1 I2 Security Professionals Workshop - May, 2004 Partnering for Success in the Security Discussion at Northeastern Gaining Traction through Influence Glenn.

Slides:



Advertisements
Similar presentations
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
Advertisements

Linda Ricks Managing Director, Information Systems May 25, 2006 Project and Resource Portfolio Management.
Influence without Authority Kannan Sundaramurthy Wal-Mart Stores Inc. May 2013.
Project Management 6e..
The Collaboration Imperative – Lessons Learned & Next Steps April 29, 2011 AMICAL Conference Beirut, Lebanon Gene SpencerSabrina Pape Gene Spencer ConsultingVassar.
Copyright Donald E. Harris This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Supporting and Hosting Web- Based Learning Systems Educause 2001 Charlene Douglas – Director Kathryn Gomm - Training Manager Sharon McCarrager – Accessibility.
Worcester Polytechnic Institute 1 Providing Technology Orientation for New Faculty and Staff Copyright © 2005 Worcester Polytechnic Institute This work.
NEW REVENUES AND ACADEMIC VALUES: OLD AND NEW CHALLENGES IN HIGHER EDUCATION David Ward President American Council on Education Chancellor Emeritus, University.
10–1 Leadership & Project Managers: Managing versus Leading a Project Managing—coping with complexity –Formulate plans and objectives –Monitor results.
PowerPoint Presentation by Charlie Cook Copyright © 2006 The McGraw-Hill Companies. All rights reserved. THE MANAGERIAL PROCESS Clifford F. Gray Eric W.
Chapter 16. Power Configuration Utilize appropriate power bases Power effectiveness enhances leadership effectiveness Changing and situational Power is.
Where We Are Now. Where We Are Now Managing versus Leading a Project Managing—coping with complexity Formulate plans and objectives Monitor results.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Management and Leadership
Chatham College Community and Computers Pervasive Computing at a Liberal Arts College Charlotte E. Lott, Ph. D. Lynda Barner West, Ed. D. Copyright Charlotte.
David Sweeney, Director Brooke Woodruff, IT Manager
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
Copyright Copyright Chris Byrd and Jeff Farnham, This work is the intellectual property of the author. Permission is granted for this material to.
BUILDING A YOUTH DEVELOPMENT SYSTEM IN YOUR COMMUNITY John J. Heldrich Center for Workforce Development Rutgers, the State University of NewJersey National.
The Need to Meet Accreditation Standards: A Systems Analysis of Technology Integration in Teacher Education Lincoln University of Missouri Division of.
Developing Online Degree Programs using a Collaborative Approach with Industry Experts as SMEs Copyright: Terry Norris This work is the intellectual.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Center for Instructional Technology James Madison University Strategies for Transitioning to the Age of Digital Media Sarah E. Cheverton James Madison.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Haute Software: Juggling Open Source and Vendor Software Jeshua Pacifici, Manager, Learning Systems Kim Gausepohl, Assistant Manager, Online Course Systems.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
ASK ME The ASK ME Program Putting Support at the Center: A New Model for Help Desk Staffing Presented By: Ann Genovese and Kathy Gillette George Mason.
1/17/07 1SCC-SSM Supporting Academic Needs: A Strategic Customer Care Sustainable Support Model Educause Mid-Atlantic Regional Conference 2007 Paul Halpine.
Developing a Learning Commons at Abilene Christian University.
Dot.edu: An e-learning Infrastructure for the University of Wisconsin System and Beyond CUMREC 2002 Charlene Douglas – Director Kathryn Gomm – Training.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
THE MANAGERIAL PROCESS Clifford F. Gray Eric W. Larson PowerPoint Presentation by Charlie Cook The University of West Alabama Leadership: Being an Effective.
McGraw-Hill/IrwinCopyright © 2008 by The McGraw-Hill Companies, Inc. All Rights Reserved. Leadership: Being an Effective Project Manager Chapter 10.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
Session 1.5: Influence Without Authority Module 1: Leadership and Team Building Leadership and Management Course for ZHRC Coordinators, HTI Principals,
Leadership: Being an effective Project Manager
1 ISE Ch. 10 Leadership … starting the discussion Give an example of good management from your own experience … Give an example of good leadership.
Community Board Orientation 6- Community Board Orientation 6-1.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
NLII05 Annual Meeting Professional Development of Faculty and Instructional Technology Staff through Communities of Practice University of Memphis: Technology.
Copyright [Dr. Michael Hoadley, Chat Chatterji, and John Henderson ] [2004]. This work is the intellectual property of the authors. Permission is granted.
Influencing Others. Leading Change Agenda What does “Managing by Influence truly mean?” Tips to being an effective influencer 5 Influencing Styles 5 Steps.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
A Cat-Herding Tale Forging a Single Course Management System for a Decentralized Institution Copyright Abdul Shibli, 2004.This work is the intellectual.
A Strategy for Moving from Commercial to an Open Source Environment Jeshua Pacifici, GEDI Assistant Director and Learning Systems Consultant.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Creating an Agile and Responsive IT Organization Presented by Ohio University - Zanesville.
1 Top 10 Challenges of the Academic Technology Community John P. Campbell & Dennis A. Trinkle EDUCAUSE Live! Monday, May 21, :00-2:00 PM Copyright.
Legal Issues in the “E-Learning Business” Jonathan Alger University of Michigan October 29, 2001 Copyright Jonathan Alger This work is the intellectual.
Paved Path to a Learning Commons Elaine Allard, Coordinator of Library Technology & Access Services & Dwight Fischer, CIO Student-centered integration.
Advice for IT Leaders By Don Harris Vice Provost and CIO Emory University.
Step up to Action. Levels of Partnership Level 4 - Assimilation Level 3 - Adapting Level 2 - Joint Projects Level - 1 Networking.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Top 10 Challenges of the Academic Technology Community Veronica Diaz, John Campbell, Dennis Trinkle Wednesday, October 24, :50 p.m. - 4:40 p.m.
Copyright Christine E. Haile & Justin D. Sipher This work is the intellectual property of the authors. Permission is granted for this material.
THE MANAGERIAL PROCESS Clifford F. Gray Eric W. Larson PowerPoint Presentation by Charlie Cook The University of West Alabama Leadership: Being an Effective.
Plan It, But Will They Come?
Julian Hooker Assistant Managing Director Educause Southwest
Leadership: Being an Effective Project Manager
Blaine A. Brownell, President,
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
Leadership: Being an Effective Project Manager
Project Management 6e..
Project Management 6e..
Presentation transcript:

