The Doing SOC 2 Well Episode
Transcript
Introduction to the Guest and Topic:
Host Allie Krings welcomes Joseph Kirkpatrick, President and Founder of Kirkpatrick Price, and Sarah Triplet, Founder of Secure Start Partners. The episode centers on SOC 2—what it is, why companies pursue it, and how founders, auditors, and fractional security leaders can work together to build meaningful security and compliance programs rather than treating SOC 2 as a simple checkbox exercise. Sarah shares her background in governance, risk, and compliance across large organizations, and how her work supporting startups revealed significant gaps in resourcing and readiness
What Is SOC 2?:
Joseph explains that SOC 2 is a reporting framework designed for service organizations to communicate their security controls to their customers. When businesses rely on third‑party vendors, they need assurance that those vendors are operating securely. SOC 2 provides visibility into how a company manages risks, implements controls, and interacts with the security expectations of its clients. Not every organization needs SOC 2, but companies serving regulated industries or handling sensitive data—such as healthcare, finance, or government—are often required to demonstrate this assurance.
Why SOC 2 Matters Right Now:
Sarah notes that discussions across the industry have increased due to misconceptions, inconsistent quality, and the rising influence of automation‑driven compliance tools. With no strict standardization around SOC 2, the market is full of differing approaches and varying levels of rigor. This episode aims to give clarity, highlight industry expectations, and help organizations understand what meaningful SOC 2 readiness looks like—not just obtaining a report, but building sustainable practices.
Common Misconceptions About SOC 2:
According to Joseph, many companies treat SOC 2 as “just getting the report,” often seeking shortcuts or quick checklists. Some even ask whether higher fees can speed up or soften audit results—something professional auditors cannot do. The misconception that SOC 2 is merely a purchased outcome leads organizations to underestimate the governance, responsibility, and operational maturity required. True compliance requires understanding the controls, implementing them consistently, and being ready to stand behind the assertion the company signs.
Why Speed‑Focused Compliance Falls Short:
Fast‑track advertisements such as “SOC 2 in weeks” or even “in hours” oversimplify the process. Joseph explains that automation can accelerate certain testing activities—like continuously checking access controls—but automation alone does not make an organization compliant. Compliance requires people: control owners, decision makers, risk managers, and leaders who understand their obligations. Sarah adds that tools help identify gaps, but they cannot determine which gaps matter, how they align with business risk, or what remediation approach is appropriate. Over‑reliance on tools often leaves companies unprepared for real‑world requirements.
The Risks of Treating SOC 2 as a Shortcut:
Sarah highlights that shortcuts do not show their damage immediately. Instead, they surface later—often at the worst possible time. Rushed or shallow SOC 2 efforts can lead to failed attestations, extended sales cycles, diminished customer trust, and expensive infrastructure rework. She emphasizes that SOC 2 is not just an annual certification—it is a core part of a company’s sales motion, customer assurance program, and internal operating model. Companies that treat it as a quick task miss the deeper value and long‑term benefits.
Where Automation Helps—and Where It Doesn’t:
Automation is powerful in collecting evidence, monitoring configurations, and tracking access or logging activity. It enables continuous visibility at a scale humans cannot match economically. However, Joseph clarifies that automation does not equate to compliance. Tools cannot interpret risk, evaluate exceptions, or make governance decisions. Sarah points out that tools cannot understand business context or priorities. A strong compliance program uses automation as an enhancement—not a replacement—for human judgment.
What Founders Often Don’t Realize About Audits:
Joseph explains that many founders begin their SOC 2 journey focused only on the immediate goal: obtaining the report. But after two or three years of recurring audits, many realize how much the process has transformed their organization. Teams communicate better, decision‑making becomes more structured, and the company becomes more resilient. SOC 2 builds operational maturity and improves how teams handle incidents, respond to customer concerns, and approach security overall.
Real Examples of SOC 2 Driving Operational Growth:
Joseph shares stories from organizations that saw tangible benefits from SOC 2 beyond the report itself. One small law firm, initially unprepared, built foundational security practices through their first audit. A year later, when they experienced an email compromise incident, they successfully followed their incident response plan—something they would not have had without the audit. Sarah echoes similar experiences, noting client companies that, after two to three years, begin preparing for audits proactively and demonstrate true security maturity.
How to Select the Right SOC 2 Partner:
Sarah emphasizes the importance of choosing partners who are genuinely invested in understanding a company’s operations—not those who simply check boxes. Good partners ask questions, clarify expectations, translate requirements into practical actions, and reduce surprises during the audit. She encourages founders to prioritize empathy, transparency, and collaboration when evaluating auditors and fractional GRC support.
How Companies Should Prepare for SOC 2:
Joseph describes common early gaps: missing documentation, unclear data flows, lack of logging, and unstructured incident processes. Understanding where data originates, how it moves, and where it is stored is essential. Companies often believe everything is “in the cloud,” without understanding boundaries or onboarding paths. Mature preparation includes documented policies, consistent evidence collection, and clarity around control ownership.
What a Mature SOC 2 Program Looks Like:
Sarah explains that after completing the initial SOC 2 cycle, companies should progress toward continuous improvement. This includes strengthening vendor risk management, enhancing security training and awareness programs, and prioritizing communication across teams. SOC 2 should become part of day‑to‑day operations—something baked into onboarding, purchasing decisions, and engineering workflows.
Final Thoughts from the Guests:
Sarah stresses that tools are valuable but should be used mindfully. Shortcuts do not eliminate work—they simply delay it and increase cost. Joseph encourages the industry to push back against trends that erode the quality of audits: misaligned incentives, offshoring critical work to untrained resources, and automation‑first approaches that undermine assurance. True SOC 2 programs improve organizations, foster accountability, and strengthen teams.
Notes
The Doing SOC 2 Well Episode
In this episode, host Allie Krings sits down with Joseph Kirkpatrick, President and Founder of KirkpatrickPrice, and Sarah Triplett, Co‑Founder of Secure Start Partners, for a practical, myth-busting conversation about SOC 2.
As automation rapidly reshapes the compliance landscape, we dig into a big question:
Is faster actually better when it comes to earning your SOC 2 report?
Together, the trio breaks down:
- What SOC 2 really requires
- Where automation can streamline the journey
- Where it can derail you just as quickly
- How to balance speed, accuracy, and trust as your organization scales
If your team is navigating SOC 2—or thinking about it—this episode will help you understand what tools can (and can’t) do for you in the compliance world.
SOC 2 Academy (One-minute videos breaking down the basics)
SOC 2 FAQs
At KirkpatrickPrice, we’re on a mission to help 10,000 organizations raise the bar for cybersecurity and compliance. Join Our Cybersecurity Mission. If you’re going to invest in an audit, it should deliver real value. That’s why we partner with you from audit readiness to final report, ensuring you get the assurance you deserve.
Ready to strengthen your security and compliance posture? Connect with an expert today and learn how we can help you meet your toughest goals.
Send a Question
Do you have a question for our podcast? Send it to us here.