Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Speed Data: CISO Leadership Tips With Pat Benoit

2 min read
Published May 30, 2023
Last updated July 11, 2023

We’re excited to introduce our new video interview series, "Speed Data: Quick Conversations With Cybersecurity Leaders." Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight presented in a rapid format for security leaders pressed for time.

Our inaugural episode features Patrick Benoit, Global Chief Information Security Officer for Brinks, Inc. and a man with many talents. Pat shared the four leadership rules he follows, what it takes to succeed in cybersecurity, and why he just might be “The Most Interesting Man in the World.”

 

Pat Benoit might be new to his new role as Global Chief Information Security Officer for Brinks, Inc. but with the help of his incredible team, he is already making headway.

“It’s been fast and furious, but that’s what I would expect,” Pat said. “We have a plan, we’re going to execute on it, and we’re having a good time.”

Pat’s background in data security has proven helpful in adjusting to his new gig, primarily because (like Pat’s previous roles at Experian and Dell) Brinks follows similar regulations and prioritizes protecting customer data first and foremost.

“We raise our standards to support the customer at their level,” he said.

Pat is familiar with rising to a higher level — both at work and in life. He shared his four favorite leadership principles from Don Miguel Ruiz’s book, “The Four Agreements,” one of which includes taking the high road when you’re mistreated.

“In many ways, [these rules] help to mitigate some of the confrontations that may go on, especially the ‘don’t take it personally.’

“Now, I don’t want anybody to misunderstand and think that means you have to be a doormat. But it does mean that when somebody’s having a difficult time communicating properly, that it’s okay to say, ‘Look, I think we need to step back and wait until we’re both in a proper frame of mind,’” he said. “It’s always good to put yourself in the same boat as them.”

Pat shared these managerial principles with his team and encourages them to study up on these universal truths:

  1. Be impeccable with your word.
  2. Don’t take anything personally.
  3. Don’t make assumptions.
  4. Always do your best.

“It became something that I started introducing to my team, saying, ‘These are the rules that I’m going to try to live by; these are the rules I hope that you will try to live by, and I’m going to set some expectations around those.’”

Being a successful leader in cybersecurity takes more than just four helpful principles, however. You need to be able to blend personal growth with business acumen and know-how.

“If you’re not studying sales techniques and storytelling techniques, and just business in general, you’re short-changing yourself,” he said. “The opportunity is really going to be in the generalists that can know all of those things and put them all together to create a more holistic plan for, ‘How do you protect everything?’”

In other words, you need to be a person who wears many hats, something Pat can relate to. A commercial pilot and flight instructor, Pat also dabbles in Aikido, scuba-diving, riding motorcycles, and more.

“You know, you’ve just got to fill your time with something!” he said.

Watch our full interview with Pat above or on our YouTube channel.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
speed-data: why-cybersecurity-is-an-unceasing-progression-with-siwar-el-assad
Speed Data: Why Cybersecurity is an Unceasing Progression With Siwar El Assad
Siwar El Assad chats about the impact of cybersecurity on modern society, the reality of breaches, and how a chance encounter led Siwar to the industry.
dspm-deep-dive:-debunking-data-security-myths
DSPM Deep Dive: Debunking Data Security Myths
DSPM is the leading acronym in cybersecurity. However, the recent buzz has cluttered the meaning of data security posture management. Let's demystify it.
speed-data:-rethinking-traditional-cybersecurity-principles-with-rick-howard
Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard
Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.
the-benefits-of-threat-and-data-breach-reports
The Benefits of Threat and Data Breach Reports
Threat and data breach reports can help organizations manage security risks and develop mitigation strategies. Learn our three pillars of effective data protection and the benefits from these reports.