In this episode, Raj Krishnamurthy sits down with Kieran Pierman, GRC & Security at Whatnot, and a former security, risk and compliance leader at Cruise and Dropbox, to explore fresh perspectives on Security & GRC (Governance, Risk and Compliance).
Kieran opens with a bold stance: data breaches, while critical, aren’t the top threat they used to be. Instead, he argues, maintaining availability and service uptime is now paramount. Drawing from his unique experience building the foundational GRC program at Cruise, a pioneering self-driving car company, Kieran reveals how managing cybersecurity risks took on profound urgency—literally life-and-death implications—when securing autonomous vehicles.
Throughout the conversation, Kieran shares actionable insights on:
✅ Why availability and uptime are today’s most critical security priorities.
✅ How building GRC at Cruise required an uncompromising security posture due to the potential consequences of vehicle security breaches.
✅ Why GRC should be seen as an engineering discipline rather than a checkbox function.
✅ Practical strategies to shift GRC from a cost center to a profit-driving role.
✅ The importance of automation, technical fluency, and proactive risk management.
✅ Balancing preventative and detective controls to optimize both security and business agility.
✅ Tips on working effectively with auditors to enhance, rather than hinder, security maturity.
Tune in to learn how adopting a proactive, engineering-minded approach can elevate your GRC program from compliance-driven to business-critical.
🎙️ Security & GRC Decoded is brought to you by ComplianceCow.
🚀 Enjoying the Show?! 🚀
Don’t forget to like, comment, and subscribe to ensure you don’t miss out on expert insights from industry leaders shaping the future of security and compliance.
Learn More / Connect with Kieran Pierman
💼 LinkedIn: https://www.linkedin.com/in/kieranpierman/
🌐 Company: https://www.whatnot.com/
uh-huh uh-huh [Music]
hey hey hey welcome to another episode of Security and GRC Decordered i’m Raj Krishna Morti your host and today we
have the fantastic Kieran with us today as our guest kieran is responsible for
GRC and security at whatn not and has led security and compliance engineering and assurance programs at companies like
Cruz Dropbox and Ernstston kieran welcome to the show thank you Raj
pleasure to be here really uh looking forward to this conversation today and uh thank you for having me
so let’s start with something we we ask our guests all this question all the time let’s start with something controversial right what is one
controversial opinion that you hold on security and GRC security yeah my
controversial opinion is uh that the data security or data protection um side
of security has become a lot less relevant uh over time and uh and I say
that meaning that I think the like platform protection sort of availability
side of security uh has become a lot more critical you know when I like when
I think about risks that a company faces the
things that get the most attention from executives and um you know have the most
like immediate revenue impacting uh uh potential are around like the site or
service being down and and customers not being able to use it and
um I feel like that’s really become priority number one whereas like all of our data don’t get me wrong
I think it’s important but you know the reason it’s a controversial opinion is like all of our data has been through so many breaches at this time that we’ve
become a little bit um you know like immune or or um you know the the
notifications have become so commonplace that it’s almost like who cares right
when you get another notification you know who cares that your email uh is is breached again or that you know an old
password that you’re using for some site is breached like um it uh I just sort of delete those
emails and move along right uh but when a site is down if I can’t use something or you know if a company can’t generate
revenue that’s um like that’s what draws attention that’s what um like security teams I think really need to be
protecting against no that’s a very interesting viewpoint it is definitely controversial so what what I’m hearing
you say in fact we had one of our other guests that came on the call and he said the exact opposite of what you’re saying
right but what I’m hearing you say is that in a world where we assume breach
right data is out there and you’re not saying it is not critical what you’re saying what you’re saying is that it is far more important that we understand
the nuances how we build these systems from an availability and resiliency perspective rather than this very
religious focus on data yeah exactly i think you know I think a
data breach is absolutely going to affect you know every company and that’s not definitely you know I’m not saying
that it won’t but um uh it definitely like affects companies
to different degrees particularly if you are like a critical service that companies can’t really move off of very
well like I don’t know I’ll pick on Workday as an example like you know it’s a big HIS that if they had a breach I
just realistically don’t see that many companies like ripping out workday and replacing it um but uh but if workday is like down
you know suddenly your like onboarding systems don’t work terminations don’t work
um there’s I mean there’s a lot of things you can put in workday different companies do it different ways but like payroll might be in workday right it’s
um suddenly a really big deal if the service isn’t available you know similarly I don’t know if you look at
like Amazon that’s more of a BTOC um example but like Amazon if all of my like order history
on Amazon was breached and like made public I’d be like “Okay whatever.” Um but
uh if the if Amazon.com doesn’t work and I can’t buy things uh even for you know
10 minutes that’s you know millions and millions of revenue impact uh for a company of Amazon size so yeah I mean
that’s that’s kind of my point is like that’s where I think the like real scale and impact comes in is is when your
service isn’t available because of some um cyber security issue and that’s um that should be given a lot of weight
when doing like risk assessments got it um let’s talk about you Kieran how did
you start your career in security and compliance yeah I feel like I sort of wound up here
by accident but I’ve had a lot of fun doing it over the years so I’ve you know leaned into it and and kept doing it i
um in college I studied in in um information systems business information
systems and wound up working for EY uh one of the big four doing um like a lot
of sock 2 audits socks audits this sort of stuff um and while like I enjoyed doing the external side it definitely
wasn’t what I wanted to do forever so um I looked for an opportunity to jump internal
uh at Dropbox spent some time at Dropbox which was like an awesome experience and
Dropbox had a relatively mature security program um security compliance program at the time so you know a lot of that
was just like seeing how a well put together program runs and like getting the opportunity to to contribute to that
