More than a buzzword, security transparency is a business imperative. At Tag1, we embraced that drive to achieve SOC 2 compliance in record time. Our new Trust Center lets anyone verify our security controls on demand.
In our latest Tag1 Team Talk, we share how modern tools, expert partnerships, and a commitment to excellence can dramatically accelerate your security certification journey. Learn how services and tools from Vanta and expert guidance from BD Emerson made this complex process efficient and manageable. Whether you're thinking about starting your own SOC 2 journey or simply want to understand its impact, this episode offers valuable insights and tips on security, compliance, and continuous improvement.
Hello and welcome to Tag1 TeamTalks, the podcast of Tag1 Consulting.
Speaker:I'm really proud that Tag1 has received its SOC 2 attestation.
Speaker:And in today's episode, we're going to talk through, uh, that whole process
Speaker:and the steps that has been behind many of the innovation that have made
Speaker:Drupal the big success that it is today.
Speaker:It's become the number two, uh, used CMS on the Internet.
Speaker:Um, and it's that expertise that we have in building large scale
Speaker:systems that power millions of websites, uh, that our clients.
Speaker:Uh, bring us on board to help them with their mission critical projects,
Speaker:uh, and ensure their success.
Speaker:So if you need help with your project, uh, please email us at info@tag1.com
Speaker:that's TAG, the number one.
Speaker:com.
Speaker:There's so much to talk about today.
Speaker:So we're just going to jump right in.
Speaker:Uh, my guests, uh, Jeff Sheltren, one of the partners at Tag1 and
Speaker:our CIO who led our SOC 2 efforts.
Speaker:Welcome Jeff.
Speaker:Thank you.
Speaker:Hi.
Speaker:Uh, Drew Danner, who is the managing director at BD Emerson.
Speaker:Uh, we're going to talk a lot about this, but we knew we need partners, uh,
Speaker:to help us quickly and cost effectively get through the SOC 2 process.
Speaker:Uh, from our first call, uh, Drew and the BD Emerson team really impressed us.
Speaker:They exceeded our expectations, you know, throughout the entire process.
Speaker:Uh, and so we really appreciate your help getting here.
Speaker:Uh, and thank you for joining us as well.
Speaker:Thanks for having me.
Speaker:Faisal Khan, who's a subject matter expert in security, privacy,
Speaker:governance, risk, and compliance at Vanta, is also here joining us today.
Speaker:Uh, Vanta is an amazing software package, and it was really
Speaker:key to how we approached this.
Speaker:Uh, our success in getting things done efficiently, um, and is also a big part
Speaker:of that monitoring, uh, to ensure that we stay in compliance at all times.
Speaker:And I, I can't imagine going through, you know, the SOC 2 process or what it
Speaker:was like to do this, uh, before Vanta.
Speaker:So I'm really excited to get into more about what it is and how it works.
Speaker:Um, Faisal, thank you so much for joining us as well.
Speaker:Happy to be here looking forward to chatting.
Speaker:So before we dive into some of the details, um, about, you know, how
Speaker:it works and what we did, uh, Drew, can you just give a high level over
Speaker:folks, you know, what is SOC 2?
Speaker:And in particular, like I was shocked that it wasn't a. Certification, right?
Speaker:I would say, Oh, we're getting our SOC 2 certification.
Speaker:Like what, what is an attestation?
Speaker:Uh, and, and why is it called that?
Speaker:So, uh, SOC, SOC actually stems from some tragedies that happened in the early
Speaker:2000s with Enron, where we decided that instead of allowing, um, companies to
Speaker:go around and make claims, uh, we were going to require certain elements of
Speaker:certain businesses like public companies.
Speaker:Uh, to undergo controls over their financial reporting, which is where,
Speaker:uh, SOC 1 and, and Sarbanes Oxley stem.
Speaker:So Sarbanes and Oxley were senators, they passed an act, and, uh, the AICPA,
Speaker:the American Institute of Certified, um, Professional Accountants, They
Speaker:went and they developed a framework to audit companies for their controls.
Speaker:That's privacy controls, governance controls, compliance,
Speaker:security, you have it.
Speaker:Stemming from that, there were sectors of business that didn't necessarily need
Speaker:controls tied to financial reporting, and they moved to a IT and security
Speaker:compliance check, which is your SOC 2.
Speaker:The reason SOC 2 isn't a certification is there isn't a
Speaker:standardized set of controls.
Speaker:SOC 2 relies on what's called COSO principles.
Speaker:So auditors actually have this list of principles and auditors work with
Speaker:their customers to then set what controls the company is going to
Speaker:commit to and then will be audited against over a period of time.
Speaker:SOC 2 controls, uh, typically stem from your regulatory requirements,
Speaker:your contractual requirements, security best practices, uh, and specific
Speaker:items that affect your business.
Speaker:Wouldn't it somewhat like customized and tailored to, you know, for like our needs.
Speaker:Exactly.
Speaker:Um, one of the very interesting things about SOC 2 that people don't realize is
Speaker:that most audit firms, even before these compliance automation tools came about,
Speaker:they had a standardized list of controls that they'd like customers to meet.
Speaker:We call them ITGCs, Information Technology General Controls.
Speaker:These are things that we define as industry best practices or things that,
Speaker:you know, throughout the course, we've seen, you know, this is what a good
Speaker:security or compliance program looks like.
Speaker:Now, you fast forward into, um, you know, what, 2017, 2018, and
Speaker:along comes tools like, like Vanta.
Speaker:Um, I say tools like Vanta, but, You know, we've used all the tools in the space
Speaker:and I think Vanta is on a leg by its own.
Speaker:What Vanta does is Vanta helps customers like yourself by giving
Speaker:you a predefined list of controls that you're looking to commit to.
Speaker:It actually cuts out probably about 40 percent of the prep and planning that goes
Speaker:into the control defining process that you used to do with your auditor right
Speaker:now, you subscribe to tools and Faisal.
Speaker:I know that Vanta has done a great job with their initial set that they
Speaker:recommend, um, the goal of the product that was always to be really configurable
Speaker:to meet all the customer's needs, right?
