SlideShare a Scribd company logo
1 of 23
Michael Santarcangelo
Security Catalyst
@catalyst #SecurityLeader
© 2015 Security Catalyst
Powerful Communication
for Security Leaders
An Overview
2 © 2015 Security Catalyst
A leadership conversation
3
“I need to learn how to
communicate with executives
and gain their support.”
© 2015 Security Catalyst
I believe that until you
recognize your own value,
you won’t be able to
realize value in others.
4 © 2015 Security Catalyst
When you see your own value
others will see it too.
5 © 2015 Security Catalyst
Exceptional Leadership Framework™
5 Foundational
Elements
5 Essential
Habits
9 Competencies
6 © 2015 Security Catalyst
Exceptional Leadership is based on a framework of
foundational elements, essential habits, and competencies.
7
Value
Overcome Friction
Measurement
Communication
Transformation
© 2015 Security Catalyst
The building blocks to develop competencies and
establish good habits in the context of your environment
Foundational Elements
8 © 2015 Security Catalyst
The single biggest problem in
communication is the illusion
that it has taken place.
~ George Bernard Shaw
Communication
9 © 2015 Security Catalyst
Literal definition of communication
Implied expectation of communication
Common experience of communication
Confusion of Communication
10 © 2015 Security Catalyst
Communication is a ‘soft skill’
Impossible to measure communication
Cannot learn effective communication
Communication Myths
“I communicate all the time – I’m really good.”
11 © 2015 Security Catalyst
Anyone can learn
to communicate effectively.
But it takes work.
12 © 2015 Security Catalyst
It takes a framework
13 © 2015 Security Catalyst
How effective is
your communication?
14 © 2015 Security Catalyst
What is effective
communication?
15 © 2015 Security Catalyst
The progression of
communication
16 © 2015 Security Catalyst
responsibility
feedback
intention
Common
Communication
Effective
Communication
Effectively
Communicate
Value
3 Steps
3 Criteria
Scale of Competence
Developed to understand
and assess communication
Progression of Communication
17 © 2015 Security Catalyst
Hallmarks of effective communication
Craft the right message
Deliver it the right way
Negotiate mutual understanding
18 © 2015 Security Catalyst
Translate complexity
19 © 2015 Security Catalyst
Structure
Substance
Style
Reconsider Communication
20 © 2015 Security Catalyst
Communicate what Counts
21 © 2015 Security Catalyst
Communicate What Counts
Create Connect Design Rehearse Deliver
Where are you on your
security leadership — and
communication — journey?
22 © 2015 Security Catalyst
23 © 2015 Security Catalyst
What is your
next best step?

More Related Content

Similar to Powerful Communication for Exceptional Security Leaders

Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership successBuild the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership successSecurity Catalyst
 
The value imperative of exceptional leadership
The value imperative of exceptional leadershipThe value imperative of exceptional leadership
The value imperative of exceptional leadershipSecurity Catalyst
 
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Security Catalyst
 
Security Leadership Landscape
Security Leadership Landscape Security Leadership Landscape
Security Leadership Landscape Security Catalyst
 
Cracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderCracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderSecurity Catalyst
 
Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1karikalan murugasen
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...IT-oLogy
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentationBenjamin Kpodo
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Chapter 1Establishing Credibility©McGraw-Hill Educatio
Chapter 1Establishing Credibility©McGraw-Hill EducatioChapter 1Establishing Credibility©McGraw-Hill Educatio
Chapter 1Establishing Credibility©McGraw-Hill EducatioEstelaJeffery653
 
ITD Unplugged: Practical Tips on Securing the Right Funding for You
ITD Unplugged: Practical Tips on Securing the Right Funding for YouITD Unplugged: Practical Tips on Securing the Right Funding for You
ITD Unplugged: Practical Tips on Securing the Right Funding for YouThe Digital Insurer
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 

Similar to Powerful Communication for Exceptional Security Leaders (20)

Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership successBuild the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership success
 
The value imperative of exceptional leadership
The value imperative of exceptional leadershipThe value imperative of exceptional leadership
The value imperative of exceptional leadership
 
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
 
Security Leadership Landscape
Security Leadership Landscape Security Leadership Landscape
Security Leadership Landscape
 
Cracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leaderCracking the Code - from security expert to exceptional leader
Cracking the Code - from security expert to exceptional leader
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1Effective And Efficient Quality Managements-1
Effective And Efficient Quality Managements-1
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentation
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Chapter 1Establishing Credibility©McGraw-Hill Educatio
Chapter 1Establishing Credibility©McGraw-Hill EducatioChapter 1Establishing Credibility©McGraw-Hill Educatio
Chapter 1Establishing Credibility©McGraw-Hill Educatio
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
ITD Unplugged: Practical Tips on Securing the Right Funding for You
ITD Unplugged: Practical Tips on Securing the Right Funding for YouITD Unplugged: Practical Tips on Securing the Right Funding for You
ITD Unplugged: Practical Tips on Securing the Right Funding for You
 
Enterprise Project Management SLIDESHARE
Enterprise Project Management SLIDESHAREEnterprise Project Management SLIDESHARE
Enterprise Project Management SLIDESHARE
 
EPM-Enterprise Project Management
EPM-Enterprise Project Management EPM-Enterprise Project Management
EPM-Enterprise Project Management
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 

Recently uploaded

internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamraAllTops
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siligurimeghakumariji156
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentNimot Muili
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxAaron Stannard
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxalinstan901
 
Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Ram V Chary
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownSandaliGurusinghe2
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalWilliam (Bill) H. Bender, FCSI
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdfAlejandromexEspino
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptxAss.Prof. Dr. Mogeeb Mosleh
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNitya salvi
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxssuserf63bd7
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field ArtilleryKennethSwanberg
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdfArtiSrivastava23
 

Recently uploaded (16)

internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 

Powerful Communication for Exceptional Security Leaders

  • 1. Michael Santarcangelo Security Catalyst @catalyst #SecurityLeader © 2015 Security Catalyst Powerful Communication for Security Leaders An Overview
  • 2. 2 © 2015 Security Catalyst A leadership conversation
  • 3. 3 “I need to learn how to communicate with executives and gain their support.” © 2015 Security Catalyst
  • 4. I believe that until you recognize your own value, you won’t be able to realize value in others. 4 © 2015 Security Catalyst
  • 5. When you see your own value others will see it too. 5 © 2015 Security Catalyst
  • 6. Exceptional Leadership Framework™ 5 Foundational Elements 5 Essential Habits 9 Competencies 6 © 2015 Security Catalyst Exceptional Leadership is based on a framework of foundational elements, essential habits, and competencies.
  • 7. 7 Value Overcome Friction Measurement Communication Transformation © 2015 Security Catalyst The building blocks to develop competencies and establish good habits in the context of your environment Foundational Elements
  • 8. 8 © 2015 Security Catalyst The single biggest problem in communication is the illusion that it has taken place. ~ George Bernard Shaw Communication
  • 9. 9 © 2015 Security Catalyst Literal definition of communication Implied expectation of communication Common experience of communication Confusion of Communication
  • 10. 10 © 2015 Security Catalyst Communication is a ‘soft skill’ Impossible to measure communication Cannot learn effective communication Communication Myths “I communicate all the time – I’m really good.”
  • 11. 11 © 2015 Security Catalyst Anyone can learn to communicate effectively. But it takes work.
  • 12. 12 © 2015 Security Catalyst It takes a framework
  • 13. 13 © 2015 Security Catalyst How effective is your communication?
  • 14. 14 © 2015 Security Catalyst What is effective communication?
  • 15. 15 © 2015 Security Catalyst The progression of communication
  • 16. 16 © 2015 Security Catalyst responsibility feedback intention Common Communication Effective Communication Effectively Communicate Value 3 Steps 3 Criteria Scale of Competence Developed to understand and assess communication Progression of Communication
  • 17. 17 © 2015 Security Catalyst Hallmarks of effective communication Craft the right message Deliver it the right way Negotiate mutual understanding
  • 18. 18 © 2015 Security Catalyst Translate complexity
  • 19. 19 © 2015 Security Catalyst Structure Substance Style Reconsider Communication
  • 20. 20 © 2015 Security Catalyst Communicate what Counts
  • 21. 21 © 2015 Security Catalyst Communicate What Counts Create Connect Design Rehearse Deliver
  • 22. Where are you on your security leadership — and communication — journey? 22 © 2015 Security Catalyst
  • 23. 23 © 2015 Security Catalyst What is your next best step?