August 31, 2018

Boundary Spanning Leadership for Privacy, Cybersecurity, + Infrastructure Success

By David Delaney | FH+H Partner, Head of Privacy, Cybersecurity, + Critical Infrastructure Practice Area

In the last few weeks I have heard the same tale of woe nearly a dozen times — data management, privacy, and cybersecurity employees feel disconnected from the company’s strategies in those areas … and frequently don’t know how the strategies are formed.

There is no shortage of business drivers, laws, and policies in these areas, so communication is surely a problem. I suspect there is also a lack of boundary spanning leadership — enabling work with diverse groups to drive innovation and achievement.

Three articles caught my eye this week because they contain good boundary spanning advice to business leaders, lawyers, and cyber incident responders. Do you see ways to improve your business and find the right people to drive success?

  1. “As work becomes more complex, it takes teams and cross-boundary collaborations to build products, attract customers, and achieve results.  Change-agile leaders and organizations are replacing functional silos with formal and informal organizations that allow for the rapid flow of information and decision-making around a product, customer, or region.” Edith Onderick-Harvey in 5 Behavior of Leaders Who Embrace Change
  2. “Resist the temptation to gravitate toward people like you. Embrace and learn from the diversity of your colleagues. Watch for ways in which people behave differently toward, around or in the absence of women, people of color or members of the LGBTQ community and ask yourself if these differences are appropriate.” Alex Dimitrief in Looking Back—And Ahead: Advice From a Global Company Leader
  3. “An optimal incident response solution allows various actors to view common dashboards, includes the collection of assets and artifacts pertaining to stages of investigation or remediation, timelines, actors completing tasks, and next stages to be performed. This workflow may be drilled and practiced until the preparation and execution becomes cybersecurity muscle memory.” Michael Malore in Cybersecurity Muscle Memory: Drilling for a Tight Incident Response

About the Author

David Delaney is a Partner at FH+H, focusing his practice on clients' cyberspace needs. He advises on a wide range of business issues arising under international, federal, and state law, including data security, privacy, breach response, product development, contracts, internal policies, and regulatory compliance. He is licensed to practice in Maryland and North Carolina.

Read Mr. Delaney's full bio here.

Connect with Us: Sign Up to Receive Email Updates

Stay Updated and Receive Occasional FH+H Updates