Speaker:Yeah, absolutely.
Speaker:Like, we come pre mapped to the list of controls, whether it's a security criteria
Speaker:or the other for availability, processing integrity, confidentiality, privacy,
Speaker:uh, but of course, like depending on the organization and their scope, what's
Speaker:actually applicable, there's always that degree of customization that's possible.
Speaker:So why does a company, uh, go about doing this?
Speaker:You know, are they required to, is it something that they, you know, take on of
Speaker:their own volition for a certain reason?
Speaker:I'd say the most common reason is because someone told him to do it, right?
Speaker:Um, that ends up being a revenue enabler for a lot of organizations.
Speaker:But if we, if I think, put my security hat on as an InfoSec and
Speaker:Compliance professional, I think it's a really good framework to establish
Speaker:foundational controls for yourself.
Speaker:When it comes down to how do you protect those sensitive, sensitive
Speaker:data, uh, systems that handle those, that data, people, locations, and
Speaker:really establishing that rigor for yourself downstream so that you can
Speaker:further mature your program over time as the complex needs continue to grow.
Speaker:And I, I think, I think more and more businesses do it
Speaker:because of the ripple effect.
Speaker:So, right, post 2002, we started requiring these large financial customers to do
Speaker:audits over their security controls.
Speaker:And as part of that, they all commit to do third party risk
Speaker:management or vendor risk management.
Speaker:And then you start working for those companies.
Speaker:So now they require you to do it.
Speaker:And then it goes downstream and downstream and downstream and, you know, we're 10
Speaker:generations removed from the original requirement, but you're doing it that way.
Speaker:We can sign a contract with a customer.
Speaker:And like Faisal said, you're looking to enable revenue, but you're also,
Speaker:you're looking to mitigate risk.
Speaker:Right.
Speaker:And business, you know, even, even in our business of compliance, the goal isn't
Speaker:to do an infinite amount of security.
Speaker:Right.
Speaker:So my background, I was Army for 10 years and I worked in
Speaker:the intelligence communities.
Speaker:Uh, in the U. S. And I lived in a box.
Speaker:I worked in what was called a skiff.
Speaker:It's a secret compartmentalized information facility.
Speaker:Everything we did stayed in a room.
Speaker:Computers were built in a room that that's supposed to be right.
Speaker:That's the top of what we think security to be.
Speaker:Security is all about what's necessary.
Speaker:What's there to enable your business?
Speaker:Too much security hurts your business.
Speaker:Not enough security opens you up for risk.
Speaker:So what one of the things that we believe that the COSO framework from
Speaker:SOC does is it establishes The right amount of controls to mitigate the
Speaker:80, 80, 20 rule, 80 percent of your risks are going to stem from the
Speaker:controls that you're implementing.
Speaker:So let's get that out of the way.
Speaker:Let's enable business and let's, let's protect your business.
Speaker:And what you described, uh, you know, applies directly, uh, to us.
Speaker:I mean, you know, Jeff, you can get a little, uh, shed a little
Speaker:light on this, but like we were.
Speaker:Basically, you know, it was like, if we wanted to capitalize on a
Speaker:business opportunity, we needed to become, you know, SOC 2 compliant.
Speaker:Yeah, I mean, it's, it's kind of funny that being around for 17 ish years
Speaker:that, uh, none of our clients have ever required us to be a SOC 2 compliant.
Speaker:Uh, I had actually walked through a couple of clients of ours, uh, helping
Speaker:them get their SOC 2 attestations, but it's been a decade plus, uh, like pre
Speaker:Vanta and all these automated tools.
Speaker:And I gotta say this experience was so much better.
Speaker:Like, um, Just having the automations, having the like, almost like cookie
Speaker:cutter, like, here's what you need.
Speaker:You can kind of customize it for your business.
Speaker:Um, and, and save so much hours of work, uh, has been pretty impressive.
Speaker:Um, but yeah, we, we finally were required to do this as part of becoming
Speaker:a D seven Drupal seven extended support provider for the Drupal association.
Speaker:Uh, and.
Speaker:You know, we dragged our feet about it a little bit having gone through it so
Speaker:many years ago and it was painful um Didn't see a ton of value saw some value.
Speaker:Um, but definitely have come around and it's um We, we put a lot of work into it,
Speaker:but I think like as a growing company, like Tag1, uh, going from a small number
Speaker:of employees to like a hundred people or whatever we are now, it's, it's been
Speaker:great to solidify some of these processes and policies that we're kind of like,
Speaker:oh, we have that on a wiki somewhere, let me find you in a bookmark, and now it's
Speaker:like, oh, we have a full set of published policies, uh, that actually anyone can go
Speaker:view online if you go to our trust center.
Speaker:Uh, because Vanta automates all that for us and collects that information.
Speaker:And it was, it was the ripple effect that you mentioned, Drew, like the new CEO
Speaker:of the Drupal Association came on board.
Speaker:His background is in, you know, uh, you know, the Beltway, Washington, and
Speaker:he came from a world where, you know, everybody did that and he was shocked.
Speaker:He's like, what do you mean?
Speaker:You're not SOC 2 compliant.
Speaker:You're like, everybody's SOC 2 compliant, you know?
Speaker:Um, and so, you know, we, we wanted to pursue this opportunity.
Speaker:But yeah, we realized that there's no way we could do this on our own.
Speaker:Certainly not in an efficient and cost effective manner.
Speaker:Uh, this can be a very time consuming and, and costly endeavor,
Speaker:depending upon how you approach it.
Speaker:Um, and so we went through our network and we asked everybody, other agencies,
Speaker:like, you know, have you done this?
Speaker:You know, like, who did you work with?
Speaker:And, you know, most people hadn't done it.
Speaker:And, and a few folks.
Speaker:That had, you know, weren't able to refer us to anybody, you know, so, um, we went
Speaker:on Google and we, you know, we, we, we called you up and, you know, it was a
Speaker:great conversation, um, and, uh, you know, we decided to work together, um, can, you
Speaker:know, um, can you give folks, you know, just, uh, you know, what is BD Emerson
Speaker:do, you know, like, why do you need a partner, uh, to go through this process?