um wasn’t too long till I felt like I really wanted to like build something myself which is why I jumped to Cruz pretty early on in Cruz’s journey and
was able to really build their security GRC program from the ground up um and then you know similarly doing something
uh uh here for whatnot and yeah just as it’s as my career has progressed uh I
found that I really enjoy GRC as like um an intersection of people problems and
like technology or security problems and like that’s that’s what I have fun doing is like kind of solving that that inter
intersection of of people and and technology um and uh yeah and it’s truly
been like a a fun career so far okay you said something also interesting at Dropbox right i you did something around
incident response management am I saying this right is that what you did what what was that about and how did that
intersect with GRC yeah that to be frank like was there wasn’t a ton of overlap
um but what it was was I was running Dropbox’s um business incident response
uh program so when you know there was some engineering issue where we needed
to reach out to customers um to tell them about the issue uh you know either
we accidentally deleted some data or there was a corruption in in some file or uh I don’t know there’s a freeze on
their account you know whatever it might be um I like kind of ran the team or program that was responsible for
coordinating the response from legal and marketing and comms and uh customer
support and all these different functions to make sure that we you know are reaching out to the customer and um
kind of treating it with a with a unified voice and and making sure everyone you know was in the loop there
um and uh yeah it sort of wound up on my plate as a a function within legal um at
Dropbox the GRC team was actually within uh legal rather than uh within like security engineering um but yeah wound
up on my plate and and had a lot of fun doing that uh it was really cool but uh not like there wasn’t a ton of overlap
with with like traditional GRC work uh there um yeah I I would say what I
really appreciate about that experience though is like now at whatnot we’re such a small team that I find myself uh you
know on call for like frontline incidents again um and uh and that experience is really
helpful because you know I’ve I’ve been through that incident process for you know customerf facing incidents uh quite
a bit and you know was able to just pick it up very easily here um cuz I’ve I’ve
done it a lot in the past so does that help you uh as you said there is no
overlap but GRC tends to be mostly an insidefacing function and given your
experience around instant management does that has that helped you or does that help you in any way on how you
think about GRC yeah I mean I think it keeps you really grounded with uh the customer with the
customer experience what the customer faces the like real life problems that
you know subsets of customers are running into um and that’s all just I
think just helpful probably in any role but like you know within GRC as you’re thinking about like you know risks
um uh it’s helpful to keep in mind like what the customer experience uh really is and um yeah and also as you’re
thinking about okay where do we want to like take a compliance program what might be important um if you know
customers are complaining about a lot of availability incidents maybe that’s a good like segue or pitch into adding
like availability criter criteria into a sock too um so you know I think those those sorts of angles are I I I have a
very strong feeling that the controversial opinion that you start to do this very much informed based on what
you have seen in the field right um and I think that is very interesting so this
creates customer empathy and I don’t know who talks about customer empathy in GRC but that’s a very fresh perspective
yeah yeah absolutely i think um you know again I know I’ve said it I
I don’t want to say that protecting data isn’t important because customers you know I think customer empathy and caring about the customer still very valid and
important for their data you know safeguarding their data is is very important but um yeah it’s like the true
frustrations come out when uh when they can’t use your product at all so yeah as
a as a compliance engineer and leader what is your view of GRC governance risk
and compliance yeah I feel like GRC a couple things i
feel like GRC should be like one and the same with security like I don’t think they should
be viewed as two separate functions uh you know I mentioned earlier Dropbox had GRC on the legal team uh and while there
were some advantages to that mainly that being like um when compliance or GRC asks for
something when it sort of has like the weight of legal behind it um it’s often easier to get things done um or like you
can you know align priorities more quickly that was nice but you know
having been on teams where it’s within legal and within security I prefer for it to be within security um because I
think GRC and security work really well like hand inand GRC and security to me is like GRC is the um kind of like
scaffolding that all the other teams can use to um mature level up build their
organizations you know GRC I think is the one function that truly sees um
across all the other domains of security right like GRC is the function that has
um requirements or controls or processes to understand you know how apps should function how detection and response
should function infrastructure security you know uh corporate engineering and and employee endpoints right all these
sorts of things um whereas you know all the other groups sure like they have a
you general knowledge of all of security but um tend to stay within their own areas and so yeah I see like GRC as the
kind of like glue or like a connector bridge across all these different um
subdomains of security that kind of has the holistic picture of what a security program should look like and and when
you lean on GRC like properly they really can um like you know use the
scaffolding example again be be the scaffolding for the other teams to to reference and and you know work towards
so got it and how do you think others perceive GRC others in the organization
whether it is your leadership team whether it is the other business units that you deal with how do they perceive
GRC yeah well I think it can vary wild wildly based on the organization uh you
know I’ve seen GRC be perceived as um a like necessary thing but very evil
or like a pain essentially necessary evil yes a necessary evil um but not one
that you know anybody enjoys or like really wants to deal with um and uh you know I’ve seen people’s
attitudes be like they’re essentially like useless uh paper pushers and uh you
know and they exist because you know some legal requirement or like a cert uh
uh insurance you know agency requires it this sort of stuff and uh and I
understand you know where those those trains of thoughts like comes from and how those originate absolutely because I
think you know in its worst form um GRC can be like that but
um but it also can be so great right like GRC can be um like truly a hub of
