What you'll learn
In a perfect setting, the CISO function should only own detection and response — preventative risk creates organizational friction security teams are structurally bad at resolving.
The way to actually shift a security org's culture is to tie 5-10% of every individual's performance plan to efficiency and automation work — incentives drive behavior, slogans don't.
The opportunity in this AI moment is for security teams to lead enterprise AI adoption — and in doing so, finally tie themselves to revenue and growth instead of fighting for budget every cycle.
Description
Iman Ghanizada is globally recognized as one of the principal voices behind Google's Autonomic Security Operations framework, the Continuous Detection / Continuous Response methodology, and the architectural thinking that's shaped how the largest security organizations in the world have evolved their SOC functions. This conversation is the most direct CISO-strategy material the show has aired this season — and Iman pulls no punches on what he sees as structurally broken about the current CISO function and how AI is the lever to fix it.
The opening segment goes after the state of the security market with the most exportable framing of the episode. The nature of cybersecurity hasn't changed since the late 90s — the same problems get rebranded with new terminology every cycle (zero trust, agentic, autonomic). What's different now is that for the first time in a decade, there's a genuine technology paradigm shift underway with AI, and the security teams that lead its adoption inside their organizations have an opportunity to permanently reshape their relationship with the business.
The most controversial framing Iman lays out — and the one every CISO should sit with — is that in a perfect setting, the CISO function should not own preventative risk. The CISO should own detection and response. Preventative risk is an advisory function that creates organizational friction because the security team doesn't actually own the assets they're trying to protect. The teams that have separated these functions cleanly — leaving preventative risk advisory to the CTO and product organizations while letting the CISO focus on the highest-value work of mitigating breaches in progress — operate materially better than the ones that try to do both.
What we cover
"the same problems, rebranded" — why "agentic" is just the latest "zero trust" and what's actually new this time
"the case against fear-based security marketing" — and the AGI-and-$7-trillion parallel that should make us all suspicious
"detection and response as the only true CISO pillar" — the controversial reframe Iman has been refining
"the Ben Treynor SRE borrow" — how Google's site reliability engineering pattern translates to security operations
"tie 10% of every performance plan to efficiency" — the incentive lever that changes culture faster than any slogan
"the autonomic security operations framework" — what's real, what's marketing, and where the next two years lead
"the AI opportunity for the CISO" — leading enterprise AI adoption as the path to permanent business alignment
"the predator-prey dynamic isn't going away" — and why detection and response is the only function that compounds in value
Thank you to our Sponsors:
Hampton North is the premier US based cybersecurity search firm. Start building your security team with Hampton North
Sysdig is the leader in AI-powered real-time cloud defense; stop watching and start defending
The conversation
The state of the security market — same problems, new labels
Iman's read on the current state of the security market is more grounded than most takes the show has aired. The fundamental nature of cybersecurity hasn't changed since the late 90s. Walk a Black Hat or RSA floor and you'll see the same problem categories — too many signals, too much context, not enough capability to rationalize it all into actionable insight. What changes every few years is the labeling. Zero trust dominated for several cycles. Agentic dominates now. The underlying defender problems remain.
What is genuinely new this time, in Iman's read, is that AI represents a real technology paradigm shift on the order of the early cloud transition — but with the important caveat that the technology can't yet do what the marketing claims. We're still solving fundamental reliability, determinism, and accuracy problems before mass enterprise adoption becomes safe. The early Google work Iman led on natural language search across Chronicle and on summarization of investigation context was useful because those use cases match what LLMs are actually good at today. The autonomous SOC use cases that vendors are marketing — fully replacing human analysts in high-risk decision paths — are mostly aspirational, and the CISOs who are skeptical of those claims are right to be.
Detection and response is the only true pillar
The most exportable conceptual frame in the episode is the one most CISOs will resist hardest.
The CISO function should never have anyone that deals with preventative risk. The CISO function should just handle detection response
The argument is structural. Security teams don't own the assets they're trying to protect. They don't stand up the servers with misconfigurations. They don't write the vulnerable code. They don't deploy the un-patched containers. The preventative side of the security function is fundamentally an advisory role — security identifies a pattern of risk and tries to influence the engineering and operations teams who actually own the assets to fix it. That's a hard role, and it creates a lot of organizational friction, and the security team doesn't have the cultural capital or the asset ownership to be effective at it at scale.
The highest value that a CISO can provide or the security organization can provide today is mitigating breaches in progress
What the security function uniquely owns is detection and response. Mitigating breaches in progress, reducing the financial and operational impact of a security incident, managing the political reality of an active compromise, running the post-incident response — these are the highest-value things a security organization does, and nobody else in the company can do them. The CISO function that focuses there, and lets the preventative advisory work get owned by the CTO and product organizations who actually control the assets, will produce materially better outcomes than the CISO who tries to own everything.
The implication for CISO career strategy is sharp. The CISOs who go all-in on detection and response are doing the most defensible, highest-value work and are going to be the most strategically important to their organizations. The ones who try to be the Officer of No on preventative risk are setting themselves up for the budget fights and the political losses that have characterized the role for the last decade.
The Ben Treynor SRE borrow — incentives drive behavior, slogans don't
The most useful operational story Iman shared was the origin of his Autonomic Security Operations work. While at Google, he spent time studying how Alphabet secured Alphabet, and discovered that many of the leads running the detection, insider-threat, and security engineering programs had come from Ben Treynor's site reliability engineering organization. Iman pulled Ben aside and asked him how he had originally gotten the SRE function started — how do you get traditional IT operations people to think like engineers?
