Tag Archives: Best practice

  • 0

Get On Board! Entraining Volunteers

Category:Infosec Communicator,Leadchange,Leadership,Lessons Learned,Presentations,STC,STC Rochester,Summit Tags : 

I’m delivering the presentation below as part of a progression at Summit 2013 Leadership Day in Atlanta. Summit Leadership Day provides STC community leaders with the knowledge and guidance they need to lead successful communities, both geographic chapters and SIGs.

Volunteers are the heart of the community. They enable us to offer meaningful services to our members. However, getting volunteers can be challenging. Issuing a cattle call doesn’t usually lead to good results. Baby Boomers, Gen X, Gen Y all have different priorities that you must consider when recruiting them.

Personally, I’ve found volunteering in leadership in my local chapter (Rochester) to be one of the most rewarding experiences of my professional career. Volunteering has stretched me and equipped me as a better leader. I don’t have a magic formula. However, STC Rochester fills 8-10 council positions each year. That’s more than 10% of the community engaged in leadership.

This presentation provides strategies and tactics for recruiting and retaining volunteers.

 

Enhanced by Zemanta

  • 0

Empowering the Introvert Within | Bulletproofing Your Career Online

Category:Bulletproofing,Infosec Communicator,Introverted Leadership,introverts,Leadership,Presentations,STC,STC Rochester,Summit,techcomm Tags : 

Empowering the Introvert Within | Bulletproofing Your Career Online.

Preview Hannah (Careersherpa.net) and Ben’s newest presentation, Empowering the Introvert Within: Becoming an Outstanding Leader. Presentations are currently scheduled in Rochester at Spectrum, March 22, 2013 and in Atlanta at the STC Summit, May 6, 2013. Contact us at info@bulletproofingyourcareeronline.com if you’d like us to provide a presentation, keynote, or workshop.

 


  • 0

Would You Like to BulletProof YOUR Career Online?

Category:Infosec Communicator,Internet Safety,Privacy,Social Networking Tags : 

Bulletproofing logoI’ve partnered with Hannah Morgan (careersherpa.net, @careersherpa) to produce our Bulletproofing Your Career Online workshop. We’ve presented Bulletproofing Your Career Online at regional and international conferences in 2012. We’re privileged to provide the keynote at STCPMC13, the annual Society for Technical Communication Philadelphia Metro Chapter’s Mid Atlantic Technical Communication Conference at the Giant Conference Center in Willow Grove, PA on Friday, March 8, 2013, followed up with the workshop the morning of Saturday, March 9, 2013.

We’re interested in procuring other speaking engagements and workshop opportunities. As you may have read in the Infosec Communicator blog, I’m passionate about being safe online. Hannah specializes in Online Reputation Management and is a career consultant.

We invite you to visit our Bulletproofing Your Career Online webpage to learn more about how we think you can leverage social media for your career safely AND effectively. Please like our Facebook page and follow us on Twitter @SherpaAndGuru

Enhanced by Zemanta

  • 2

Infosec Strategies: Creating Centralized Efficiencies in a Decentralized IT Environment

Category:Higher Education,Information Security,Infosec Communicator,Leadchange,Risk,Uncategorized Tags : 

Information Security Wordle: RFC2196 - Site Se...

My thoughts on one of the challenges facing infosec offices in higher education. It reflects my thoughts, and not necessarily those of my employer.

The institutional challenge of creating centralized cost-effective efficiencies in an environment with a strong tradition of localized, decentralized IT solutions and personnel is normative in higher education.

An Information Security Office can create centralized efficiencies by:

  • Modeling an effective centralized service organization that is responsive to the individual needs of specific departments. (One way to accomplish this is by regular meetings with stakeholders to ensure that the Information Security Office can enable their business, rather than create barriers with unreasonable requirements.)
  • Providing centralized security services such as vulnerability scanning of web and servers and security reviews of proposed solutions.
  • Managing compliance initiatives such as private information remediation centrally, leveraging an extended team composed of empowered college and division representatives.
    Read More

  • 0

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner