SlideShare a Scribd company logo
1 of 28
Download to read offline
Cracking the Code:
How security leaders earn respect
Michael Santarcangelo
Security Catalyst
@catalyst #ITLeader
© 2015 Security Catalyst
Evanta CISO Summit
Minneapolis, MN
June 2, 2015
HANDOUT
VERSION
A leadership conversation
2 © 2015 Security Catalyst
This is a slightly modified version of the slides used during the
presentation. Comments and content added where appropriate. 



Carry on the conversation with me on Twitter (@catalyst),
LinkedIn (https://www.linkedin.com/in/securitycatalyst), or shoot
me an email (michael@securitycatalyst.com)
I believe that until you
recognize your own value
as a leader,
you won’t be able to
realize value in others.
3 © 2015 Security Catalyst
When you see
your own value as a leader
others will see it too.
4 © 2015 Security Catalyst
5
Situations
& Conditions
what we hear,
in your words
© 2015 Security Catalyst
These are some of the challenges I help leaders assess,
understand, and solve. See how many are familiar to you.
6
“I don’t have the time, energy, or
resources to get it all done —
or know where to start.”
© 2015 Security Catalyst
7
“I should measure my programs,
but it’s hard, I don’t know how,
and have no time to figure it out.”
© 2015 Security Catalyst
8
“How do I get people to understand
and change their behaviors?”
© 2015 Security Catalyst
The challenge is not
technology.
The opportunity is
IT leadership.
9 © 2015 Security Catalyst
How much pressure do you feel
to perform as a leader?
10 © 2015 Security Catalyst
This is where we explored the “layers of leadership” —
individual, organizational, and industry. While we face
challenges, each presents powerful opportunities.
Are you valued as much as an
IT leader as you are an IT expert?
11 © 2015 Security Catalyst
Have you ceded your leadership?
12 © 2015 Security Catalyst
What does it mean
to be a security leader?
13 © 2015 Security Catalyst
Remarkable IT Leadership Framework
5 Foundational
Elements
5 Essential
Habits
9 Competencies
14 © 2015 Security Catalyst
Remarkable IT Leadership is based on a framework of
foundational elements, essential habits, and competencies.
This framework is practitioner focused. Built on experience, this is the code that
represents what it takes to develop into a remarkable leader that earns respect.
Foundational
Elements
Essential
Habits
Competencies
15 © 2015 Security Catalyst
I added this slide to provide more detail; I’m working on a
resource to introduce the entire framework. Contact me if
you’d like a copy to review and offer constructive feedback.
Essential habits represent the discipline that leaders incorporate into their
thinking and actions. The right habits deepen understanding of the
foundational elements and guide proper improvement of the competencies.
Foundational elements are the building blocks to develop competencies
and establish good habits. They also provide key insights into the
environment and current situation, guiding the right actions.
Developed from the foundational elements, competencies are the specific
capabilities necessary for successful and remarkable leadership. The key to a
competency is the ability to (teach) learn, demonstrate, and measure it.
Remarkable IT
Leadership Framework
16
Foundational Elements
Value
Overcome Friction
Measurement
Communication
Transformation
© 2015 Security Catalyst
We didn’t have time to cover these during the keynote. The five foundational elements are the
cornerstones of remarkable leadership. These impact you, your team, and define the environment. The
deeper your understanding and ability with each, the more remarkable your potential.
17
9 Competencies
Prioritizes
Measures
Communicates
Executes
Creates Value
© 2015 Security Catalyst
Holds Accountable
Influences
Accelerates Change
Drives Improvement
We didn’t have time to cover these during the keynote. The competencies are built on the
foundational elements and are used by leaders and their teams to drive remarkable results.
18
Essential Habits
Routinely evaluates where to invest time, energy, and resources into the efforts and
assets that create the most value for themselves and the people around them
Actively seeks out, understands, and reduces friction to improve performance
