Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Is your security program making you fat?

February 12, 2019

Is your security program making you fat?

Did you know there’s far too much in common with yo-yo weight loss programs and your run-of-the-mill security program?

Here’s the deal:

Published psychology research points out that fad diets – you know, the ones that say you’re going to lose 21 pounds in 10 days or something like that – and *especially* repeated bouts of this kind of diet actually end up making someone gain up to 167% of the weight they initially wanted to lose in the first place!

That’s right, you can get fatter by dieting.

Why?

Well, there’s psychology to support that as well.

Fad diets originated thanks to our Western cultural obsession with unrealistic standards of beauty. Everyone wants to emulate what they consider beautiful, e.g., they want the results other people have.

Sound familiar?

The kicker is that they don’t know how they were actually able to achieve them—especially if people mistake correlation (what other, potentially unrelated things were happening) with causation (what actually caused the change, regardless of anything else).

People get addicted to fad diets, because they’re generally a recipe: if I do X, I’ll get Y result.

And they do. For a while.

And then the Thomas Edison quote about opportunity dressed in overalls kicks in, and whatever they’re doing is either a) unsustainable in the first place or b) gets filed in the “too much work” category.

So, think very seriously for a moment if your current approach to building your security program isn’t actually making you fat.

Are you getting sustainable change from the latest vendor bauble you bought?

Once the newness wears off, is maintaining the tech or managing the volume of information it produces creating more problems than it solves?

Are you being strategic about working within the scope of what the business needs – even if it’s not new and sexy – or are you forever chasing shiny objects and your security strategy reads like someone taped together the executive summaries of the last 10 issues of some Analyst report?

Building an effective security program takes sustained commitment and oversight. It most certainly “is dressed in overalls and looks like work.”

Success requires recognizing and pursuing the right opportunity, and Thomas Edison was right. That *IS* what opportunity looks like.

If you’re tired of security fads, vendor hype and a bloated, redundant control set, how about trying something completely different.

Here’s what our overalls look like: https://archistry.com/go/SecurityLeader

Are you ready to put on yours?

Cheers,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Information Security, Leadership, Success

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.