Author: rr
-
The Ryleyev Story: Words Can Undo Your Work or Efforts
NARRATIVE Kondraty Ryleyev was condemned to death by Czar Nicholas I after the failed Decembrist uprising. At the gallows, the rope snapped — by custom, grounds for a pardon.Rather than kneel, Ryleyev mocked Russia for not knowing how to make rope. Word reached the Czar. The pardon was torn up. He was hanged the next…
-
The Martian
Book Notes | Andy Weir 🎙 Show: N/A 📌 Episode: N/A 🏷 Tags: #Mars #TheMartian #ProblemSolving #Resilience Below are my thoughts from reading the book “The Martian” “I’m not dead, so it’s a win.”— Mark Watney, stranded alone on Mars The One-Line Summary An astronaut gets left for dead on Mars and survives through relentless problem-solving, dark humor, and a…
-
The Art of Letting Go
Podcast Notes | At Last She Said It, Episode 260 🎙 Show: At Last She Said It 📌 Episode: 260 — Big Ideas: Letting Go 🏷 Tags: #LetttingGo #Surrender #Resilience #SpiritualPractice #ClickReads Below are my thoughts from listening to this podcast. https://atlastshesaidit.org/p/episode-260-big-ideas-letting-go 🧠 The Big Idea Jim Finley wrote that a life is almost too much to bear. His answer — and the…
-
What is needed for an architecture practice?
Three people have shaped my thinking on IT Architecture Governance more than anyone else: Andrew Townley, Neil Rerup, and John Czaplewski. The link below is from Neil — and if you’re trying to build or mature an Architecture Practice, it’s one of the best blueprints I’ve come across. www.linkedin.com/pulse/ecsas-reference-architecture-practice-neil-rerup-yoiyc
-
What does Lego have to do with Cybersecurity Architecture?
Great question! Despite the risk of spoiling future “ice breakers,” let me share an exercise that answers the question through action. Enough talking—no academic architects needed today! 3) Show a “rules” slide. Below is an example from the last exercise. 4) organize the participants into group of 2-3 people 5) tell people to start. So, what…
-
Business Contextual Architecture – Keelson Management, a wholly owned subsidiary of CMA CMG
This is a follow up post to another one that focuses on Port and Terminal Cybersecurity in general. This post focuses on the business contextual architecture of a company responsible for maritime terminal cybersecurity, Keelson Management. This is another use case for The Agile Security System by @Andrew Townley. Please refer to others postings on…
-
Port and Terminal Cybersecurity
Following President Biden’s recent executive order on “Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States” I quickly delved into some research and discovered four valuable resources. Side note, one thing that I love about the cybersecurity field is the opportunity to use your expertise to contribute and…
-
Business Contextual Architecture – SC Johnson & Son, A Manufacturer and the Value of Re-Usable Architecture
Greetings, fellow architect or cybersecurity strategist! Imagine if you had a looming deadline and a meeting scheduled with a stakeholder in just two hours, especially as a newcomer to the company or potentially a new customer, preparation is key. In tackling this challenge, consider leveraging the Agile Security System (TASS) for a streamlined approach. Note:…
-
Data Brokers – Consumer Data and Analytics Industries
Recently, I came across a LinkedIn post (see Figure 2 below for visual representation) that delved into the intricate journey of data from its inception to consumption. While it was interesting, it triggered my contemplation on the analogous process concerning our personal data – its collection, analysis, sale, and exploitation for various purposes, notably in…
-
Business Contextual Architecture – Another Manufacturer Use Case (ON Semiconductor)
Delve into another instance of harnessing the Agile Security System. This time the focus is on ON Semiconductor. For insights into the methodology, kindly consult the Rogers post. This article will spotlight a couple of ways in which this approach can prove beneficial for individuals in these specific functions: Value of Agile Security System “Artifacts” for Non-Architecture Functions…