and conserve energy; recaptured energy is reinvested to maximize value creation
Gathers and evaluates measurements and evidence-based insights in
context to demonstrate value, make decisions and drive improvement
Communicates with intention, gathers feedback, and takes responsibility to navigate to
understanding; Invests time to match structure, substance, and style to the audience
Assesses and influences the appetite, capacity, and accelerates change by
making the necessary adjustments to process and structure
© 2015 Security Catalyst
We didn’t have time to cover these during the keynote. The essential habits
drive the mindset for growth, work to deepen our understanding of the
foundational elements and guide improvement of the competencies.
Are you remarkable?
19 © 2015 Security Catalyst
A remarkable IT leader possesses a grasp of the 5 foundational elements,
exhibit proficiency across the 9 competencies, and demonstrates
habits that deepen their understanding of the entire framework.
Remarkable IT Leadership is an experience.
Remarkable IT leaders get results
and consistently create value.
Remarkable IT leaders use this framework to develop themselves, their
teams, and craft experiences that benefit those around them.
Remarkable security leaders
are respected
20 © 2015 Security Catalyst
Where are you on your
security leadership journey?
21 © 2015 Security Catalyst
22 © 2015 Security Catalyst
What are the best actions
you can take to
boost your performance
and elevate your team?
23 © 2015 Security Catalyst
Are you ready to find out?
Start with a complimentary assessment. This brief
exercise helps you see your value and gain insight
on your current situation and conditions.
Then we schedule a review (by phone or
video conference) to explore your findings
and recommendations.
Assess where you are
in your IT Leadership journey
24 © 2015 Security Catalyst
This is the offer I made during the keynote. No charge, no obligation. If you are have an
appetite for personal improvement, want to be remarkable (and respected), and realize that
you and your team are struggling with parts of the framework, we should talk.
25 © 2015 Security Catalyst
Stop reacting.
Start creating value.
26
Additional Resources
© 2015 Security Catalyst
This is a partial listing of resources developed or in
development to support and enhance your journey.
Translating Security Value [link]- a column
on leadership at CSO Magazine Online
Writing & Visual Resources
Leading Security Change - a new program
at CSO Magazine Online where security
leaders share solutions to current challenges
Security Catalyst [link]- your home base for
original articles, links to resources, newsletter,
and new opportunities launching in 2015 Webinar Series
Cracking the Code [link]- a free, multipart
series that dives deeper into the Remarkable
IT Leadership Framework™ to offer actionable
solutions to technical teams looking to
demonstrate results and improve security
27
Audio Resources
© 2015 Security Catalyst
Remarkable IT Leadership- a personal look at
remarkable leadership with interviews, analysis, and
insights that amplify the good™
Catch me on these podcastsSpeaking About Security - joined by two
remarkable colleagues, we evaluate and offer
solutions on how to get your point across every time
Forest and Trees Security - taking on top issues
in security with a focus on understanding problems
and opportunities to advance solutions
Get ready for 3 leadership focused podcasts
After pausing one of the first security podcasts to launch, I’m ready to
climb back behind the mic and offer insights and analysis you need;
look for these shows starting over the summer at securitycatalyst.com
Down the Security Rabbithole [link] - the
podcast for enterprise security leaders and
business-minded professionals
Security Weekly [link]- a longstanding
show addressing the technology of security,
along with my focus on developing
remarkable leaders and advancing our
industry
This is a partial listing of resources developed or in
development to support and enhance your journey.
Let’s Connect
securitycatalyst.com
@catalyst
linkedin.com/in/securitycatalyst
© 2015 Security Catalyst28
#ITleader
Michael Santarcangelo
michael@securitycatalyst.com
The catalyst to develop remarkable IT Leaders
and high performance teams

More Related Content

What's hot

Architecting the IT foundation
Architecting the IT foundationArchitecting the IT foundation
Architecting the IT foundationPravin Nadkarni
 
XYZ of Strategy Execution
XYZ of Strategy ExecutionXYZ of Strategy Execution
XYZ of Strategy ExecutionAnthony Sanson
 
Crushed by technical debt
Crushed by technical debtCrushed by technical debt
Crushed by technical debtScott W. Ambler
 
Buyers_Guide_eBook
Buyers_Guide_eBookBuyers_Guide_eBook
Buyers_Guide_eBookAbbey Peckis
 
An Organizational Mind Map
An Organizational Mind MapAn Organizational Mind Map
An Organizational Mind MapAnthony Sanson
 
Enterprise Architecture in the Business Technology Age
Enterprise Architecture in the Business Technology AgeEnterprise Architecture in the Business Technology Age
Enterprise Architecture in the Business Technology AgeJean-François Caenen
 
Detecon Cyber Security Radar
Detecon Cyber Security RadarDetecon Cyber Security Radar
Detecon Cyber Security RadarDaniel Steinfeld
 
Getting the big picture with OBASHI™
Getting the big picture with OBASHI™ Getting the big picture with OBASHI™
Getting the big picture with OBASHI™ Claire Agutter
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management toolssarahbrown1
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesStephen Lahanas
 
Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...
Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...
Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...Richard Knaster
 
Fool with a tool presentation
Fool with a tool presentationFool with a tool presentation
Fool with a tool presentationTim Guay
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...Aggregage
 
Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013Google
 
Introducing the Professional Service Management Framework from itSMF UK
Introducing the Professional Service Management Framework from itSMF UKIntroducing the Professional Service Management Framework from itSMF UK
Introducing the Professional Service Management Framework from itSMF UKClaire Agutter
 

What's hot (18)

Architecting the IT foundation
Architecting the IT foundationArchitecting the IT foundation
Architecting the IT foundation
 
Integrative Thinking
Integrative ThinkingIntegrative Thinking
Integrative Thinking
 
The Agile Project Manager - fact or fiction ?
The Agile Project Manager - fact or fiction ?The Agile Project Manager - fact or fiction ?
The Agile Project Manager - fact or fiction ?
 
XYZ of Strategy Execution
XYZ of Strategy ExecutionXYZ of Strategy Execution
XYZ of Strategy Execution
 
Crushed by technical debt
Crushed by technical debtCrushed by technical debt
Crushed by technical debt
 
Buyers_Guide_eBook
Buyers_Guide_eBookBuyers_Guide_eBook
Buyers_Guide_eBook
 
An Organizational Mind Map
An Organizational Mind MapAn Organizational Mind Map
An Organizational Mind Map
 
Enterprise Architecture in the Business Technology Age
Enterprise Architecture in the Business Technology AgeEnterprise Architecture in the Business Technology Age
Enterprise Architecture in the Business Technology Age
 
Detecon Cyber Security Radar
Detecon Cyber Security RadarDetecon Cyber Security Radar
Detecon Cyber Security Radar
 
Getting the big picture with OBASHI™
Getting the big picture with OBASHI™ Getting the big picture with OBASHI™
Getting the big picture with OBASHI™
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management tools
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate Capabilties
 
Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...
Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...
Agile India 2016 Keynote - The Lean-Agile Enterprise Awakens- Scalable and Mo...
 
Fool with a tool presentation
Fool with a tool presentationFool with a tool presentation
Fool with a tool presentation
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...
 
Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013
 
Introducing the Professional Service Management Framework from itSMF UK
Introducing the Professional Service Management Framework from itSMF UKIntroducing the Professional Service Management Framework from itSMF UK
Introducing the Professional Service Management Framework from itSMF UK
 

Viewers also liked

Coursera FA8MRVLGTLP6
Coursera FA8MRVLGTLP6Coursera FA8MRVLGTLP6
Coursera FA8MRVLGTLP6Raul Aguirre
 
97167793 arquitectura-de-software
97167793 arquitectura-de-software97167793 arquitectura-de-software
97167793 arquitectura-de-softwareWendy Francisco
 
Propiedades de carpetas general
Propiedades de carpetas generalPropiedades de carpetas general
Propiedades de carpetas generalMagaly Valles XD
 
SAP | SAPServices | Principle Infotech
SAP | SAPServices | Principle InfotechSAP | SAPServices | Principle Infotech
SAP | SAPServices | Principle InfotechJames L. Lee
 
Θέματα για μελέτη στην Κοινωνιολογία
Θέματα για μελέτη στην ΚοινωνιολογίαΘέματα για μελέτη στην Κοινωνιολογία
Θέματα για μελέτη στην Κοινωνιολογίαlykkarea
 
