Good questions, boss management

Appearing in In The Black magazine, April 2019

 

Questions Are the Answer

By Hal Gregersen

Harper Business, $27, 336 pages

Questions are the AnswerAs Director of the MIT Leadership Center, Gregersen has a special interest in why some business leaders are exceptionally successful. After conducting over 200 interviews he reached the conclusion that they ask the right questions. They do not ask many but they are good ones, capable of dissolving barriers to creative thinking and guiding the pursuit of new solutions. Drawing on this research, he explains how questions  can be structured to get to the core of an issue while pointing the way to clear action. A good question is a paradox: completely surprising yet entirely obvious.

While the research dealt with senior people Gregersen emphasises that active questioning is effective at any level of leadership. He examines the idea of the “question burst”, a team meeting centred around asking questions about an emerging challenge. The process usually leads to some innovative thinking and at least a few ideas worth further development.

The best questioners make an effort to find information and views outside their comfort zone. Breaking out of the bubble requires an effort but is needed for a fresh perspective. Good questions also require humility. Finding the right question, after all, is about accepting that you don’t know what you don’t know.

 

Cybersecurity Program Development for Businesses

By Chris Moschovitis

Wiley, $71, 225 pages

This book is written for business owners and executives whose education did not include cybersecurity, and as a result they do not know how to communicate with the company specialists. Moschovitis clearly knows a great deal about the field but he also knows how to explain the issues without undue techno-babble. He emphasises that there is no silver-bullet cybersecurity defence; the point is how to make good business decisions about what can be done to minimise risks and mitigate damage. He guides the reader through basic concepts without talking down to them, steadily progressing to risk evaluation and asset protection. He also explains what should be in an incident response plan and offers advice on cybersecurity training for employees and managers. Cybersecurity Program Development

The later chapters deal with cyber threats affecting machine learning, cloud computing and blockchain. There is also an important section on trends in regulation, essential from both governance and decision-making perspectives.

If read from cover to cover the book provides a comprehensive overview. However, it is structured so that readers can choose what is most relevant to them (although the first third is for everyone). It allows executives to not only know what questions to ask but to understand the answers as well.

 

Manage Your Boss

By Jonathan Vehar

Centre For Creative Leadership, $31 (e-book), 55 pages

This e-book is a short read but a pithy one, explaining how to manage upwards to minimise misunderstandings and friction. Vehar specialises in the design of business education programs and he believes that it is up to the person in the subordinate position to actively manage the relationship. This means finding out the preferred communication methods of the boss, how closely they want to oversee their reports, their methods for resource allocation, and how much information they wish to share. In each case it is up to the subordinate to adjust their working methods accordingly, although Vehar suggests ways to communicate to the boss when more direction or assistance is needed. It is generally more effective to approach the boss with a clear list of suggestions rather than vague open-ended questions.

Manage Your BossThere are numerous checklists that can help define, guide and develop the relationship, as well as interesting anecdotes. Along the way Vehar notes that your boss is usually obliged to look upwards to their own boss. The concluding chapter provides a four-step framework for discussions: pluses, opportunities, issues and new thinking. It is a straightforward, practical system, and a good way to build the trust that the relationship requires.

 

 

 

Downloadable research

A guide from Deloitte, Forecasting in a Digital World, underlines the extent to which advanced maths and machine learning have changed forecasting. The guide explains the basics of algorithmic forecasting and examines cases where the new tools have provided predictions that have been more accurate and timelier than traditional methods of data compilation and spreadsheet analysis.

forecastingThe key figure is the CFO, who is responsible for assembling and leading a team of people who understand both the business environment and the technology. The CFO also has the task of integrating the forecasts with the company’s strategic processes, including at the board level.

Download from:

https://www2.deloitte.com/au/en/pages/finance-transformation/articles/crunch-time-6-forecasting-in-digital-world.html

 

 

In a TED Talk that mixes insight with humour, entrepreneur Chieh Huang explains how micromanagement leads to exhausted, dissatisfied employees and kills innovation. In fact, most senior managers are aware, when questioned, that micromanagement is counter-productive. Their attempts to do it usually stem from a desire to re-engage with ‘real’ work rather than managing managers.

He explains how managers have to understand their role, and step away from their instinct to micromanage. This entails an acceptance that employees might occasionally fail. Any short-term costs, however, are certain to be outweighed by increases in productivity and innovation.

View at:

https://www.ted.com/talks/chieh_huang_confessions_of_a_recovering_micromanager

micromanaging

 

A new report by McKinsey, Megadeals: How Data and Analytics Can Dramatically Boost Success, discusses how business analytics can be used in large, complex deals. There is often a reluctance to apply data-based methods to big deals but the report authors believe that by drawing on multiple data sources – customer-relationship management, enterprise resource planning, sales reporting, and external data – it is possible to create rich datasets that can provide important insights.

Analytics can also provide early warning of possible problems and enhance risk management. Although the report focuses on large deals the authors believe that the processes can be used on deals of any type and scale.

Download from:

https://www.mckinsey.com/business-functions/marketing-and-sales/our-insights/megadeals-how-data-and-analytics-can-dramatically-boost-success

 

 

Hays Specialist Recruitment has released its Jobs Report for the period to June 2019, looking at the trends of skills in demand within the areas of commerce, professional practice and the public sector. While there is considerable diversity across the areas a common theme is an increasing demand for an understanding of analytics and cloud computing.

Graduate job applicants with these skills should provide details of their qualifications, and people who are seeking promotion or to change jobs should emphasise any upskilling they have done in these areas. This is to show that that they are both competent with the new fields and are willing to undertake continuous improvement.

Download from:

https://www.hays.com.au/report/accountancy-finance—commerce-industry-695

https://www.hays.com.au/report/accountancy-finance—professional-practice-931

https://www.hays.com.au/report/accountancy-finance—public-sector-375

 

 

The Australian Cyber Security Centre has released the Australian Government cybersecurityInformation Security Manual to help organisations protect their information, networks and systems from cyber threats. The guidelines within the ISM are based on the experiences of the Centre and the Australian Signals Directorate.

The ISM is aimed at Chief Information Security Officers, Chief Information Officers, cyber security professionals and IT managers. The guidelines discuss both governance and technical concepts, with chapters on equipment management, database management, system hardening, outsourcing and data transfers. The entire document can be downloaded or individual chapters can be selected. A useful Security Assessment Aid is also available.

Download from:

https://acsc.gov.au/infosec/ism/index.htm

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s