Earlier this year I joined Clay, an automation and orchestration SaaS for RevOps, Sales, and Marketing. Clay enables these teams to experiment with and execute different go-to-market motions. The core primitive is a table where columns are data enrichments from various sources or LLM-based actions (including browsing the web). An example table starts with a target account's company and domain, uses LLMs to research industry, size, geographical focus, fundraising data or SEC filings, key stakeholders and recent conferences they attended, and generates talking points for approaching this lead and account.
This structure is powerful for GTM motions. Though Clay has specific ICPs in mind and builds its use cases and data partners around them, I believe a similar approach can transform security and compliance work.
Security teams struggle to separate meaningful from performative work. Impact and risk can be hard to measure. You must raise the floor across the board while raising the ceiling in areas core to your offering. You serve multiple teams, balancing deviations within centralized frameworks. As companies grow, removing implementations becomes harder: you lose track of the compliance controls that depend on them. People avoid removing anything, resulting in bloat.
I propose a paradigm and operating system that helps security and compliance work, by first collecting all task sources, enriching each task based on internal and external knowledge to quantify marginal security and compliance value, then using rules to orchestrate how each should be prioritized, performed, documented, and automated. Over time, the system improves by learning from previous work. Filtered views can be generated for each stakeholder. Think Superhuman the email client, where you see historical context for each correspondent, construct various filter rules, and even have AI draft emails.
Sources of Work
Aggregate all tasks into one constantly updated database: roadmap items, incoming requests, recurring compliance reviews, vulnerability scanners, posture management tools (e.g., CSPM, ASPM), SIEM alerts, and compliance platforms like Vanta. Start small and connect more systems over time. The more systems connected, the better the operating system performs.
Enrichment
For each item, enrich from three sources:
Self-enrichment: Correlate with other tasks in the database, including similar, related, and ones forming parent-child hierarchies. This gives insight to how similar tasks were handled in the past, including any possible automations. Hierarchies enable grouping, summaries, and effective browsing into this database.
Internal enrichment: Add context from controls, procedures, documentation, playbooks, discussions, decisions, upcoming roadmaps, and accepted risks. Creative enrichment sources include read-only access to your AWS environment, Github analysis for attribution, and even chatting with other team members over Slack.
External enrichment: Pull from compliance frameworks, security news, threat intel, and vulnerability databases. More creatively, it can research open-source libraries on Github, or read security advisories and interpret if they are applicable.
This enrichment provides necessary context for both humans and LLMs in later steps. It also quantifies the cost of delay--whether a contractual commitment, regulatory obligation, or exploitability of a vulnerability. Enrichments are stored in a structured format, with fields dependent on task type, plus free text for LLMs.
Orchestration and Automation
With context established, route tasks to different outcomes: prioritized versus de-prioritized (risk accepted), individual fixes versus one project to fix the whole class, which team to route to or if AI agents should try first. Rules plus AI recommendations ensure focus on the most important work at the right abstraction.
Continuous Retrospection
The operating system continuously analyzes past work. When a task type increases in volume, it proposes a project to eliminate them wholesale. When a control becomes thin or sloppy in evidence, it increases the priority. When it detects redundancy, it suggests ways to keep operations lean and meaningful.
Custom Views
To work effectively with so much data, you can create custom filter-based views for different stakeholders, similar to database views. This allows you to prune irrelevant tasks, whether horizontally, vertically, or using more complex filters.
Key Differentiators
This paradigm introduces four core features:
Global visibility enables maximum context and prioritization
Enrichment adds internal and external context, important especially as more work shifts to AI agents
Routing engine triages and routes all tasks, reducing mental burden and maintaining team focus
Self-improvement through continuous retrospection
To be clear, nothing has been built and I don't think there is a readily available off-the-shelf software without a bunch of custom work. Would love to get feedback.