Tech

Scaling tech, teams, and companies

Project Gamma Podcast Logo

Project Gamma Podcast: Dan Manges, Co-Founder & CTO of RWX

In today’s rapidly evolving technological landscape, cybersecurity is no longer just a technical necessity; it’s a critical enabler of business growth and resilience. To explore this intersection, Warner Moore hosted an engaging chat with Dan Manges, Co-Founder & CTO of RWX.

With successful ventures like Braintree and Root Insurance under his belt, Dan shared his invaluable insights on scaling fintech startups, addressing security challenges, and fostering innovation.

This article captures the essence of their discussion, structured to guide tech leaders on navigating the complexities of scaling businesses while embedding robust security practices.

Here’s what we cover:

  • The Challenges of Scaling FinTech Startups
  • The Role of Leadership in Scaling Tech Teams
  • Cybersecurity as a Growth Enabler
  • Advanced Security Practices for Modern Tech Companies
  • Compliance and Risk Management
  • Future Trends in Authentication and Security
  1.  

The Challenges of Scaling Startups

Warner: Dan, you’ve successfully scaled companies like Braintree and Root Insurance. What do you think is unique about taking a company from zero to a billion dollars?

Dan: The biggest challenge is moving fast in the early stages of the company. At that point, you’re experimenting and prototyping, trying to validate your product. Over-engineering or neglecting foundational security can create significant issues down the road. At Root, we scaled to 250 engineers within five years, which required robust systems to manage such rapid team expansion.

Warner: How do you ensure that growth doesn’t compromise your foundation?

Dan: It’s all about setting up processes that mature at the right pace. You don’t want to overdo it in the early stages, but you also need a solid foundation to scale effectively as the company grows.

The Role of Leadership in Scaling Tech Teams

Warner: Let’s talk about leadership. How did you approach hiring during those early days at Root?

Dan: I focused on hiring engineers with management potential, even if they started as individual contributors. This way, they could learn the codebase and grow into leadership roles as the team expanded. It’s much more effective than bringing in external leadership later on, which often lacks historical context.

Warner: That’s an interesting approach. What’s your take on the dual path for technical and managerial careers?

Dan: It’s essential. Not everyone wants to manage people, but technical experts should still have a clear growth path. Companies need to recognize and promote technical excellence without forcing engineers into management roles.

Cybersecurity as a Growth Enabler

Warner: Security is often seen as a cost center. How do you see it enabling business growth?

Dan: Embedding security early is not just cost-effective; it’s critical for scaling. Basics like encryption, multi-factor authentication, and secure defaults should be non-negotiable. However, security measures should also enable productivity, not hinder it.

Warner: Can you share an example of balancing security and productivity?

Dan: Sure. At RWX, we implement secure defaults while ensuring that processes don’t slow down our teams. It’s a constant balancing act but crucial for long-term success.

Advanced Security Practices for Modern Tech Companies

Warner: What advanced security practices are you excited about?

Dan: A few stand out:

  1. OIDC Protocols: We eliminate long-lived keys with ephemeral tokens for authentication.
  2. Vault Systems: Centralized management of sensitive credentials with robust access controls.
  3. Row-Level Security: Ensuring multi-tenant data separation directly at the database level.

These approaches eliminate entire attack vectors, making systems more secure by design.

Warner: That’s impressive. How do you ensure these practices are implemented effectively?

Dan: It’s about embedding security into infrastructure and processes from the start. Automation and proper tooling make it easier for teams to adopt these practices without friction.

Compliance and Risk Managements

Warner: SOC 2 compliance is a hot topic. What’s your advice for startups approaching it?

Dan: Start with a risk-based security program. Focus on aligning controls with your business culture and goals. For tracking changes, integrate compliance workflows directly into your CI/CD pipelines and collaboration tools like Slack.

Warner: How do you balance compliance with innovation?

Dan: By automating processes wherever possible. For example, at RWX, we use Slack channels for access requests and approvals, ensuring that changes are tracked and authenticated without adding unnecessary overhead.

Future Trends in Authentication and Security

Warner: Authentication seems to be a perennial challenge. What trends are you seeing?

Dan: Passkeys and WebAuthn are game changers. They tie authentication to devices or domains, eliminating common attack vectors like phishing. It’s all about making it easy to do the right thing.

Warner: What’s your take on moving beyond passwords?

Dan: Passwords are a relic. Innovations like passkeys not only improve security but also enhance the user experience. As an industry, we’re finally addressing the complexities of authentication head-on.

Stay tuned for the next episode of Project Gamma! 

Spotify: link

About Project Gamma: Project Gamma, where technology meets leadership. Hosted by Warner Moore, vCISO and Founder of Gamma Force, this podcast features insightful conversations with industry leaders who are shaping the future of tech.

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound