Information

 

 

https://sm.asisonline.org/Pages/Dancing-With-Yourself.aspxDancing With YourselfGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-12-01T05:00:00Zhttps://adminsm.asisonline.org/pages/mark-tarallo.aspx?_ga=2.235866438.650069683.1543244114-1119989502.1541012085, Mark Tarallo<p>​You can't manage others if you can't manage yourself.  And for any manager, including a security manager, effective self-management requires a certain level of professional self-knowledge. Achieving that can be trickier than it sounds, given the human tendency to overrate one’s own abilities and performance. </p><p> “We are wildly overconfident in most domains. We are wildly bad at self-assessing,” says Khalil Smith, a former leadership development expert at Apple who is now a practice leader at the NeuroLeadership Institute. To illustrate, Smith cites a driving survey in which 80 percent of respondents rated themselves as better-than-average drivers, a mathematical impossibility. This also applies to leadership, he adds. </p><p>“Most managers think they’re really good managers, and a lot of them aren’t,” Smith explains. “Confidence and competence are not correlated.” But if self-knowledge requires great effort to attain, the results will be worth it, experts say. It will ultimately allow managers to maximize their strengths, minimize their shortcomings, and modify their responses and behaviors, all for the cause of becoming more effective leaders.</p><h4>​Strengths Analysis </h4><p>“History’s great achievers—a Napoleon, a da Vinci, a Mozart—have always managed themselves. That, in large measure, is what makes them great achievers,” wrote Peter Drucker in “Managing Oneself,” a 2005 article published in the Harvard Business Review. Drucker is considered one of the fathers of modern management; he developed one of the first executive MBA programs in the early 1970s. </p><p>Drucker’s article, which was an excerpt from his book Management Challenges of the 21st Century, is still considered the seminal work on self-management; if anything, it has grown more relevant as the emphasis on values-based leadership has become more pronounced. In his piece, Drucker advises managers to answer a series of questions about themselves, and then offers best practice guidance in each area: What are my strengths? How do I perform? What are my values? Where do I belong? What can I contribute?</p><p>In the first area, Drucker tells managers that the one true way to discover their strengths is through feedback analysis. The analysis method is simple: after every key decision or key action made, the manager should write down what he or she then expects will happen. A year later, the manager compares these expectations with the actual results. Within three years, Drucker argues, the analysis will reveal where the manager’s strengths lie. </p><p>In addition, the analysis will reveal “what you are doing or failing to do that deprives you of the full benefits of your strengths,” Drucker writes. </p><p>Take, for example, a security manager who creates a new security plan, and then writes down the expectation that the plan will be implemented in a year. A year later, if there is no progress, the analysis may point to the fact that the manager’s weak advocacy and people skills were insufficient to make the plan a reality.</p><p>Gary Bradt, an executive leadership coach who has written about self-management, says this type of analysis is particularly important for a manager who aspires to climb the ranks of an organization. In some firms, when a manager reaches a certain executive level, the position hinges on two skill sets: managing people and high-level strategy. But for some security managers, who were promoted based on their technical mastery of security, high-level strategy and people skills may not be their long suits. “You have to know that,” Bradt says, so that you can get proper training to succeed. </p><h4>How Do I Perform? </h4><p>“Amazingly few people know how they get things done. Indeed, most of us do not even know that different people work and perform differently,” Drucker writes. To ascertain this crucial knowledge about oneself, he advises managers to ask themselves another series of questions.</p><p>Am I a reader or a listener? This first question can make all the difference in performance. To illustrate, Drucker offers the example of two U.S. presidents. When Dwight Eisenhower, a reader by nature, held press conferences as Supreme Commander of the Allied Forces in Europe, he read all submitted questions in advance. That advance reading allowed him to speak in polished sentences once he was in front of reporters. But when Eisenhower was president, reporters were not required to submit questions in advance. As a result, Eisenhower performed terribly at press conferences, rambling on endlessly and avoiding the point of questions.