Ben's answer is the practical lever every CISO should adopt. He had managerial oversight over the team. He used that oversight to change the performance plans. Every individual on the team was now required to spend roughly 10% of their work on solving efficiency problems, and they were measured and compensated against that work. Once the incentive structure changed, the culture followed. The team stopped thinking like an operations function and started thinking like an engineering function. The transformative programs that came out of that culture shift produced the operational efficiency gains Google's security organization is now famous for.
The lesson translates directly to AI adoption inside any security organization. Champion programs, show-and-tell sessions, and town halls about the importance of automation produce minimal behavior change. Tying 5-10% of each individual contributor's performance review to AI-leveraged efficiency or automation work produces sustained behavior change because it changes the incentive equation. The CISOs who actually want their teams to adopt AI tooling at scale should be reworking their performance management process, not their slide decks.
The AI opportunity for the CISO function
The optimistic frame Iman returns to throughout the episode is that this is the moment when security teams can finally tie themselves to revenue and growth. For 30 years the CISO function has fought a losing political battle for budget by pitching fear — sophisticated adversaries, alert volumes, threat intelligence reports, the inevitable breach narrative. The fear-based marketing has worked well enough to capture budget but it has also locked the security function into a structurally subordinate role within the executive team.
The AI moment offers a different path. If security teams lead the safe adoption of AI inside the organization — solving the reliability, security, and privacy problems that are blocking enterprise AI deployment — they become directly responsible for unlocking material revenue and margin growth. The security team that helps the engineering team ship AI-enabled features faster, with lower risk, ties itself permanently to the business value the company is creating. That's a different CISO posture than fighting for the next $5M to deploy another tool.
The corollary on the talent side is that the security teams who actively use AI in their own operations — building agents, running threat-modeling automation, retiring repetitive analyst toil through AI tooling — develop the practical fluency to advise the rest of the business credibly. The teams that wait for vendors to package AI security for them will always be a year behind the threat actors and a year behind the rest of the executive team's expectations.
The fear-based marketing problem and the AGI parallel
The candid take on industry marketing was the most quotable segment of the episode. Fear-based marketing has worked across cybersecurity for decades, but it's also worked across the broader AI industry — the AGI-is-two-years-away framing, the $7-trillion-data-center-capacity claim, the autonomous-self-driving-by-end-of-quarter promises that have been "coming soon" for a decade. Iman's argument is that we should treat AI marketing claims with the same skepticism we'd apply to any vendor pitch from a security vendor that isn't actually solving the problem they're claiming to solve.
The healthy posture for any CISO in this moment is calibrated optimism. The technology is real. The opportunity to use it is real. The marketing is consistently overstating what the technology can do today. The CISOs who calibrate against the actual capability rather than the marketing claim will make the right architectural decisions for their organization. The ones who buy the AGI framing will make poor capital allocation decisions and end up with shelf-ware AI vendors in two years that nobody uses.
Insider threat, corporate espionage, and the long-game adversary
The closing segment Iman walked through is the geopolitical and competitive reality most security programs aren't yet pricing in. The recent Detect / DTEX disclosure of roughly 30,000 fired North Korean IT workers placed across US companies is the visible tip of the iceberg. Corporate espionage and nation-state-sponsored employee placement has been a feature of the technology industry for as long as there's been an industry. The new variation is that the adversary now has AI tooling that lets them mine internal data stores at scale once they have access — sitting dormant inside an organization, building competitive intelligence quietly, until the moment the access is used.
The defender's posture for this isn't a single product. It's the combination of identity governance, data classification, privileged access management, and detection capability for anomalous internal data access patterns that the foundational security work has been preaching for years. The CISOs who didn't finish that foundational work are now exposed in a way that's much more consequential than a typical insider threat. The recommendation Iman closed on — that for any organization using AI at scale, the security team should be focused first on understanding their own data flows, model provenance, and data governance before building any AI-specific defensive tooling — is the practical action item every CISO should carry into the next quarter.
Show notes
Guests — Iman Ghanizada, formerly head of autonomic security work at Google; author of the Autonomic Security Operations framework and the Continuous Detection / Continuous Response methodology; published author and recognized as one of the cybersecurity industry's leading operational thinkers
Books mentioned — none (Nick Frichette's upcoming book on cloud native security from Snap referenced as forthcoming)
Frameworks / models / tools named — Autonomic Security Operations (ASO) framework (Iman, at Google); Continuous Detection / Continuous Response (CDCR) methodology; site reliability engineering (Ben Treynor, the original SRE function at Google); the 10%-performance-plan-tied-to-efficiency lever; Chronicle (Google's SIEM, where the early natural-language-search work was done); WIZ exposure management product (referenced as a market signal); Pegasus spyware (referenced re: "real adversary tools sit dormant"); the predator-prey dynamic in detection and response
Other people / shows / resources referenced — Phil Venables (referenced as the source of the "autonomic" naming); Ben Treynor (the founder of SRE at Google); the DTEX / Detect North Korean fired-IT-worker report (~30,000 fired workers); Brian Johnson (the "immortality" reference); Cobol mainframes (still running production financial services); Detect (the company behind the North Korean threat report); Forbes 30 Under 30 (2021 — Iman's inclusion before he aged out); the Sinclair quote on incentive structures ("hard to get a man to understand something when his salary depends on his not understanding it")
Hosted by Conor Sherman and Stuart Mitchell.