Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Easy security reporting recipes

March 26, 2020

Easy security reporting recipes

When it comes to security reports, we often tend to take a page out of the book of W.C. Fields:

“If you can’t dazzle them with brilliance, baffle them with bullshite.”

…at least that’s how a lot of them are received by their audience, anyway.

Of course, weeee don’t think they’re bullshite. They make perfect sense to us. They’re overflowing with facts, figures, event counts, and lots and lots…and LOTS of stats that, of course, can’t help but make blindingly obvious the brilliant contributions security makes – every day – to keep the organization safe and justify the hefty budgets we keep requesting.

Right?

Pretty-much without exception EVERY single customer and client I’ve worked with has struggled to create meaningful security reports. And the reason most cited is the classic “business/technology divide” or some variation that eventually boils down to, at some stage, someone finally flat-out saying in frustration:

“They just don’t get it.”

The problem is that, as you probably already understand, busy doesn’t mean effective. And, to our friends, business sponsors and other organizational countrymen (and countrywomen)…

…all we end up doing is just shouting, “Hey, look! We’re doing something, and we have all this data, and we have metrics, and this 2.3475 in cell B42 was 2.5473 last week. Isn’t that great?”

It’s all absolutely meaningless—at least to anyone but us.

Now SABSA gives us the whole performance management framework (PMF) and puts that together with the idea of the Attributes Taxonomy to give you the holy and much-revered Attributes Profile, or BAP if you’re into ‘60s Batman comic book sound effects.

And we tell you – in Foundation at least – that this is the solution to all your reporting woes. Because they’re attributes, they’re aligned with the business—and because they all have fully-engineered, 100%, Grade A, business-approved metrics, measurements and performance targets…

…you’ve got the whole thing sorted.

How-ev-ah…..

In the trenches of trying to make it all work, it’s hardly ever that straightforward. And I have rarely met a team that didn’t really struggle to come up with meaningful metrics and performance targets that weren’t absolute thresholds like “zero incidents” (which is a whole other book of emails as to why that’s a bad idea).

So, you have a tool. And you have a technique. And the two of them together give you some artifacts that should solve the problem.

But, alas, the practice of theory isn’t always as straightforward as the theory suggests—and, in this case, the root of the problem is a simple – but subtle – shift in the way you actually crate, capture and communicate those magical, mystical metrics to all and sundry.

And, because so many people often struggle with this, there’s a whole section on how to make this subtle shift that will have you face-palming when you discover what it really is…

…which together with a detailed understanding of how to apply the Baseline Perspectives™ of The Agile Security System™…

…will give you easy, reliable and repeatable recipes for any reports you’ll ever need to create.

It truly is that simple.

In fact, the reports will practically write themselves—if you know what you’re doing.

But…as I said, it’s a subtle thing that most people miss.

So, if you’re joining us for the next cohort of Building Effective Security Architectures next week, by the time we hit Lesson 3 in Module 3 in the next-to-the last of the 7 weeks we’ll spend together…

…you’ll have one more tool in the credibility-building toolbox that will lead to a whole lot more dazzling brilliance…

…and a veritable boatload LESS of bullshite to bury your baffled business colleagues.

Like the lottery, you can’t win if you don’t play—and, while it’s not impossible for you to figure this out on your own, it’ll be handed to you on a plate if you’re part of the cohort—along with a whole load of stuff that only people who’ve worked with me directly or previously taken the program know how to do.

So whether you choose to join us or not is a decision only you can make. But it’s one you need to make pretty quickly, because in just 36 hours from the time I send this email, it’ll be too late.

Here’s the link:

https://archistry.com/besa

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, BESA, SABSA, Security Reporting

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.