Speaker:That's a, that's a great question.
Speaker:Um, So the short of it, so BD Emerson is a, we're, we're a consulting firm,
Speaker:a law firm and a CPA audit firm.
Speaker:Right.
Speaker:So we actually have a, um, kind of an umbrella of businesses.
Speaker:Uh, Tag1 worked primarily with the consulting firm to implement the controls.
Speaker:And then when it comes time for any additional work, right, we, we have
Speaker:these other capabilities that we offer.
Speaker:Uh, one of the things that we find ourselves most frequently doing, not just
Speaker:in this space, But it's really helping people understand what what's next, right?
Speaker:Um, typically where we have clients come is, um, like yourself, right?
Speaker:Someone's gonna give you a requirement, but the requirements bland.
Speaker:It's it's go get socked to.
Speaker:And as we talked about, sock to doesn't really have a list of required controls
Speaker:that that's for you to develop.
Speaker:So one of the things we do is we help customers understand
Speaker:what are their requirements.
Speaker:So from the legal aspect.
Speaker:We take a look at your contracts.
Speaker:We go through and we see what commitments you have made that we
Speaker:should add to your control list.
Speaker:You know, you, you, you leverage a tool like Vanta or not, we want to make sure
Speaker:that the things that you're committing to your customers, you're also going to
Speaker:commit to being checked by an auditor.
Speaker:Uh, we find that, I mean, that's, that's the core part of this.
Speaker:One of, one of the things that, that you found us to help you do is not
Speaker:just hold your hand, but help you build these processes and help you
Speaker:implement these controls and help you.
Speaker:You know, we, we work from the paper to the end of the stack.
Speaker:So we have, we have team members that are going to analyze your requirements,
Speaker:build processes and document.
Speaker:We have engineers that are going to fix, you know, coding your product.
Speaker:If you were, we were asked to, in this case, you know, your,
Speaker:your stack was pretty clean.
Speaker:You know, I don't know if, uh, if you tell people that, but,
Speaker:uh, I'll say it on the call.
Speaker:It was a very low risk environment.
Speaker:You do a great job of managing risks and vulnerabilities.
Speaker:Um, but typically BD Emerson does everything from the
Speaker:left end to the right end.
Speaker:We, we advise on security requirements and we make sure they get built
Speaker:in your process and product.
Speaker:Well, hey, now, now you, you can definitely tell people that
Speaker:your stack is clean because you got a trust center that says it.
Speaker:All right.
Speaker:That's the, that's the whole idea of trust centers with Vanta, just being able to
Speaker:surface that information and make that available for those that need to see it.
Speaker:Yeah, I think, I think that's the biggest part of you know, I, I love, I love
Speaker:people in the space that say compliance isn't security and the rights are right.
Speaker:Compliance isn't security.
Speaker:Um, good compliance makes you more secure and good security makes you better.
Speaker:Um, when you do the little things right, you mitigate, again, the
Speaker:80 20 rule, a lot of the risks.
Speaker:Um, you're a services company.
Speaker:You also have a product.
Speaker:Where's the bulk of your risk today?
Speaker:You said you have a hundred endpoints, right?
Speaker:Well, we focus in security and hardening hardware and software.
Speaker:It's always the meatware.
Speaker:It's the people.
Speaker:It's what's between our ears that's always falling to scams, to, you know,
Speaker:easy, easy things that we can prevent easy things that understanding what
Speaker:our process is, what our policies are, uh, being trained on what's what
Speaker:to do and what not acceptable use.
Speaker:Those are the elements of any good security program that there are certain
Speaker:security professionals that say, well, that's, that's not security.
Speaker:And you're coming from the government that that's 90 percent
Speaker:of our security is processed.
Speaker:It's, these are the phases, these are the steps, this is how we do it.
Speaker:And, you know, that's typically the longest part and that was a part
Speaker:that you guys executed very well.
Speaker:I feel like Jeff is looking at me right now that I'm the bulk of the risk.
Speaker:It's typically, it's typically the C suite.
Speaker:It's typically finance, CEOs that are not technical, that
Speaker:there's a, there's a lot of.
Speaker:Um, what do they call it now?
Speaker:There's a, like a spearfishing, right?
Speaker:Isn't, isn't that the name we call it now?
Speaker:It's, it's phising, but at the top levels of an organization, you're prone to move
Speaker:quickly, you have a lot on your plate, you're a lot, you know, executives are
Speaker:mobile more frequently than other people.
Speaker:So you click on a link, you know, it's a Mamba 2FA attack.
Speaker:It looks just like a regular sign in and you give them your credentials.
Speaker:Now they have access to everything.
Speaker:They dump everything.
Speaker:Security is not a, if it's a, when, and when you build compliance, like a SOC
Speaker:2, you've already built in a couple of those layers for if something happens,
Speaker:how do you react when this happens?
Speaker:What's our backup strategy.
Speaker:What's our disaster recovery plan?
Speaker:What's our incident response plan?
Speaker:Those are elements that you went through with with Vanta's guidance with BD
Speaker:Emerson's guidance and now you have a, if stuff happens this is how we move forward.
Speaker:Yeah, coupled with things like training and education and you know we have
Speaker:systems that send us those messages to see whether or not, you know,
Speaker:we're dumb enough to click on them and, you know, call us out on it.
Speaker:Um, so you said it's comprehensive.
Speaker:Yeah.
Speaker:And it's also a really good segue to continuous monitoring, right?
Speaker:Um, now that you've done it once you're implementing those tests, those docs
Speaker:areas, the things that you need, you know, you need to be doing having that
Speaker:real time monitoring to your tech stack and being able to just know when things
Speaker:are out and be notified of those things.
Speaker:It's really crucial because now you have process and really a broader
Speaker:program as drew was emphasizing earlier.
