Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Breaking both your arms?

August 9, 2019

Breaking both your arms?

Today I needed a little “pick-me-up” so I decided I’d go hunting for some of my favorite stand-up. Now, I’m old, which means, I’m kinda “old school” about this, so one of the clips I found was a classic Steven Wright quip:

“I woke up this morning, and I was folding my bed back into my couch. I almost broke both my arms, because it’s not one of those kinds of beds.”

And since right now, my brain is totally immersed in unlocking the mysteries of stakeholder interviewing so you don’t have to learn everything the hard way like I did, my brain just naturally made the connection, and this question came to me:

How many times is this what we feel like?

…I mean the “breaking both your arms” kinda thing because you’re desperately trying to do something at the wrong time…

…in the wrong way

…or at the wrong time.

And one of the other things I’ve been doing over the last couple of weeks was scouring the Interwebs for people talking about problems getting security requirements.

What I learned was that apparently, I’m the only person on the planet who ever had this problem. Everyone else seems to have it figured out.

I mean, yeah, you just get NIST 800-53, or the CSF, or ISO 270000000002…or 1…or whatever, and then you just use that. It’s like a checklist, and the more the merrier.

What could possibly go wrong?

But…

…after considering it a bit more, I figured, hell…I already have the thing half-written, so I might as well finish it. So there you go.

Back to breaking arms, though…

One of the things that’s pretty clear when you have the luxury to step back and really think about what you’re trying to do when you’re  interviewing stakeholders is that you see pretty clearly that not all security stakeholders are the same.

Shocking, right?

But then…if this is so obvious, then why do we only have a pack of the same 10 questions that any kid working behind the counter at McDrive-Thru would ask. Seriously…

“Um…ok, that’ll be 10,000,000 widgets, $30 billion in revenue – hold the lawsuits – and a share price of $1,275 by Q3…

…you want security with that?”

Hence the pick-list approach.

But that’s not good enough—and it’s surely not good enough to get you the respect of your no-security peers, colleagues and customers.

It’s like Principle #2 of The Agile Security System™ we officially launched last month says: understand the customer’s world.

And each of our different customers has their own world—even though we all have the same logo on our ID badges. So we need to ask them different questions…

…and we need to be prepared to speak to them in different terms

…and, most importantly, we need to be prepared to give them the priority they deserve of the most precious thing we have…

Our time.

So, if you want to figure out how to unlock the interstellar gateway to better, more effective and more valuable stakeholder interviews, then you might want to go ahead and head on over to this link and subscribe before the September issue comes out:

https://securitysanity.com.

Or…you can just keep breaking those arms. They do heal, but after a while, they’re gonna stop kinda looking like arms…

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Stakeholder Credibility, Stakeholder Engagement

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.