Remove Active Listening Remove Execution Remove Servant Leader Remove Technology
article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Communicating to executives and board members. This creates financially inefficient security architectures with increased vulnerabilities.Couple the above list of security initiatives with the below statements about the environments that security leaders are placed into, and you quickly realize a practical yet manageable shift is needed.

IAM 187