Here are five moments of our best moments from CISO Series Video Chat: “Hacking Sprawl: An hour of critical thinking about how to manage everyone’s ability to harness and deploy computing power.”
Our guests from this discussion were:
- Ed Bellis (@ebellis), CTO and co-founder, Kenna Security (now part of Cisco)
- Collin Boyce (@solarissparc), CISO, City of Tucson
Got feedback? Join the conversation on LinkedIn.
HUGE thanks to our sponsor Kenna Security

Best Bad Idea

Congrats to a mystery attendee for winning this week’s Best Bad Idea.
Other honorable mentions go to:
“Only allow provisioning requests to be approved on days when the Bitcoin price is up (so that budget will cover it).” – Michael Williams, director of product marketing, Laminar
“Combat data sprawl by deleting all data that is over 30 days old. Saves time and money – win win!” – Michael Williams, director of product marketing, Laminar
“Manage ‘accepted levels of sprawl,’ and allow up to 25 tools. When you pass that, the oldest one gets deleted/the contract is cancelled.” – Bryn Ossa, enterprise customer success manager, Elevate Security
“Company sprawl contest. Give every marketing and sales employee a $500 gift card and encourage them to purchase and install as many apps as possible. Winner gets a 1:1 dinner with the CISO.” – Dutch Schwartz, principal security specialist, AWS
10 percent better
“Do a financial audit to look for duplicate purchases against the same vendor and try to consolidate.” – Duane Gran, Director, information systems and security, Blue Ridge ESOP Associates
“Have a company wide ‘IT request portal’ that funnels all requests for software/products/platforms to be prioritized by business leaders for IT to procure/deploy/support.” – Jonathan Waldrop, senior Director, cyber security, Insight Global
“Incentivize managers to move these SaaS expenses to IT, thus relieving pressure on their own budgets.” – Dennis Huck, SVP technology and information security, Day One Agency
Quotes from the chat room
“There is a class of sprawl that is just disused, abandoned tech that the tech team forgot to decommission. Targeting this is a quick win to reduce risk (and reduce power consumption, so ESG win too) if you can spend some time on it.” – David Peach, CISO, head of information risk, The Economist Group
“Monitoring of tech spend on corporate payment cards is a legit way to detect this sprawl.” – David Peach, CISO, head of information risk, The Economist Group
“Sprawl is how the enterprise explores solution spaces. It exists because the effort/cost/delay of discovery is higher through centralized IT.” – Phil Wolff, co-founder, Wider Team





