Leadership Articles – BSW #139 | SC Media
Firewall

Leadership Articles – BSW #139

August 13, 2019

 

 

 

In the Leadership and Communications segment, How our brains decide when to trust, Warren Buffet's "2 List strategy, Lack of IT leadership fuels IoT trial failures, and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Leadership Articles

  • CIO interview: Simon McNamara, chief administrative officer, RBS Group - Brought in after a catastrophic IT failure that affected 6.5 million customers, the IT chief at Royal Bank of Scotland Group says the bank is now a leader in innovation. The four key areas of transformation: resilience, simplification, efficiency and innovation. Using business change to generate new opportunities, including Mettle, its digital bank for small businesses, and mobile banking. "The only way you’re going to survive is by being in the mix and trying things, says McNamara. "My advice to other finance CIOs is to be in the mix, try some stuff and work with other partnerships.”
  • Warren Buffett’s “2 List” Strategy: How to Maximize Your Focus and Master Your Priorities - This simple three step process to prioritize yours goals:
  1. Write down your top 25 career goals.
  2. Circle your top 5 goals.
  3. You now have two lists: "A" list with top 5 goals and "B" list with other 20 goals. Focus on "A" list and avoid "B" list at all cost!
  • HOW OUR BRAINS DECIDE WHEN TO TRUST - Human brains have two neurological idiosyncrasies that allow us to trust and collaborate with people outside our immediate social group (something no other animal is capable of doing). The first involves our hypertrophied cortex, the brain’s outer surface, where insight, planning, and abstract thought largely occur. The second idiosyncrasy is empathy, our ability to share people’s emotions. To trust someone, especially someone unfamiliar to us, our brains build a model of what the person is likely to do and why. That means humans are constantly engaged in a two-sided trust game: Should I trust you? and How much do you trust me? As social creatures, we naturally follow leaders and model our behavior on theirs. The influence they have means they can easily sabotage trust in two key ways: by stoking fear and wielding dominance.
  • Efficiency vs. effectiveness in business: Which comes first? - Operational efficiency gains do not equate to operational effectiveness. In the quest to cut costs, companies are often blind to the difference between operational efficiency vs. effectiveness and the impact of one metric on the other. Indeed, statistics show that current implementations of automation, unless carefully designed, can cause serious problems.
  • Lack of IT leadership fuels IoT trial failures - Many companies experience failure at the proof-of-concept stage of internet-of-things (IoT) projects, a study of 3,000 decision-makers has found. The results are:
    • Only 7% had experienced no proof-of-concept project failures
    • 32% had a low rate of failure in trials and proof-of-concept projects
    • 31% had experienced a moderate level of failure
    • 30% estimated that between half and all of their proof-of-concept projects had failed

To learn more about our sponsors visit: The Security Weekly Sponsor's Page

 

Leadership Articles

 

Hosts

[caption id="attachment_210" align="alignleft" width="120"]Jason Albuquerque Jason Albuquerque - CISO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Matt Alderman Matt Alderman - CEO[/caption]

Guests

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for our upcoming webcasts with (ISC)2 by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
  • Some of you told us that you are overwhelmed by the amount of content we distribute! In an attempt to make it a little easier for you to find what you're interested in, we've created our new listener interest list! Sign up for list and select your interests by visiting: securityweekly.com/subscribe and clicking the button to join the list! You can also now submit your suggestions for guests in our recently released guest suggestion form! Go to securityweekly.com/guests and enter your suggestions!
  • Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man's talk as well!

[audio src="http://traffic.libsyn.com/sw-all/BSW_139_-_Leadership_Articles-0_converted.mp3"]

prestitial ad