About Us | Contact Us
View Cart

Gestalt You

By Dan Hadaway | Tuesday, April 20, 2010 - Leave a Comment

A big company party is coming up and a scrap-booker asked me to write something about our ten year anniversary to put in the last page of her scrapbook.  Ironically, she had said “just take ten minutes and write what comes to your mind about this milestone.”

What was only supposed to take me ten minutes ended up using a good part of my Sunday afternoon.  Granted, I was thinking about it while gardening, but I could have been thinking about something else (such as why all my broccoli seedlings suddenly died).

Then this morning I once again run-up against the risk of keeping a blog (that you don’t add to it regularly).  And woo-who!  A topic for my blog!

But, as it turns out . . . . blogs and scrapbooks are not interchangeable.  For one:  What you put in a scrapbook refers to everything that was in the scrapbook.  Secondly, what I put on this blog about our company making it to our ten year anniversary . . . . it needs to be profound.  It needs to adequately express the gratitude that I and our team feels towards everybody who helped and helps make infotex a success.

So instead, I’m going to take this post into my thoughts on the “gestalt” theory as it applies to information security, risk management, and running a business.  I imagine that most of my readers (as if there are already hundreds of them) are right now scratching their head.  You vaguely remember learning about “the gestalt” while in some easy art or psychology class you took as an elective to get you through your senior year.

illustration

Principle of Totality

You can refresh your memory, if necessary, by knowing that what I’m referring to is “the principle of totality,” to the fact that a system is a group of parts which are combined in a manner to create a whole which is greater than the sum of the parts.  The best way to illustrate this, in my opinion, is to look at the classic illustrations to the left.  Each illustration is merely a set of parts, but the way the parts relate to each other creates a meaningful whole.  It’s the relationship between the parts that does the work of turning them from squiggly black blotches into four distinct “systems.”

My point for bringing this up is that infotex has always worked off a “gestalt” approach to our business.  We see your information security program as a gestalt.  We see that when you change one simple policy, you change the entire system.

Backing up a bit further from the “system” called “information security,” we believe that we are a part of a greater team of professionals dedicated to the mission of managing technology risk.  We firmly live and breathe this belief.  We see “the four corners of the bank” as having equally important team members ranging from board members through management through the technical team to your users to your customers to your vendors.  Academia, clubs, associations, and law enforcement are also members of this team.

You can see this philosophy permeates our approach to our clients.  Heck, we even consider our competitors to be a very important and productive part of this team and thus we often recommend them.

illustration

Change the Relationship, Change the Whole

If you remove the top circle in the figure to the right . . . . or if you even turn it clockwise a few degrees . . . . you completely change the system.  It might make the system better, it might make it worse, but it does indeed completely change the system.  That’s because to change a system, you can only change the relationship between the parts of that system.  To improve a system, improve the relationships it has with other systems, and the relationships between its subsystems.

Whatever parts were in the system we call “infotex,” we made it ten years!  And that is why we are grateful to ALL parties that helped us make it past “the critical first three years” into the rest of our history as a company.

Ten is simply a number.  We hope to be here ten years from now.  But what is important right now is to thank those who have helped us in the past, as well as those who are actively helping us now.

Thank you!!


Posted by:
Dan Hadaway, CISA, CISM
Managing Partner
infotex

Posted in Dan's New Leaf

Related Articles
Latest News
    Dan’s Semi-Retirement . . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . If you follow my blog, you may have already surmised that I am starting to get ready for retirement.  This is actually a result of a long process we have been […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS Dateline: Lafayette, IN, December 5th, 2022 infotex, the Managed Security Service Provider, announces that Dan Hadaway, Founder and Managing Partner of the company for the last Twenty-two years, plans to semi-retire at the end of 2023. Prior to founding infotex in 2000 to serve community banks, Dan Hadaway […]
    A new study highlights the benefits of looking at your network from the other side… An article review. If you were trying to attack your organization’s network, how would you start?  That’s a question you may not have asked yourself, but experts say it’s something that can help you strengthen your security.  That’s according to […]
    Google Ads, Gitlab and OneDrive have been used to distribute the BATLOADER malware… An article review. We’ve always believed that “watch where you click” has always been good advice when it comes to security online, however Microsoft is tracking the spread of malware that has been using legitimate websites to help facilitate its spread, counting […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
    Thanks for being interested in our Technology Planning Webinars! The 2022 annual webinar update on technology planning includes a review of the previous years’ movies that are available, as well as alternative tactics that have arisen from recent conferences, forums, and industry experience. Feel free to invite your entire technology committee! Click the Button to […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! In the spirit of October and Halloween we have put together a gallery of our “spooky” Awareness Posters at halloween.infotex.com. Use them to help decorate for the holiday! Check […]
    Microsoft, Cisco and Uber are among the companies hit by this new threat… An article review.  As more organizations adopt multi-factor authentication to help safeguard their systems hackers have adapted, and several major corporations have been among those hit by this new style of attack.  This new technique, called MFA Fatigue or Push Spamming, involves […]
    A Webinar Movie This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!