Speaker:And that's one of the best things that came out of this for us, I think, you
Speaker:know, in talking with you, Jeff, you know, and, and like the trust center
Speaker:on our website, but like, um, you know, that the, the process, the automation,
Speaker:having constant insight into this is one of the biggest benefits, right?
Speaker:Yeah.
Speaker:It's been amazing.
Speaker:I, I can't explain how happy I am with it.
Speaker:Uh, I'll give an example, like, uh, should we spin up a new service on AWS?
Speaker:We have Vanta integrated there.
Speaker:Uh, and it's going through all our, all the controls that we defined and doing
Speaker:all these tests to match the controls.
Speaker:If, if for example, someone goes in and sets up a new database and they forget to
Speaker:tick the box to like encrypt data at rest.
Speaker:Uh, in the past, that would have gone unseen for a while until
Speaker:someone went in and reviewed it.
Speaker:Uh, and now Vanta is like sending me an email and a Slack notification
Speaker:like, Hey, you have a failing test.
Speaker:What's going on?
Speaker:Uh, same for like when we onboard new employees or off board employees.
Speaker:It's like, Oh, did you go through your onboarding checklist?
Speaker:Uh, Did, or the offboarding checklist.
Speaker:Did you remove their access to this?
Speaker:And this it'll even be like, Oh, you remove their Google account,
Speaker:but they still have a Slack account.
Speaker:What's up with that?
Speaker:Um, and that's been just amazing.
Speaker:And eyeopening, very helpful.
Speaker:I wanted, I mean, I called BS.
Speaker:I, you know, like we looked at Vanta and I'm like, there's no way
Speaker:this can do like what is claiming.
Speaker:And I'm like,
Speaker:I see how it is
Speaker:Michael.
Speaker:I see how it is.
Speaker:No, I mean, I still don't understand how it could possibly do it.
Speaker:And, and, and it's, and it works and it, and like it plugs into all these things.
Speaker:And it like, um, it's, it's, we build software.
Speaker:I know a lot about software and, and Vanta blows my mind.
Speaker:As to like how it integrates and ties into all those different
Speaker:things and give us that insight.
Speaker:I, I didn't think it would be, uh, possible to deliver on that.
Speaker:And it, and it does.
Speaker:I think one of the other things that people overlook that, you know, Jeff,
Speaker:Jeff and my team have spent a great deal of time on and Jeff's probably
Speaker:annoyed is how do we document our risks?
Speaker:Um, there are tools on the market that can go monitor a control, right?
Speaker:We can, we can get a hook into an API and do a read and see if a, if
Speaker:a control that we've documented, you know, is not yes, right?
Speaker:If something is marked, no, you know, we get a zero back and we flag it.
Speaker:We say, Hey, we need to go fix this.
Speaker:But what about the process?
Speaker:Um, you build software, all software has vulnerabilities.
Speaker:All software, right?
Speaker:We leverage third party packages to complete tasks, right?
Speaker:This isn't, this isn't the 80s.
Speaker:We don't build everything by ourselves anymore.
Speaker:We use what's on the market.
Speaker:So when we do that, we open up ourselves to all of this third party risk.
Speaker:So how do you identify those risks and how do you mitigate those risks?
Speaker:And one of the things that you're leveraging is the, the integration with
Speaker:Vanta and the Dependabot in GitHub, right?
Speaker:So you're, you're getting all those third party packages, their dependencies.
Speaker:Any, any patching, any outdated software that you're using as part of your stack.
Speaker:You're learning about it.
Speaker:That way we can build those mitigation plans where in the past, even
Speaker:if you were doing pin testing or scanning, you know, once a year,
Speaker:what are you going to do with that?
Speaker:You just generated a backlog for next year.
Speaker:I guess we'll get to it.
Speaker:Right?
Speaker:But now in real time, every time you push a build, right, you're learning
Speaker:what we've introduced into the product.
Speaker:You're doing static code analysis.
Speaker:You're doing static testing.
Speaker:You're learning.
Speaker:We've just introduced a new critical vulnerability.
Speaker:It makes smart people come to the table.
Speaker:It makes Jeff go talk to engineers and say, Is it critical?
Speaker:What are the dependencies tied?
Speaker:How do we decouple?
Speaker:Is there a patch available?
Speaker:Is there an update?
Speaker:That's going to keep your customers safe in your app.
Speaker:That's going to keep your business safe from, you know, would be attackers.
Speaker:And that's because of, like you said, right, there's some magic to it.
Speaker:There's they thought of, let's build this integration.
Speaker:Let's make this partnership with this company that people regularly
Speaker:use so we can pull in this telemetry and we can service the customer.
Speaker:Yeah, it's a continual improvement almost, right?
Speaker:If we think about just vulnerabilities continuing to be assessed, maybe it's
Speaker:resources not being encrypted constantly.
Speaker:You kind of have to take a step back and go.
Speaker:Well, why, like, why is this keep happening and give yourselves that
Speaker:opportunity to go back in update process, whether it's a configuration
Speaker:standard that you need to go update.
Speaker:Maybe it's a YAML file for the pipeline that's deploying the
Speaker:code, set those things up, make sure it doesn't happen again.
Speaker:And it really encourages that forward thinking and a bit more
Speaker:proactive approach to security world.
Speaker:Yeah, it's amazing how it integrates into so many aspects of our business
Speaker:from the process to the, you know, the software that we're building.
Speaker:Um, now I know that there's, there's SOC 2, type 1, SOC 2, type 2.
Speaker:Um, you know, just at a high level, could you give us a sense of the process here?
Speaker:You know, we talked about defining, you know, the aspects that you
Speaker:know, we think apply to us, you know, where do you go from there?
Speaker:And
Speaker:So it's a great question.
Speaker:So, um, SOC 2, SOC in general audits in general.
Speaker:So a type one audit, a type one audit is an audit of the design of your controls.
Speaker:Um, what the auditor is looking to do is make sure that, uh, you have a control
Speaker:that is related to the COSO principle that is important to your business, right?
Speaker:So, you know, maybe we, we sell software, right?
Speaker:Then we almost have to meet all the criteria from management to
Speaker:personnel, to systems, to hardware.
Speaker:Now, how do we tie that control in?
Speaker:And is the control effective?
Speaker:Not the test of the control in theory.
Speaker:So think of the blueprint of the house.
Speaker:Uh, we built a square box.
Speaker:We didn't put any doors in it.
Speaker:Okay, so let's put a door in it.
Speaker:Does the, does the door have a lock?
Speaker:We're going to plan for a lock.
Speaker:Does it, does it have some windows?
Speaker:Do they open and close?
Speaker:The design of your, your system, right?
Speaker:So in an ISO world, we call it your ISMS, your information
Speaker:security management system.
Speaker:In your management system for your SOC, Did we design processes correctly?
Speaker:Did we design the controls in a way that's suitable?
Speaker:The auditor is going to check a point in time to make sure that occurred.
Speaker:And once it did, auditors issue a SOC 2 Type 1, which you've achieved.
Speaker:A Type 2 is the test of control effectiveness.
Speaker:You made this commitment to encrypt your, your devices, right?
Speaker:Their, their hard disks are encrypted.
Speaker:Now, to your point, um, you opted to give your employees some privacy.
Speaker:You have European employees.
Speaker:You didn't want to go through the process of fully automating this,
Speaker:which is not uncommon, but you understood the goal of the commitment.
Speaker:So what we did was you worked and you built a manual process and you
Speaker:leverage technology to read and make sure individual users are enforcing
Speaker:the controls on their own machines.
Speaker:And you use smart people to do this instead of technology.
Speaker:That's, that's the test now that the auditor during the
Speaker:type two is going to go test.
Speaker:They're going to say over this monitoring window.
Speaker:Which your monitoring window to start is 90 days.
Speaker:Very common for most companies to start with a 90 day monitoring window
Speaker:over those 90 days, did all of those devices keep their hard disk encrypted?
Speaker:Did all of those devices have antivirus on them?
Speaker:Um, did your cloud infrastructure always require NFA for console access?
Speaker:Did we rotate our keys?
Speaker:Those controls that you committed to, the auditor is now going to test those.
Speaker:So they're going to do some population requests.
Speaker:They're going to gather evidence that is going to come from Vanta.
Speaker:You know, if you have systems and processes that aren't integrated, they're
Speaker:going to come from outside of Vanta.
Speaker:And then you're going to substantiate.
Speaker:You're going to show them this is what happened during the
Speaker:window, and they're going to test.
Speaker:I think one of the struggles for auditors, customers typically feel like, you know,
Speaker:insulted when there's findings, but, and that's not what this is for, right?
Speaker:The auditor's job is to be tough.
Speaker:If the auditor isn't tough, then you didn't gain anything.
Speaker:It's a pencil, you know, you wasted your time, you wasted your money.
Speaker:Tough audits, audits that look to find things.
Speaker:That's going to make your business better, to what Faisal said, it's
Speaker:all about continuous maturity.
Speaker:Say we had a process where we onboarded someone on a Friday, we didn't
Speaker:integrate their systems and set up their controls until the following
Speaker:Wednesday, but we had an SLA documented that we're going to, you know, commit
Speaker:to this service level agreement SLA.
Speaker:We're going to make sure that all of our devices meet all of the requirements
Speaker:within 24 hours, what have you.
Speaker:There are these exceptions, so the auditor documents the
Speaker:exception, and then the goal is.
Speaker:Right.
Speaker:We have a management response.
Speaker:We tell them, listen, we understand this is what happened.
Speaker:This is why we're, this is how we're going to get better next time.
Speaker:And then they're going to, they're going to double down on your next audit.
Speaker:They're going to make sure that you did what you said you did.
Speaker:And, and that's, that's the goal of audit, right?
Speaker:That's the goal of the SOC two type two.
Speaker:I think one of the things I love the most about the outcome of this is
Speaker:that third party validation, right?
Speaker:Because, you know, in our world, agencies go around like, Oh, we're
Speaker:the number one contributor to Drupal.
Speaker:Everybody says that, you know, like everybody makes all of these claims.
Speaker:Um, and, and it's hard to, you know, uh, differentiate.
Speaker:And so, you know, to, to, you know, have something you can point to and say, this
Speaker:has been thoroughly audited, you know, this has, you know, serious controls
Speaker:in place, um, I think is, you know, a differentiator for us that sets us apart
Speaker:from, you know, almost every other agency, uh, you know, using the technologies we
Speaker:do, because I, you know, I haven't seen any of them talk about SOC 2, I don't see
Speaker:any of them, you know, have this in place.
Speaker:And so for, for me, that's a big benefit.
Speaker:Um, Jeff, coming out of this, you know, what is one of the
Speaker:biggest benefits that you see?
Speaker:Uh, you know, I think for me, it's kind of formalizing a lot of our, what used to
Speaker:be very informal processes or policies.
Speaker:Um, you know, I kind of mentioned we would toss some, write something up
Speaker:on a wiki real quick and just point new hires there and be like, there's
Speaker:your, your onboarding documentation.
Speaker:Uh, and now, you know, we have a full set of like, Of policies that have been
Speaker:reviewed, uh, you can see who wrote the policy, who approved the policy,
Speaker:when it happens, we track that new employees have accepted the policies.
Speaker:It's not just kind of a wink and a nod sort of deal.
Speaker:Uh, that's been huge, um, and definitely like back to the Vanta
Speaker:integrations, um, being able to just.
Speaker:Get, get a ping in slack from Vanta when it's like, Oh, there's a new
Speaker:dependabot alert or, or, Oh, there's, you know, a new server came online
Speaker:and it, it has this port open.
Speaker:What's up with that?
Speaker:Uh, so it's, it's almost like giving this extra set of eyes.
Speaker:Uh, that we never had previously.
Speaker:Um, that's been great.
Speaker:And Jeff, just to add on, I think that it also adds a bit of implicit accountability
Speaker:to stuff that you've already done as part of your audit for SOC 2, right?
