SecurityCertified

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, May 21, 2011

Five Qualities of Real Leadership

Posted on 6:43 AM by Unknown
I've noticed coverage of "leadership" in IT magazines recently, but I'm not comfortable with the approach they take. For example, this editorial in CIO Magazine titled Leadership Isn't a Fairy Tale After All has "Personal attention and hands-on involvement can make good IT managers great IT leaders" as the subtitle. The text then says:

Our story spells out detailed tactics and practical ideas that CIOs can use to turn good IT managers into potentially great IT leaders...

You’ll notice a strong thread of personal attention and hands-on involvement from the very top at the companies developing a strong bench of future leaders.

At REDACTED, for example, the CEO walks the walk on one-to-one leadership development by holding regular career conversations with his senior leadership team. His CIO, REDACTED, then makes sure that style of direct communication flows downward to the IT team. “If you don’t take time to talk to people about their professional development,” REDACTED notes, “it just doesn’t get done.”

REDACTED is another bright light in this realm with a program called The Lab, which fosters leadership development across various business units by bringing together 30 of them at a time to form strategic problem-solving teams.

And at REDACTED, CIO REDACTED connects on a more personal level, emailing coffee-talk questions to her global staff every two weeks to get conversations going on everything from personal dreams to world views.


In my opinion, "regular career conversations" are a form of coaching, not leadership. Forming "strategic problem-solving teams" is management, not leadership. Finally, "emailing coffee-talk questions" is banter, not leadership.

So what are the five qualities of leadership, at least in my experience?

  1. Leaders develop and execute a vision; they do not follow trends set by others.

  2. Leaders embody strong core values and do not sacrifice those core values in order to advance their personal careers.

  3. Leaders' actions demonstrate a focus on their people, not themselves, and that focus on the people takes care of the mission.

  4. Leaders work to "make their people look good," rather than making the boss or themselves look good.

  5. In the darkest hours, leaders put themselves personally at risk for the good of their team.


Notice the contrast between these five principles and the previous guidance. My focus is on actions, whereas the other ideas focus on communication. I do not discount the value of communication, but with leadership the deeds matter far more than the words. It is helpful to have coaching, mentoring, managing, and so forth, but these concepts are separate from leadership.

If you're wondering about the image for this post, I wanted to show a picture from the movie We Were Soldiers, based on the book by Lt Gen Hal Moore and Joe Galloway. Then Lt Col Moore (portrayed by Mel Gibson) always landed with his air cavalry troops, in the first helicopter, and was the first person to step foot on adversary soil. He was also the last person to leave. As he wrote:

When we step on the battlefield, I will be The First Boots On and the Last Boots Off.

And he didn't just say it, he did it. That's a leader.
Tweet
Email ThisBlogThis!Share to XShare to Facebook
Posted in leadership | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DojoCon Videos Online
    Props to Marcus Carey for live streaming talks from DojoCon . I appeared in my keynote , plus panels on incident response and cloud secur...
  • Practice of Network Security Monitoring Table of Contents
    Since many of you have asked, I wanted to provide an updated Table of Contents for my upcoming book, The Practice of Network Security Monito...
  • Mandiant APT1 Report: 25 Best Commentaries of the Last 12 Days
    Two weeks ago today our team at Mandiant was feverishly preparing the release of our APT1 report . In the twelve days that followed public...
  • Feedback from Network Security Monitoring 101 Classes
    At Black Hat in Las Vegas I taught two Network Security Monitoring 101 (NSM101) classes. This is a new class that I developed this year, a...
  • A Book for the Korean Cyber Armies
    I've got a book for the Korean cyber armies, North and South. That's right, it's my first book , The Tao of Network Security Mo...
  • What is Cloud?
    The slide at left was one of my favorites from Craig Balding's Cloud Security Ghost Story talk from Black Hat EU earlier this year. I ...
  • SQL Injection Challenge and Time-Based Security
    Thanks to this Tweet by @ryancbarnett, I learned of the lessons learned of the Level II component of the ModSecurity SQL Injection Challen...
  • Bejtlich Speaking at TechTarget Emerging Threats Events in Seattle and New York
    I will be speaking at two events organized by TechTarget , for whom I used to write my Snort Report and Traffic Talk articles. The one-da...
  • BeyondTrust Report on Removing Administrator: Correct?
    Last week BeyondTrust published a report titled BeyondTrust 2009 Microsoft Vulnerability Analysis . The report offers several interesting ...
  • President Obama Is Right On US-China Hacking
    I strongly recommend watching the excerpt on the Charlie Rose show titled Obama: Blunt Conversation With China on Hacking . I reproduced the...

Categories

  • afcert
  • Air Force
  • analysis
  • announcement
  • apt
  • attribution
  • bestbook
  • blackhat
  • books
  • breakers
  • bro
  • bruins
  • certification
  • china
  • cisco
  • cissp
  • cloud
  • clowns
  • commodore
  • conferences
  • controls
  • correlation
  • counterintelligence
  • cybercommand
  • cyberwar
  • dfm
  • education
  • engineering
  • feds
  • fisma
  • freebsd
  • GE
  • ge-cirt
  • hakin9
  • history
  • impressions
  • information warfare
  • ipv6
  • law
  • leadership
  • malware
  • mandiant
  • microsoft
  • mssp
  • nsm
  • offense
  • oisf
  • packetstash
  • philosophy
  • pirates
  • powerpoint
  • press
  • psirt
  • reading
  • redteam
  • reviews
  • russia
  • sans
  • sec
  • sguil
  • snorby
  • spying
  • threat model
  • threats
  • Traffic Talk
  • training
  • tufte
  • tv
  • ubuntu
  • usenix
  • verizon
  • vulnerabilities
  • wisdom
  • writing

Blog Archive

  • ►  2013 (16)
    • ►  September (1)
    • ►  August (1)
    • ►  June (2)
    • ►  April (2)
    • ►  March (1)
    • ►  February (3)
    • ►  January (6)
  • ►  2012 (60)
    • ►  December (4)
    • ►  November (5)
    • ►  October (3)
    • ►  September (10)
    • ►  August (2)
    • ►  July (6)
    • ►  June (6)
    • ►  May (4)
    • ►  April (2)
    • ►  March (9)
    • ►  February (6)
    • ►  January (3)
  • ▼  2011 (108)
    • ►  December (3)
    • ►  November (7)
    • ►  October (11)
    • ►  September (9)
    • ►  August (18)
    • ►  July (10)
    • ►  June (5)
    • ▼  May (4)
      • Five Qualities of Real Leadership
      • CIO Magazine Realizes "IT Alignment" Is Dead
      • Bejtlich Teaching at USENIX Security in San Franci...
      • America the Vulnerable Arrives This Fall
    • ►  April (13)
    • ►  March (17)
    • ►  February (2)
    • ►  January (9)
  • ►  2010 (193)
    • ►  December (14)
    • ►  November (11)
    • ►  October (6)
    • ►  September (16)
    • ►  August (15)
    • ►  July (26)
    • ►  June (15)
    • ►  May (15)
    • ►  April (15)
    • ►  March (16)
    • ►  February (19)
    • ►  January (25)
  • ►  2009 (123)
    • ►  December (10)
    • ►  November (17)
    • ►  October (21)
    • ►  September (13)
    • ►  August (20)
    • ►  July (21)
    • ►  June (21)
Powered by Blogger.

About Me

Unknown
View my complete profile