Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Why your security program’s singin’ “Baby, I’m built for compliance. I ain’t built for speed.”

March 17, 2019

Why your security program’s singin’ “Baby, I’m built for compliance. I ain’t built for speed.”

Today to recover from yesterday’s efforts of putting together some submissions for this year’s COSAC security conference in Ireland, I was listening to an old album of Howlin’ Wolf Blues tracks.

And, as I was listening to “Built for Comfort,” it occurred to me that this was actually the perfect description of far too many security programs out there. So, I thought it would be a good thing to talk about since we’re getting to the end of Q1 and there’s still time (if not budget) to try and straighten this problem out.

After all, you wouldn’t want to be stuck with this problem for another year.

That’d  be kinda like having “Yeah, but I’m GOING to go back to the gym next month” on endless repeat on iTunes.

Because everyone that hears it maybe 10 times or so will be like, “Yeah… sure you will, mate.”

And that’s just another way to lose credibility.

But I digress…

Back to those security programs walking around in the “comfortable shoes” of compliance.

Sure, it might keep you out of hot water during the external audit, but do you really think that compliance-driven security is going to keep you ahead of the bad guys?

No. Of course you didn’t.

That’d just be silly.

And yet, soooooooooooooooooo many people keep thinking that this is the easiest, lowest-hanging fruit to go after when building their security programs.

To understand why this won’t work, let’s take just a brief few words about what compliance is all about in the first place—in reverse order.

For “compliance” to be a requirement…there first must be a law or regulation.

…and there won’t be a law or regulation UNLESS there’s a really big number of people who’ve screwed up both often and at such a scale that a sufficient percentage of the voting public are either screwed out of their time, money or privacy…or someone dies.

And for those events to actually happen, there has to be a pretty big gap that everyone’s either:

  1. ignoring out of ignorance, or
  2. ignoring out of convenience,

Where option b) also often implies “willfully exploiting” due to short-term profit or market gains.

So, it’s really the last one that causes the most problems, giving the benefit to the doubt that option a) doesn’t come about because of lapses in leadership and organizational governance that conveniently skips the “due diligence” and “fiduciary responsibility” parts of the accountability of owning and operating a legal entity.

The key point here is that to get from even where we are right now in our reverse analysis to the point where “compliance” is even necessary takes…well…YEARS.

And, unless you’re talking about global warming or the rate of expansion of the sun, it’s pretty hard to equate any timeframe measured in years with the concept of speed.

But that’s really the requirement we have today of our security programs.

First and foremost, of course, the program needs to be aligned with the business, but a close second to this is that the program needs to actually be able to react, adapt and continue to deliver measurable value to the business quickly.

Sometimes in minutes.

Not hours.

Not days.

Not even weeks.

Minutes.

So today’s question is really about how you’d rate the speediness of your security program’s ability to respond to an ever-changing threat and business environment.

Are you a rabbit, a turtle…or a 3-toed sloth?

If you want to put a bit more zip in your security program than it has today, I can help you put everything in place you need to literally see up to a 10x improvement in the reaction time and delivery of your security services.

We only have a few days (and a few slots) left before we close this round of the exclusive Archistry High-Value, High-Speed Security Leadership Coaching Program, and I’d really hate to see you miss this chance to get the help you need.

Compliance-driven security might be more comfortable—or it might be a flat-out, frantic free-for-all…

…either way, it’s time has expired.

It’s time for a new approach that actually delivers what your organizations demands.

When you’re ready to talk about it, I’d like to help: https://archistry.com/go/SecurityLeader

…but don’t wait too long, because the offer won’t ever be this good again.

Hope to speak to you in time.

 

ast
—
Andrew S. Townley
Archistry Chief Executive

P.S. I mean it: Fast is the new black, which means the best way to start changing things is to click that link today—not at the end of the week…or the end of the month.

Article by Andrew Townley / Archistry Daily / Action, Compliance, High-Speed Security

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.