Artwork for podcast Great Security Debate
Risky Risks: Live from the GTS Security Summit
Episode 6112th May 2025 • Great Security Debate • The Great Security Debate
00:00:00 00:47:30

Share Episode

Shownotes

The Great Security Debate crew recorded a live episode at the GTS Security Summit in Detroit, Michigan with special guest, Zah Gonzalvo, SVP of Financial, Climate, and Operational Risk at Banco Popular. Tune in for a great discussion on risk, risk mitigation, risk prioritisation, and risk in context. Yep, it's all about risk!

Takeaways:

  • The evolution of security has shifted from a binary perspective to a more nuanced understanding of risk management, acknowledging the need for flexibility in addressing diverse security challenges.
  • In contemporary discussions, it is increasingly evident that security must be integrated into business strategy, highlighting the imperative for security professionals to communicate effectively with stakeholders.
  • The role of the Chief Information Security Officer (CISO) has transcended traditional technological boundaries, necessitating a comprehensive grasp of business risk and operational efficiency.
  • Effective risk management within organizations requires a shared responsibility model, where every employee contributes to the overall security posture, thus reinforcing the concept that security is a collective endeavor.
  • Scenario analysis is a potent tool in risk management, enabling organizations to anticipate potential threats and understand the implications of various risk scenarios on their operations.
  • Engaging with business units to contextualize security risks in terms of operational impact and financial implications is vital for securing necessary budgets and resources for security initiatives.

Transcripts

Speaker A:

Welcome to the great security debate.

Speaker A:

This show has experts taking sides to help broaden understanding of a topic.

Speaker A:

Therefore, it's safe to say that the views expressed are not necessarily those of the people we work with or for.

Speaker A:

Heck, they may not even represent our own views as we take a position for the sake of the debate.

Speaker A:

Our website is greatsecuritydebate.net and you can contact us via email at feedbackreatsecuritydebate.net or on Twitter, Twitter ecuritydebate.

Speaker A:

Now let's join the debate already in progress.

Speaker A:

Security has needed to morph.

Speaker A:

It's about technology.

Speaker A:

It's rooted in technology, but there's so much of it that's not about technology anymore.

Speaker A:

And I think the one specific piece is around the background.

Speaker A:

years in this space now,:

Speaker A:

And So over the 30 years it's changed a lot.

Speaker A:

And it started out with this idea that we were binary.

Speaker A:

If it was secure, it was good.

Speaker A:

If it wasn't fully secure, you had failed.

Speaker A:

And that's evolved into a much more risk minded mindset.

Speaker A:

And so the comment I made to Za was I'm so frustrated with counterparts with security, counterparts who can't think outside the edges.

Speaker A:

And I want to help more people figure out that there's a middle ground, that there is shades of gray.

Speaker A:

And oh, by the way, the businesses that we serve, we're not here just to be binary.

Speaker A:

We're here to start helping them get to, yes, helping them get to the answers that help the business.

Speaker A:

Because you know what the best kind, sorry, the most secure company is one that has no computers completely locked in the closet, no network like no data, et cetera, perfectly secure, not all that useful.

Speaker A:

And so you know, Za's been working on, working on coming out of technology Risk.

Speaker A:

I'll let you introduce yourself a little more yourself, but now has spent more time in business Risk.

Speaker A:

And you know the argument that I put out there is that security isn't tech anymore, it contains tech, but security is business.

Speaker B:

Hi everyone.

Speaker B:

So yeah, a little bit of my background right now.

Speaker B:

I've spent I don't know how many years but around 15, 20 years in banking.

Speaker B:

actually:

Speaker C:

Sure.

Speaker B:

One out, literally one hour.

Speaker B:

But yes, in terms of the risk and how you transition.

Speaker B:

Right.

Speaker B:

The role of the ciso, for example, is no longer anymore technology alone and I've had this argument with a lot of people that says, no, you need to have networking experience, engineering experience to become a ciso.

Speaker B:

And let me tell you, I was a CISO in my prior role, and a lot of it was a risk management activity.

Speaker B:

And what is risk?

Speaker B:

The risk is really what kind of events are going to be hitting you that are going to cause you to lose money.

Speaker B:

And you have to think of that premise to sell the technology.

Speaker B:

Especially a lot of you that are partners here that are selling services to companies and to CISOs.

Speaker B:

When I was a CISO, I had a problem, right?

Speaker B:

How would I.

Speaker B:

I knew that there was a potential risk that my company could be, you know, compromised.

Speaker B:

How do I get the money to buy those services?

Speaker B:

I had to explain that in Greece terminology to my management.

Speaker B:

I had to go talk to the business side, talk to my CFO, to my CEO, and tell them, this could happen to you perhaps 30 years ago.

Speaker B:

The attacks were different and they didn't understand.

Speaker B:

That's why there was a premise that security was technology.

Speaker B:

But.

Speaker A:

Or you can go scare them.

Speaker A:

Your uncertainty account solves everything, doesn't it?

Speaker B:

Yeah.

Speaker B:

Once you go through an event, they open that checkbook, right?

Speaker B:

There is no other.

Speaker B:

I can tell you that, you know, it only takes one time and they're going to be opening the checkbook.

Speaker D:

They're saying, create security.

Speaker A:

That's what I heard.

Speaker B:

I didn't say that.

Speaker B:

Don't tell my.

Speaker A:

Link to the podcast here.

Speaker D:

So I totally agree with where you're going with that on the evolution of the CSO becoming a business leader, actually one of the favorite phrases.

Speaker D:

So I was sitting in a talk.

Speaker D:

So anybody who knows John Bacon, he was the former CSO for Delphi and Whirlpool before that and Whirlpool before that.

Speaker D:

And he was giving a talk.

Speaker D:

It was actually.

Speaker D:

It was a Fireside chat downtown and talking about how he leads his team.

Speaker D:

And one of the comments he made that he is the chief storyteller.

Speaker D:

And that's so true.

Speaker D:

So fast forward, I'm sitting on a panel, gosh, last week, two weeks ago, over in Grand Rapids, and we were talking about the whole premise of the panel was better together.

Speaker D:

Together we're talking about tools and the interoperability of them.

Speaker D:

And I made the comment that understanding not just the technology, but how it's infused and how it changes the lives of those within the business is critical.

Speaker D:

Critical to being able to sell it.

Speaker D:

Because as CISOs, if we continue to be the.

Speaker D:

I think, damn, what's it Propeller Heads.

Speaker A:

Yes.

Speaker D:

Just looking at the ones and zeros in technology that CISOs for the longest time have pushed.

Speaker D:

We need to be at the table.

Speaker D:

We need to be at the table.

Speaker D:

We're at the table.

Speaker D:

But continue to focus on technology.

Speaker D:

And if we continue to focus on just the technology, going to be relegated back to the Fisher price table.

Speaker A:

Yeah, we're at the table.

Speaker A:

We can't bring our hot dogs from the kids table.

Speaker A:

We gotta eat grown up meals.

Speaker D:

We gotta.

Speaker C:

Yep.

Speaker C:

So adding to that.

Speaker C:

Right.

Speaker C:

So backing up a little bit.

Speaker C:

When you look at the evolution of security, Right.

Speaker C:

And when you say becoming part of the business, and you said this the other day.

Speaker C:

No, no.

Speaker A:

The idea of the business as a distinct item from information security.

Speaker A:

I think this was something.

Speaker A:

We talked about this at this gathering last year.

Speaker A:

That's a misnomer.

Speaker C:

Right.

Speaker C:

But what I'm saying is, so because everyone says become part of the business, understand the business, learn what the business does.

Speaker C:

Right.

Speaker C:

How does the company make money?

Speaker C:

What's important to, I think is where you were going.

Speaker C:

What's important.

Speaker C:

Right.

Speaker C:

You were talking about risk earlier.

Speaker C:

Zah.

Speaker C:

Like now in your position, seeing risk, it's not just security risk, it's.

Speaker C:

You said liquidity.

Speaker C:

Right.

Speaker C:

We have tariffs, et cetera.

Speaker C:

When you look at, when I say traditional business, right.

Speaker C:

We make something, we sell something, we make money.

Speaker C:

Right.

Speaker C:

What's our biggest risk?

Speaker C:

We look at operational efficiencies, we look at supply chain, not in software, but supply chain of our finished goods.

Speaker C:

Right.

Speaker C:

You look at some of the largest automotive companies.

Speaker C:

And again, for reference, I go to automotive a lot.

Speaker A:

What?

Speaker C:

Yeah.

Speaker D:

And food, don't forget about food.

Speaker C:

But the idea that the second something happens critical to one of your biggest suppliers, and you had only that one supplier, Right.

Speaker C:

One fail point.

Speaker C:

And that supplier, say, provided a airbag weight sensor.

Speaker C:

And now that plant caught on fire, you didn't have any backup, you didn't have a secondary.

Speaker C:

That's why they always had two sources for every product they make.

Speaker A:

we all learned our lesson in:

Speaker A:

We had only one and everything was just in time.

Speaker A:

I thought we figured that out now.

Speaker A:

And that mindset has prevailed across everything, including security.

Speaker B:

Yeah.

Speaker C:

No 100% prevailed and then diminished and then prevailed and then diminished.

Speaker C:

Where Eric and I were having conversations like it used to be, like there was the IT team and there was a security team.

Speaker C:

And then over the last five, 10 years, it became like a Venn diagram and there was a little bit of overlap.

Speaker C:

Today when you get the chance to look down, it literally mirrors over the top and you're seeing network and security work closer together.

Speaker C:

Right.

Speaker C:

Like we had the conversation about post quantum, right?

Speaker B:

Yeah.

Speaker C:

If you're not starting to think about those things, right, when this team's going to do renewals on hardware, this team's going to do that.

Speaker C:

What's going to impact the business long term, not just security, everything you do.

Speaker B:

And then it becomes a cross functional team.

Speaker B:

Business, technology, risk, compliance, all working together.

Speaker B:

Legal, right.

Speaker B:

And you know, in banking there is a concept of the three lines of defense and that is the regulatory framework where the regulators are saying everyone in a company is responsible for risk.

Speaker B:

I don't care what you do, I don't care if you're the teller in the branch or you are the CEO.

Speaker B:

You're all responsible to manage risk.

Speaker B:

And I have a good analogy to remember, right.

Speaker B:

Because even though we're all responsible to manage risk, we do it in different ways.

Speaker B:

The first line of defense.

Speaker B:

So there are three lines of defense.

Speaker B:

Sometimes now people say there are four, but I'm going with the traditional three lines.

Speaker B:

The first line is the people that are doing the day to day job in automotive, it's the people in the plant, you know, getting parts through.

Speaker B:

You know that you have to follow procedures.

Speaker B:

You have some controls, you know, there are safety issues that if you don't follow your procedures, you can, you can do damage, you know, to physical damage or to the products from a quality perspective.

Speaker B:

So you have to follow your process.

Speaker B:

That's how you manage the risk.

Speaker B:

The second line of defense are the compliance, legal risk groups that are there to check the checker, just to check, check if you're doing your job, check if you're doing your procedures.

Speaker B:

And the third line is internal audit.

Speaker B:

You know, they're checking those second line of defense groups and the first line just to see their following just in case everything fails.

Speaker B:

And my analogy is, you know, the pants, belts and suspenders, the pants is the first line, the belts are the second line and the suspenders, the third line.

Speaker B:

They're working together for what?

Speaker B:

To go over what to go over.

Speaker A:

Who's the attacker of this analogy?

Speaker A:

Who's the attacker of this analogy?

Speaker A:

The subway seat.

Speaker B:

Subway seat.

Speaker B:

You know, you're wearing all of those three things to cover your ass basically.

Speaker B:

So they're all working together to manage risk.

Speaker B:

And I think that's how we need to think it through that what is the responsibility of everyone in the technology side as well when they're developing a product and they're putting software out.

Speaker A:

What about the idea that if it's everybody's responsibility, it's no one's responsibility as it becomes more pervasive.

Speaker A:

I spent a long time as a CISO fighting to make sure that I was not part of the CIO organization because I really believed in the need for parody and peer debate and discussion when it came to doing the right thing.