</p><p>Unlike readers, listeners process information best through their ears. Lyndon Johnson was a legendary Senate Majority Leader in part because he could retain and distill everything he was told by countless lawmakers, Drucker writes. (Managers who are listeners may want to take advantage of books on tape—a source that Bradt relies on. “I am an auditory learner,” Bradt says.) </p><p>Another related performance question is, How do I learn? Some people, like Winston Churchill, a poor student who became an acclaimed author, learn by writing. Others learn through copious notetaking. Beethoven, who left behind numerous sketchbooks, reportedly said that when he put an idea in a sketchbook, he never forgot it. Still others learn by hearing themselves talk. Drucker cites a CEO who called his entire senior staff into his office once a week and then talked at them for two or three hours. But some learn only by doing. </p><p>The importance of this performance self-awareness extends to the manager’s staff, Bradt says. He offers a negative example of this from his graduate school days, when Bradt was charged by his study group to summarize an assignment. He provided the group with a series of terse bullet points, which were meaningful to him but much too minimalist for the group. “I gave them what I would need, not what they would need,” he says.</p><p>Effective leaders, on the other hand, know what types of learners and performers their direct reports are, so that they can give them what they need to succeed, Bradt explains. Drucker, who agrees with this sentiment, argues that it should work in all directions. Coworkers should know the strengths, the performance modes, and the values of their coworkers. And employees should observe their managers, find out how they work, and adapt their methods to what makes their bosses most effective, Drucker writes. </p><p>Other key self-management questions involve the working environment. Managers should ask themselves, Do I work well with people or do I work best alone? “That’s where the importance of self-awareness comes in,” Bradt says. “Some love interacting with people, and love working in a team environment.” The latter should be aware that they might find it difficult to be at their best in a more solitary executive position, he adds. </p><p>Finally, there is the president-versus-vice-president issue: Do I best perform as a decision maker or as an adviser? Some perform swimmingly as advisers but cannot take the burden and pressure of making final decisions. “This is a reason, by the way, that the number two person in an organization often fails when promoted to the number one position,” Drucker writes. Others need an adviser to force them to think, so they can make decisions with self-confidence and courage.</p><h4>​Values and Contributions</h4><p>To be effective in an organization, a manager’s values must be compatible with the organization’s values, Drucker argues. They do not need to be the same, but they must be close enough to coexist. Bradt agrees and adds another wrinkle: an organization shows its true values in its daily operations. A firm may state in its mission statement that “our people are our most important assets,” but if that company decides to do nothing to address its high turnover and bad working conditions, it is obviously not living its values. “Values are real when you use them in day-to-day decisions,” Bradt says. </p><p>For a new manager, the interview process is a good time to touch on these issues. Knowing one’s values allows the interviewee to discuss his or her approach to the new opportunity. For example, a security manager being interviewed for a new assignment may make clear that he or she firmly believes in continual professional development for staff, and thus ask about the possibility of providing workplace training programs and continuing education opportunities.</p><p>Finally, Drucker argues that managers need to ask themselves: What should my contribution be? This question ties together different aspects of self-management: Given my strengths, my way of performing, and my values, how can I make the greatest contribution to what needs to be done? That question must come in tandem with environmental workplace questions: What does the situation require? What results need to be achieved to make a difference?</p><p>Of course, the answers to these questions will differ, depending on the manager and the job in question. However, Drucker argues that the following benchmark question will be applicable in most situations: Where and how can I achieve results that will make a difference within the next year and a half?</p><p>“The answer must balance several things,” Drucker writes. The results should be ambitious, but not impossible—within a reasonable reach. Second, the results should be meaningful and make a difference. Finally, the results should be visible and, ideally, measurable.</p><h4>​Mitigating Bias </h4><p>Even the most effectively self-managed leaders are biased. “We see the world through tremendous filters. And we are not aware of these filters,” said David Rock, president of the NeuroLeadership Institute, in his address “The Neuroscience of Breaking Bias” delivered at the Society for Human Resource Management annual conference last year.</p><p>And bias can have a large impact on a manager’s decisions, from hiring to assignment delegation to performance reviews. This made bias an important area of study for management scholars, with a traditional focus on what managers can do to reduce their own bias. But scholars have found that reducing one’s own bias is quite difficult to do effectively. “Much work in this space hasn’t really moved the needle,” Rock said.</p><p>That’s generally because overcoming bias is not simply a matter of will. Managers who are motivated to self-examine for bias are still likely to come to the conclusion that they are not biased. Instead, experts say it is more effective to try to mitigate bias by building procedures designed to weed out bias into operational systems. </p><p>An example of this, Rock said, is the use of a stock investment system that is based on a mathematical performance evaluation formula. The formula, which is based on hard data, is a better alternative to simply choosing stocks by one’s gut feeling, which reflects personal bias. </p><p>For managers, one of the most relevant types of bias is similarity bias. Similarity bias is the following feeling: people like me are better than others. The “people like me” similarities may range from ethnic background, religion, race, hobbies, and economic class to professional approach and personality types. Studies have found that this similarity bias can have a major impact on hiring decisions, Rock said. “In hiring, when you take age/gender/race away, you get very different results,” he says.</p><p>But similarity bias can affect more than just hiring. Promotions, succession plans, vendor selection, and assignment delegation are all vulnerable to similarity bias, as well as more subtle influences such as “how I engage with you in meetings—I listen to your ideas a little more than those of others,” Smith says. “I invite you out more often. I review you better.” </p><p>Similarity bias is not a new concept, of course, and some have tried to use it in their favor for career advancement purposes, such as the employee who learns golf to bond with the golf-loving boss, or the interviewee who is coached to consciously mirror the interviewer’s body language.   </p><p>For managers interested in effective self-management, similarity bias, given its potential impact, must be contended with. “We need to mitigate similarity bias, and we need to do it quite proactively,” Rock explained. As a best practice, Smith recommends doing this in a few steps. First, managers should not deny their own bias, but accept it as a natural byproduct of being human. Second, managers should label the bias, so they understand what type of bias it is. </p><p>Third comes the mitigation effort. This can be tricky, Smith says, because once a manager discovers a similarity, it’s hard to unlearn or reinterpret it. So, Smith advises that the manager make the effort to find similarities, or connections, with all other people in the hiring pool, or in the security department, or whatever the relevant group. This is doable, experts maintain, because there are similarities that all people share. “If you can’t find it, you’re not trying enough,” Smith says. This action mitigates similarity bias by putting employees on a more level playing field.  </p><p>Another mitigation method for similarity bias is through reframing key questions. In hiring, for example, many organizations look for hires that will be “a good cultural fit” and enjoyable to work with it on a day-to-day basis. Sometimes, the hiring manager uses what is called the airplane test–if you are sitting next to this person on an airplane and forced to chat for three hours, would you enjoy it? </p><p>But a manager can mitigate similarity bias by reframing the hiring question to: if the plane went down and we had to work in tandem, which candidate would most enhance our chances of survival? “Those are the people you want on your team,” Smith says, because complimentary skills are sometimes more valuable than similarities.  </p><h4>​Feedback and Responses</h4><p>Experience bias is another form of bias that is difficult to reduce. “You cannot see the world not through your own eyes,” Smith says. “Everything we do is colored through that lens.” And so, a manager’s decisions will sometimes be at least a partial product of his or her experiences, even if those experiences are relatively narrow and not reflective of the world at large.    </p><p>How can experience bias be mitigated? By seeking out other perspectives. Smith uses the example of a manager making a presentation. Smith advises that the manager seek out feedback from someone who seems to have a different world view or approach to things, whose opinions seem to be on a different wavelength. By soliciting this different—even diametrically opposed view, the manager can mitigate his or her experience bias.  </p><p>And soliciting feedback can have other benefits, Bradt says. Often, the person offering the feedback is saying what he or she needs. He gives the example of a manager who solicits general feedback from a colleague, and the colleague says that sometimes the manager is often multitasking and does not seem to be listening when they are in a conversation. </p><p>That might not actually be true; the manager may in fact be able to listen closely while multitasking, Bradt says. But the feedback reflects the colleague’s need to be heard. “That’s still extremely helpful,” Bradt says, because the manager learns about the needs of colleagues, which is valuable information for any leader. </p><p>In addition, feedback can also help managers become aware of their automatic emotional responses, Bradt says. For example, a colleague might point out that a manager is quick to forcefully react when challenged, in a way that might be considered overreacting. This can be the starting point for honest self-reflection by the manager, which can be crucial for effective self-management. </p><p>“That’s kind of the biggest challenge. You have a situation, and then you think, ‘What happened there? That really set me off—why? What are my patterns?’” says Bradt. Such reflection could lead to a breakthrough, such as the need to override those hair-trigger responses when necessary. </p><p>If all this seems daunting—good, it’s likely a sign of growth. “You have to make yourself uncomfortable,” Bradt explains. But the core of self-management—modifying your behavior to get desired results—is a skill that can be cultivated, he says. The essence of leadership is having a vision and motivating and inspiring people to do things better, and self-management can be a crucial step to becoming a more consistent and effective leader for others.</p><p>“If I am going to lead other people, I have to be able to manage myself,” Bradt says. </p>