like knowledge and best practice and um like hands-on work to help all the other
like security domains help like product uh implement security better all of
these sorts of things um and so yeah so I’d say Like I’ve also seen
security be viewed or uh GRC specifically right be viewed as a uh
huge value ad for for security and for the organization um
and you know maybe we’ll getting we’ll get more into this later but I think when you can position it as a uh you
know as a valuable thing tied to business development or or business objectives that’s really where you start
to see that value um and ensure that the GRC teams are you know
uh valued or or uh seen how you know for their best yeah okay i in fact I was
going to ask you the question in terms of how do you think we can change the perspective for the better i think some
part you already answered but anything more you want to add yeah I mean I think the like core idea underpinning it that
is um making sure GRC is seen as a um
profit center and not a cost center essentially right position GRC to be seen as a function that drives new
business not as just a function that you have to pour money into to keep the business afloat and you know what I mean
by that is like working closely with um sales or business development um to
understand like what target markets the company is trying to target um what
customers the company might be trying to go after and understand
um what compliance um you know objectives may help them unlock uh that
market you know that may be something like SOCK 2 or ISO but you can get more specific you know like uh the German
automative automotive market is based off of T-AX right and so um you know maybe that’s something sales has come up
against but they’ve always been shot down because nobody’s considered TAX before um so you know it’s a good
example of like okay work with sales and see if uh you can essentially unlock a new market to for the business to to
target um I use you know PCI is probably the easiest example there where uh you have
to have PCI if you want to be able be able to accept payment cards um you know that’s a clear revenue driver of like
GRC has unlocked or like maintains the ability for the company to collect credit cards that’s a huge uh like
revenue driver revenue enablement um function and um anyways I think all of that is
important is important because the more you can show that GRC is tied to revenue growth then you know you unlock much
easier time of getting budget um getting headcount uh just getting you know
visibility that you need uh at the company to to make your uh initiative
successful okay and and when you and I think that’s a very interesting point you’re saying so you’re saying it is not
a cost center it is it has to be looked at from a profit center perspective which helps you with unlocking deals
right getting into new markets penetrating so on and so forth but what does that mean for GRC practitioners
Kieran do they do enough for compliance so that they can uh they can they can
sort of unlock some of these opportunities are there more things that they have to do from a security perspective uh that can more add more
value to security as an apparatus Yeah I think GRC or I should say like
any security standard out there um let me add some more copouts most
security standards out there should be seen as like the minimum bar for for the company to achieve right
um companies that get breached have a litany of uh you know security standards
uh that they can attest to or have audited and you know that having having security standards does not make you
secure um so I think making sure that it’s understood that like yeah the
standards that GRC is putting forth can be tied to like business development but that is not where security stops like
security needs to continue maturing um and I think when you know when you
look like at a standard like suck 2 it’s very flexible by intention and like in
its worst form it is a terrible check the box exercise where you like explain
away most of the requirements and get an auditor that doesn’t care that much um you know and you get a meaningless like
report um but in its best form it has like great controls around ongoing risk
management where you need to be constantly assessing your security program and putting in controls that
don’t exist anywhere in the wording of SOCK 2 but if you are following the spirit of what SOCK 2 is trying to get
at you know you’ll be constantly finding these risks and putting in like net new controls that yeah may never be tested
in the audit but like continue to mature your program the way they they need to be so little bit of a roundabout answer
to your question but I you know I think that’s really like continue added value comes comes after um you know after you
kind of get the initial certification or report or whatever it is is like really following the spirit of what these
standards are asking for and continuing to protect your company do what’s right for the customer um by advancing and
maturing your your security got it and I want to double click on this uh risk is
contextual and I wanted to maybe if you can double click on your experience at Cruz as you built you were one of the
foundational you built the GRC program at Cruz what how did you what did you
think about from a from a risk perspective at Cruz how was that thought process yeah so Cruz you know for just
broader context was um self-driving cars and the when I joined it was very much
an R&D research and development shop um where any vehicles out on the road you
know had a safety driver behind the wheel um so our risk profile like evolved over
time but the important thing or I think like the biggest takeaway is the number one thing that we were always focused on or what we knew the top risk was um was
a remote takeover of a vehicle that would cause the vehicle then to you know be used as a weapon drive it into a
crowd of people something like this and and that was always the like number one
risk on our minds that we were trying to to protect against and so with that you
know you’re literally dealing with human lives and uh at the scale that Cruz was looking to get to um a you know remote
takeover of numerous vehicles at once could be like a serious large-scale terrorist attack essentially
um and so with that came yeah just a
like um lower risk tolerance for anything connected to the vehicle itself
um you know crew still wanted to like be agile and and move as fast as possible
and you know that was we did our best to do that in in areas where we could but you know when it came to connections to
the vehicle things like our remote assistance um uh service to to help vehicles you know out of like
complicated construction zones or or things like this or um you know the the vehicle network that was hosted uh in
the cloud they you know just had a very low
toler tolerance for um for security risks and we would focus a lot on like
network segmentation and zero trust and the CI/CD pipeline for deploying to those services
um yeah and that you know is very different from my
experience at whatnot where we you know security is extremely important we have
