Context: You are the CISO of a 500-person company.
Situation: The CEO wants to deploy extensive CCTV cameras across the organization, including in sensitive areas like meeting rooms, server rooms, and public spaces.
Concern: The CEO feels threatened by potential surveillance by competitors and suggests using drones for additional surveillance.
Variety of Leadership Styles: CEOs can be sensible, conservative, risk-taking, autocratic, or incompetent.
Influence: Decisions can be influenced by peers or perceptions from media (e.g., movies about surveillance).
First Step: Establish the facts. Understand the CEO's rationale behind wanting the increased surveillance instead of assuming motivations.
Active Listening:
Listen carefully to the CEO.
Understand rather than respond immediately.
Demonstrating Understanding: Validate the CEO’s perspective before offering alternatives:
Acknowledge potential benefits of CCTV.
Share concerns about competitive surveillance.
Stephen Covey's Principle: "Seek first to understand, then to be understood."
Presentation of Facts: Use a strategic order in presenting your facts to ensure the CEO remains receptive to your response.
Approach A: Collaborative
Acknowledge benefits: "The advantages of CCTV are X, Y, Z."
Highlight considerations: "There are cost implications, and we need to check GDPR legalities."
Propose action: "I can prepare a one-pager discussing these factors and we can meet to discuss it."
Approach B: Dismissive
Quick refusal: "No, we can't do that due to GDPR."
Negative implications: "There could be staff revolt and these measures might not be necessary."
This approach may appear condescending and is less likely to succeed.
Common Scenario: A teenager requests €50 from parents.
No, Because: The response may list past misconducts, which the listener may not register beyond the immediate disappointment of a 'no.'
Yes, If: Framing with conditions garners a more positive response and keeps the requester engaged with potential solutions.
Reasons for Refusing: Be prepared to explain "no" with good rationales.
User Education: Ensure users understand why certain requests are denied to prevent workarounds that may compromise security.
Data Leak Example: Denying USB access led a user to find alternative insecure methods to transfer data, resulting in a breach.
Different Perspectives: Two people can interpret the same facts in completely different ways: one may see an opportunity for CCTV, while another sees GDPR issues and privacy concerns.
Communication Gap: Just because something is clear to you doesn’t mean it’s clear to others.
Education Over Condescension: The CISO must ensure that users not only follow policies but understand them.
Policy Clarity: Security policies should be explained in an accessible way to enhance understanding and compliance.
Communication Skills: Security professionals need to develop their communication skills to enhance workplace collaboration.
Suggested Reads:
Leadership and the Art of Conversation by Kim Kriss.
Switch: How to Change Things When Change is Hard by Chip and Dan Heath.
Influence: The Psychology of Persuasion by Robert Cialdini.
TED Talks: Explore relevant TED talks for compact insights into communication and persuasion.
Key Takeaway: Communicating effectively and understanding others' viewpoints is crucial for security professionals. The interplay of surveillance, privacy, and effective communication is significant in achieving organizational security and buy-in from leadership.