Speaker:Mm hmm.
Speaker:These policies, procedures, these processes that you've
Speaker:established, the things that you're doing to keep them secure.
Speaker:Now, it's not just this three month observation period.
Speaker:Going forward, like for the full year, right?
Speaker:You have to do SOC 2 type 2 audits, at least annually to keep them intact.
Speaker:You're now on, on the hook to continue to manage that program and
Speaker:continually improve, as we mentioned earlier, your posture over time.
Speaker:I think, I think it also sets up, right.
Speaker:The world has changed pretty rapidly in the last five years.
Speaker:And as more and more U. S. businesses are doing business globally, uh, you
Speaker:see a lot of European companies and countries really, really care about
Speaker:security because they put privacy first.
Speaker:Um, we look at, you know, the GDPR articles one through 99 are pretty
Speaker:explicit when it comes to privacy controls and what needs to happen
Speaker:from a user data perspective, but not necessarily from security controls, right?
Speaker:They, they say that, you know, you're going to use industry best practices.
Speaker:We, again, we'll go back to ITGCs.
Speaker:Information technology, general controls.
Speaker:These are the same controls from a security perspective that, that you
Speaker:just committed to doing annually.
Speaker:Many European companies and European countries are actually moving.
Speaker:They, they prefer sometimes a SOC 2 to an ISO because an ISO
Speaker:audit is a point in time audit.
Speaker:Now I'm not saying one is better than the other.
Speaker:I actually prefer ISO.
Speaker:Uh, for certain elements, especially when it, when it comes to governance and,
Speaker:and management oversight and strategy, I think that the controls that you have
Speaker:to put in to achieve a 27, 001 make the leadership team a little more accountable
Speaker:to the full governance process.
Speaker:Where SOC 2 is, you know, it's, it's, it is very unified and it's standard, but
Speaker:it's, can we, can we meet our controls?
Speaker:There are companies that aren't going to make the same control
Speaker:commitments that you did.
Speaker:Uh, but your partners, your, your prospects, your, your clients, they can
Speaker:see those controls and they can map them and say, you know, do these standards
Speaker:meet our minimum requirement as they do their vendor risk management process?
Speaker:And that's when you point them and say, not only do we have these things committed
Speaker:to be tested by our auditor, we're also reporting on their status in real time.
Speaker:If you want to go to our trust center and you want to see how we are encrypting
Speaker:our databases, how we're, you know, tunneling traffic to gain access into
Speaker:a bastion host or however we're drawing those lines of segmentation between
Speaker:people, process and technology, you're very transparent, and that's what that's
Speaker:what leads to good security, right?
Speaker:Accountability.
Speaker:You can't have accountability without transparency.
Speaker:Again, full circle trust center, Vanta.
Speaker:What are some of the biggest challenges that companies face?
Speaker:I mean, when we were hesitant to do it, it was costly.
Speaker:It was, you know, time consuming.
Speaker:We couldn't do it on our own, you know, you know, the, the, the basic things
Speaker:aside, like once you get into the process, you know, what do you see as, as the,
Speaker:you know, the big stumbling blocks?
Speaker:I'll turn that to Faisal first, actually, because I assume that.
Speaker:Faisal answer this, this question at least once a day.
Speaker:Yup.
Speaker:Yeah, a hundred percent.
Speaker:I actually think, I think one of, one of the core ones is that top
Speaker:level buy in, uh, and engagement.
Speaker:We think about just the, all those reasons that you were just mentioned, right?
Speaker:It's costly.
Speaker:It's going to take a lot of time.
Speaker:It might add.
Speaker:It might add some maybe slowness to how operations run where you
Speaker:can't just be running and gunning.
Speaker:And now you have to follow process and do things.
Speaker:And there's a lot of concern around that often times at the top layer and saying,
Speaker:Hey, is this going to slow us down?
Speaker:And the reality is, it's not going to, it's less about slowing down.
Speaker:It's more about Like formalizing the, that guardrail and that process so that
Speaker:you can go faster over time, right?
Speaker:This is when I get the army though, right?
Speaker:So slow is smooth and smooth is fast.
Speaker:Sometimes we, we run everywhere all at once, but we don't get anywhere.
Speaker:Uh, when you, when you organize, you go slow, you move steady, right?
Speaker:Now we've traversed the field and look at when did you start this process?
Speaker:You started this process six months ago at most.
Speaker:There are a lot of companies and you can go speak to your cohorts.
Speaker:You're, you know, even people that leverage technology like Vanta.
Speaker:I mean, it takes, I think, on average, probably 12 to 15 months
Speaker:to ever sit for your first audit.
Speaker:So, to me, I agree with Faisal, but, you know, I, I, shameless plug, right?
Speaker:Like, I, I was an idiot.
Speaker:Um, I used to tell my soldiers when I was in the Army, education's free, go get it.
Speaker:Uh, so, I had a soldier one day who was like, you don't have a doctorate.
Speaker:What are you, what are you doing?
Speaker:So, I went back to school to get a, a business, a doctorate degree in business.
Speaker:Um, my, you know, undergrad and masters are in technology,
Speaker:uh, math and computer science.
Speaker:And I didn't know anything about change management.
Speaker:To me, change management was like, like, how do we deploy
Speaker:our software change management?
Speaker:I never thought about the people side.
Speaker:To me, one of the biggest challenges we always see is making people change.
Speaker:Like, how do you, how do you drag people along for change?
Speaker:Change is hard.
Speaker:Change is hard.
Speaker:John Cotter wrote a book in the 70s.
Speaker:called Leading Change.
Speaker:And today it's still one of the best books of like, how do we
Speaker:undergo digital transformation?
Speaker:How do we go change?
Speaker:Uh, some people look at compliance like you put a tool in, you, you, you know,
Speaker:you put in security tooling, you've made some changes, you underwent a
Speaker:digital transformation right now you have this centralized spot in your
Speaker:stack to go monitor everything from the people to the processes to the
Speaker:software to your vendors to your third party, like, who do we do business with?
Speaker:What is our supply chain risk?