a lot of user data we have a active um you know service that hundreds of
thousands of people are using all the time and um but we don’t have people’s lives like
on the line right so we can take um we can take a different set of risks um at whatnot um you know we can rely on more
uh detective controls in some instances uh rather than preventative if that makes more sense for the business um and
I think like I think that context is is really important when you’re doing that risk assessment right
because you have to match the like controls to the company um the preventative controls you know have
the potential to be more disruptive if they’re going to like block something from happening whereas detective controls you can allow a process to
happen and like check after the fact to see um uh you know see if it happened as
expected or not and so yeah just important um important context to match match the
control to the company make sure it makes sense to sort of Okay okay and I I think that’s an interesting uh switch
from Cruz which is a software definfined vehicle company to whatnot which is a retail large scale I mean high-speed
retail company and what were some of the learnings that you were able to apply from Cruz into whatnot
yeah definitely some of the learnings were from like early on in my cruise
days when it was still an R&D company there was still this like sense
of you know we need to make sure that processes are mature or are secure um
and you know coming from Dropbox seeing a like relatively mature program I knew
what those processes needed to be um and so early on you know I tried to sort of
force maturity into cruise um but didn’t
take the time to like really understand the risk uh at that time what I mean by
that you know is like when it was an R&D company there were safety drivers in all the vehicles and so we didn’t need the
full suite of security controls turned on on day one because you know even in the worst case scenario of a like remote
takeover of a vehicle the safety driver just like pulls the vehicle over and turns the car off right uh and and
you’ve mitigated your risk um so you know one one simple example is just like access reviews right uh a typical like
security control that that you you must do for you know any any security standard really but um they can be like
really ownorous timeconuming especially early on in a company when um access has
been given like pretty widely and uh you know trying to get crews to like
immediately start pick up picking up and like doing access reviews for a lot of
their applications um just got a lot of push back and you know when you take the time to like sit down and think about it
like yeah it wasn’t like there wasn’t right justification for why we need to do these like full access reviews right
now given the broader like risk profile um so anyways that’s definitely like one
of the learnings I’ve taken forward is you know match these security controls to the maturity and risk profile of the
company um don’t force maturity when the company isn’t ready yet like maturity is
a journey and like you know if you look like a a maturity model there’s steps one to three or one to five you know
whatever maturity model you’re using and I generally don’t advise companies to
try to like skip from one to four or something you know like they’re steps for a reason even if you know what four
should look like step four of majority should look like you should probably go through two and three u first to um to
get there because it it’s just part of the journey the company needs to go through to like learn and um and be
ready so okay and what were some of the unlearnings what did you have to unlearn
from from cruise into whatnot yeah
um I think forgetting um forgetting some of
the I’ll say like size I guess um was important like even when I first
joined Cruz we were roughly a 30 person security team I think
um and so you know at that scale you have at least a few people in each
domain of security uh focused on their area and that’s great but what it means
also is like there’s less there’s just less sharing of resources right you don’t need necessarily need the GRC
person like doing uh helping out with detection response or like um helping work on like cloud security
um and so but I wasn’t all that’s very different right we’re like a team of um
six and we share resources across um all the different security domains um I help
out it I help out uh you know in cloud security in in detection and response
and so um yeah just making sure that we’ve breaking down the you know silos
kind of has a taboo but you know for lack of a better word like silos that that crop up as you as you scale as you
grow to bigger companies and like um moving back to like a flatter uh flatter structure okay and I’m assuming that to
your earlier comment because you you see GRC as an oversight function and it can
look at a holistic I think you use the word scaffolding i think you are in the best possible position to look at this
holistically as well yeah yeah i think um you know one of
the one of the things that we often did at cruise that I would like to do like differently at
whatnot is um teams the different like subdomains within security were really
like completely responsible for setting their own road map and then would sort of like share that out with the broader
team and um and I don’t think like GRC had as big of a role as it should have um or like
what I came to like realize in hindsight uh over time and you know to be clear I think teams
need to be in charge of their own destiny you know no team or nobody understands like better the risks in front of them or like what needs to be
focused on than the subject matter experts so you know I’m not saying like GRC should dictate the road map of appsec or or infra or something but um
we do understand like what the maturity of those different domains look like Um
and I think GRC should have like strong input into uh those road maps and like
that’s definitely part of what I want to do at whatnot is um be much more plugged in with those domains working with the
um like leaders of um of each area and you know helping shape uh that that road
map over time proactive GRC yeah what do you see as some of the
organizational challenges that typically we you see GRC teams facing that they
need to overcome yeah um I
think budget like is always budget can always fluctuate right like based on how
the business is doing um the like both headcount or like
headcount budget and like tools budget uh fluctuates but
maybe this might this might you know overlap with it with another area a bit but you know what I see is like
shortterm um prioritization over long-term scale being a challenge so
what I mean by that is like and I’m guilty of it myself uh an easy thing to
do is like as as a GRC practitioner is like keep your head down pass the audits
make sure the controls are successful and like don’t cause problems for uh for
leadership and then like and then you’ve done a good job right um and that’s great but what that often winds up winds
up with is like manual controls or just kind of like sticking things together to like pass the the next audit um and it
causes processes that like really should have been automated to stay manual like way longer than they should
um and I just I see both like in programs that like I’ve run and in in
talking to other partners a um hesitancy for GRC uh to ask for like
engineering resources um and I think there’s maybe a few different reasons for it uh but yeah you know I think JRC
should be like encouraged to ask for either just like an engineering contractor for like 6 months or like borrow see if we can borrow an engineer
from another team for uh you know a quarter or a trimester to like automate several controls if there’s concern you
know that there’s not enough um work for a you know true full-time engineer fine but that shouldn’t then like preclude us
from asking for a contractor for a certain amount of time or you know or borrowing resources because
um yes just like as you scale to set up processes where people are not going to be frustrated where people are going to
like be like wow this was like well designed by GRC and like thought out you need the automated controls um and
uh yeah and you know just putting like a dedicated engineer on it is is like is what’s needed so what I’m hearing you
say is that you see GRC as as much an engineering discipline as is it is a
functional discipline yes yeah absolutely like I think and I think it’s starting to become more and more popular but like having an engineer a full-time
engineer or or multiple even you know within the GRC team is uh is like
absolutely important and like um uh yeah it can bring a lot of value to getting
GRC teams out of uh manual processes yeah and which goes back to your earlier statement which is that you have to look
at the spirit of what these standards are and these controls are right rather than the letter yes yes okay that makes
sense what do you see as GRC team’s role with respect to auditors and how should
how should we think about it how should we approach it yeah um I think the relationship between like
GRC team and auditor is uh undervalued or overlooked sometimes
um you know and I come at this from the perspective of having been the auditor as well so a couple things one like be
friends with your auditor right like you and your auditor are on the same team is is really how you should be thinking
about it and looking at it um and I mean that even just down to like treating
your auditors as like good people uh you know take the time to like do an offsite
with them go out to dinner um and spend a little time with them because one like
auditors have some of the widest breadth of experience for uh how controls or
processes have been done uh across companies like similar companies and
so you know being able to like tap in and leverage that expertise to help you
uh help your own company like understand how can a given a controller process be done like well what has the auditor seen
in the past um is is really important and then um you know the other thing is
just like having that transparent relationship or like positive relationship with your auditor lets you
be more transparent about like issues that might come up and um and honestly
like it even just like makes like push back uh in an audit from uh you know potential finding go so much easier um
you know yeah when you’re like discussing a potential deviation or finding um there is like some implicit uh trust
that is built when you have like a positive relationship when you’ve been transparent in the past and auditors are
much more willing to work with you help you solve the issue to like come to a uh
you know to avoid a finding or something rather than sort of just like you know giving the you the default like this
failed here’s your here’s your finding so you had mentioned to me when we were
talking that um I think you would be prudent in auditive selection am I reading too much into it how do you do
it yeah 100% so you know I mentioned this a little bit uh earlier as well about you know
SOCK 2 can be a wonderful standard with um you know that that does a great job
guiding a security program or it can be like a paper exercise that doesn’t mean much and the auditor has a huge piece in
that um I I think our like industry as a whole
is actually like um coming up against an issue where suck 2 is getting watered
down more and more um a lot of these more just like uh you know check the box
reports are coming out that don’t mean that much and yeah in my opinion that like comes back to the auditor right
because auditors have a lot of discretion around what is like
considered um acceptable in terms of meeting the points of focus within SOCK
2 and the rigor to which those controls are tested um you know I’ve seen sock 2
reports where they called it a type two but when you like look through the testing like testing steps they just did
a test of design for every single one like there was no test of effectiveness there was no sampling and so I’m like sitting there scratching my head like
what like what happened here like what’s going on um
so I mean ultimately I would actually I would love to see the AICPA come out with like stronger standards um that
auditors are held to um because you know I think anybody you know asking auditors
even to self audit themselves just isn’t going to happen or isn’t realistic but um yeah all that to be said you know you
can you should pick an auditor that is going to uphold some level of like rigor
um you know will push back on you sometimes because you if you are just getting sock 2 for the sake of like
putting the sock 2 seal on your website you’re doing it wrong like just you like you know you’re watering down like the
whole industry and like you’re making it worse for all of us um and uh getting
push back from others is is a good thing right like that’s helping you mature your security program um you should be
looking for an auditor that challenges you well said our audience um has GRC
security engineering and possibly it as well maybe it’ll be helpful to define
test of design and test of effectiveness briefly yeah yeah absolutely so yeah test of design versus test of
effectiveness is basically the difference between a type one report uh sock two type one and sock two type two
so test of design is a point in time test of a control so just like on the
day the auditors show up can you prove like we pick change management for a reason you know can you prove that all
your changes were actually like peer-reviewed and approved and tested correctly sorry I shouldn’t say all your
changes one change you know one change that is uh picked uh can you prove that that one change was um was actually
approved and and tested as expected um and that’s tested design like did you design a control uh according you know
uh well according to to the control stated test of effectiveness is did that
control actually work effectively operate effectively over a period of time and that’s type two right so if
you’re doing 3 months 6 months year report whatever it is the auditor is going to sample a bunch of changes over
the last um you know over that time period 12 months and you need to prove every single time for every single
