Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Pancakes and security architecture

January 7, 2020

Pancakes and security architecture

One of the things my wife made a family tradition a long time ago is pancakes on Sunday mornings. So, unless we’re all traveling – and sometimes even if we’re visiting friends – it’s a given that I’m on the hook to make pancakes every week.

They’re basically pretty simple to make. It’s just flour, sugar, baking powder, buttermilk, an egg, oil and a bit of salt, but there’s still a bit of skill required to make them turn out right in the pan.

And like any other skill, while you can read about it, or you can watch someone do it on YouTube…

…until you’re the one dropping the batter on the griddle…hearing the sizzle…watching the bubbles pop…and observing the shine turn dull…

…you’re not going to actually be able to do it very well.

Even as someone who does it every week, I can still screw up the first ones if I try and rush it—or I’m using different tools.

However…even there, because I do have the experience, I can generally recover from those minor mistakes and turn disaster into at least passable—even if I don’t hit pancake perfection every time.

And experience also helps when faced with a different brand of buttermilk…or substituting various other milk products of different consistencies, so it all will work out more-or-less the same no matter what.

With making pancakes, it mostly makes sense to develop those skills and get the experience on your own…

Because, let’s face it…the stakes are pretty low—and even the mistakes are mostly edible.

However…with something like true security architecture (as opposed to simply the structure and deployment of your security controls—independent of their connection and relevance to the business objectives they’re supposed to support)…

…flying solo with only the help of training manuals, books, a collection of web pages and even an in-person course or 7…

…may work, but it might also increase your anxiety, overall stress levels and you’re still probably going to have trouble getting some independent validation and assessment of where you might be making things harder than they need to be.

And I say this because I know firsthand how hard it can be. While I had some of the best support imaginable at times, I still spent a lot of time doing things the hard way and figuring it out on my own.

Maybe you’ve struggled too to figure out how to do proper, business-driven security architecture, and maybe you’re ready to get some support and immediate feedback on what you’re doing well and where you still need a bit more practice—both from me and from fellow architects trying to solve the same kinds of problems you are.

To help you have the best possible chance to develop the skills and experience you need as quickly as possible, I’ve built an environment specifically focused on balancing the right amount of instruction, practice and oversight with our flagship learning experience Building Effective Security Architectures.

Maybe it’s not for you, because nothing’s for everyone—not even pancakes.

But if you’re tired of trying to figure things out on your own and are prepared for 7 weeks of work to make a tangible difference in the way you work and the way your organization is protected, then why not join me in February?

Here’s the link: https://archistry.com/besa

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, BESA, Security Architecture

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.