How do you “read between the lines” when engaging stakeholders to better understand their needs or concerns? How can a CISO navigate those conversations to surface what might otherwise be left unsaid?

309 views2 Comments
Sort By:
Oldest
CISO in Softwarea month ago
It is important to provide a safe place where people are open, honest and transparent to work through challenges.  it should always be like an RCA or post mortem where there is no blame, no hiding and only focused on how to improve.
1
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CIO in Education24 days ago
I'd suggest that if you aren't already, change the way you're listening to feedback or input. Listen for potential mismatches between what your stakeholders are saying, and how they say it, then ask clarifying questions to dig deeper into the statements being made.

Try to identify pain points by listening for feedback that illustrates frustrations, obstacles, roadblocks, challenges etc. Probe further if possible, to try to understand root causes and impact of the frustrations being experienced. Empathise with the situation and listen to learn/understand, not to rebut.

Try to align expectations by having regular check-ins with your stakeholders (particularly those whose needs you're still trying to surface).Follow up the conversations with email summaries of what was discussed, what was agreed upon etc to ensure clear communication and to avoid misunderstandings.

Establishing trust and building a rapport with your stakeholders helps to encourage open communication. Avoid being defensive about concerns raised to you - remember you're trying to surface these needs and concerns with a view to resolving them. Collaborate to find mutually agreeable way to address underlying issues. Also, ensure you always follow up promptly to show responsiveness and accountability. 

Content you might like

Attack Surface Management39%

Account Takeovers60%

Executive Protection49%

Hacktivism/Disinformation32%

Brand Abuse/Impersonations18%

Phishing Attacks30%

View Results
1.5k views
CTO in Software12 days ago
A couple of suggestions: 1) You ask coaching questions to assess whether the candidate has critical thinking; 2) Respectfully, you put the candidate under moderate pressure and observe how they react. This might involve saying ...read more
12 views1 Comment

Yes; I had to take extended time off to recover22%

Yes; but I kept working anyway54%

Almost; I was able to catch it early and made changes16%

No; I have not experienced extreme stress or burnout7%

View Results
1.6k views2 Upvotes1 Comment
CISO13 days ago
CISOs play a crucial role in organizations, as data and information protection falls under their responsibility. Building trust across the organization is essential for maintaining a strong cybersecurity posture.

Collaboration ...read more
79 views1 Comment