Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Get yer assets outta my office!

August 14, 2019

Get yer assets outta my office!

It’s been an interesting few days, folks. I’ve had more than a few conversations with people about the role of security, talking to stakeholders and how to actually understand the worlds of security. And one of the things that I keep tripping over is that people have a very tactical view of security.

Now, ok, I get that this is necessary. However, my argument is that it’s not the focus of what we do, it’s the details of what we do.

And the thing about details is that it doesn’t matter how brilliant the details…how fast you can pick the lock…or whether you can take over my MacBook Air.

In fact, I can’t do any of those things. I mean, I’m sure I could learn, but they’re not things that really interest me. There’s a world of other things in business, leadership, security, architecture, philosophy, psychology and human behavior that I’d rather focus my efforts on.

But that’s just me.

The point is that if you’re picking the wrong lock, or breaking into the wrong computer or protecting them, or chasing the wrong patch or crying wolf about the wrong vulnerability…

…at the wrong time

…to the wrong people

It’ll just kill your credibility.

D-E-D..dead.

“Oh, you start with the assets, then you get the threats and then…” was something I heard recently.

Which assets? The ones that you can kick?

Oh, you mean the ones that were obsolete before you clicked the “Buy Now” button on the latest, magic cloud information dispersal device with the click-through policy that says, in big, blinking, 40’ high, pink neon letters:

The supplier’s in charge.

Why?

Because they’re  a supplier. They’re advertising the service that you picked based on whatever criteria—probably cost…maybe convenience…or maybe just so you could get your work done.

But are those the “assets” that matter to your customers?

Do you know who your customers actually are?

Do you know what you do for them—no, really, can you explain it in a way that  they would  understand?

How about this one: do you know what  they value? Or what they’re trying to accomplish? Or what their motivations and constraints really are?

Do you understand when they’re likely to take bigger risks to get what they want—and, most importantly, why they would do that?

Hand on heart, I can truly say to you, you’re not gonna find the answers to these questions calculating the empirical financial value of a set of bits  on a cloud storage service…or the dollars/fan revolution ratio of some rack-mounted piece of blinken-lights.

The only way you’re really going to figure out the answers  to those questions…

…the only way you’re really going to figure out  what you, the security professional, are actually supposed to  be doing, to what  degree, with what priority and where

…so that you truly enable the business

…enable the business to take the risks they need to  take

…as safely as possible

…and enable the business

…to make informed  decisions

…about the  consequences of  the  risks they may face

…in both your blinkin-lighten, APT-wearin, socio-economic disruptor-infested world

…and in their word

…the world of business…

The ONLY way you’re going to figure out the real job you have…

…which ISN’T implementing 50 NIST standards in 50 days, BTW…

The only way, is by being able to successfully meet, to successfully  engage, to successfully connect with, and to successfully understand the world of your customer.

How confident are you in  your ability to do that right now?

How confident are you in your ability to truly understand  the world of  your customer?

…to know what motivates  them…

…what scares them…

…how they think.

Maybe you are. And it’s possible. It’s not hard.

It’s just…it’s something most people don’t really do. Because it’s much easier  to get all keyed up about killer cables, IoT hacks and being aware – and afraid – of all these brilliant people doing really awesome crazy things…

…and those things happening to you

…to your assets

…to your 1’s and 0’s

…to  your clouds

…to  your spinning fans

…to your kernels

You know that  stuff. You live and breathe it.

It’s your  world.

But your world is only a means to an end, and that end is what matters to your customer…to the business…to the organizations that  pay your bills.

Can you really afford not to understand what they care about?

If you’re not sure, or you’re not  confident that you can successfully understand what you’re really supposed  to do in order to deliver risk-proportional, business-driven  security,

I’d suggest  you check out the  upcoming September issue  of the paid Security Sanity newsletter. It’s all about  how you can better understand your customer’s world, and how you can understand them  better…how  you can build  trust, credibility and respect with the non-technical  side of the house.

And the only way to get it, is by subscribing via this  link before it goes to the  printer:

https://securitysanity.com

Stay safe,

ast

P.S. and yes, I know there’s a million extra  spaces in this  email. I have one of the “new, most-awesome-est-est” MacBook Airs  with the most annoying and broken keyboard I’ve ever actually owned. This may be the machine I own for the shortest period of time, so I apologize. If you can’t  deal with the extra spaces, have Siri read it to you or something… 😉

Article by Andrew Townley / Archistry Daily / Agile Security, Customer Trust, Stakeholder Credibility, Stakeholder Engagement

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.