SlideShare a Scribd company logo
RMI Risk Masters, Inc.

Communicating the Message that Matters…
Technical Skills, Business Experience

Allan M. Cytryn
Principal

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

1
Your Are Presenting IT Issues to Leadership…

RMI

Your role is to…
• Explain clearly (and succinctly)
• State the impact
• Present alternatives
• Lead a discussion to a positive
outcome
Leadership expects you to show…
• Knowledge of the business
• Knowledge of the subject matter
• Thoughtfulness

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

2
To Be Successful…

RMI

Speak to people in their language
• Speak to others about issues relevant to them
Present facts
• Avoid emotions
• Express opinions when asked
Avoid communication barriers, including…
• Words that are ambiguous or have multiple meanings
• Secret codes and acronyms
Anticipate and address misunderstandings
• Assume you are not understood until you have positive feedback
• Solicit feedback to assess if the listener understands
© Copyright, Risk Masters, Inc. 2013. All rights reserved.

3
You Are Meeting the Board…

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

RMI

4
To Request Funds to Enhance IT Security…
We have a big
problem!

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

RMI

They discovered
They discovered Memo to Self:
They discovered
the
the counterfeit the bogus
Check Golden
incriminating
parts!?
expenses?!
Parachute
emails?!

5
Are They Getting Your Message?

RMI

There’s a new humongous virus
…it might corrupt our SANS
…reroute our SDNS
…reconfigure our Virtual Farms
I mean, this is a big deal.
It can destroy everything!

Phew!

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

This
could be
good!

6
Your Effectiveness Scorecard…
Your role is to…
 Explain clearly (and
succinctly)
 State the impact
 Present alternatives
 Lead a discussion to a
positive outcome
Leadership expects you to
show…
 Knowledge of the
business
 Knowledge of the subject
matter
 Thoughtfulness

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

RMI

Speak to people in their language
 Speak to others about issues relevant to them

Present facts
 Avoid emotions
 Express opinions when asked
Avoid communication barriers, including…
 Words that are ambiguous or have multiple
meanings
 Secret codes and acronyms
Anticipate and address misunderstandings
 Assume you are not understood until you have
positive feedback
 Solicit feedback to assess if the listener understands

7
Ambiguous Language…

RMI

Network

Router

Crash

Server

Virtual

Boot

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

8
And Additional Ambiguity…
Term

RMI

For IT

For Others

IP

Internet Protocol

Intellectual Property

DNA

Digital Network
Architecture

Genes

SaaS

Software as a Service

An Airline

A Test

A Test

Attest

RAM

Memory

An Animal

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

9
Let’s Try This Again…
Our Auditors confirmed our
Network is secure.
But they confirmed a new threat
that might cause:
• Trade secrets to be stolen
• Production to be interrupted
• Financials to be revealed

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

RMI

Oh
#&)(&^!@!

10
RMI

Did They Get Your Message?
But I have a solution the Auditors will
approve.
• We can get it done in only 90 days
and without delaying key plans.
• We can fund it with an additional
$$$ dollars, or by deferring some
low priority projects.

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

Phew!

This
could be
good!

11
RMI

© Copyright, Risk Masters, Inc. 2013. All rights reserved.

12

More Related Content

Similar to Making the business case for investing in technology

ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
 
Working with external vendors - ASTD Consultancy SIG - sept 2010
Working with external vendors - ASTD Consultancy SIG - sept 2010Working with external vendors - ASTD Consultancy SIG - sept 2010
Working with external vendors - ASTD Consultancy SIG - sept 2010
The Blockchain Academy
 
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnDesigning Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Cammy Bean
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - Pulsedive
Grace Chi
 
PAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message DevelopmentPAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message Development
ProActiveCommunications
 
Success with softskill to deliver your hardskill feri sulianta - st inten
Success with softskill to deliver your hardskill   feri sulianta - st intenSuccess with softskill to deliver your hardskill   feri sulianta - st inten
Success with softskill to deliver your hardskill feri sulianta - st inten
ferisulianta.com
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
Mike Murray
 
Business Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docxBusiness Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docx
jasoninnes20
 
Business Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docxBusiness Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docx
felicidaddinwoodie
 
To Open Source or Not to Open Source...Where is the ROI?
To Open Source or Not to Open Source...Where is the ROI?To Open Source or Not to Open Source...Where is the ROI?
To Open Source or Not to Open Source...Where is the ROI?
Ted Haeger
 
Do you want a software job
Do you want a software jobDo you want a software job
Do you want a software job
Ian Brockbank
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
Asmajaved42
 
Communication skills 737
Communication skills 737Communication skills 737
Communication skills 737
techmodi_India
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
Vivek Ahuja
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster
1508 A/S
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
Technopundits Business Solutions
 
3 Ways to Drive Talent Goals with AI
3 Ways to Drive Talent Goals with AI3 Ways to Drive Talent Goals with AI
3 Ways to Drive Talent Goals with AI
Beamery
 
14 things you need to be a successful software developer (v3)
14 things you need to be a successful software developer (v3)14 things you need to be a successful software developer (v3)
14 things you need to be a successful software developer (v3)
Robert MacLean
 
Communication for the new design leader
Communication for the new design leader Communication for the new design leader
Communication for the new design leader
Alvaro Soto
 
Fear focused Retrospective webinar
Fear focused Retrospective webinarFear focused Retrospective webinar
Fear focused Retrospective webinar
Dana Pylayeva
 

Similar to Making the business case for investing in technology (20)

ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Working with external vendors - ASTD Consultancy SIG - sept 2010
Working with external vendors - ASTD Consultancy SIG - sept 2010Working with external vendors - ASTD Consultancy SIG - sept 2010
Working with external vendors - ASTD Consultancy SIG - sept 2010
 
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnDesigning Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - Pulsedive
 
PAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message DevelopmentPAC Presentation - Keeping Out the Wonks: Message Development
PAC Presentation - Keeping Out the Wonks: Message Development
 
Success with softskill to deliver your hardskill feri sulianta - st inten
Success with softskill to deliver your hardskill   feri sulianta - st intenSuccess with softskill to deliver your hardskill   feri sulianta - st inten
Success with softskill to deliver your hardskill feri sulianta - st inten
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Business Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docxBusiness Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docx
 
Business Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docxBusiness Communication TodayFourteenth EditionChapter 1Pro.docx
Business Communication TodayFourteenth EditionChapter 1Pro.docx
 
To Open Source or Not to Open Source...Where is the ROI?
To Open Source or Not to Open Source...Where is the ROI?To Open Source or Not to Open Source...Where is the ROI?
To Open Source or Not to Open Source...Where is the ROI?
 
Do you want a software job
Do you want a software jobDo you want a software job
Do you want a software job
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Communication skills 737
Communication skills 737Communication skills 737
Communication skills 737
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
 
3 Ways to Drive Talent Goals with AI
3 Ways to Drive Talent Goals with AI3 Ways to Drive Talent Goals with AI
3 Ways to Drive Talent Goals with AI
 
14 things you need to be a successful software developer (v3)
14 things you need to be a successful software developer (v3)14 things you need to be a successful software developer (v3)
14 things you need to be a successful software developer (v3)
 
Communication for the new design leader
Communication for the new design leader Communication for the new design leader
Communication for the new design leader
 
Fear focused Retrospective webinar
Fear focused Retrospective webinarFear focused Retrospective webinar
Fear focused Retrospective webinar
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Making the business case for investing in technology

  • 1. RMI Risk Masters, Inc. Communicating the Message that Matters… Technical Skills, Business Experience Allan M. Cytryn Principal © Copyright, Risk Masters, Inc. 2013. All rights reserved. 1
  • 2. Your Are Presenting IT Issues to Leadership… RMI Your role is to… • Explain clearly (and succinctly) • State the impact • Present alternatives • Lead a discussion to a positive outcome Leadership expects you to show… • Knowledge of the business • Knowledge of the subject matter • Thoughtfulness © Copyright, Risk Masters, Inc. 2013. All rights reserved. 2
  • 3. To Be Successful… RMI Speak to people in their language • Speak to others about issues relevant to them Present facts • Avoid emotions • Express opinions when asked Avoid communication barriers, including… • Words that are ambiguous or have multiple meanings • Secret codes and acronyms Anticipate and address misunderstandings • Assume you are not understood until you have positive feedback • Solicit feedback to assess if the listener understands © Copyright, Risk Masters, Inc. 2013. All rights reserved. 3
  • 4. You Are Meeting the Board… © Copyright, Risk Masters, Inc. 2013. All rights reserved. RMI 4
  • 5. To Request Funds to Enhance IT Security… We have a big problem! © Copyright, Risk Masters, Inc. 2013. All rights reserved. RMI They discovered They discovered Memo to Self: They discovered the the counterfeit the bogus Check Golden incriminating parts!? expenses?! Parachute emails?! 5
  • 6. Are They Getting Your Message? RMI There’s a new humongous virus …it might corrupt our SANS …reroute our SDNS …reconfigure our Virtual Farms I mean, this is a big deal. It can destroy everything! Phew! © Copyright, Risk Masters, Inc. 2013. All rights reserved. This could be good! 6
  • 7. Your Effectiveness Scorecard… Your role is to…  Explain clearly (and succinctly)  State the impact  Present alternatives  Lead a discussion to a positive outcome Leadership expects you to show…  Knowledge of the business  Knowledge of the subject matter  Thoughtfulness © Copyright, Risk Masters, Inc. 2013. All rights reserved. RMI Speak to people in their language  Speak to others about issues relevant to them Present facts  Avoid emotions  Express opinions when asked Avoid communication barriers, including…  Words that are ambiguous or have multiple meanings  Secret codes and acronyms Anticipate and address misunderstandings  Assume you are not understood until you have positive feedback  Solicit feedback to assess if the listener understands 7
  • 9. And Additional Ambiguity… Term RMI For IT For Others IP Internet Protocol Intellectual Property DNA Digital Network Architecture Genes SaaS Software as a Service An Airline A Test A Test Attest RAM Memory An Animal © Copyright, Risk Masters, Inc. 2013. All rights reserved. 9
  • 10. Let’s Try This Again… Our Auditors confirmed our Network is secure. But they confirmed a new threat that might cause: • Trade secrets to be stolen • Production to be interrupted • Financials to be revealed © Copyright, Risk Masters, Inc. 2013. All rights reserved. RMI Oh #&)(&^!@! 10
  • 11. RMI Did They Get Your Message? But I have a solution the Auditors will approve. • We can get it done in only 90 days and without delaying key plans. • We can fund it with an additional $$$ dollars, or by deferring some low priority projects. © Copyright, Risk Masters, Inc. 2013. All rights reserved. Phew! This could be good! 11
  • 12. RMI © Copyright, Risk Masters, Inc. 2013. All rights reserved. 12