DoGood Signals
DoGood Signals is a bi-weekly snapshot of what enterprise IT and security teams are actively working on in our network.
1. Lead Signal
Replacement behavior is no longer isolated. Across security, identity, and infrastructure, switching is showing up across a broader set of teams and titles. Displacement is becoming normalized rather than exceptional. Cost pressure and operational friction are no longer edge cases. They are now baseline decision criteria.
2. Who Entered the Market
New members who joined since the Jan 20 Signals issue (34 total)
Gerald Lopez De Choudens — Chief Information Officer, Universal Insurance Group
Veeren Jote — Director of Software Engineering, Identity & Access Management, Humana
Matthew Bentolila — Director, Cybersecurity & GRC, Hospitality | Healthcare
Steve Yip — Senior Director, AI/ML & Data Engineering, RingCentral
Lance Sons — Global Chief Information Officer, PSA BDP International
Carnell Council — Chief Information Security Officer, Arctic Slope Regional Corporation
David Tuhy — Vice President, Data Center & AI (HPC & Supercomputing), Intel
John Clawson — Vice President of Information Security, Pattern
Ross Gordon — Senior Director of Data Engineering, Circana
Chris Briggs — Fractional Chief Information & Transformation Officer, Proper Group International
Ellen Williamson Lakin — Senior Manager, Cyber Threat Intelligence & Threat Hunting, Baxter International
Masialeti Masialeti — Head of IT & Digital, First Quantum Minerals Ltd.
Tom Monaghan — Vice President, Engineering (DevEx, GenAI Tools, AI SRE & Observability), Zendesk
Matt Kietzman — Chief Information Officer, Family Farm & Home
Michael Brady — EVP, CIO & CISO, LeaderOne Financial Corporation
Charles Kirk — Director of Engineering, Trust & Safety, Chime
Angela Anderson — Vice President of Information Technology, TDIndustries
Tom Yeung — Senior Vice President, Cybersecurity Risk Officer, Truist
Michael Neuman — Director, IT Infrastructure & Architecture, Cleveland-Cliffs
Craig Martell — Chief Technology Officer, Lockheed Martin
Jamel Perkins — Global Technology Executive, Sodexo
Gavin Barton — Vice President of Engineering, Marketplace, Booking.com
Sunil Agrawal — Chief Security Officer, Glean
Howard Wolfe — Director of Information Security, First Bank
Milan Karunaratne — Vice President, Digital Advanced Technologies, Wabtec
Tony Bautts — Director, Cyber Security Operations (Identity, Detection/Response, NetSec, Security Architecture), Verily Life Sciences
Sumanta Baruah — Senior Manager, CTO Office & Global Technology Strategy (Strategic Partnerships), Samsung Electronics America
Dan Gustafson — SVP Information Technology / CIO, Newell Brands
Jason Richling — Vice President, Development & Platform Engineering, PerfectServe
James Martin — Chief Technology Officer, McNational
Deborah Cafarella — Senior Director of IT Security & Infrastructure, Shields Health
John Michael Gross — CIO / CISO, Cascade Environmental
Adrian Gill — Director, IT Service Delivery, RXO
Greg Maier — Assistant Vice President, Navy Federal Credit Union
New members this cycle span healthcare, insurance, SaaS, manufacturing, logistics, financial services, and the public sector.
3. What Buyers Are Actively Working On
Replacing penetration testing vendors. Multiple buyers cited gaps in current continuous testing coverage
Addressing threat detection and security operations gaps tied to offshore or distributed team models
Implementing AI guardrails and usage tracking for enterprise AI assistants. Budget already allocated
Standing up identity security initiatives with defined budget and audit-driven timelines
Automating access review processes described as “completely manual and time-consuming”
Fixing offboarding and asset recovery workflows cited as operational pain points
Planning ERP and EPM cloud migrations (Oracle, Workday) with longer 2026–2027 horizons
4. What We’re Seeing
Replacement activity continues to outpace net-new. Buyers are increasingly explicit about dissatisfaction with incumbents, citing cost pressure, VAR disruption, and weak alignment with day-to-day workflows. At the same time, identity, access, and audit-related work is consistently surfacing as a near-term priority, while large transformation initiatives remain planned but deferred. Switching now feels justified, not risky.
5. Why This Matters
For vendors selling into IT, security, and data teams, this cycle favors displacement, not feature expansion. Buyers are doing cost–benefit math, questioning incumbent spend, and prioritizing tools that reduce manual effort or clearly justify their footprint. Operational efficiency, not roadmap ambition, is driving decisions.
Signals is compiled from real member intake, meeting activity, and project submissions across the DoGood network.
