Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / How to avoid bad things happening

May 14, 2020

How to avoid bad things happening

Photo by Boston Public Library on Unsplash

This weekend, as you do after 5 weeks of the whole family under one roof, my wife decided that it was time to clean out the garage. And, apart from needing to do a bit of real-world architecture archaeology on my son’s disassembled Hot Wheels garage to get it back together correctly, things generally went pretty well.

And, by “pretty well”, I mean I was able to mostly stay far, far away from this project.

But, today, as the final toys were being organized so there was actually a new play area for the kids come rain or shine since we’re heading into winter shortly, my daughter had hit her limit of patience to help. And her definition of “helping” turned into basically throwing her brother’s Hot Wheels cars into the garage from the middle of the driveway.

My son, rather expectedly, was getting a bit upset. Shouting at his sister to stop doing that.

However, I reminded him that if he’d picked up his own cars the 6 times his mother and I had already asked him, they wouldn’t be still sitting in the middle of the driveway as a tempting target for a toddler.

“Ohhhhh. Now I see, Papa,” was his reply, as he finally raced around getting his cars before his sister grabbed them.

It’s no different in security. Sometimes, the things we really don’t want to happen are relatively easy to prevent…

…but we first have to see the full picture.

And, given everything we face as security professionals every day – and the fact that there’s often a huge divide between the “architecture”, “engineering” and “operations” teams (and, no, this isn’t the time to start talking about Dev[Sec]Ops. We can argue about that one later).

That divide, plus the fact that we often don’t have any good way to organize and really examine the tacit knowledge that’s often only in the heads of the people on our team…

…can prevent us from seeing – and quickly solving – the easy ones, because, from where we sit, they all pretty-much look the same, given the 5 seconds we steal to actually look at them.

How do you see that full picture?

Well, the only way I’ve ever found in 25 years of professional experience solving real-world problems involving people, processes and technology is that you need to have an architecture. But not just any kind of an architecture.

A *usable* archtiecture.

One that isn’t imprisoned within hundreds pages of documentation and locked in a drawer or sitting on an open shelf, collecting decades of dust.

It needs to be available and accessible. It needs to be actionable…

…and it probably needs YOU to build it.

While it’s not always easy to figure out the best way to do it, that doesn’t mean that it isn’t straightforward once you have. And after all the time I’ve spent doing it – including 14 years of hard time in the SABSA salt mines – I truly believe that that best way is to use the 7 principles, 14 practices and 3 Baseline Perspectives™ of The Agile Security System™.

With it, you can easily build that “big picture” to identify and classify the hard vs. the easy problems and make conscious decisions about which ones to solve in what order. Because in addition to being able to classify them, you’ve also got a pretty good way to prioritize them based on their relative importance and risk impact.

Maybe this sounds too good to be true. But as you work through the 7 weeks of material in the Building Effective Security Architectures program, you’ll quickly see how seemingly little things – sometimes even as simple as the security equivalent of picking up your own toys before your sister tries to break them – can make a big difference…

…to your own sanity and effectiveness…

…to the credibility and trust of your team within your organization…

…and your overall ability to demonstrate the way you protect and enable the business.

Right now the registration is open for the July cohort of the program, and, if you register before the stoke of midnight tonight – around 9 hours from now – you can learn how to be a better security architect for $2,000 less than the people who wait until the regular registration rolls around.

Only you can decide if it’s right for you. And if you do, here’s the link you’ll need:

https://archistry.com/besa

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, BESA, Credibility, SABSA, Security Architecture, Security Architecture Skills

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.