1 I2 Security Professionals Workshop - May, 2004 Partnering for Success in the Security Discussion at Northeastern Gaining Traction through Influence Glenn C. Hill, CISSP Manager of IT Security, Northeastern University Copyright Glenn C. Hill, 2004 This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

2 Imperatives around Information Security  Customer, community, institutional and regulatory expectations exist.

3 Imperatives around Information Security  Customer, community, institutional and regulatory expectations exist.  Security does not come naturally to everyone.

4 Imperatives around Information Security  Customer, community, institutional and regulatory expectations exist.  Security does not come naturally to everyone.  Not everyone understands the relevance of security to their work.

5 Imperatives around Information Security  Customer, community, institutional and regulatory expectations exist.  Security does not come naturally to everyone.  Not everyone understands the relevance of security to their work.  Educators often have other things to think about.

6 Yet…  Security is a shared responsibility.

7 Yet…  Security is a shared responsibility.  Security risks are man-made problems that require human and technical forces to address.

8 Yet…  Security is a shared responsibility.  Security risks are man-made problems that require human and technical forces to address.  Single-sided efforts are often less successful and more costly over the long run.

9 Challenges…  Create mutual understanding: “Security is more a journey than a destination.”

10 Challenges…  Create mutual understanding: “Security is more a journey than a destination.”  Create shared value in the security proposition.