sample that it actually worked as expected um which is much much harder to do right um setting up a process that uh
that always works um rather than you know cherrypicking a good example uh to to prove that it works you know in
theory by design so what do you see as some of the technical challenges that the GRC teams face
yeah um I think a lot of like traditional GRC
practitioners don’t have like a ton of um software engineering background um
you know even myself I’m I’m not a software engineer by trade but I’ve um learned a lot over time where I can uh
you know spend a good amount of time in in GitHub and uh you know be be figuring things out myself now but um yeah you
know I think one of the technical challenges is literally just like technical ability right uh I think the
the ability to recommend good controls that are automated can scale that like
fit well into the overall architecture requires really like a comprehensive understanding of
um software engineer engineering fundamentals from like okay you know is
what does your infrastructure look like are you on Kubernetes and like if so um what’s the like uh you know container
image that’s being used for that versus um versus like if you’re on your own uh
uh stack and you need to control all the way up from like bare metal um you’re looking at a very different
like set of controls um and even just like taking the time to
understand how different systems like interact with each other uh you know like at whatnot we use um Snowflake as
one of our data uh warehouses but understanding like okay how does our data actually get from our backend
systems into Snowflake um and like do we need like checks or like controls on
that ETL pipeline um is important otherwise you’re like only kind of looking at like an input and output and
missing how you know how the data gets from from one place to another okay I I think you said something very
interesting when we spoke uh last Kiran you said you don’t buy into this argument of speed versus security um you
don’t think that they don’t have to be at odds you don’t think security is a gating function can you explain that a little bit yeah I think the com or the
like classic security uh and business like dichotomy right is that security is
going to make the business go slower um and while it’s obviously possible that’s
why it’s like you know one of the classic issues I don’t think it has to be that way or it shouldn’t be that way when security is done uh done right or
done well and so you know thinking about when we’re thinking about controls I
think thinking putting in place controls that are as low friction as possible um
or even make things more efficient for the business is really really important
and so you know a couple examples there is like um MFA it’s a you know it’s a very basic
security control it’s going to be non-negotiable we’re going to need MFA and like if you do it wrong it’s going
to be a pain for everybody and so that might be you know if you’re doing like one-time passcodes or like SMS uh uh
texts uh codes uh even like pushes to your phone are like both less secure but
also like annoying for people to um to answer uh and so like that’s going to
create uh just friction in the process but if you put MFA in place where you’re
using like biometrics or some form of like some form of fishing resistant um web a or you’ve got like a Ubi key or
your fingerprint or face ID um it becomes like both both mo more secure
and way easier for users um to authenticate when you know they just use
their face they’re already looking at it um and they can get in um that way uh
yeah you know another um another example might be with like uh change management
i think getting peer reviews you know is a pretty ubiquitous control even apart
from security you know pretty much every company does peer reviews on changes just because it’s uh good practice but
um making sure you have a really uh easy and like accessible process for people
to push emergency changes uh that don’t require peer review and that you can
just you can get alerted and like check after the fact if um you know if something gets pushed that way is
another example of like you’re still covering your risk uh by having a detective control in there but you’re
also letting the business like move fast when they need to and not being a blocker or disruptor um by uh you know
by allowing changes to be pushed um without an approval um yeah you know
there’s access examples as well of like setting things up to be self-service with preset rules about who can be
pre-approved for different um different access even like beyond arbback right arbback is a great start but um yeah
even beyond that you can set up like automatic rules so that like an example would be for an admin break glass
function we have it tied to a page duty rotation at whatnot so you know these
people don’t have access to admin all the time but the pager of duty uh schedule for the person that’s on call
can grab the admin access if they need it um to solve a problem super low
friction you know addresses the security risk of just having a bunch of admins all the time um yeah no that is very
interesting and I think you have also been a big proponent of using GRC beyond the natural sense of controls like right
sizing access can you can you talk about that a little bit about for our for our users audience yeah I think GRC
particularly at um you know smaller companies although I I think it should hold true as you get larger um although
I understand that like a lot of GRC’s time just gets taken up with audits uh as you get to larger companies but um
yeah GRC can really be a function to help mature these basic security
controls um across the company so you know something like arbback um at a you
know startup they may have heard the term but like it’s unlikely to have been implemented well yet uh and that’s
something that like GRC has a lot of experience uh with knows how it should look um you know has possibly like set
it up before and so like that’s something I think is great for GRC teams
to do is like integrate closely with it and like help set up arbback uh at the company and you’ve like it it does so
much good right arbug arbback done right creates so much efficiency for the company because people have the access
they need on day one there’s no like just so much less people like running around trying to figure out what they
need and how to get it um and at the same time like drastically reduces overprovisioning of people just saying
like uh yeah here have admin because we don’t actually know like what um access makes sense uh and so yeah just you know
it’s something that works so well hand in hand and uh like I’m a huge proponent of using some GRC time GRC time to not
just consult on these best practices but like use it and and do them do them ourselves yeah well that actually that’s
brilliant because I don’t know if you know this Kubernetes has this command line utility called can audit it started
as an open source project where they are basically looking at your access logs and trying to determine whether the
