Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archives for Information Security

February 12, 2019

Is your security program making you fat?

Did you know there’s far too much in common with yo-yo weight loss programs and your run-of-the-mill security program? Here’s the deal: Published psychology research points out that fad diets – you know, the ones that say you’re going to lose 21 pounds in 10 days or something like that – and *especially* repeated bouts […]

Article by Andrew Townley / Archistry Daily / Information Security, Leadership, Success

August 18, 2017

Why Your Cybersecurity RCA Isn’t Working

Recently, I was having a discussion with a customer we’re working with to restructure their IT Security department and adopt SABSA end to end. Doing this will more effectively manage their cybersecurity risks and keep them directly focused on supporting business execution, not just doing security for security’s sake. The Problem One of the problems they […]

Article by Andrew Townley / Risk Management / Cybersecurity, Data Breach, Information Security, SABSA, Security Architecture

March 9, 2017

Security — What does that mean?

Security isn’t really a thing—it’s more a feeling you get when you believe things are the way you expect them to be. You expect things you care about to be “ok”, but most of the time, we really don’t think about what that means either. Maybe it means that something is “safe”, e.g. free from […]

Article by Andrew Townley / Risk Management / Cybersecurity, Featured, Information Security, Operational Risk

September 13, 2014

Cybersecurity for Boards: What You Need to Know Now

$22 billion in losses by businesses per year. $11 million in fraudulent charges. 50 enforcement actions by the US FTC in the last 10 years. 1.2 billion usernames and passwords and 500 million email addresses from 420,000 websites. 63,437 security incidents in 95 countries. 79 seconds between thefts of personal data. $3.5 million is the […]

Article by Andrew Townley / Compliance, Corporate Governance, Risk Management, Security / Cybersecurity, Data Breach, Featured, Information Security, Operational Risk, Reputation, Security Architecture, straegy, Strategy Implementation

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.