Speed Data: CISO Leadership Tips With Pat Benoit

Pat shared the four leadership rules he follows, what it takes to succeed in cybersecurity, and why he just might be “The Most Interesting Man in the World.”
Megan Garza
2 min read
Last updated March 25, 2024

We’re excited to introduce our new video interview series, "Speed Data: Quick Conversations With Cybersecurity Leaders." Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight presented in a rapid format for security leaders pressed for time.

Our inaugural episode features Patrick Benoit, Global Chief Information Security Officer for Brinks, Inc. and a man with many talents. Pat shared the four leadership rules he follows, what it takes to succeed in cybersecurity, and why he just might be “The Most Interesting Man in the World.”

 

Pat Benoit might be new to his new role as Global Chief Information Security Officer for Brinks, Inc. but with the help of his incredible team, he is already making headway.

“It’s been fast and furious, but that’s what I would expect,” Pat said. “We have a plan, we’re going to execute on it, and we’re having a good time.”

Pat’s background in data security has proven helpful in adjusting to his new gig, primarily because (like Pat’s previous roles at Experian and Dell) Brinks follows similar regulations and prioritizes protecting customer data first and foremost.

“We raise our standards to support the customer at their level,” he said.

Pat is familiar with rising to a higher level — both at work and in life. He shared his four favorite leadership principles from Don Miguel Ruiz’s book, “The Four Agreements,” one of which includes taking the high road when you’re mistreated.

“In many ways, [these rules] help to mitigate some of the confrontations that may go on, especially the ‘don’t take it personally.’

“Now, I don’t want anybody to misunderstand and think that means you have to be a doormat. But it does mean that when somebody’s having a difficult time communicating properly, that it’s okay to say, ‘Look, I think we need to step back and wait until we’re both in a proper frame of mind,’” he said. “It’s always good to put yourself in the same boat as them.”

Pat shared these managerial principles with his team and encourages them to study up on these universal truths:

  1. Be impeccable with your word.
  2. Don’t take anything personally.
  3. Don’t make assumptions.
  4. Always do your best.

“It became something that I started introducing to my team, saying, ‘These are the rules that I’m going to try to live by; these are the rules I hope that you will try to live by, and I’m going to set some expectations around those.’”

Being a successful leader in cybersecurity takes more than just four helpful principles, however. You need to be able to blend personal growth with business acumen and know-how.

“If you’re not studying sales techniques and storytelling techniques, and just business in general, you’re short-changing yourself,” he said. “The opportunity is really going to be in the generalists that can know all of those things and put them all together to create a more holistic plan for, ‘How do you protect everything?’”

In other words, you need to be a person who wears many hats, something Pat can relate to. A commercial pilot and flight instructor, Pat also dabbles in Aikido, scuba-diving, riding motorcycles, and more.

“You know, you’ve just got to fill your time with something!” he said.

Watch our full interview with Pat above or on our YouTube channel.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

how-the-moveit-vulnerability-impacts-federal-government-agencies
How the MOVEit Vulnerability Impacts Federal Government Agencies
Our latest State of Cybercrime episode examines the MOVEit vulnerability and its impact on victims, including federal government agencies.
straight-from-the-ciso:-top-tips-for-today's-cybersecurity-leaders
Straight From the CISO: Top Tips for Today's Cybersecurity Leaders
We’ve gained massive insight from our conversations with CISOs and other cybersecurity leaders. Now, we're passing along their wisdom to you.
speed-data:-film,-foodies,-and-the-future-of-tech-with-david-ulloa
Speed Data: Film, Foodies, and the Future of Tech With David Ulloa
Dr. David Ulloa, Chief Security Information Officer at IMC Companies, shares the best line of defense against a sophisticated threat actor.
speed-data:-the-impact-of-ai-on-attack-vectors-with-justin-michael
Speed Data: The Impact of AI on Attack Vectors With Justin Michael
Corbin Capital Partners CTO Justin Michael discusses the hot topic of ChatGPT. Justin leads guarding sensitive data for the leading asset management firm.