CSO - Many chess players--and I'm sure you are going to find this hard to believe--are boring. Even to their fellow chess players.
Because they try to play zero-risk chess.
These poor saps try to win by playing timidly, avoiding error at all costs, purely trying to create weakness-free positions. They don't gamble, but they also don't try new ideas, and they never play a game that anyone else would find interesting or creative or worth emulating. They aren't actually playing to win; they are playing not to lose.
[Get CSO's new monthly Risk Management newsletter]
It's a soul-crushing experience to sit down for a three- to four-hour game at my Tuesday night club, only to realize that my opponent's sole objective is to suck the life out of the position. This, I say, is no way to spend a Tuesday night. Zero-risk chess is boring.
In my professional life, as in chess, I have discovered that I like risk. I like creativity and I like winning. I am willing to gamble on my own judgment. And when I don't get the result I expect, I rethink my analysis with this new data. If I come to the same conclusion as before, I often double down.
Of course, the results of chess games don't matter. You lose spectacularly, you get to reset the pieces and try again from scratch next week. You look kind of stupid, but so what.
The results of taking this approach in business are much more tangible. Particularly with security risks, it doesn't make sense to be cavalier. But that doesn't mean your business should take no risks. Zero-risk business isn't just boring, it also has very little upside.
That is why security leaders have to become great evaluators of risk. Join me on my new blog and share your experiences as I delve into the exciting--not boring!--topic of risk management.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cyberwarfare White Papers | Webcasts