Information

 

 

https://sm.asisonline.org/Pages/Dancing-With-Yourself.aspx2018-12-01T05:00:00ZDancing With Yourself
https://sm.asisonline.org/Pages/Transport-to-Transhumanism.aspx2018-12-01T05:00:00Ztransport to transhumanism
https://sm.asisonline.org/Pages/Happy-Holidays-from-Security-Management.aspx2017-12-22T05:00:00ZHappy Holidays from Security Management
https://sm.asisonline.org/Pages/Accolades-Entries-Spotlight-Innovation.aspx2016-09-11T04:00:00ZAccolades Entries Spotlight Innovation
https://sm.asisonline.org/Pages/SM-Online-February-2016.aspx2016-02-01T05:00:00ZSM Online February 2016
https://sm.asisonline.org/Pages/SM-Online-October-2015.aspx2015-10-01T04:00:00ZSM Online October 2015
https://sm.asisonline.org/Pages/Industry-News-September-2015.aspx2015-09-14T04:00:00ZIndustry News September 2015
https://sm.asisonline.org/Pages/Most-Wanted---Computer-Bugs.aspx2015-08-04T04:00:00ZMost Wanted: Computer Bugs
https://sm.asisonline.org/Pages/SM-Online-May-2015.aspx2015-05-01T04:00:00ZSM Online May 2015
https://sm.asisonline.org/Pages/Service-Denied.aspx2014-10-01T04:00:00ZService Denied
https://sm.asisonline.org/Pages/A-Safer-Frontier.aspx2014-09-01T04:00:00ZA Safer Frontier
https://sm.asisonline.org/Pages/Watching-The-Port.aspx2014-09-01T04:00:00ZIndustry News September 2014
https://sm.asisonline.org/Pages/data-breaches-0013551.aspx2014-08-01T04:00:00ZVerizon's 2014 Data Breach Investigations Report
https://sm.asisonline.org/Pages/data-breach-victims-0013553.aspx2014-08-01T04:00:00ZData Breach Victims
https://sm.asisonline.org/Pages/access-control_E2_80_99s-future-now-0013512.aspx2014-07-01T04:00:00ZAccess Control’s Future Is Now
https://sm.asisonline.org/Pages/cyber-crime-security-and-digital-intelligence-0013546.aspx2014-07-01T04:00:00ZCyber Crime, Security and Digital Intelligence
https://sm.asisonline.org/Pages/cybersecurity-0013484.aspx2014-07-01T04:00:00ZCybersecurity: 2014 Security Threat Report
https://sm.asisonline.org/Pages/industrial-espionage-developing-a-counterespionage-program-0013542.aspx2014-07-01T04:00:00ZIndustrial Espionage: Developing a Counterespionage Program
https://sm.asisonline.org/Pages/windows-xp-goes-dark-0013508.aspx2014-07-01T04:00:00ZWindows XP Goes Dark
https://sm.asisonline.org/Pages/cyber-experts-talk-trends-0013428.aspx2014-06-01T04:00:00ZCyber Experts Talk Trends

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspxSafety in Shared Spaces<p>​Coworking spaces  are on the rise around the globe. These flexible work settings allow people without a traditional office building to still enjoy many of the amenities that come along with having a dedicated work environment. </p><p><em>The 2017 Global Coworking Survey</em>, conducted by Deskmag, along with SocialWorkplaces.com, found that there are an estimated 13,800 active coworking spaces worldwide, hosting more than 1 million people. </p><p>This represents a major increase from five years ago, when just 2,070 coworking spaces were used by 81,000 people globally. COCO, a coworking company based in St. Paul, Minnesota, offers several different levels of membership and types of space, so clients are only paying for the amount of time they need and space they require, says Megan Dorn, director of operations at COCO. </p><p>“Our idea in doing that was to be with our clients as they grow—from the beginning of their business, to hiring employees, to maybe needing private offices—which we also have,” she says. “So that’s what makes us a little bit different than your typical coworking space.” </p><p>When the company started in 2010, it had to distribute physical keys to its members, “which is a nightmare as you’re trying to grow,” she notes, and a security concern if a key was ever lost. </p><p>Because COCO normally leases its space in a larger building, it needed a security solution that was as flexible as the working environment it provides. “We usually have to find ways—when we’re opening a space or acquiring a space—to work with the building to find ways to get our security system installed,” Dorn explains. </p><p>When COCO acquired a new space in Chicago last May, the existing security system was a door locked by a PIN code, which the building never changed. The PIN code was distributed to a large number of people.</p><p>“The space got broken into a week before we acquired it. Laptops were stolen, and people were really on edge,” she notes. “So as soon as we came in to the Chicago space, one of our top priorities was to get a really solid access and security system in place.” </p><p>COCO turned to Brivo’s OnAir, a cloud-based access control system that easily integrated into the company’s membership dashboard, called Bamboo. Using Brivo, COCO can easily distribute keycards to its clients and manage membership usage and levels. </p><p>To set up the system, Brivo representatives come to COCO’s space and add card readers to the appropriate doors. They also set up schedules and the different access levels for membership types.