About Us | Contact Us
View Cart

Gestalt You

By Dan Hadaway | Tuesday, April 20, 2010 - Leave a Comment

A big company party is coming up and a scrap-booker asked me to write something about our ten year anniversary to put in the last page of her scrapbook.  Ironically, she had said “just take ten minutes and write what comes to your mind about this milestone.”

What was only supposed to take me ten minutes ended up using a good part of my Sunday afternoon.  Granted, I was thinking about it while gardening, but I could have been thinking about something else (such as why all my broccoli seedlings suddenly died).

Then this morning I once again run-up against the risk of keeping a blog (that you don’t add to it regularly).  And woo-who!  A topic for my blog!

But, as it turns out . . . . blogs and scrapbooks are not interchangeable.  For one:  What you put in a scrapbook refers to everything that was in the scrapbook.  Secondly, what I put on this blog about our company making it to our ten year anniversary . . . . it needs to be profound.  It needs to adequately express the gratitude that I and our team feels towards everybody who helped and helps make infotex a success.

So instead, I’m going to take this post into my thoughts on the “gestalt” theory as it applies to information security, risk management, and running a business.  I imagine that most of my readers (as if there are already hundreds of them) are right now scratching their head.  You vaguely remember learning about “the gestalt” while in some easy art or psychology class you took as an elective to get you through your senior year.

illustration

Principle of Totality

You can refresh your memory, if necessary, by knowing that what I’m referring to is “the principle of totality,” to the fact that a system is a group of parts which are combined in a manner to create a whole which is greater than the sum of the parts.  The best way to illustrate this, in my opinion, is to look at the classic illustrations to the left.  Each illustration is merely a set of parts, but the way the parts relate to each other creates a meaningful whole.  It’s the relationship between the parts that does the work of turning them from squiggly black blotches into four distinct “systems.”

My point for bringing this up is that infotex has always worked off a “gestalt” approach to our business.  We see your information security program as a gestalt.  We see that when you change one simple policy, you change the entire system.

Backing up a bit further from the “system” called “information security,” we believe that we are a part of a greater team of professionals dedicated to the mission of managing technology risk.  We firmly live and breathe this belief.  We see “the four corners of the bank” as having equally important team members ranging from board members through management through the technical team to your users to your customers to your vendors.  Academia, clubs, associations, and law enforcement are also members of this team.

You can see this philosophy permeates our approach to our clients.  Heck, we even consider our competitors to be a very important and productive part of this team and thus we often recommend them.

illustration

Change the Relationship, Change the Whole

If you remove the top circle in the figure to the right . . . . or if you even turn it clockwise a few degrees . . . . you completely change the system.  It might make the system better, it might make it worse, but it does indeed completely change the system.  That’s because to change a system, you can only change the relationship between the parts of that system.  To improve a system, improve the relationships it has with other systems, and the relationships between its subsystems.

Whatever parts were in the system we call “infotex,” we made it ten years!  And that is why we are grateful to ALL parties that helped us make it past “the critical first three years” into the rest of our history as a company.

Ten is simply a number.  We hope to be here ten years from now.  But what is important right now is to thank those who have helped us in the past, as well as those who are actively helping us now.

Thank you!!


Posted by:
Dan Hadaway, CISA, CISM
Managing Partner
infotex

Posted in Dan's New Leaf

Related Articles
Latest News
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]
    Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Many organizations still fail to consider the unique risks posed by cloud computing… An article review. Last month thousands of Western Digital MyCloud device owners learned about the risks of cloud-based solutions the hard way: their data had been wiped remotely due to a flaw in the internet-facing component of their external hard drives. While […]
    infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]