![]() So, what is a “crucial conversation?” The authors defined it as a conversation with high-stakes in value the people engaged in the conversation held differing opinions and emotions ran high. Although that unto itself is not a bad thing, it didn’t meet my expectations based on the hype I heard about it as a professional communication aide. I was then surprised to learn while reading this New York Times bestseller that it was labeled as “self-help.” While the authors did provide plenty of workplace examples, overall, the book is a guide for how to think and react differently in varied of situations. I assumed that it was a straightforward guidebook on interpersonal communication in a business setting. In the rapidly-changing world of Information Security, communication skills are proving to be essential for professionals in this field to get important messages across to both end users and executives.Īfter hearing Crucial Conversations: Tools for Talking When Stakes Are High recommended so often during professional development workshops, I figured that now was a good time to explore this book through the lens of an information security practitioner. Please do so!īased on 20 years of field research, four authors compiled guidelines of how to communicate effectively when professional or personal discussions with potentially impactful results get heated or emotional. ![]() We have designed it so that you can directly participate in the process. The Cybersecurity Canon is a real thing for our community. ![]() ![]() We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number. Please write a review and nominate your favorite. We modeled the Cybersecurity Canon after the Baseball Hall of Fame and the Rock & Roll Hall of Fame, except for cybersecurity books. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |