I felt that that we need

to get much better at that those vulnerabilities were in bad shape um Security reviews were done um like the

slas weren’t defined so all these sort of item then I want to reduce toil as well in order to be operationally

excellent you shouldn’t have to do a lot of things you should have automations that do a lot of things for you so had a

theme around that and it made it easy for having I had a couple other themes one operational excellence um building a

strong Foundation as well as burning down risk so having these themes really made it easy for the ic’s on my team uh

my team itself to understand the type of projects that we want to take on and make sure that they align to those

projects so having a way to really think about that and a lot of those themes

came because of the lack of data that I had as well so I need to gather all this

data so that uh now and in the future I can make datadriven decisions what

should my road map look like um so let me look at the data okay I’m noticing these classes of vulnerabilities or

these are the gaps that I’ve noticed because sea uh my sea program has showed me these gaps I want to be able to

really build out a road map based on the data itself and then it’s easy to prioritize that data as well so when you

discover these gaps um you would understand the risk with a likelihood what is the impact of these things to

happen and then you sort of can prioritize it that way um and always go

back to engineering how does engineering do their work and a lot of the um latest

companies that I’ve worked with they sort of have a framework of objectives and key results okrs that we call it so

you have your main objective maybe your main objective is to um reduce the

amount of vulnerabilities that are introduced into the ecosystem okay then you have a number of key results that

would be under that Neath that objective over the year multiple quarters or over the year to make sure that you um be

able to do that in itself so being able to make sure that you have the right

data you’re able to prioritize the things on your road map um and properly

planning to address those uh road map items will really help ensure that you have a very focused team if everyone’s

rowing in the same direction you’re going to get to your destination a lot faster if you have a very um very

division like if you have 20 things instead of three things then everyone’s rowing in their own Direction and not

everyone’s going to be able to get over the Finish Line itself go so I I think in a sense to build an effective

security culture bring your leadership along or at least go work for the leaders that you like uh make it data

driven right so it is um um and plan around it effectively yes right through

that’s what I’m hearing what one other thing I I forgot to add to it is actually um a lot of the programs that

have been a part of uh very recently I say in the last 5 seven years we have to

measure the type of impact that we’re making in the business so if you’re not making if you’re not really risk

reducing what are you doing anyways like why are we doing that project so really

understanding the impact that you’re making so um uh SCA we’ve been talking

about that um how many like uh we kicked

off that program last year um and now we’re ingesting all datas for all repos

um but that doesn’t make impact knowing what’s out there doesn’t make the impact the impact is actually patching or

removing those libraries from your ecosystem that’s the impact so being able to so it’s great that you’re D

deling priorities uh planning all that but you have to deliver the impact beautifully said beautifully said got so

got it no just don’t report on it do something about it right now you have talked a lot about

the paved path for security and I think you also touched on that with with GRC

if for a listener who’s out there and they want to build a pave path any

advice on how they can go about doing it yeah first understanding what pay path is so I I know that

um there are a lot of San Francisco based companies that talk about pay path

and we talked a a tiny bit about it we want to make it EAS easy for engineers

to do the right thing in itself so if I can build in my permission framework to

be a default lockdown and people have to um add uh items to the allow list or

attributes to their apis to show that hey I’m going to reduce the um security

posture for this I I want to allow everyone to be able to hit this API or Whatever It Is by default we should have

everything secure and make it uh make it additional steps to make it unsecure in

a way that we can actually track things in itself so those are paypath uh um and

I’ve seen a lot of security engineering Orcs where um they have taken over

certain responsibilities or build out features themselves so Borg where um

they automated how to um ask for and get certificates so made it really easy for

that file processing is another great example file processing can be a very

problematic functionality within your application there are numerous R code

execution rcees that could be discovered as part of the file processing uh workflow so centralizing having a

singular file processing system throwing it into separate AWS accounts will help

ensure that the blast radius for these sort of items are um are going to be

very minimal so when we talk about PayPal that’s what we’re talking about we trying to make sure that Engineers are doing the right thing and that the

blast radius is minimal there’s no real impact if uh if a particular vulnerability gets exploited and really

like we I want to go back to the risk uh conversation so um having those

conversations with your engineering uh partners and saying hey this is a big problem it’s our part of our top five or

top 10 risks we think we can chip away at it let’s uh first thing Let’s do

let’s centralize how we do all of our file processing that way if there are

vulnerabilities we don’t have to patch eight different areas or make modifications to eight eight different

areas let’s do it in a singular place so that reduces the risk rating Maybe by a tiny amount okay let’s move the file

processing out of where we have most of our uh um data in AWS let’s move it to

somewhere else so that even if someone were able to get an rce um they can’t do anything they can’t break out of the

sandbox uh in itself so um when when I talk about pay paths I really want to make sure that we’re prioritizing the

right things with our um our partners we don’t want to make a paay path for

everything we want to prioritize what we think is the most riskiest and do it in

a way that you get results quarter over quarter in itself so that you’re not

having to wait six n months before you see any impact in itself every single

quarter you’re delivering something reducing that risk in itself so that’s that’s why we really want to make sure

that we’re driving towards when we’re um building up our pay pass and I like to

call it secure pay path just because you can walk down it without having to worry about someone attacking you on that pay

path oh beautiful beautiful you today do you have GRC as a function reporting

into into you into security no no um GRC is uh reporting into our ciso Duncan but

we have a fabulous relationship with with the GRC team they they are really really great people so if you were to

think as a security engineer and a security leader if you were to think of a dream GRC solution what would that

look like well first it’ll be the team that we already have but okay in

addition to them um we talked a little bit about uh uh the engineering capabilities um I would really love uh

for us to add a few more GRC folks that are technical or have right now we don’t

mind doing that work for them like we are Partners we are one team so if there are stuff that benefits any team infr

SEC incident response product security we always look at what’s the most beneficial thing to work on for the the

team organization the business uh so if there are ways that we can actually benefit the GRC we don’t mind building

out that but like we talked a little about at segment where they actually had actual software engineer

that was on the team um that actually built out a lot of the automations to just reduce that uh toil that that’s

what I love about it so my dream GRC team would be folks that are very strong

at engineering and I really understand uh how to think like Engineers how to build processes scalable processes like

Engineers self-service uh processes and are really thoughtful and uh uh

collaborative with the engineering team when it comes to controls and rolling up controls themselves so but also Pusher

like they have to push they have to add that we talked about healthy friction continuously adding healthy friction

with the security team but also with the engineering team in all aspects of the business no that is a that’s that’s

brilliant I think we are approaching the end of the segment um G1 are there any podcast audio books

books that you read you listen to that you want to share with our listeners today yeah um that’s a great question uh

I’m a absc heavy individ so I love all the absc sort of related P podcast so um

so uh Chris Romeo uh has a great one Ken Johnson Seth law have another one so

absolute ABAC is another great one so um there are some really fantastic

individuals and thought leaders within the absc space um oasp is just great in

general as a resource um highly recommend Ola for to see more GRC folks

in uh like conferences uh that um OAS provides so just get exposed to some of

the problems and challenges that we’re running into um be able to wrap their head around uh those sort of things um

books I haven’t read too many it last while but I love reading

books about um I love reading books about technology

themselves like how do we think about these technological problems uh yeah there there’s plenty of books in that

space uh I run into a lot of different type of problems uh in itself yeah so

there’s so many great books out there um yeah but um but definitely conferences

come out to GFC folks please come out to our conferences speak with us let’s build stronger relations uh let’s make

sure that we help you on your path your career path as well and if folks want to

meet you where do you typically hang out I I’m a I’m Vancouver right so if you’re

in Vancouver uh you can catch me at oasp meetups for sure um but I’ll be at a few

conferences this year so um you can catch me at bide Seattle bide San Francisco this year so I’ll be

volunteering at bide Seattle I’ll be in the appac pnw area so application

security ific Northwest you can catch me there I’ll be floating at like uh at

beside San Francisco I’ll be walking around so feel free grab me ask me questions uh tell me my opinions suck I

don’t care like just reach out let’s chat let’s make sure that we build a stronger and better Community this has

been a fantastic discussion Jen I I thoroughly loved it uh so thank you very

much for coming out thank you for having me these were hard questions

glad that we were able to sort of chat through them thank you very much

[Music]

Listen on your favorite platform and stay updated with the latest insights, stories, and interviews.

CCM NERO graphic

Want to see how we can help your team or project?

Book a Demo