Speaker:Oh, we do business with it.
Speaker:T Mobile and T Mobile just had their 34th breach this year.
Speaker:So maybe we should consider doing a, sorry, T Mobile.
Speaker:Uh, maybe we should consider moving to Verizon, right?
Speaker:There are items that inform your stack.
Speaker:Uh, the more you do them, the better it gets.
Speaker:But when you look at that base set of challenges, there's no
Speaker:value in that to people today.
Speaker:Um, one of the things that I love about Vanta and shameless plug to Vanta.
Speaker:They invested in a whole team to do analytics, not analytics on
Speaker:customers, you know, like use case, it's specifically analytics for what's
Speaker:the business case to do compliance.
Speaker:You wanted to win a contract.
Speaker:Is it a one time contract?
Speaker:Is this going to help you sell up market?
Speaker:Compliance has a cost and compliance should have a benefit.
Speaker:And one of the things that Vanta does for their customers is make
Speaker:sure that you understand like, this is what it's costing you.
Speaker:This is what consulting costs is, what audit costs.
Speaker:But based on what science and logic and reason tell us in the
Speaker:field, these are the benefits.
Speaker:And while you did it for this initial set, you, you mentioned that you've
Speaker:already seen some other benefits.
Speaker:You've had some customers other than that initial ask for this.
Speaker:Is that right?
Speaker:Yeah.
Speaker:I mean, we've had multiple leads come in to our trust center.
Speaker:And since we keep talking about it, I'm just going to say it's
Speaker:like trust.tag1consulting.com.
Speaker:You can go there.
Speaker:It's the Vanta Trust Center.
Speaker:And it literally is real time.
Speaker:Here's our controls.
Speaker:And there's going to be a green check mark or presumably a red thing.
Speaker:If, if we weren't meeting those controls, uh, thankfully we're meeting them so far.
Speaker:But yeah, I mean, yeah, no, uh, anyone can go there.
Speaker:Uh, you do a little click wrap NDA and you can see.
Speaker:Like in depth details of all our controls and tests.
Speaker:And yeah, we've had multiple potential customers.
Speaker:Like that's kind of one of their first landing spots is like, Oh,
Speaker:can I actually trust you guys?
Speaker:In your space, I mean, our space too, that's, that's how we settle.
Speaker:What differentiates you from your competitor?
Speaker:It's the product's great, sure.
Speaker:Can we, can we trust you to keep our data safe?
Speaker:Can we trust you not to be the, the reason that we've lost time,
Speaker:energy, money, and customers?
Speaker:I see this as a lot of, uh, maturing our business, right?
Speaker:Like it's, it's so, it's, you know, so much of what we've talked about
Speaker:resonates so strongly with like how we got here, why we did it.
Speaker:Um, you know, my background is in startups.
Speaker:I want to move fast.
Speaker:You know, I want to make mistakes and just keep going.
Speaker:Um, you know, but we're at a size and point in our life
Speaker:cycle where we need to be.
Speaker:You know, more mature, you know, we're onboarding people a lot more frequently,
Speaker:you know, like we have more people, because we're, we're bigger, you know, so
Speaker:it's like having these controls in place, um, really, it doesn't slow us down.
Speaker:It just gives us that, like, you know, maturity.
Speaker:And level of operation and our entire business for 17 years has been built
Speaker:exclusively on people coming to us for our reputation and expertise.
Speaker:And we're at the point where, you know, we're going out and we're trying
Speaker:to, you know, grow our business.
Speaker:Um, and, and having this in place is like, I, I'm, I'm hoping, and I think
Speaker:will be a key part of that, right?
Speaker:So people who don't know us, who aren't seeking us out, this gives
Speaker:us that, that validation to say, we do know what we're talking about.
Speaker:And here, you don't have to, you know, listen to our words, you know, you can,
Speaker:you can see it in, in, in real time and, uh, you know, and so I, I think it's,
Speaker:you know, uh, hopefully going to be a big part of our success moving forward.
Speaker:Um, I really appreciate you guys joining us.
Speaker:There's so much more I'd like to cover and get into, uh, but we're,
Speaker:uh, we're at time and need to wrap up, um, parting words, uh.
Speaker:You know, uh, Faisal, like, having gone through this with many organizations, you
Speaker:know, uh, you know, besides use Vanta, um, you know, uh, what would be your,
Speaker:your recommendations for folks there?
Speaker:Yeah, I'd say when thinking, when you think about establishing, um, guard,
Speaker:guardrails for yourself or really formalizing process internally, You want
Speaker:to take, as Drew was mentioning, sort of a risk based approach to things, right?
Speaker:Uh, consider the scope of where your sensitive data and systems live, the
Speaker:risk of people, their operations.
Speaker:And, um, take those into account when making the decisions of what framework
Speaker:and what, what, uh, standard you're trying to adhere to at the end of the day.
Speaker:Or even a framework at all.
Speaker:Maybe it's just a attestation to a standard.
Speaker:Um.
Speaker:The CSF is a common example from a self attestation perspective.
Speaker:Um, but think about what is the risk to you and from there continue onward.
Speaker:Also, you know, of course, adding, just slowly adding in the, the Vanta bit.
Speaker:If we think about just the implicit benefits of as we've talked through,
Speaker:there's also that implicit benefit of.
Speaker:the network that you guys have established now.
Speaker:You have Vanta as the partner.
Speaker:You have BD Emerson's team as the partner.
Speaker:Heck, they're so good at their, the security and compliance
Speaker:space and operating things.
Speaker:One of our strongest partners.
Speaker:You have this network of professionals that now you've helped establish
Speaker:a program and continue to, can continue to scale with you.
Speaker:And, and that's the beauty of what you've established here today.
Speaker:I think, I think what I would tell people is actually be more in your shoes, right?
Speaker:Move, move fast.
Speaker:Um, huge, huge fan of speed, right?
Speaker:Um, I, I tell my team, I, we, we say SVM, speed, violence, and momentum, right?
