5 Key Elements of Influence

Leadership is about influence – influence over those around you and influence over the outcomes you want to achieve. Building influence is an essential component of successful leadership, so it’s important for anyone who wants to become a high-performing leader to understand how influence works. I’ve identified five key elements of influence: authenticity, respect, engagement,Continue reading “5 Key Elements of Influence”

The FAA Outage as a Resiliency Test

                The theme of cyber resilience engineering has been reverberating through the last few years, and the resilience gong is sounded again with the Federal Aviation Administration (FAA) network outage which impacted all airline service and caused thousands of flight delays.  Between concepts of DevOps,  Site Reliability Engineering (SRE), and Cyber Resiliency Engineering, there areContinue reading “The FAA Outage as a Resiliency Test”

You Laggards! Use MFA!

Multi-Factor Authentication (MFA) is a security process that requires users to provide more than one form of identification when logging into a system or accessing sensitive data. This can include something the user knows (like a password or security question), something the user has (like a smartphone or security token), or something the user isContinue reading “You Laggards! Use MFA!”

Average Managers vs. Good Managers vs. Leaders

                Marcus Buckingham, in his 2005 Harvard Business Review article “What Great Managers Do,” said that average managers play checkers, great managers play chess, and great leaders rally people around what is universal and capitalize on that (Buckingham, 2005).  As someone who prefers leadership to management, I agree with this sentiment.                 The average managerContinue reading “Average Managers vs. Good Managers vs. Leaders”

Why People Don’t Adopt Multifactor Authentication (MFA)

Some people are bullheaded. Some people are ignorant. There are several reasons why some people may not adopt multifactor authentication (MFA). Some of the most common reasons include: Overall, the adoption of MFA depends on a variety of factors, including the needs and preferences of the individual or organization, the availability and cost of MFAContinue reading “Why People Don’t Adopt Multifactor Authentication (MFA)”

Art in the SSE Forum Podcast

I ‘appeared’ (audio-only appearance) in the SSE Forum podcast with Jaye Tilson and John Spiegel regarding zero trust. Here’s Jaye’s LinkedIn post about that: https://www.linkedin.com/feed/update/urn:li:activity:7009191284678492161/ Here’s the SoundCloud for the podcast episode: https://soundcloud.com/sse-forum/ciso-visionaries-ft-art-ocain?si=5710958b55414259a529609e559c33ff&utm_source=clipboard&utm_medium=text&utm_campaign=social_sharing

Fitbit’s Approach to Agile

Introduction             Fitbit, a popular wearable fitness tracker brand, has embraced agile throughout its lifespan in order to bring fitness technology to consumers in order to improve their health with innovative and competitively-products (McNew, 2018).  At the top of its market, Fitbit creates purpose-built hardware and advanced software to deliver technologies like GPS, heart rateContinue reading Fitbit’s Approach to Agile