Remove Active Listening Remove Management Remove Resources Remove Servant Leader
article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Below is a list of security initiatives that a security leader would either manage or have parallel impact upon within a business: Data security. Vendor management. Identity & Access Management (IAM). Vulnerability Management (VM). Managing enterprise risk tolerance. Human resource leadership.

IAM 194
article thumbnail

The Skills of Kindness: a guide for sellers, coaches, leaders and facilitators

Strategy Driven

It’s necessary to listen using a different part of our brain (not Active Listening) that we’ve never been taught to use intentionally. Fact #5: Change cannot happen until there is a defined route to manage disruption, and the appropriate elements buy-in, for those elements that are disrupted. All change must include this.

Skills 50