roles are right sized right when the user accesses so actually that’s a brilliant way to think about this
problem um I think this brings me I mean this analogy that you’re talking about speed versus security is also very
interesting because it brings to my memory DORA the DevOps uh research and assessment where they are basically
challenging those this notion of velocity versus stability and they’re saying they don’t have to be at odds at
each other right I mean you can achieve both from a de
Yeah yeah exactly i think um I think when done right right they
should they should work together like you can you can have security and um and
speed you can uh you know have a good DevOps process that uh that works well
quickly um but it does like you Yeah I mean you have to take a
sec to like think about it and um uh and just like be willing to like
be creative right like sometimes you have to move away from some of the like most traditional uh implementations of
of a control but that is a good segue because you also earlier talked about balancing between preventative and
detective controls i want to double click on that how do you think about this k yeah so you know yeah I mean
every company is unique obviously and like you’re going to have your own risk profile but um
the not in in the hierarchy of controls right preventative are the best like
most um like generally strongest controls you stop something from happening entirely um and detective
controls are uh generally like on the weaker side because the issue or
whatever it is would have already happened and and you’re finding out after the fact but um but that doesn’t mean that like
preventative is always the control you want to push for um right when you do a
risk assessment you can you determine your like inherent risk there and then
figure out you know what your target risk is or what your um you know what your residual risk that you want to get to is and if you know two um detective
controls get you to your risk target like there’s a good chance that that winds up being better for the business
um than like one preventative control and so um yeah you know uh if we use uh an
example like it might be um something like uh you know Terraform
configurations where we could put a preventative control in
place that stops somebody from like pushing a change without approvals from you know uh three different teams that
you know that all have their hand in this um and yeah fine but like that creates lots
of opportunities for things to slow down you know people are out and um there’s a lot of back and forth etc
um whereas you can have a detective control and you’re able to like still be
notified that something happened something changed and follow up if it is of interest but nobody is nothing’s
being blocked because somebody was like out for a long weekend or like out on PTO um you know or like wants to have
like an in-depth uh uh like conversation about some like semantic point of it
like that conversation can still happen but while the business is able to move forward with like with the change that
needs to happen that’s a beautiful example the terapform example is a beautiful example but in order to do
this what type of culture do we expect to create yeah you definitely need and
you know I I understand that you can work hard to create like a culture of GRC of trust within the GRC team but
like there’s a broader company culture that you have to deal with as well but anyways I think what’s really important is like um a culture that is not afraid
of failure or like encourages failure and iteration right um I think like one
of the best ways to like quickly understand what the right control is and how to rightsize your response to a risk
is um iterating quickly you know put a control in and based on the feedback you
get whether it’s um you know too ownorous or you know nobody complains um
you get that feedback very quickly but um but the company has to be very like open to uh open and okay with things
going wrong or like failure essentially uh and not hold that against you
um you know like I’ll use an example where I uh last week turned off access
um for a permission and I wasn’t like basically it would would have probably taken me like weeks to fully understand
all the imp implications of this role and everything that was going on but I knew it was like way overprovisioned and
so you know rather than spending like weeks looking at all the access logs and where everything is going and how all the permissions correlate um I started
like taking away access and Uh then someone from marketing like very quickly pings me and was like hey like I don’t
have access to approved push notifications anymore and I’m like oh you know sorry like this was me and um
but their response was like you don’t need to be sorry like we’re super happy to like help you test um and like you
know thanks for like addressing this quickly and like that sort of response where like culture lets me iterate on
these controls rightsize that access in like you know I was able to do it in like 20 minutes instead of spending
weeks trying to find you know what the right solution there I I I would love to get a poll out to our audience on that
question in terms of how they feel i’m sure it’s going to it’s going to be all over but that’s a fantastic and an
interesting sort of experiment right i I think what you’re basically saying is the culture of experimentation culture
of risk takingaking right as long as you can act on it and the intent is right you know can Yes yes and I mean like
again you always have to use caution you know like I probably wouldn’t do a do a permission change like that if I knew it
was going to affect you know like our frontline customer support agents ability to like give refunds or
something because you know that’s just like a high volume thing that they need to be able to do i don’t want to mess
with that but um but yeah you know like this permission I was like okay like the worst that can go wrong is I disrupt
like uh push notifications that are scheduled in the future anyways so I’m like okay like let me go for this and
like see um see where we are you talked about earlier about GRC being a profit
center versus a cost center and for the GRC manager who is trying to build a
business case right and learning everything that you’re saying here and today and they want to build a GRC program how should they think about
building that business case yeah I mean as I mentioned earlier I would go directly to the sales or like
business development team to understand where the business is trying to go um understand from leadership or
you know internal company resources whatever it is what the larger business um objectives are definitely talk to
legal as well and compile basically all the different
um I don’t know what the word catalysts uh uh for where GRC is needed and you
know so on the sales or like business development side that may be like new customers or like markets that you’re
trying to address um on the business objective side that may be um you know
generally about like customer trust or um going public right like then socks
