Making Security Agile

How Do You Make Security Agile?