Speaker A:

A thing that was about technology and service resumption was not necessarily the same driver as around data protection, around investigation and understanding root cause.

Speaker A:

As this as risk is becoming more pervasive, as it is everybody's job, how do we keep it from becoming nobody's job?

Speaker C:

Go ahead.

Speaker D:

I was, I was going to challenge.

Speaker A:

You like I always do on the what.

Speaker D:

What would it be if we didn't challenge each other?

Speaker D:

The CSO that has to report outside of the cio?

Speaker D:

Because I'm going to use your own mind against you.

Speaker D:

It depends, right?

Speaker D:

It depends on the leadership that is in that role at the given time.

Speaker D:

That I could point to a lot of great CIOs in this area.

Speaker D:

There might be one sitting in front of us that understand the risk of the organization, that understand how security is a force multiplier within the IT organization and not just right.

Speaker D:

So it really depends.

Speaker D:

But going.

Speaker D:

Sounds like you were going to answer Dan's question.

Speaker A:

It also depends on that.

Speaker A:

It also depends on the role of the CIO in the organization.

Speaker A:

The CIOs are sometimes becoming more enterprise whole and some are trying to get toward corporate, whereas the product units or the divisions are taking on more technology.

Speaker A:

It's changing.

Speaker A:

So yeah, there's no single answer.

Speaker A:

Yes.

Speaker C:

So this is in reference to even some of the partners I talked to earlier that were like, I'm interested in today learning how to start those discussions on security.

Speaker C:

I've got people that are really, really good at talking, whether it's ucas, ccas, circuits, telephony, et cetera.

Speaker C:

To me, some of that's even more complicated than security because if you look at what the start of the conversation around rescue, you were mentioning pants.

Speaker C:

You mentioned the belt.

Speaker C:

You mentioned suspenders.

Speaker C:

That's almost like table stakes now.

Speaker C:

When you get to the 50s and 60s, you're that old that you now have to have all three just to cover it.

Speaker A:

Right.

Speaker C:

Unless you continuously keep that in shape.

Speaker C:

Right.

Speaker C:

So like any technology, right.

Speaker C:

As the technology gets older, you double that car.

Speaker C:

I'm just saying a little more cma.

Speaker C:

But it's that starting point, right.

Speaker C:

And I'm not picking on security in terms of 10, 20, or even the last five years.

Speaker C:

From an introvert, extrovert standpoint, the more extrovert, the more capability in storytelling.

Speaker C:

The more introvert, the harder it is to understand how to tell that story.

Speaker C:

But everybody finds that, right?

Speaker C:

At some point, good leaders bring that out, good CIOs bring that out.

Speaker C:

And that's why it's important, right, for people to train.

Speaker C:

Like, this is what the board wants to hear, or this is what management wants to hear.

Speaker C:

I understand what you're asking me for, but I still don't understand the why, right?

Speaker C:

And I go back to the again, Nazi, Nazi, Japanese.

Speaker C:

Ask why five times.

Speaker C:

You get to the root cause of all things automotive had P, fema, D, fema, process, filler, design, filler, everything that would go to making that good.

Speaker C:

To understand what a return on investment is, the business understands what the risk is, right?

Speaker C:

And reporting.

Speaker C:

I can think of some really big companies.

Speaker C:

We'll use Takata as an example, right?

Speaker C:

You mentioned pants suspenders, right?

Speaker C:

At some point, right?

Speaker C:

To save money.

Speaker C:

And this happens in security, we're cutting this, this happens in it, we're cutting this.

Speaker C:

Budgets get cut.

Speaker C:

The same thing happened in automotive.

Speaker C:

Nissan had that same risk.

Speaker C:

At some point it was, well, if we quit doing X number of checks, we save X amount of money per part being made.

Speaker C:

But then one day when it hits the fan and someone comes in and audits, there's no proof that you were doing X, Y and Z.

Speaker C:

And then when things got out of scope, right, it went to a really bad place.

Speaker C:

And that is massive business risk.

Speaker C:

So it's the same thing.

Speaker C:

The starting point in those conversations, right, or where do you begin?

Speaker C:

Is understanding how to explain the risk.

Speaker C:

And do.

Speaker C:

Whether it's your own internal assessment or your own internal conversation, because you're doing assessments not just on security, but across the board, of what is the risk to the entire business.

Speaker C:

Security is just one part of it.

Speaker A:

I think Brian just announced his run for Senate because that was a phenomenal.

Speaker A:

Not answering the question about what is everybody's risk?

Speaker A:

Is it nobody's risk?

Speaker C:

I plead the fifth.

Speaker C:

I'm joking.

Speaker D:

All right, same question one more time.

Speaker B:

Yeah, go ahead.

Speaker A:

So the idea that.

Speaker A:

The idea, as said, that managing risk exists at all levels, it exists in every role.

Speaker A:

And we've said this about security too.

Speaker A:

Security is everybody's responsibility.

Speaker A:

And, and.

Speaker A:

But when it's everybody's responsibility, when it's everybody, then is it really nobody.

Speaker C:

When.

Speaker D:

It comes to risk?

Speaker D:

When it comes to risk, I guess we Gotta get it closer.

Speaker D:

So I like the yellow one better.

Speaker D:

No, that's fine.

Speaker D:

When it comes to risk.

Speaker C:

Just saying.

Speaker D:

Just saying.

Speaker D:

So a badger, a wolverine and a Spartan walk into a park.

Speaker D:

True story.

Speaker D:

So.

Speaker D:

So when we're talking about risk, there's always a name and frame.

Speaker D:

Always a name and frame.

Speaker D:

Right.

Speaker D:

So there's everybody partakes in helping out with the risk.

Speaker D:

There's a shared ownership model, but at the end of the day, whether it goes up to the gc, whether it's owned by the ciso, the cio, the board itself, there always is a name and frame.

Speaker D:

And my default for risks that we don't know the ownership.

Speaker D:

I pass it.

Speaker D:

That's what you always talk about, the relationship with your GC as one of the most critical ones.

Speaker A:

My best friend.

Speaker D:

That's my go to.

Speaker A:

Yeah.

Speaker A:

Well, thank you for answering it that way because I think you took it exactly where I wanted you to, not because I was walking you into a trap, because I agree the the idea of the idea of a name in a box.

Speaker A:

But now coming back to Brian's comment about acceptance of risk.

Speaker A:

Business, that is a business risk that is either accepted and understood, combined with the need for storytelling now leads us to how you paint the idea of risk in a way that the person whose name is in the box isn't just going, yeah, I'll do it, I'll take on the risk without understanding what it is, without understanding the real impacts, just to keep moving.

Speaker B:

Yeah, I think that that's the main issue is when you explain, you need to explain what is the impact, what is the consequence, how bad can it get?

Speaker B:

Right?

Speaker B:

And that definition of risk, not everybody knows how to do it well, even to how to write a risk statement.

Speaker B:

People find that very difficult because it's hard to think of the what if scenarios.

Speaker B:

You know, you're talking about theory until the time it occurs, then it becomes an issue, it becomes an incident.

Speaker B:

Right.

Speaker B:

So when we're talking about risk, it's still not real.

Speaker B:

So that is a very difficult thing to think about and put responsibility.

Speaker B:

But at the end of the day, when you are in a crisis, when you are in an incident, it stops with the CEO at the end of the day.

Speaker B:

And in my experience, it comes when the board asks what happened and you know, who's responsible for this.

Speaker B:

You can keep passing the bulk around and at the end of the day, the leaders are going to come up, the true leaders are going to come up and say, you know, at the end of the day, I let this happen.

Speaker B:

Why?

Speaker B:

Because I didn't give you enough resources?

Speaker B:

I didn't give you enough money to buy the technology.

Speaker B:

I didn't approve this thing.

Speaker B:

Of course, you know, it's our role as CISOs and rich people to explain properly what we want.

Speaker B:

But when something happened and occur, that CEO is going to be in the hotline, right in the media trying to explain what happened 100%.

Speaker D:

And this is where I think we can fuse together the advice that we've all given our kids at one point with the don't you nice high risk with the Japanese automotive on this that God gave you two ears and one mouth for a reason.

Speaker A:

Less than 24 hours from having said that.

Speaker D:

Yeah, see, there you go.

Speaker D:

It's a daily occurrence at our house as well before kids.

Speaker D:

But if you think about it, you start to have some of those conversations with some of the.

Speaker D:

You're going to a plant manager or somebody who's owning operations.

Speaker D:

Okay, what happens if the line is down?

Speaker D:

Well, we can't get product to ship.

Speaker D:

Okay, what happens if you can't ship?

Speaker D:

Well, we have a ticked off customer.

Speaker D:

What happens if you have it?

Speaker D:

The five whys gets us to the point of a dollar value at some point.

Speaker D:

And then manufacturing plants know how much it costs per minute per hour.

Speaker D:

That starts to become your risk rationalization on what do we have to do about it.

Speaker D:

Now I'm not saying go out and do the typical spend a thousand dollars to save a dollar or protect a dollar.

Speaker D:

So we have to be cognizant of that.

Speaker D:

But having those conversations and walking them through, it's almost hand holding to some of those leaders.

Speaker A:

It is.

Speaker A:

Well, it is.

Speaker A:

It's handholding and contextualizing.

Speaker A:

I never need a microphone.

Speaker A:

And contextualizing in a way that they understand.

Speaker A:

And this comes back to why we need to be business.

Speaker A:

We need to be speaking business terms.

Speaker A:

We are the business.

Speaker A:

And I'll turn it around and I'll dump back to Brian in a second.

Speaker A:

But.

Speaker A:

So this all makes sense in a manufacturer in a concrete world, you work in a concrete world, you work in a.

Speaker A:

There's nothing more concrete than actual dollar bills.

Speaker D:

No, everything's out of wood.

Speaker A:

Not concrete, truthfully.

Speaker A:

Oh, oh, did I leak the new direction for cabinets?

Speaker D:

Cement cabinets.

Speaker A:

All the time.

Speaker C:

Cement cabinets coming.

Speaker A:

And shoes.

Speaker C:

The.

Speaker A:

Now I've lost my train of thought.

Speaker C:

This is going to be really hard to edit later.

Speaker A:

Oh, there'll be no editing the guy the idea.

Speaker A:

Oh.

Speaker A:

So I'm in the software world and it's a lot harder to quantify.

Speaker A:

Lost time, lost revenue, customer sentiment, brand risk.

Speaker A:

Like it's all the sorts of risks that are.

Speaker A:

You can't quantify in such a way.

Speaker A:

So it necessitates having to be a storyteller, having to walk through things and I talk about them in insurance terms.

Speaker A:

The hundred years flood, the 500 years flood, so that the people who are running our products, the presidents of those units and their development teams and their heads of sales and operation, understand the potential impact and the likelihoods in ways that they can relate to in the regular world.

Speaker A:

Because we would have a backlog of wood that would become cabinets that sits there for this and it costs us.

Speaker A:

This isn't nearly as concrete.

Speaker D:

So I'm going to challenge you on that one though, because I think the metrics are there.

Speaker D:

You're just looking at it from the wrong direction.

Speaker D:

Your salespeople know what the sales funnel are, they know what the, what percentage turns into actual sales and start to calculate what's the impact.

Speaker D:

If because something happens, customer attrition, or you draw down on the number of customers that are attracted to you versus your competitors, that is quantified.

Speaker A:

But as we learned from Google, you know, I can deliver beta software and collect revenue.

Speaker A:

You can't collect them until you deliver a cabinet.

Speaker A:

It's a different.

Speaker A:

You're not wrong, you're just not completely right.

Speaker C:

But again, so again, understanding the business, okay, yeah, if you're in the software world.

Speaker C:

But going back to the manufacturing side, I want this very clear for any security practitioners in the room that I've ever heard or anyone that I've ever met that complains that, well, I just can't get budget.

Speaker C:

Right.

Speaker C:

Understood.

Speaker C:

But maybe you didn't tell the right story, because I can think, everybody has issues getting budget.

Speaker C:

And I can revert back to manufacturing when you put that line together, let's say for that cabinet you're putting together and saying we need a $5 million budget, right?

Speaker C:

Or maybe your supplier, right, you put that in front of the management, management agrees, they send it to the board, and the board says, that's not 5 million, you're gonna get 2.5 million because we need to see a 20% return.

Speaker C:

And your 5% doesn't cut it.

Speaker C:

So figure out how to make a 2.5 million dollar line.

Speaker C:

And then you go back and you begin to say, okay, all these automated checks that we had come out, all this camera equipment that we were gonna do, we're gonna have to do manual inspection here, right?

Speaker C:

But then at the end of the day, you still got to go through the production control process and the audit with your customer who says, can you meet our quality requirement?

Speaker C:

Right.

Speaker C:

So what is your quality requirement?

Speaker C:

That's the point.

Speaker C:

Security.

Speaker C:

What is our requirement?

Speaker C:

What do we set it as?

Speaker C:

And is there some requirement that customer has that we work with?

Speaker C:

Right.

Speaker C:

You got to find what it is you're going to use to make tangible to say, this is the requirement.

Speaker C:

Tell the story to the management.

Speaker C:

This is why we need the money.

Speaker C:

We can probably get away with doing just this.

Speaker C:

Right.

Speaker C:

But then I need more bodies because I need more physical inspection.

Speaker C:

You have to find a way to tell the story.

Speaker B:

Yeah.

Speaker B:

And in banking, for example, when you're thinking about, I mean, yes, dollar and cents, but not really because you're throwing digital products out the market and it's hard to quantify.

Speaker B:

But for example, right now we're dealing with that.

Speaker B:

Right.

Speaker B:

We have an impasse of the last six months between our security team and the product team because of some security requirements.

Speaker B:

And it comes down to measuring the latency and the performance of those security requirements being implemented in that digital platform.

Speaker B:

What will be your customer experience?

Speaker B:

How long does it take you to do a transaction?

Speaker B:

Those are things that you could measure to quantify the cost, not only the cost of security, then you have to balance.

Speaker B:

My risk is if I don't do those security requirements, customer data may go out or I may have a system outage due to a malware injection of some sort.

Speaker B:

And that's going to cost the company potentially X amount versus the performance issues that a user can get through when they are going through the platform.

Speaker A:

But you're coming off the line from the only answer is perfect security and encouraging them both to come to the middle.

Speaker B:

Exactly.

Speaker B:

And that's the role of risk partner.

Speaker B:

Right?

Speaker B:

That's my role.

Speaker B:

My role is how to get them to the middle and how to create a framework that makes sense and that it's traceable because everything is solid.

Speaker B:

Right.

Speaker B:

And that we could justify getting to the middle of that discussion, discussing with legal, bringing your partners to the table and saying, what is the risk appetite?

Speaker B:

What is the threshold where we are, okay, considering that we have cyber insurance, you have to look at maybe reputational damage that can cause.

Speaker B:

But considering all of these things, what is our risk appetite and how far we can go in kind of making that determination and decision on what is the right level of security that you need to include?

Speaker C:

I was going to say try to get it closer.

Speaker C:

It's a little.

Speaker B:

It's a yellow one.

Speaker C:

It feels like it's dying.

Speaker B:

It should be the best one, the.

Speaker A:

Yellow one though I think they call it maze here.

Speaker A:

But now let's take that and fast forward three years.

Speaker A:

The risk you allowed or encouraged them to stay in comes true.

Speaker A:

How what does that look and feel like in the organization and do you think about that when doing, when negotiating these middle ground risks?

Speaker A:

What happens when it comes true?

Speaker B:

Yes, yes.

Speaker B:

That comes to my mind every day when I'm in the middle of these decisions.

Speaker B:

Because I mean I lived through a couple of really bad situations.

Speaker B:

Situations.

Speaker B:

And I know how I can get and it's a little bit working with that risk appetite and understanding from the top of the house, what is the level of.

Speaker B:

For example, we have a threshold on operational losses that we can absorb.

Speaker B:

From the board of directors to our senior management team every year we go through our risk appetite statements and our key risk indicators and metrics and determine what is my threshold of possible losses that I could absorb and I'm still going to be okay.

Speaker B:

What is my threshold of reputational risk that I could absorb.

Speaker B:

You need to do that exercise to be able to feel comfortable accepting certain risks.

Speaker B:

Because the reality is, like you said earlier, the only way you're not going to have any risk if you are locked up, you're not gonna make any money.

Speaker B:

You need to make money and you have to take some risk.

Speaker A:

Have you have the scars of your past changed your risk appetite completely?

Speaker B:

Yes.

Speaker B:

And it's a struggle because then you have to go back and recenter yourself and say wait a minute, I'm here to enable the business to make money and not to let what occurs, you know, be I guess a bottleneck or a resistance on it.

Speaker B:

But it's something that we deal with it every ciso, I think ex CISO priority.

Speaker B:

So person that has gone through a major crisis have dealt with it.

Speaker A:

I'm the same question for Eric though.

Speaker A:

But he's going to have to imagine because he's never had an issue.

Speaker A:

It's all his security has been perfect.

Speaker C:

Right.

Speaker D:

No comment.

Speaker D:

Plead fifth.

Speaker C:

No.

Speaker C:

So I was going to use an example and I'm going to butcher this one because I don't have my notes or computer in front of me where I were usually able to pull stuff.

Speaker C:

But when you just made a statement maybe five minutes ago around software.

Speaker C:

Right.

Speaker C:

And a little bit different than building a tangible.

Speaker C:

Good.

Speaker C:

Right.

Speaker C:

You have an application you built.

Speaker A:

No, it's a little bit harder to.

Speaker A:

It's a little bit harder to put your hands around and.

Speaker A:

And to immediately I'M going to use this.

Speaker C:

I'm going to agree with you because when I was reading this, this was somebody talking about the risk that they didn't even know they had, but they had built this really, really, really cool program and application.

Speaker C:

And I think it was the NFL that they took it to.

Speaker C:

This was like 15 years ago, right?

Speaker C:

Or 10 years ago.

Speaker C:

Whatever, whatever it was.

Speaker C:

And they've been growing leaps and bounds in the entertainment industry and they took it on in.

Speaker C:

And these guys were like, yes, five months in, they're all in.

Speaker C:

This was gonna make them like the hundred million dollar company versus the 5 million they were.

Speaker C:

And as part of it, they said, we need somebody on our team to run a test on your application.

Speaker C:

Basically a pen test or something.

Speaker C:

And they had the opportunity to go do a third party first, but they were so excited.

Speaker C:

They were like, no, go ahead.

Speaker C:

And it blew it apart.

Speaker C:

And they were like, no, your product has way too many holes, way too many issues.

Speaker C:

Said it put them behind three years.

Speaker C:

What they ended up selling the company for was a quarter of what that would have been had they landed that big deal.

Speaker C:

But we had no clue what the risk really was.

Speaker C:

Right?

Speaker C:

So you think about that in the context of like making a finish good even, right?

Speaker C:

And you don't understand what the risk is.

Speaker C:

You put it out there and then people get hurt, right?

Speaker C:

It's like immediately now you're liable the value of your company, right?

Speaker C:

So there's all different levels of risk.

Speaker C:

So it just got me thinking, that was just one example, right.

Speaker C:

That that wasn't part of the business, right.

Speaker B:

Of deciding like, exactly.

Speaker C:

And they were even given the opportunity to say, you can go do it with your own third party, but we need to see the report.

Speaker C:

Right?

Speaker C:

So they could have done it first, fix stuff, right.

Speaker C:

Or improve stuff.

Speaker C:

And it came back to literally blow up in their face.

Speaker B:

Yeah, we do a lot of.

Speaker B:

I know in risk, we're used to risk assessments.

Speaker B:

Everyone does risk assessments.

Speaker B:

But there is another practice that is, I think, more powerful to think about those contexts, which is scenario analysis.

Speaker B:

And now you're taking a specific scenario and saying that what if?

Speaker B:

What?

Speaker B:

In a risk assessment, you're talking about plausible risk, you know, plausible likelihood, possible scenario possible, smaller type of losses that could occur in a scenario.

Speaker B:

You're saying this is how bad it can get.

Speaker B:

This is the end of that bell curve where we're looking at how much I can stress this to the end.

Speaker B:

So we can see if we can actually accept that risk or not.

Speaker B:

And we go through the exercise and within operational risk.

Speaker B:

Now we're putting cyber scenarios to run through and it's actually very eye opening to the business when they see how bad can a loss get.

Speaker B:

Right.

Speaker B:

And think of how all of these things could happen at the same time.

Speaker B:

We are in a geographical zone.

Speaker B:

We are in Puerto Rico, which is an island hit by hurricanes every year.

Speaker B:

So the now I'm mixing a hurricane coming through.

Speaker B:

And at the same time, hackers know we're vulnerable.

Speaker B:

We know that all the banks are going to experience, you know, a storm coming through and they're preparing and it's a little bit chaotic and now they're taking advantage to get through your system at the same time.

Speaker B:

A cyber hurricane, well, it's going to be a sharknado kind of hurricane.

Speaker B:

I love tornado, by the way.

Speaker B:

So it's that possibility of mixing events to see how catastrophic can it get.

Speaker B:

Which sometimes is what the insurance companies are doing too.

Speaker B:

So when you stress and do that, that's when you realize, that's when the business realize, wow, this could actually happen.

Speaker B:

And this is how much capital or reserves I need to have to be able to absorb in how much investment I need to make in my tool set to be able to absorb that.

Speaker D:

All right, I'm going to challenge you here.

Speaker D:

We're talking about the value.

Speaker D:

Oh, he's got the microphone.

Speaker C:

Here we go.

Speaker D:

Value of a company.

Speaker D:

If we go back to Target, Home Depot, do you stop buying there?

Speaker D:

Yes, it depends.

Speaker D:

Liar.

Speaker C:

Only because the part I know where this is going.

Speaker D:

So if you look at it, it's depending on the value, how we're valuing a company.

Speaker D:

Right.

Speaker D:

A lot of companies out there in the public space.

Speaker D:

Space, it's market cap.

Speaker D:

If you look at what happened to Target bounce right back.

Speaker D:

Fickle society.

Speaker D:

We forget where they once came.

Speaker D:

Or I'll use your argument that the restaurant that gets shut down by the health department, that once they open back up again, that's the healthiest company or restaurant.

Speaker A:

The best Chinese food in all of Chicago.

Speaker C:

Okay, so to your point, and I, this is where I'll say for any vendors in the room, too careful how you throw out fudge.

Speaker C:

Right?

Speaker C:

Because everyone talks about the brand, reputation, etc.

Speaker C:

Target, did they bounce right back.

Speaker C:

What was the impact to them from a reputation standpoint?

Speaker C:

I personally never really shopped at Target to begin with, but that's only because the stuff I bought was more Home Depot ish.

Speaker C:

Did I stop buying at Home Depot?

Speaker C:

No, I continue to buy at Home Depot preferably because when I spend Money at Speedway, I earn points.

Speaker C:

Those points can be redeemed for Home Depot gift cards.

Speaker C:

So I still spend money at Home Depot, but I try to be aware of that.

Speaker C:

Like, who do I think I trust or don't trust?

Speaker C:

Go ahead, Dan.

Speaker C:

You're gonna.

Speaker A:

Well, no, I think there's the net.

Speaker A:

Net of it is the value of the company.

Speaker A:

And this is what makes this discussion very hard.

Speaker A:

Inside an organization is the stock price always bounced back and it grew.

Speaker A:

And in six months it was back.

Speaker A:

So who gives a crap, right?

Speaker A:

You know, inside the organization, it's okay.

Speaker A:

We'll have an attack.

Speaker A:

We'll get on the news.

Speaker A:

And the marketing people say, no marketing.

Speaker A:

You know, no press is bad press.

Speaker A:

And then in six months, our stock is back and everybody's forgotten about it, except the propeller heads who sit in front of rooms and talk about Home Depot's breach 10 years ago.

Speaker A:

But I think there's another place.

Speaker A:

There is in smaller organizations that are growing, that are.

Speaker A:

We're in a time of acquisition.

Speaker C:

Yeah.

Speaker A:

We're in a time of M and A.

Speaker A:

We're in a time of PE takeover.

Speaker A:

We're in a time of strategic investments.

Speaker A:

This is where it comes into play.

Speaker C:

This is where I agree with you 100%.

Speaker A:

And we've seen.

Speaker A:

I've done a lot of M and A.

Speaker A:

I'm part of a.

Speaker A:

I'm part of a larger.

Speaker A:

A larger software investment company and a portfolio within them.

Speaker A:

And we do M and A.

Speaker A:

And I'll tell you that the value of a company.

Speaker A:

Company.

Speaker A:

Anywhere between 10, 15% uplift for those that have good security and at least a 5 to 7% discount for those that don't.

Speaker A:

And when you're talking billions of dollars, that is a material amount of money.

Speaker A:

It is worth investing in it because it is, I'd say a third to a half of all diligence right now in M and A, in investment refinancing.

Speaker A:

If you're restructuring your debt, I promise you this is part of the discussion and it will affect the rate you get when you get.

Speaker A:

When you redo your debt.

Speaker C:

This.

Speaker A:

This is where it matters.

Speaker C:

This is.

Speaker C:

This is real strong.

Speaker C:

Because for small businesses, all right, Especially.

Speaker C:

And this is.

Speaker C:

Consider your succession.

Speaker A:

Even have to be just small.

Speaker A:

Yeah.

Speaker C:

But I'm gonna throw this out there, though, because succession planning.

Speaker C:

All right, And I, we may have talked about this.

Speaker C:

It was an article I read, and it was calling out Japan in particular, but saying, hey, get ready, because there's a tsunami coming in North America.

Speaker C:

And what it was referring to was the age of business owners in Japan, right.

Speaker C:

Private small businesses that didn't have a succession plan.

Speaker C:

And because the population birth rate was so low, they didn't have kids to take over the business.

Speaker C:

Right.

Speaker C:

When I say that's coming as a tsunami here, the number of businesses.

Speaker C:

So I got friends in the construction business where they used to have 30 competitors just here in Michigan when it came to large framing.

Speaker C:

Today my buddy has nine competitors and half of them are asking to buy their company.

Speaker C:

Why?

Speaker C:

Because their kids went to college and don't want to do that job or they just don't have anyone to do the job.

Speaker C:

They didn't have kids, right.

Speaker C:

So now they have a succession plan of now I got to sell my business.

Speaker C:

Right.

Speaker C:

I use the example of the company in Europe, in England, I forget what it was.

Speaker C:

Just happened recently in the last six months, months over $100 million in sales, got hit with ransomware, had no backups, nothing.

Speaker C:

The entire business, six months later, shut down, gone.

Speaker C:

And they had a plan of a succession plan.

Speaker C:

But in terms of they plan to give this to their family, there's now nothing left to give to the family.

Speaker C:

That's like the direst.

Speaker C:

Right.

Speaker C:

End of it.

Speaker C:

Right?

Speaker C:

But even over here on this end.

Speaker C:

So let's say you were in that succession plan.

Speaker C:

They said, okay, if you can acquire company B, you're going to be worth this much more.

Speaker C:

And then when you go to sell your business, you're going to have all of that value and then boom, something happens.

Speaker C:

Or while they're doing that, the investigation says while they're doing the M and A or you're about to sell or get acquired, it's like, yeah, but guys, you have problem X, Y, like the way your books everything that you've done from a tech standpoint, sorry, you're only worth this regardless of the amount of current recurring revenue you have to stand you up in this other model is going to be that much more difficult.

Speaker C:

Those are not things that business owners typically think about.

Speaker C:

But if you're already having these conversations with those business owners around their day to day operations when it comes to their productivity and everything else, this is why you have that conversation around security.

Speaker A:

There's money in that banana stamp.

Speaker A:

I mean there is.

Speaker A:

There's money in there.

Speaker A:

Go find it because it will add to the value of your organization.

Speaker A:

Stock price aside, there's money in that banana stand.

Speaker D:

Capital structure matters.

Speaker C:

Did I answer your question, Eric, or did I swim through it again?

Speaker D:

Capital structure matters.

Speaker B:

But even the rating agencies, you know, you're Talking about Moody's, AM Best, etc.

Speaker B:

Where they come to the organizations, you know, they do it in the banks all the time.

Speaker B:

And the first thing that they want to talk is about their risk management structure, the cyber security structure, what are the controls, etc.

Speaker B:

And they take that into consideration to grade that company, you know, to, to see if it's worth, you know, in the stock market.

Speaker B:

So it is definitely an investment and something that, that we need to capitalize to be able to get money to invest in, in tools.

Speaker A:

Is that capitalize or capitalize like I can.

Speaker A:

Can I capitalize the investment?

Speaker B:

You can.

Speaker C:

So Daniel David meets these rules.

Speaker C:

Give me the best example of a story you've told though, to a get a point across, whether it was for funding or to get your point across about a risk.

Speaker C:

Right.

Speaker A:

Well, I'm using this in the next interview I give because it's a great job interview for somebody that's a great interview question.

Speaker C:

I get 5%.

Speaker A:

I'll have the candidate give you 5%.

Speaker A:

I think I talk, I like to talk about things I mentioned earlier in terms of hundred years floods, 500 years floods, things that.

Speaker A:

Giving people quantifications about how big this risk is in terms of something that they can understand.

Speaker A:

This is something.

Speaker A:

This is equivalent to the 50 years flood.

Speaker A:

We expect it to happen in some amount of time.

Speaker A:

It'll have a moderate amount of impact and we should put money away to do it because it's almost likely, almost guaranteed gonna happen.

Speaker A:

And then we.

Speaker A:

Okay, sorry.

Speaker A:

I guess I was buying time while I was thinking of an actual story.

Speaker A:

We talk about Amazon.

Speaker C:

So aws, at least he's being honest.

Speaker A:

Oh, I'm never.

Speaker A:

Not that.

Speaker A:

So talk about putting a lot of our infrastructure into aws.

Speaker A:

And the question often comes up, you know, what happens if AWS goes down?

Speaker A:

And there's a whole lot of, there's a whole lot to unpack in that particular question.

Speaker A:

Are we talking about a region, are we talking about all of aws, are we talking about our vpc, et cetera.

Speaker A:

And so you start to dig.

Speaker A:

So in one case, we're talking about where to put a particular product and all of its infrastructure at the request of a particular customer who wanted it in a place because it was going to then have more, less latency for communication to other services that they bought that were also in that same Amazon place.

Speaker A:

And so the conversation that we had went a little like this.

Speaker A:

Well, this is, you know, this is putting it all into one region we can use.

Speaker A:

We can Use azs.

Speaker A:

We can use availability zones to spread it out.

Speaker A:

But why wouldn't we put it also on the west coast and just, you know, US east one?

Speaker A:

Well, there's latency, there's this.

Speaker A:

What happens if it goes down?

Speaker A:

Well, if US east one goes down, I promise you we're not the biggest problem that they're going to have.

Speaker A:

They're not going to be able to get to their Google workspace.

Speaker A:

They're not going to be able to anything else.

Speaker A:

We're not the ones that are going to be caught.

Speaker A:

So we put some of that quantification and context in.

Speaker A:

While it would have been horrific if US East 1 went down for all of us, for us especially, we took into account that we would not be the first person that they'd be calling.

Speaker A:

And so we were willing to take on that risk in that particular case and not spread it out because we would have had to double the cost of the environment, we would have had to double the cost that we charged and hire 10 new people to support it.

Speaker A:

So those kinds of things all went into the mix.

Speaker C:

No, that's good.

Speaker C:

You quantified it, right?

Speaker B:

Yeah.

Speaker C:

Which is good.

Speaker A:

As one should always do with risk, right?

Speaker C:

Well, it's a massive risk.

Speaker C:

The, the overall.

Speaker C:

No, that makes a lot of sense.

Speaker D:

Eric.

Speaker C:

Best story that you've ever told and.

Speaker A:

Keep in mind he's had time and he does shouldn't have to.

Speaker D:

Van I just want to.

Speaker D:

Are you hiring him now?

Speaker D:

Did he ask you?

Speaker C:

It was a pretty good answer.

Speaker D:

I like that story around what?

Speaker D:

So I wasn't paying attention.

Speaker C:

The best story that you've told or story that comes top of mind in terms of how to A get budget or how to B quantify some type of a risk.

Speaker D:

Yeah.

Speaker D:

So I'm going to take a little bit different angle on this.

Speaker D:

So going back to being at a tier one automotive that I think we can all agree that IT people and OT people don't get along, that there's a little bit of a divide there, not the best of friends.

Speaker D:

And we were trying to figure out how do we start to infuse some technology, some controls on the plant floor without totally alienating that group.

Speaker D:

And as we were listening to them having conversations, one of the struggles that they had was getting telemetry off of the machinery that they were doing it some really old school ways with some JKD technology which actually gave us an inroad in technology not mentioning the provider but providing them a solution that allowed them to get the telemetry off.

Speaker D:

Of the machinery into a cloud container where they could then take actions off of it much quicker than what they had before.

Speaker D:

But at the same time, it had built in security on it that completely made that operational technology disappear from the rest of the network.

Speaker D:

So essentially tunneled under everything.

Speaker D:

So gave them exactly what they needed with intrinsic security built in.

Speaker D:

So it was a huge win.

Speaker D:

Win.

Speaker C:

So you got your micro segmentation ot security, they got the ability to pull data and analytics and stuff they wanted off.

Speaker C:

Zah.

Speaker C:

Best story ever.

Speaker B:

Best story ever.

Speaker B:

I'm working through it right now.

Speaker B:

This is a good story, but I'm not gonna talk about that one because if this is gonna be recorded, I don't want to get anyone into trouble, but I have another one.

Speaker A:

It's outside the statute of limitations.

Speaker B:

Yeah, yeah.

Speaker B:

Okay.

Speaker B:

So, yes, my prior employer.

Speaker B:

And this is before they knew how bad it could get.

Speaker B:

Right.

Speaker B:

This is at the beginning of our maturity cycle on our building our security program.

Speaker B:

Actually, the best way I was able to sell getting investments in security was that the COO at the time figured out that for that company to be able to sell our servicing business to other banks, you know, be a subservicer for other banks.

Speaker B:

When they were doing the due diligence, the first thing they asked was, how is your security?

Speaker B:

So then they started bringing me to the table to talk to pitch in our security program to those people to sell the services.

Speaker B:

And I said, you want me to do that?

Speaker B:

I need all of this.

Speaker B:

It's like, okay, how much do you need?

Speaker B:

What do you need?

Speaker B:

You know?

Speaker B:

So it was a little bit more opportunistic than risk, I would say.

Speaker B:

It was more.

Speaker B:

You're gonna get more.

Speaker B:

At the end of the day, it's money quantification.

Speaker B:

You want to sell your product and you, you know, then you have to invest to be able to sell that product.

Speaker A:

And if you don't want me to have to tell a story to these people that you don't want me to tell to these people, let's fix it so I can tell the truth, which I would always tell, but I want the truth to be the truth that they want to buy from.

Speaker A:

So, first of all, I want to get a huge round of applause for Zagonzalva.

Speaker A:

Thank you for joining us.

Speaker B:

Thank you for inviting me.

Speaker A:

I miss.

Speaker A:

We love having guests.

Speaker A:

And thanks to you, Eric and Brian, or Eric and Brian.

Speaker A:

And thanks to you, the listener, for being here today.

Speaker A:

For we love having you.

Speaker A:

If you want to learn more, our podcast is part of a distilling security network distillingsecurity.com you can find us on your favorite podcast app, Search for the Great Security debate and on YouTube.

Speaker A:

YouTube.com theat sign great securitydebate.

Speaker A:

Thanks for being here.

Speaker A:

We'll see you again on the next Great Security Debate.

Speaker B:

It.

Links

Chapters

Video

More from YouTube