</p><p>COCO has one membership accountant who works out of the company’s headquarters and oversees assigning new members a keycard number through Brivo. “It’s all digital, so it can be done remotely,” she notes. </p><p>A community manager at the member’s location—the lead COCO employee for that site—can then log on to Brivo and see which card number has been assigned for that client, add the number to their member profile in Bamboo, and distribute it. </p><p>Changing, granting, and revoking access levels, as well as keeping track of when members come and go throughout the building, are all managed through the Brivo platform. </p><p>“Say you want to upgrade a member from part-time to full-time. We’re able to just go into Brivo and quickly change your access. It’s active the moment that you do it,” she notes. “That’s actually been really helpful for us, given we have all this variability in types of membership.” </p><p>When a member badges in, a wealth of information comes up on the Brivo dashboard for the community manager to see. “Their picture, their name, their membership level, how many times they’ve checked in already that month, it immediately shows up,” she says. “So it tells you in real time exactly who’s in your space and when.”</p><p>The business value of OnAir is immense for COCO, Dorn points out, because the company can tell how often members are actually using the space, and whether they have made payments, as soon as they present their access card to the door reader. </p><p>“Let’s say someone is delinquent on payment. As soon as the member checks in, there’s going to be big red circle with an exclamation point [on the dashboard]–you can’t miss it,” she says. “It’s definitely helped us lower the sheer amount of delinquent payments that we have, and receive that payment.”</p><p>When a member badges in, Brivo also alerts the community manager if that person hasn’t been in the space very often that month. </p><p>“If we can find a member who we consider at-risk, who hasn’t been using the space, and we’re alerted to that we can reach out to them, invite them to an event, or try whatever we can to reengage them,” Dorn says. </p><p>COCO is also in the initial stages of using Brivo MobilePass, which lets COCO staff remotely lock and unlock doors via a smart device, for members who want to access the space after-hours but forget their keycard. </p><p>Because of how easily it can deactivate and reactivate access, COCO also encourages members who leave the company to keep their keycards. </p><p>“The goal is to try to get the member to come back. So if you have that card and you come back, you’re already set up in our system, all we have to do is reactivate the card and then we’ll also waive any setup fees,” Dorn says. </p><p>She notes the combination of security and business insights from Brivo has been tremendous for COCO. </p><p>“Brivo as a security system has helped us go from being a group of people working out of a space to a full-fledged company,” she says. “It really helps us manage all of the different types of membership and the stages of business they’re in.” </p><p><em>For more information: Nicki Saffell, sales@brivo.com, www.brivo.com, 301.664.5242 ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/effective-physical-security-third-edition.aspxEffective Physical Security, Third Edition<div class="body"> <p> <font face="Arial">Effective Physical Security, Third Edition. <font size="2">By Lawrence J. Fennelly; published by Elsevier Butterworth-Heinemann; available from ASIS, Item #1568, 703/519-6200 (phone), <a> www.asisonline.org</a> (Web); 315 pages; $40 (ASIS members), $44 (nonmembers). </font></font>  </p> <p> <font size="2" face="Arial">Asset protection and management pose unique and ever-shifting challenges, but the foundation principles on which these fields are based remain the same. For those basic components of physical security controls, one need look no further than the third edition of this Lawrence Fennelly work. It's a compilation of informative essays written by security professionals expert in various topics.</font> </p> <p> <font size="2" face="Arial">Fennelly provides readers with a quick, easy-to-understand reference on security controls, design, and management techniques. Numerous checklists, definitions, and drawings capture the reader's attention and ensure that each control will be well understood and implemented correctly.</font> </p> <p> <font size="2" face="Arial">New to the third addition are chapters on risk assessment and management, security lighting, entry control, contraband detection, bomb-incident management, and homeland security. These join stalwarts from earlier editions, including worthy chapters focused on locks, alarms, CCTV, and crime prevention through environmental design. The chapters vary in detail, but any security professional would benefit from the collection of knowledge and useful information assembled in this book, especially those seeking the newly launched ASIS Physical Security Professional designation.</font> </p> <hr size="2" width="100%" /> <p> <font size="2" face="Arial"> <em>Reviewer: Cathal Walsh is a security analyst for the global security department of Prudential Financial, Newark, New Jersey. He is a member of ASIS International.</em> </font> </p> </div>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465