Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / How do I know if I can trust you?

November 28, 2019

How do I know if I can trust you?

Trust. It’s a funny thing, really. And, maybe it’s something that we don’t really think about too much…or often enough. Yet, trust is really at the foundation of what we do every day as security professionals.

Trust is our currency.

On one level, our organization trusts us to keep them safe what they’re off slaying the dragons, or whatever it is they really do. If we don’t know, then that’s a problem, because part of the thing they trust us to do is “the right thing,” and we can’t do the right thing, if we don’t know what they’re trying to accomplish.

Trust is our yardstick.

I might trust you to buy the next round, but I might not trust you to take out my sister (if I had one). Same word. Different…what?

What is it that’s really different when we’re trying to measure this slippery thing called trust?

I don’t know if you’re a Star Wars fan, or if you’ve been keeping up with the new Jon Favreau take on the franchise in Mandalorian, but so far, the underlying theme of all 3, far too short, episodes is the concept of trust.

You see, The Mandalorian is a bounty hunter, sporting armor similar to the legendary Boba Fett from the first movies, and, apparently a member of a society of bounty hunters. Without giving away any significant spoilers, secrecy of the identities of any individual Mandalore is pretty important:

“Our secrecy is our survival. Our survival is our strength,” is the way it’s put by the armorer.

So, if you’re part of the club, then you’re trusted to uphold its secrets. If you’re wearing the armor, you’re trusted to not reveal your true identity.

And then there’s the whole Code of being a bounty hunter. You’re expected to abide by the Code. There are “traditional” rules of engagement, like how you identify the bounty target, and who is entitled to the bounty.

Basically, it’s a bit like playing baseball in Little League: if you call it, you got it.

The show is actually quite brilliant, and it’s so far redeeming the franchise in my opinion after the re-hashed, milquetoast and, frankly, kinda boring set of new movies. But, aside from that, it’s chock-a-block a study on trust.

At the end of the day, the real reason trust can’t (yet) be established by technology is that it boils down to belief. I have to believe that something has the characteristics that I desire, and that those will be delivered as I expect.

Trust is expectations…of something.

Sure, you can define those things, and you can attempt to define sensors and instruments to detect whether they may or may not exist—but, as we well know, sensors can be fooled.

Trust is our level of belief that the agreements we make will be upheld. But here’s the thing about agreements:

Everyone has the right to veto. At any point.

When is that point?

Well…that’s about belief.

When The Mandalorian asks the Guild leader in response to his request, “How do I know if I can trust you?”

They’re negotiating an agreement. The Guild leader’s reply?

“Because I’m your only hope.”

Let’s just say that “Mando” decides to exercise his right to veto…you’ll just have to watch to find out what happens.

However, if you want to understand how the human aspects of trust intertwine with the technical aspects of cybersecurity to define whether we ultimately deliver value anyone can actually recognize…

…so we get our shiny toys

…and we get our mythical cybersecurity unicorns

…and we collect our bounty of trust from our customers

then head on over to this link:

https://securitysanity.com

Because in 4 days, the package will disappear, and you’ll have missed the deadline to get the December issue of the Security Sanity™ print newsletter that talks all about both the true nature of governance relationships within your organization and how that throws a mudhorn in the midst of some of the traditional guidance on implementing security governance.

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Security Architecture, Security Governance, Trust

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.