Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Speed Data: CISO Leadership Tips With Pat Benoit

Pat shared the four leadership rules he follows, what it takes to succeed in cybersecurity, and why he just might be “The Most Interesting Man in the World.”
Megan Garza
2 min read
Last updated March 25, 2024

We’re excited to introduce our new video interview series, "Speed Data: Quick Conversations With Cybersecurity Leaders." Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight presented in a rapid format for security leaders pressed for time.

Our inaugural episode features Patrick Benoit, Global Chief Information Security Officer for Brinks, Inc. and a man with many talents. Pat shared the four leadership rules he follows, what it takes to succeed in cybersecurity, and why he just might be “The Most Interesting Man in the World.”

 

Pat Benoit might be new to his new role as Global Chief Information Security Officer for Brinks, Inc. but with the help of his incredible team, he is already making headway.

“It’s been fast and furious, but that’s what I would expect,” Pat said. “We have a plan, we’re going to execute on it, and we’re having a good time.”

Pat’s background in data security has proven helpful in adjusting to his new gig, primarily because (like Pat’s previous roles at Experian and Dell) Brinks follows similar regulations and prioritizes protecting customer data first and foremost.

“We raise our standards to support the customer at their level,” he said.

Pat is familiar with rising to a higher level — both at work and in life. He shared his four favorite leadership principles from Don Miguel Ruiz’s book, “The Four Agreements,” one of which includes taking the high road when you’re mistreated.

“In many ways, [these rules] help to mitigate some of the confrontations that may go on, especially the ‘don’t take it personally.’

“Now, I don’t want anybody to misunderstand and think that means you have to be a doormat. But it does mean that when somebody’s having a difficult time communicating properly, that it’s okay to say, ‘Look, I think we need to step back and wait until we’re both in a proper frame of mind,’” he said. “It’s always good to put yourself in the same boat as them.”

Pat shared these managerial principles with his team and encourages them to study up on these universal truths:

  1. Be impeccable with your word.
  2. Don’t take anything personally.
  3. Don’t make assumptions.
  4. Always do your best.

“It became something that I started introducing to my team, saying, ‘These are the rules that I’m going to try to live by; these are the rules I hope that you will try to live by, and I’m going to set some expectations around those.’”

Being a successful leader in cybersecurity takes more than just four helpful principles, however. You need to be able to blend personal growth with business acumen and know-how.

“If you’re not studying sales techniques and storytelling techniques, and just business in general, you’re short-changing yourself,” he said. “The opportunity is really going to be in the generalists that can know all of those things and put them all together to create a more holistic plan for, ‘How do you protect everything?’”

In other words, you need to be a person who wears many hats, something Pat can relate to. A commercial pilot and flight instructor, Pat also dabbles in Aikido, scuba-diving, riding motorcycles, and more.

“You know, you’ve just got to fill your time with something!” he said.

Watch our full interview with Pat above or on our YouTube channel.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

8-things-to-look-for-in-file-auditing-software
8 Things to Look for in File Auditing Software
Here is a list of 8 critical factors IT pros should consider when evaluating file auditing software.
complete-guide-to-windows-file-system-auditing---varonis
Complete Guide to Windows File System Auditing - Varonis
Windows file auditing is key in a cybersecurity plan. Learn about file system auditing and why you'll need an alternate method to get usable file audit data
what-is-an-it-security-audit?-the-basics
What is an IT Security Audit? The Basics
Security audits are crucial to maintaining effective securilty policies and practices — learn best practices, audit types and what to look for in an audit
what-is-spear-phishing?
What is Spear Phishing?
You might be wondering what is spear phishing. Our guide includes all the information you'll need to know including examples and tips for avoiding an attack