#8 – DISRUPTIVE RISKS IN EDUCATION – IT’S EVERY WHERE – JERRY BRONG

Let’s look at your investment in education.  If you graduated from high school, you spent about twelve years in a structured, organized, and a managed school program.  Excluding homework and travel to-from your school your in class time may have consumed 2,100 to 2,200 days or about 10,800 to 11,000 hours of your life.  If you have a four-year university or college degree, you may have spent another 36 to 45 months in school.  Add to your school time hours of your life spent in other training and education programs for specialized work related certifications, licenses, and professional recognitions and four  things become evident. Continue reading

#8 – GETTING THE RAISE YOU DESERVE – ELIZABETH LIONS

Elizabeth Lions PixMy client looked at me a long time across the table in Starbucks and said, “I can negotiate for others, but not for myself.  For whatever reason, talking about money really stresses me out”: she said.

This surprised me a great deal.  Highly competent woman, educated and who had an admirable career path.  Certainly well accomplished and in a critical sales role to boot!

“Why is that?” I asked.

“It makes me uncomfortable talking about money.   I don’t want to leave any on the table and want the employer to do the right thing.  Especially around review time.  Certainly, they know all that I do for them.”

Continue reading

#8 – EXECUTIVE ORDER – IMPROVING CRITICAL INFRASTRUCTURE CYBER SECURITY – ED PERKINS

IMPROVING CRITICAL INFRASTRUCTURE CYBER SECURITY 

US President Barack Obama signed the long awaited Cybersecurity Executive Order on Feb. 12, 2013. The full text of the Executive Order can be found on the White House website here:

http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity

For months, the Obama administration had been floating the issuing of an executive order on cybersecurity. With the failure of the Cyber Intelligence Sharing and Protection Act (CISPA) to get traction in Congress they have delivered – the “Improving Critical Infrastructure Cybersecurity” Executive Order was signed on February 12. [For details of CISPA, see this link:

http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/HR624.pdf]

The focus of the Order is protection of Critical Infrastructure. The Secretary of Homeland Security and the Attorney General, in coordination with the Director of National Intelligence are the responsible officials.

This article describes the basic sections of the Order and the timeline that is laid out for implementation.
Continue reading

#8: UNADDRESSED RISK – PAUL KOSTEK

Paul Kostek PixWhat’s the risk of not addressing a risk?  What happens on a project when a risk is identified and not addressed/mitigated?    There may be reasons not to correct it, e.g low probability of occurrence and minimal impact,  but how do we document and track this decision?  And if we’re delaying an implementation how do we insure the risk is addressed at a later date, e.g. next version release?   How do we insure that if an audit takes place the project team can clearly explain the reasons for the decision?  Is this even acceptable?
Continue reading

#8 – THE WORST JOB – KARL SCHULTZ

Supply Chain Manager!  It is your job to never ever shut down a car assembly line with 15,000 parts.  It is your job to keep inventory as low as possible – lean.  It is your job to anticipate the risk involved – earthquakes, tsunamis, snowstorms, union strikes, manufacturing issues, and the list goes on.  And to source globally for the best-cost producer.

Key job skill – masochist! Continue reading