Search This Blog

Tuesday, June 16, 2009

Working with consultants

Darwin Awards for Disaster Recovery; Distributed traffic capture optimizes monitoring
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Symantec Corporation
rule

Don't let security impact performance.
A recent analyst evaluation found Symantec Endpoint Protection delivers the best security performance and clearly sets it apart from all other vendors. Upgrade your security performance by switching to Symantec Endpoint Protection and get up to 45% trade-in discount.

rule

Spotlight Story
Working with consultants

This is the second in a series of four columns on working effectively with consultants. When the client and consultant are discussing problems and how the consultant could help, both parties must be conscious that a consultant always has two allegiances: to the manager hiring her and to the firm employing the manager. You must define the scope of the consulting assignment so that the consultant can in fact legitimately tackle the task. For example, it would be pointless for a local manager to request assistance in implementing a security solution requiring corporate-wide changes. Such a project would be beyond the manager's scope. The converse problem is consultants, especially those from large firms, which use templates to prepare consulting reports where string variables are modified to include details from the client firm but which have little research and less analysis of the specifics of the client's situation and needs. It is an excellent practice to ask for a couple of sample anonymized reports from consultants before accepting their proposals; finding identical language in substantive sections of the two reports should give you pause. As you evaluate potential consultants, look for those who can state their understanding of your problems clearly. I am fond of the phrase, "Let me see if I have understood" because it's a chance to test my perceptions against those of the client. Ask your candidates to tell you how they see your situation and to define the problems they perceive. Be especially attentive to consultants who challenge your initial views of your problem: you want consultants who are able to think independently and bring their expertise to bear on your problems, not sycophants who are willing to hide their knowledge and their disagreement to get the contract. Just as important, you want consultants who can articulate their views clearly and non-aggressively. You need a reasoned exchange of views from which to learn, not a boxing match where winning is the object. Sometimes consultants are (foolishly and improperly) asked by managers to produce support for a predefined set of conclusions as part of an internal political battle; consultants must be clear that their report may very well disagree with preconceptions. Indeed, consultants should be chary of accepting such assignments: they can be the kiss of death, since providing a professional result that conflicts with the client's predetermined outcome can result in slanderous comments in the community, yet unprofessionally kowtowing to unreasonable demands can justifiably lead to a tarnished reputation, litigation for malfeasance, and perhaps expulsion from professional societies. In the next column, I'll look at relating to consultants for effective use of your time and money. M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online. Read full story

Related News:

Feds bust $55 million international telephony hacking ring
The losses in this case, which exceeded $55 million in the US alone and impacted more than 2,500 companies across the globeThe US Department of Justice today said it helped crack a ring of fraudsters who allegedly hacked into the telephone systems of large corporations and entities in the United States and abroad and sold information about the compromised telephone systems to Pakistani nationals residing in Italy.

Darwin Awards for Disaster Recovery
Many of you may already be familiar with the general Darwin Awards, where "The Darwin Awards salute the improvement of the human genome by honoring those who accidentally remove themselves from it..." In this fine tradition, Webtorials now has the "Darwin Awards for Disaster Recovery" by Gary Audin, Delphi.

Distributed traffic capture optimizes monitoring
Visibility can be the critical factor in heading off the increasing number of attacks, outages and data breaches in large-scale distributed networks. But up to now total visibility of Ethernet networks has been infeasible due to the cost of deploying analytical devices throughout the network. Distributed traffic capture is a new approach to network monitoring that can deliver complete, selectable and centralized visibility.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


Windows 7 + Windows Server 2008
Windows 7We found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Management appsHere are nine management apps that won't break the bank.

Is Your Company Prepared for the Unexpected?
In this live webcast, June, 25, 2009, you'll hear how to prepare the network now to seamlessly continue business operations during a major crisis, as well as a case study of an organization that has implemented a business continuity network plan.
Register now.


 

June 16, 2009

TOP STORIES | MOST DUGG STORIES

  1. Data center derby heats up
  2. 68-degree data centers becoming a thing of the past
  3. The 10 dumbest tech products so far
  4. National broadband happy talk papers over net neutrality fight
  5. China dominates NSA-backed coding contest
  6. Cisco says it's not eating its SAN young
  7. Sprint starts divesting iDEN network
  8. Cisco expected to be more aggressive after Q1 share losses
  9. Google unveils plug-in to marry Outlook, Gmail
  10. Future proofing your router purchases

Optimizing IT Budgets
Discover how to help IT managers work within budget constraints by offering: Fast implementation, High Return on Investment (ROI), Low Total Cost of Ownership (TCO).
Optimizing IT Budgets



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: