CSO - Many chess players--and I'm sure you are going to find this hard to believe--are boring. Even to their fellow chess players.
Because they try to play zero-risk chess.
These poor saps try to win by playing timidly, avoiding error at all costs, purely trying to create weakness-free positions. They don't gamble, but they also don't try new ideas, and they never play a game that anyone else would find interesting or creative or worth emulating. They aren't actually playing to win; they are playing not to lose.
[Get CSO's new monthly Risk Management newsletter]
It's a soul-crushing experience to sit down for a three- to four-hour game at my Tuesday night club, only to realize that my opponent's sole objective is to suck the life out of the position. This, I say, is no way to spend a Tuesday night. Zero-risk chess is boring.
In my professional life, as in chess, I have discovered that I like risk. I like creativity and I like winning. I am willing to gamble on my own judgment. And when I don't get the result I expect, I rethink my analysis with this new data. If I come to the same conclusion as before, I often double down.
Of course, the results of chess games don't matter. You lose spectacularly, you get to reset the pieces and try again from scratch next week. You look kind of stupid, but so what.
The results of taking this approach in business are much more tangible. Particularly with security risks, it doesn't make sense to be cavalier. But that doesn't mean your business should take no risks. Zero-risk business isn't just boring, it also has very little upside.
That is why security leaders have to become great evaluators of risk. Join me on my new blog and share your experiences as I delve into the exciting--not boring!--topic of risk management.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- Omnichannel: From Buzzword to Strategy Customers demand a seamless experience across channels, especially mobile. Read this whitepaper for a research-based framework for using omnichannel for higher customer engagement.
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- 10GbE in the Data Center Improvements in 10GbE technology, lower pricing, and improved performance make 10GbE for the mid-market a viable and cost-effective strategy. This white paper discusses...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cyberwarfare White Papers | Webcasts