Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

From Product Security to Incident Response: Strategic Insights from NYDIG's CISO

Former Microsoft security executive Avi Ben-Menachem shares insights on building security teams founded on military values, bridging technical and business perspectives, and adapting security approaches across vastly different technology environments.

Session Summary

In this insightful conversation from the RSA Conference with Bishop Fox's Allan Cecil and Tom Eston, Avi Ben-Menachem shares his journey from Microsoft security pioneer to cryptocurrency protection leader. Ben-Menachem begins by reflecting on his early career helping build security into Windows XP following Bill Gates' famous security memo in the early 2000s, explaining how the opportunity to impact millions of users drew him to cybersecurity from his engineering background. This foundation informs his strong belief that technical expertise remains essential for security leadership—even as one ascends to executive levels.

Throughout the interview, Ben-Menachem emphasizes the critical importance of bridging technical and business perspectives. He describes security leadership as requiring both deep technical understanding and exceptional storytelling ability to translate complex threats into business impacts that executives and board members can comprehend. This dual capability—being both technically credible and executive-fluent—emerges as a central theme in his leadership philosophy.

Ben-Menachem draws significant inspiration from his six years of military service when discussing team building, highlighting three core values he considers essential: accountability, integrity, and respect. He specifically advocates for hiring veterans in security roles, noting they often naturally embody the sense of responsibility and accountability necessary in environments with limited resources and complex challenges. These values, he argues, create the foundation for high-performing security teams beyond just individual technical brilliance.

The conversation shifts to Ben-Menachem's experiences across dramatically different technology environments—from Windows to Xbox to Azure and now cryptocurrency. He explains how each role required adapting security approaches while maintaining core principles, particularly at Microsoft where the scale means security failures could put customer organizations out of business entirely. This perspective fundamentally changes how one balances security foundations with innovation, requiring a customer-focused approach.

Looking to the future, Ben-Menachem predicts significant changes in cloud security beyond just AI applications. He identifies two critical industry shifts needed: security products must evolve from merely finding problems to actively solving them, as CISOs face resource constraints that make "finders" increasingly less valuable; and security programs must transition from compliance-focused checklists to more intentional threat-based protection models driven by understanding adversary techniques. He concludes by connecting his career trajectory to Bitcoin security, noting how the cryptocurrency's fundamental technology leverages the same cryptographic principles he's worked with throughout his career, just applied in innovative new ways.

Key Takeaways

  1. Technical expertise remains essential for security leadership - Even at executive levels, hands-on engineering experience and subject matter expertise provide the credibility and insight needed to make effective security decisions.
  2. Effective security leaders must be exceptional storytellers - The ability to translate technical security issues into business impacts that executives understand represents a critical skill for modern CISOs.
  3. Military-inspired values create stronger security teams - Building teams around accountability, integrity, and respect—values often embodied by veterans—creates more resilient security organizations than focusing solely on individual technical talent.
  4. Security approaches must adapt to business contexts - Security strategies that work for one technology environment may not transfer to others; effective security requires understanding the unique business impacts of failures in each context.
  5. The future requires security products that solve, not just find - With constrained resources, CISOs need tools that move beyond identifying vulnerabilities to actually implementing solutions automatically.
  6. Threat-based protection should replace checkbox compliance - The industry must shift from framework-based checklists to security approaches driven by understanding specific adversary techniques and tactics.
  7. Career growth comes from intentionally seeking diverse experiences - Security professionals should view their careers as a collection of experiences that build different skills and perspectives rather than a linear progression.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.