would matter there’s different there’s standards for if you are running ads on
your site um there’s MRC now I forget what it is like media ratings council or
something i forget exactly what it stands for but like um yeah in order to like get advertisers to uh be
comfortable running ads on your platform MRC is going to matter so like yeah like if you see okay we’re going to start
running ads on the business objectives if people aren’t already aware that like MRC is probably going to come up and we
should get a head start on that you know that’s where you need to plug in and then on legal side right um uh third party risk uh often ties in
like closely with legal um socks again is like relevant for legal um and
so the compiling all these things and and tying dollar numbers to it right um
the total addressable market uh value from the new business development uh the
oh sorry I completely spaced on the privacy regulations in the in the legal sphere uh right uh GDPR CCPA etc like
are huge for um from the legal perspective that we need to focus on so like understanding what the potential
um costs avoided there would be right in terms of fines um and anyways then you
can put together like a very clear business case of like doing XYZ gets us or saves us this amount of money um and
yeah and then you’ve you know sounds very nice in theory definitely harder in practice but
you’ve essentially put together like your pitch of like this is the profits revenue that like GRC can help the
business generate okay oh that’s beautiful what would you if there is a dream GRC solution what would that look
like okay yeah
um I want a GRC solution that is as
customizable as possible um to automate
not just evidence collection but a lot of times the like operation of controls
right so like um if we are using change management as
an example again you know I want a solution that is not only going to
monitor for when a change is pushed in GitHub without an an approval but I want
it to then follow up with that PR um uh author and be like hey in Slack
ideally or you know wherever we’re working uh you know meet people where where they are um you know hey I saw
this uh PR was pushed without an approval like was this intentional and
essentially like you know have a call in response with them to to address that finding um I don’t you know I don’t just want
like a screenshot or something of the change to like say you know this change got pushed um yeah you know I want that
automation and at the end collect the evidence for me um you know if I’m if I’m continuing
with the uh examples uh you know a GRC solution where if um
uh for access right if we are looking at uh an access
review it should be able to like connect in with octa assuming you know octa is
your SSO and tell me the last time people signed into a given application
um so that as part of the data for the access review you understand who’s
inactive right and be able to provide that information then to the reviewer um like hey you have these 16 people to
review five of them haven’t actually logged into this application in uh you know in 45 days and they should have
that context as part of their review um yeah anyways these are like these are
my dream things i think what you’re saying is very interesting what you’re basically saying is that you are not you’re saying GRC beyond sort of telling
what we do into more a conversation that you’re having with the control owners and the rest of the organization you’re
basically helping them to move from from the baseline get better from the
baseline as much as possible incrementally step by step is what I’m hearing yeah yeah improving from the
baseline step by step and like um and meeting people where they are I
think is the other thing that I would say is really important you know I um teaching people or like trying to get
people to use yet another tool um is difficult and uh and you’re probably
going to wind up spending more of your time right chasing people down uh than getting like results out of them so yeah
you know something that’s built into Slack or email or whatever it is where uh they can just answer like yes or no
and like give you the evidence you need or you know perform their control right there like that just saves both parties
so much time and um and it’s better for security because you’re like getting the control to happen like more quickly and
more efficiently so no absolutely it sounds like a compliance code marketing pitch but that’s another discussion uh I
think we are almost at the end of the segment um Kieran and I want to ask you
are there any podcast books you read people that you follow anything that you
want to share with our audience today yeah um I think uh I don’t know maybe maybe
you’ll have them on at some point if you haven’t you should but uh uh Troy Fine on LinkedIn um I recommend that you know
everyone should follow he has uh he has great content about the security GRC
world um and also like often it’s it’s funny um he didn’t pay me to say this uh
I just think you know his content is worth following and it’s often like very timely about uh you know new standards
that have come out or um you know rulings from uh or guidance from SEC or or whatever it might be so um honestly I
think yeah he’s he’s a great source um I don’t have like one specific book I
would say like I have tried reading a bunch of different books about like risk management and cyber security
um definitely have learned some great things as I have issues uh with a lot of them um but I would say maybe my broader
recommendation is um I was actually able to get like a whole bunch of books like
probably like three dozen uh security related books from Humble Bundle um one time um for like a very very reasonable
price um and that was the first time I realized that like Humble Bundle does more than just video games um so anyways
just a general like shout out for that uh you know always be monitoring what’s what’s available there and I think you
know when you have an opportunity to um to to use that to to get a bunch of like resources you definitely should no
that’s nice i I’ve never heard of Humble Bund this is the first time so Oh okay nice yeah yeah it’s um Yeah it’s an
online like site where they donate like most of their proceeds to charity but um they work with like game publishers or
books to offer uh bundles of of games or books at uh like severely reduced prices
uh yeah and anyways um but but they have a lot of like just great content that that goes through it so well this was a
fantastic conversation Kenan love the conversation so I I think you took us through sort of beautifully the GRC
world and uh I’m hoping we have a better appreciation of the forest and the
trees uh so thank you very much for coming on the show yeah yeah thank you for having me Raj uh this is a lot of
fun uh hopefully hopefully people are able to learn uh learn something take something away from it um and I think
more generally you know I just say my door is always open i love like connecting with people um chatting so uh
you know always happy to for people to reach out and and talk [Music]
Want to see how we can help your team or project?
Book a Demo