Rootly’s JJ Tang on Transforming Incident Management Culture
Nov 19, 2024
In this episode of Detection at Scale, Jack speaks to JJ Tang, CEO and Co-founder of Rootly, about revolutionizing incident management in tech organizations. JJ shares his journey from practitioner to founder and emphasizes the importance of viewing incident management as a cultural and collaborative effort rather than just a tooling issue.
JJ touches on breaking down silos between security and other teams to enhance communication and reliability, and empowering security practitioners to take on educator roles within their organizations. He also offers actionable insights on creating a culture of reliability and improving incident response strategies!
Topics discussed:
The importance of viewing incident management as a cultural shift rather than just a tooling problem, focusing on people and processes.
Strategies for breaking down silos between security teams and other departments to foster collaboration and improve incident response effectiveness.
The role of security practitioners as educators, helping other teams understand best practices and the importance of security in incident management.
The significance of collecting and analyzing data on repeat incidents to identify root causes and prevent future occurrences.
Insights on how to create a culture of reliability within organizations, making incident management a shared responsibility across teams.
The challenges faced during the transition from a practitioner role to a founder and CEO in the tech industry.
The impact of AI and automation on incident management, including how these technologies can improve response times and learning from incidents.
The necessity of having a clear governance framework in place to ensure data privacy and security during incident management processes.
By continuing to use this website you consent to our use of cookies.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.