11 Challenges…  Create mutual understanding: “Security is more a journey than a destination.”  Create shared value in the security proposition.  Identify reasonable “waypoints” on the security journey.

12 Challenges…  Create mutual understanding: “Security is more a journey than a destination.”  Create shared value in the security proposition.  Identify reasonable “waypoints” on the security journey.  Identify and overcome natural resistance.

13 Challenges…  Create mutual understanding: “Security is more a journey than a destination.”  Create shared value in the security proposition.  Identify reasonable “waypoints” on the security journey.  Identify and overcome natural resistance.  Underwrite successful outcomes through cooperation.

14 Techniques to gain traction…  Identify essential/optimum partnerships and stakeholders. (the right people)

15 Techniques to gain traction…  Identify essential/optimum partnerships and stakeholders. (the right people)  Codify business problems (relevant risk and consequence list)

16 Techniques to gain traction…  Identify essential/optimum partnerships and stakeholders. (the right people)  Codify business problems (relevant risk and consequence list)  Diagnose the environments.

17 Techniques to gain traction…  Identify essential/optimum partnerships and stakeholders. (the right people)  Codify business problems (relevant risk and consequence list)  Diagnose the environments.  Anticipate resistance, but avoid SFP.

18 Techniques to gain traction…  Identify essential/optimum partnerships and stakeholders. (the right people)  Codify business problems (relevant risk and consequence list)  Diagnose the environments.  Anticipate resistance, but avoid SFP.  Expect the academic argument.

19 Techniques to gain traction…  Identify essential/optimum partnerships and stakeholders. (the right people)  Codify business problems (relevant risk and consequence list)  Diagnose the environments.  Anticipate resistance, but avoid SFP.  Expect the academic argument.  Illustrate relevance and benefits of security opportunities

20 Techniques to gain traction…  Create safe and respectful discussion environments.

21 Techniques to gain traction…  Create safe and respectful discussion environments.  Exchange trading currencies.

22 Techniques to gain traction…  Create safe and respectful discussion environments.  Exchange trading currencies.  Build trust.

23 Techniques to gain traction…  Create safe and respectful discussion environments.  Exchange trading currencies.  Build trust.  Identity incremental opportunities and clear paths to change.

24 Trading Currencies…. Gaining influence through exchange

25 Trading Currencies  Inspiration  Task  Position  Relationship  Personal Adapted from Allan Cohen & David Bradford: “Influence without Authority”

26 Inspirational Currencies  Vision - Involvement in task of larger significance.  Excellence - Chance to do important things well.  Moral/ethical correctness - Doing what is “right” by higher standard.

27 Task-related currencies  New resources - $, budget increases, people, space  Challenge (Doing tasks that increase skills)  Assistance (Getting help)  Task support - Backing or assistance with implementation  Rapid response  Information (Access to knowledge)

28 Position-related currencies  Recognition (acknowledgement)  Visibility to higher-ups  Reputation (seen as competent/committed)  Importance (sense of belonging)  Contacts (opportunity to link with others)

29 Relationship currencies  Acceptance/inclusion (closeness)  Understanding - Having concerns listened to.  Personal support - Personal/emotional backing.

30 Personal currencies  Gratitude - Appreciation/expression of indebtedness.  Ownership/involvement - Ownership/influence over important tasks.  Self-concept - Affirmation of own values/identity.  Comfort (avoidance of “hassles”)

31 Handling your trading currencies…  Your optimum/necessary partners are the targets of influence.  To gain influence, one must have and spend valued trading currencies.