Speaker:If, if you have someone who can funnel that, right, we have a, there's a guy
Speaker:on our team that Jeff knows well, his name is Jose and he's our funneler.
Speaker:Jose keeps everyone organized.
Speaker:And if you have someone internally, who's like that, it's
Speaker:not really a project manager.
Speaker:It's more of a, can we wrangle the group and make them make decisions?
Speaker:Uh, decision paralysis is what really slows this down.
Speaker:Again, we talked about your hardest challenges.
Speaker:Your initial challenge was the decision to do it.
Speaker:And once you did it, I think the rest of those decisions were rapid.
Speaker:You, you asked, to Faisal's point, you took a risk based approach.
Speaker:What's the risk of us not doing this?
Speaker:Or what's the risk of us adding this?
Speaker:And then, you know, we, we moved quick.
Speaker:You bounced ideas off of experts and you came to a decision.
Speaker:And then you stood firm and you said, okay, that's our decision.
Speaker:Let's get audited to it.
Speaker:What I would tell anyone who's going to go through this process is move quick,
Speaker:make decisions quickly, be informed, and when you need help, raise your hand.
Speaker:Um, I can tell you 15 other BD Emersons that I trust to do this work.
Speaker:They're all part of Vanta's network.
Speaker:Uh, in our space, we don't really have competitors, right?
Speaker:I will refer work to our biggest competitor, because I know that
Speaker:they're going to do a phenomenal job.
Speaker:Um, everyone that Vanta went and hand picked and said, Hey, we
Speaker:want you to take part in this.
Speaker:I mean, this whole network is incredible.
Speaker:Um, if you need help, go ask for help.
Speaker:There's different flavors of help.
Speaker:If you're going to do it by yourself, you can.
Speaker:Move quick.
Speaker:Make decisions quick.
Speaker:Be a group.
Speaker:Don't assign a task and let it sit.
Speaker:Group thinking, right?
Speaker:Like everyone come together, make decisions and move that.
Speaker:That's, that's what I have.
Speaker:Jeff, what would you tell, uh, our peers, you know, having been through this and
Speaker:led it for our organization, you know, run for the hills, you know, uh, uh, you
Speaker:know, what have you taken out of this?
Speaker:Oh, man.
Speaker:I mean, certainly I can see chasing after a SOC 2 accreditation
Speaker:could be super time consuming.
Speaker:Uh, in our case, it was not.
Speaker:I put a lot of time in for a handful of months.
Speaker:Uh, like Drew mentioned, like, this could take years if you aren't
Speaker:being guided the right way or you're not quite sure what you're doing.
Speaker:Uh, so for us, like, the, having BD Emerson support us and, and
Speaker:kind of give us that guidance.
Speaker:Tell us, you know, When we're kind of going off the rails or tell
Speaker:us, yeah, that's totally fine.
Speaker:You just have to, you know, change, change this.
Speaker:And that can work for you.
Speaker:Uh, it was huge because yeah, we're, we're small, we're kind of different.
Speaker:We like to do our own thing.
Speaker:Uh, and we like to respect our employees and their privacy and that
Speaker:like inform some of our decisions.
Speaker:Um, And having someone expert in the field like BD Emerson kind of support us through
Speaker:that and, and guide us in what we kind of can and can't do, like, where's the gray
Speaker:lines, where's the, where are the really solid lines, uh, has Just this definitely
Speaker:would have taken us over a year.
Speaker:I'm just pulling that number out of him out of there, but it would have taken
Speaker:us a very long time to complete this.
Speaker:Uh, and I question how our audit would have looked at the end.
Speaker:Um, and now going through this with BD Emerson, like I know we're, we're just
Speaker:finishing up our type two audit right now.
Speaker:Uh, We're all our tests are getting a hundred percent on Vanta.
Speaker:So I know we're in great shape.
Speaker:Uh, I, I have no concerns that we're going to have a very nice audit report.
Speaker:Um, and yeah, just leveraging the tools like Vanta.
Speaker:To make this kind of automated and ongoing, like, we know we're
Speaker:just, we're going to do this again next year, go through an audit.
Speaker:Um, and now Vanta, we're in the habit of just checking this stuff, um, day to
Speaker:day, we're probably going to set like a monthly meeting going forward internally.
Speaker:Like what's our.
Speaker:What do we need to deal with, uh, for SOC two compliance this month?
Speaker:Uh, is there anything that Vanta's flagging for us?
Speaker:Yes or no.
Speaker:And, uh, just keep moving forward.
Speaker:Um, so yeah, I guess the, uh, the longest run of it is like, hire these guys.
Speaker:It's going to save you so, so much time and energy.
Speaker:And, uh, it's been absolutely great to work with.
Speaker:Well, yeah, thank you guys.
Speaker:Sorry.
Speaker:I didn't want to cut you off.
Speaker:I think.
Speaker:You know, good consultants are one thing, but you guys are a
Speaker:great company and not everyone.
Speaker:We can't say that about every, you know, every engagement, uh,
Speaker:change is hard for some people.
Speaker:You guys have rapidly matured.
Speaker:You took it serious.
Speaker:And that, I mean, we have a great relationship, so I appreciate both of you.
Speaker:Thank you all so much.
Speaker:Uh, we couldn't have done it without you and, uh, and really appreciate you
Speaker:joining us here today to, to share this.
Speaker:Um, hopefully more agencies will, will take this on.
Speaker:Uh, we'll put a bunch of links in the show notes, uh, to, you know, the
Speaker:various different, uh, software Vanta, uh, and, um, you know, our Trust Center.
Speaker:Um, if you liked this talk, uh, please, uh, share it out.
Speaker:Uh, people need to know more about SOC 2, the benefits of why you should do it.
Speaker:If you want to see more of our team talks, check out tag1.
Speaker:com slash TTT.
Speaker:That's three T's for Tag1 Team Talks.
Speaker:Uh, and as always, we'd really appreciate your feedback,
Speaker:suggestions on future shows.
Speaker:You can write to us at ttt@tag1.com.
Speaker:Thanks.
Speaker:See you next time.