One Container, Two Container, Three Containers, Four
One Container, Two Container, Three Containers, FourOne Container, Two Container, Three Containers, Four
One Container, Two Container, Three Containers, FourAshley Roach
 
Breakdown & Review: Taco Bell Mobile App
Breakdown & Review: Taco Bell Mobile AppBreakdown & Review: Taco Bell Mobile App
Breakdown & Review: Taco Bell Mobile AppRMagazine
 
Akili XStream Upstream Oil & Gas Solution Overview
Akili XStream Upstream Oil & Gas Solution OverviewAkili XStream Upstream Oil & Gas Solution Overview
Akili XStream Upstream Oil & Gas Solution Overviewrnaramore
 
PCSK9 Inhibitors PP
PCSK9 Inhibitors PPPCSK9 Inhibitors PP
PCSK9 Inhibitors PPVince Netto
 

Viewers also liked (17)

CORAL Fact Sheet
CORAL Fact SheetCORAL Fact Sheet
CORAL Fact Sheet
 
5
55
5
 
Coursera FA8MRVLGTLP6
Coursera FA8MRVLGTLP6Coursera FA8MRVLGTLP6
Coursera FA8MRVLGTLP6
 
Http _mail.iaes.edu
Http  _mail.iaes.eduHttp  _mail.iaes.edu
Http _mail.iaes.edu
 
97167793 arquitectura-de-software
97167793 arquitectura-de-software97167793 arquitectura-de-software
97167793 arquitectura-de-software
 
Propiedades de carpetas general
Propiedades de carpetas generalPropiedades de carpetas general
Propiedades de carpetas general
 
SAP | SAPServices | Principle Infotech
SAP | SAPServices | Principle InfotechSAP | SAPServices | Principle Infotech
SAP | SAPServices | Principle Infotech
 
Θέματα για μελέτη στην Κοινωνιολογία
Θέματα για μελέτη στην ΚοινωνιολογίαΘέματα για μελέτη στην Κοινωνιολογία
Θέματα για μελέτη στην Κοινωνιολογία
 
Archivos ocultos
Archivos ocultosArchivos ocultos
Archivos ocultos
 
Makalah Lidah buaya
Makalah Lidah buaya Makalah Lidah buaya
Makalah Lidah buaya
 
Google advance search for Advanced Searcher & SEO
Google advance search for Advanced Searcher & SEOGoogle advance search for Advanced Searcher & SEO
Google advance search for Advanced Searcher & SEO
 
Assignment
AssignmentAssignment
Assignment
 
One Container, Two Container, Three Containers, Four
One Container, Two Container, Three Containers, FourOne Container, Two Container, Three Containers, Four
One Container, Two Container, Three Containers, Four
 
Breakdown & Review: Taco Bell Mobile App
Breakdown & Review: Taco Bell Mobile AppBreakdown & Review: Taco Bell Mobile App
Breakdown & Review: Taco Bell Mobile App
 
Akili XStream Upstream Oil & Gas Solution Overview
Akili XStream Upstream Oil & Gas Solution OverviewAkili XStream Upstream Oil & Gas Solution Overview
Akili XStream Upstream Oil & Gas Solution Overview
 
Infecciones de la piel en el adulto mayor
Infecciones de la piel en el adulto mayorInfecciones de la piel en el adulto mayor
Infecciones de la piel en el adulto mayor
 
PCSK9 Inhibitors PP
PCSK9 Inhibitors PPPCSK9 Inhibitors PP
PCSK9 Inhibitors PP
 

Similar to Cracking the Code: How security leaders earn respect

Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership successBuild the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership successSecurity Catalyst
 
AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...
AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...
AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...VersionOne
 
The value imperative of exceptional leadership
The value imperative of exceptional leadershipThe value imperative of exceptional leadership
The value imperative of exceptional leadershipSecurity Catalyst
 
It economist
It economistIt economist
It economistronpoul
 
Proactive Governance & Adoption In Microsoft 365
Proactive Governance & Adoption In Microsoft 365Proactive Governance & Adoption In Microsoft 365
Proactive Governance & Adoption In Microsoft 365Richard Harbridge
 
Security Leadership Landscape
Security Leadership Landscape Security Leadership Landscape
Security Leadership Landscape Security Catalyst
 
Organizing IT beyond 2014
Organizing IT beyond 2014Organizing IT beyond 2014
Organizing IT beyond 2014Mendel Koerts
 
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011Pink Elephant
 
The 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 finalThe 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 finalTroy DuMoulin
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive ActionMighty Guides, Inc.
 
Achieving Escape Velocity in Your Digital Transformation Through Product Thin...
Achieving Escape Velocity in Your Digital Transformation Through Product Thin...Achieving Escape Velocity in Your Digital Transformation Through Product Thin...
Achieving Escape Velocity in Your Digital Transformation Through Product Thin...VMware Tanzu
 
Proactive Governance & Adoption For Microsoft 365: Canadian Cloud Summit
Proactive Governance & Adoption For Microsoft 365: Canadian Cloud SummitProactive Governance & Adoption For Microsoft 365: Canadian Cloud Summit
Proactive Governance & Adoption For Microsoft 365: Canadian Cloud SummitRichard Harbridge
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Stephen Lahanas
 
CTO Universe Leadership Series: More Effective Agile Leadership
CTO Universe Leadership Series: More Effective Agile LeadershipCTO Universe Leadership Series: More Effective Agile Leadership
CTO Universe Leadership Series: More Effective Agile LeadershipAggregage
 
Powerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security LeadersPowerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security LeadersSecurity Catalyst
 
Steve Bell - Lean IT @ 7. Kongres itSMF Polska 2014
Steve Bell  - Lean IT @ 7. Kongres itSMF Polska 2014Steve Bell  - Lean IT @ 7. Kongres itSMF Polska 2014
Steve Bell - Lean IT @ 7. Kongres itSMF Polska 2014Fundacja Governica
 
Proactive Governance & Adoption In Microsoft 365 - M365Ottawa
Proactive Governance & Adoption In Microsoft 365 - M365OttawaProactive Governance & Adoption In Microsoft 365 - M365Ottawa
Proactive Governance & Adoption In Microsoft 365 - M365OttawaRichard Harbridge
 
Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...
Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...
Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...Wolfgang Hilpert
 

Similar to Cracking the Code: How security leaders earn respect (20)

Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership successBuild the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership success
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...
AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...
AgileLIVE: Scaling Agile Faster, Easier, Smarter with SAFe and VersionOne - P...
 
The value imperative of exceptional leadership
The value imperative of exceptional leadershipThe value imperative of exceptional leadership
The value imperative of exceptional leadership
 
It economist
It economistIt economist
It economist
 
Proactive Governance & Adoption In Microsoft 365
Proactive Governance & Adoption In Microsoft 365Proactive Governance & Adoption In Microsoft 365
Proactive Governance & Adoption In Microsoft 365
 
Security Leadership Landscape
Security Leadership Landscape Security Leadership Landscape
Security Leadership Landscape
 
Organizing IT beyond 2014
Organizing IT beyond 2014Organizing IT beyond 2014
Organizing IT beyond 2014
 
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
 
The 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 finalThe 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 final
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
Achieving Escape Velocity in Your Digital Transformation Through Product Thin...
Achieving Escape Velocity in Your Digital Transformation Through Product Thin...Achieving Escape Velocity in Your Digital Transformation Through Product Thin...
Achieving Escape Velocity in Your Digital Transformation Through Product Thin...
 
Proactive Governance & Adoption For Microsoft 365: Canadian Cloud Summit
Proactive Governance & Adoption For Microsoft 365: Canadian Cloud SummitProactive Governance & Adoption For Microsoft 365: Canadian Cloud Summit
Proactive Governance & Adoption For Microsoft 365: Canadian Cloud Summit
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011
 
CTO Universe Leadership Series: More Effective Agile Leadership
CTO Universe Leadership Series: More Effective Agile LeadershipCTO Universe Leadership Series: More Effective Agile Leadership
CTO Universe Leadership Series: More Effective Agile Leadership
 
Powerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security LeadersPowerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security Leaders
 
Steve Bell - Lean IT @ 7. Kongres itSMF Polska 2014
Steve Bell  - Lean IT @ 7. Kongres itSMF Polska 2014Steve Bell  - Lean IT @ 7. Kongres itSMF Polska 2014
Steve Bell - Lean IT @ 7. Kongres itSMF Polska 2014
 
Proactive Governance & Adoption In Microsoft 365 - M365Ottawa
Proactive Governance & Adoption In Microsoft 365 - M365OttawaProactive Governance & Adoption In Microsoft 365 - M365Ottawa
Proactive Governance & Adoption In Microsoft 365 - M365Ottawa
 
Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...
Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...
Scrum Deutschland 2018 - Wolfgang Hilpert - Are you agile enough to succeed w...
 

Recently uploaded

GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 

Recently uploaded (20)

Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Cracking the Code: How security leaders earn respect

  • 1. Cracking the Code: How security leaders earn respect Michael Santarcangelo Security Catalyst @catalyst #ITLeader © 2015 Security Catalyst Evanta CISO Summit Minneapolis, MN June 2, 2015 HANDOUT VERSION
  • 2. A leadership conversation 2 © 2015 Security Catalyst This is a slightly modified version of the slides used during the presentation. Comments and content added where appropriate. 
 
 Carry on the conversation with me on Twitter (@catalyst), LinkedIn (https://www.linkedin.com/in/securitycatalyst), or shoot me an email (michael@securitycatalyst.com)
  • 3. I believe that until you recognize your own value as a leader, you won’t be able to realize value in others. 3 © 2015 Security Catalyst
  • 4. When you see your own value as a leader others will see it too. 4 © 2015 Security Catalyst
  • 5. 5 Situations & Conditions what we hear, in your words © 2015 Security Catalyst These are some of the challenges I help leaders assess, understand, and solve. See how many are familiar to you.
  • 6. 6 “I don’t have the time, energy, or resources to get it all done — or know where to start.” © 2015 Security Catalyst
  • 7. 7 “I should measure my programs, but it’s hard, I don’t know how, and have no time to figure it out.” © 2015 Security Catalyst
  • 8. 8 “How do I get people to understand and change their behaviors?” © 2015 Security Catalyst
  • 9. The challenge is not technology. The opportunity is IT leadership. 9 © 2015 Security Catalyst
  • 10. How much pressure do you feel to perform as a leader? 10 © 2015 Security Catalyst This is where we explored the “layers of leadership” — individual, organizational, and industry. While we face challenges, each presents powerful opportunities.
  • 11. Are you valued as much as an IT leader as you are an IT expert? 11 © 2015 Security Catalyst
  • 12. Have you ceded your leadership? 12 © 2015 Security Catalyst
  • 13. What does it mean to be a security leader? 13 © 2015 Security Catalyst
  • 14. Remarkable IT Leadership Framework 5 Foundational Elements 5 Essential Habits 9 Competencies 14 © 2015 Security Catalyst Remarkable IT Leadership is based on a framework of foundational elements, essential habits, and competencies. This framework is practitioner focused. Built on experience, this is the code that represents what it takes to develop into a remarkable leader that earns respect.
  • 15. Foundational Elements Essential Habits Competencies 15 © 2015 Security Catalyst I added this slide to provide more detail; I’m working on a resource to introduce the entire framework. Contact me if you’d like a copy to review and offer constructive feedback. Essential habits represent the discipline that leaders incorporate into their thinking and actions. The right habits deepen understanding of the foundational elements and guide proper improvement of the competencies. Foundational elements are the building blocks to develop competencies and establish good habits. They also provide key insights into the environment and current situation, guiding the right actions. Developed from the foundational elements, competencies are the specific capabilities necessary for successful and remarkable leadership. The key to a competency is the ability to (teach) learn, demonstrate, and measure it. Remarkable IT Leadership Framework
  • 16. 16 Foundational Elements Value Overcome Friction Measurement Communication Transformation © 2015 Security Catalyst We didn’t have time to cover these during the keynote. The five foundational elements are the cornerstones of remarkable leadership. These impact you, your team, and define the environment. The deeper your understanding and ability with each, the more remarkable your potential.
  • 17. 17 9 Competencies Prioritizes Measures Communicates Executes Creates Value © 2015 Security Catalyst Holds Accountable Influences Accelerates Change Drives Improvement We didn’t have time to cover these during the keynote. The competencies are built on the foundational elements and are used by leaders and their teams to drive remarkable results.
  • 18. 18 Essential Habits Routinely evaluates where to invest time, energy, and resources into the efforts and assets that create the most value for themselves and the people around them Actively seeks out, understands, and reduces friction to improve performance and conserve energy; recaptured energy is reinvested to maximize value creation Gathers and evaluates measurements and evidence-based insights in context to demonstrate value, make decisions and drive improvement Communicates with intention, gathers feedback, and takes responsibility to navigate to understanding; Invests time to match structure, substance, and style to the audience Assesses and influences the appetite, capacity, and accelerates change by making the necessary adjustments to process and structure © 2015 Security Catalyst We didn’t have time to cover these during the keynote. The essential habits drive the mindset for growth, work to deepen our understanding of the foundational elements and guide improvement of the competencies.
  • 19. Are you remarkable? 19 © 2015 Security Catalyst A remarkable IT leader possesses a grasp of the 5 foundational elements, exhibit proficiency across the 9 competencies, and demonstrates habits that deepen their understanding of the entire framework. Remarkable IT Leadership is an experience. Remarkable IT leaders get results and consistently create value. Remarkable IT leaders use this framework to develop themselves, their teams, and craft experiences that benefit those around them.
  • 20. Remarkable security leaders are respected 20 © 2015 Security Catalyst
  • 21. Where are you on your security leadership journey? 21 © 2015 Security Catalyst
  • 22. 22 © 2015 Security Catalyst What are the best actions you can take to boost your performance and elevate your team?
  • 23. 23 © 2015 Security Catalyst Are you ready to find out?
  • 24. Start with a complimentary assessment. This brief exercise helps you see your value and gain insight on your current situation and conditions. Then we schedule a review (by phone or video conference) to explore your findings and recommendations. Assess where you are in your IT Leadership journey 24 © 2015 Security Catalyst This is the offer I made during the keynote. No charge, no obligation. If you are have an appetite for personal improvement, want to be remarkable (and respected), and realize that you and your team are struggling with parts of the framework, we should talk.
  • 25. 25 © 2015 Security Catalyst Stop reacting. Start creating value.
  • 26. 26 Additional Resources © 2015 Security Catalyst This is a partial listing of resources developed or in development to support and enhance your journey. Translating Security Value [link]- a column on leadership at CSO Magazine Online Writing & Visual Resources Leading Security Change - a new program at CSO Magazine Online where security leaders share solutions to current challenges Security Catalyst [link]- your home base for original articles, links to resources, newsletter, and new opportunities launching in 2015 Webinar Series Cracking the Code [link]- a free, multipart series that dives deeper into the Remarkable IT Leadership Framework™ to offer actionable solutions to technical teams looking to demonstrate results and improve security
  • 27. 27 Audio Resources © 2015 Security Catalyst Remarkable IT Leadership- a personal look at remarkable leadership with interviews, analysis, and insights that amplify the good™ Catch me on these podcastsSpeaking About Security - joined by two remarkable colleagues, we evaluate and offer solutions on how to get your point across every time Forest and Trees Security - taking on top issues in security with a focus on understanding problems and opportunities to advance solutions Get ready for 3 leadership focused podcasts After pausing one of the first security podcasts to launch, I’m ready to climb back behind the mic and offer insights and analysis you need; look for these shows starting over the summer at securitycatalyst.com Down the Security Rabbithole [link] - the podcast for enterprise security leaders and business-minded professionals Security Weekly [link]- a longstanding show addressing the technology of security, along with my focus on developing remarkable leaders and advancing our industry This is a partial listing of resources developed or in development to support and enhance your journey.
  • 28. Let’s Connect securitycatalyst.com @catalyst linkedin.com/in/securitycatalyst © 2015 Security Catalyst28 #ITleader Michael Santarcangelo michael@securitycatalyst.com The catalyst to develop remarkable IT Leaders and high performance teams