32 The Key Relationships: Where to spend your trading currencies  Administrative  Faculty  Business-Centered  Student-Centered  External

33 Spending on Administrative Relationships  CIO

34 Spending on Administrative Relationships  CIO  Office of University Counsel

35 Spending on Administrative Relationships  CIO  Office of University Counsel  Internal Audit

36 Spending on Administrative Relationships  CIO  Office of University Counsel  Internal Audit  Human Resources

37 Spending on Administrative Relationships  CIO  Office of University Counsel  Internal Audit  Human Resources  External Affairs/University Relations

38 Spending on Administrative Relationships  CIO  Office of University Counsel  Internal Audit  Human Resources  External Affairs/University Relations  Public Safety

39 Spending on Administrative Relationships  CIO  Office of University Counsel  Internal Audit  Human Resources  External Affairs/University Relations  Public Safety  Student Affairs

40 Spending on Administrative Relationships  CIO  Office of University Counsel  Internal Audit  Human Resources  External Affairs/University Relations  Public Safety  Student Affairs  Office of the President

41 Spending on Faculty Relationships  Provost

42 Spending on Faculty Relationships  Provost  Faculty leadership

43 Spending on Faculty Relationships  Provost  Faculty leadership  Individual faculty with specific interests

44 Spending on Business-Centered Relationships  Office of the Registrar

45 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center

46 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center  Enrollment Services

47 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center  Enrollment Services  CFO/Controller

48 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center  Enrollment Services  CFO/Controller  Risk Management function

49 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center  Enrollment Services  CFO/Controller  Risk Management function  Division of Research

50 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center  Enrollment Services  CFO/Controller  Risk Management function  Division of Research  Residential Life

51 Spending on Business-Centered Relationships  Office of the Registrar  Student Customer Service Center  Enrollment Services  CFO/Controller  Risk Management function  Division of Research  Residential Life  “ResNet”

52 Spending on Student-centered Relationships  Students (1:1)  Student representation (RSA)  Student media leadership  Student advisory groups

53 Spending on External Relationships  Peers in higher ed

54 Spending on External Relationships  Peers in higher ed  Peers in other businesses

55 Spending on External Relationships  Peers in higher ed  Peers in other businesses  Local media (*)

56 Spending on External Relationships  Peers in higher ed  Peers in other businesses  Local media (**) - Observe policy on speaking with media. - Carefully identify opportunities to get involved. - Create positive impression. - Get on the “experts” lists.

57 Lessons Learned  Security is a shared imperative with shared responsibility.

58 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.

59 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.  Risk must be relevant and illustrated.

60 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.  Risk must be relevant and illustrated.  Resistance is natural.

61 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.  Risk must be relevant and illustrated.  Resistance is natural.  To gain traction, must overcome resistance.

62 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.  Risk must be relevant and illustrated.  Resistance is natural.  To gain traction, must overcome resistance.  Diagnose the others’ world.

63 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.  Risk must be relevant and illustrated.  Resistance is natural.  To gain traction, must overcome resistance.  Diagnose the others’ world.  Know trading currencies.

64 Lessons Learned  Security is a shared imperative with shared responsibility.  Security is not universally understood.  Risk must be relevant and illustrated.  Resistance is natural.  To gain traction, must overcome resistance.  Diagnose the others’ world.  Know trading currencies.  Calculate your exchanges.

65 Lessons Learned  Know when to give binary vs. analog answers.

66 Lessons Learned  Know when to give binary vs. analog answers.  Encourage evolution…not revolution.

67 Lessons Learned  Know when to give binary vs. analog answers.  Encourage evolution…not revolution.  Not everyone is “wired” for these discussions. Choose optimum partners.

68 Lessons Learned  Know when to give binary vs. analog answers.  Encourage evolution…not revolution.  Not everyone is “wired” for these discussions. Choose optimum partners.  Technical, influential and diplomatic skills not always found together. - Seek participants with these skills. - Where they don’t exist, grow them.

69 Lessons Learned  Know when to give binary vs. analog answers.  Encourage evolution…not revolution.  Not everyone is “wired” for these discussions. Choose optimum partners.  Technical, influential and diplomatic skills not always found together. - Seek participants with these skills. - Where they don’t exist, grow them.  Be willing to accept small victories.

70 Take-away concept… Influence is key. Gain it by…  Identifying optimum partnerships.  Developing & spending trading currencies.  Illustrate an exciting and mutually- beneficial vision of the post-change environment.