Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / “Mind blowing” security architecture

February 27, 2020

“Mind blowing” security architecture

Today’s been a bit hectic for me, so I’m going keep this one short. It’s inspired by a conversation I just had with someone we’ve worked with previously who reminded me that of all the stuff I’ve talked about so far, one of the the…well, many things I haven’t yet talked about that you’ll learn if you’re part of next week’s cohort is how to use the architectures you produce…

…to create “mind blowing” realizations of the value of architecture…

…within the operations teams.

Yeah, that’s right. Because one of the things that is normally a pit deeper than the Mariana Trench is the place where the architecture artifacts you manage to create (if you manage to create them at all) eventually end up.

The very idea that you can use the methods of The Agile Security System™ that you’ll learn as part of the next cohort of Building Effective Security Architectures to connect the organization’s strategy to security strategy…to security operations…

…is pretty-much unheard of.

It’s kinda dragon, griffon and unicorn mythical-beast territory. Sure, theoretically, it’s possible, but what most of the people who try quickly learn…

…is they don’t have the right foundation on which to actually pull it off.

Hint: a control library is CERTAINLY not going to be up to the job.

You need something more. Something formalized and based on a unified theory…

…that can be practically implemented in a systematic way.

In our case, SABSA provides the former, and The Agile Security System provides the latter.

Now you might be thinking that this is a pretty tall order to fill – especially if you’ve tried to do this sort of thing in the past. Because you don’t really know what’s important…you see a sequential set of steps…

…or you get lost in 66 cells of the 2 main SABSA matrices.

What you’ll specifically learn as part of Module 3 when we start putting all of the puzzle pieces we’ve worked to individually identify and flesh out in the previous modules is this:

The specific value of each of our potential customers can get from our architecture efforts. And this is effectively the same whether it’s a DevOps, Agile or “traditional” waterfall/SDLC approach you’re trying to support.

Sure the mechanics are different – which you’ll also learn – but the value – that’s right, the VALUE each of our security customers requires will be the same.

What’s that value?

I guess you’ll just have to join the cohort to find out. But time’s running out since there’s only 2 more days to make sure you get in before the 11:59pm US/Eastern registration deadline.

If you want to:

…understand the most powerful ways to justify the architecture you want to build

…learn how to integrate “real” architecture with Agile and DevOps—the right way, and

…build extensible, SABSA-based, enterprise (non-technical to technical) security architectures one piece at a time that are ALWAYS going to fit together

Then here’s the link to join the cohort starting next week:

https://archistry.com/besa

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, BESA, SABSA, Security Architecture

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.