• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
chuttersnap

chuttersnap

The Banquest of Life

February 10, 2020

I am blogging everyday (or nearly everyday) on The Daily Stoic.

Lots of lessons in this one on table etiquette and manners. We should be patient for the dishes on the table and wait our turn. Reaching out is impolite and is a metaphor for wanting something we don’t have yet in the future. I’m reminded of trips with this idea. I often don’t get excited about a trip until we’re on our way with the trip. I’ve found getting excited ahead of time doesn’t really do much for me.

A lot of those same lessons can be applied for wanting for things to get done at work. I was once asked why I’m not upset or freaking out about a security incident that we were currently dealing with. My response was that right now someone is starting or doing something that I will find out about in three months and it will blow up my day. There’s no reason for me to get upset now. It’s already happened and in the past. What’s important is moving forward and addressing the issue. I used this same mindset early in my IT career. When I had long workdays that led into early mornings, I always told myself that at some point I would be at home in bed sleeping.

There are other lessons from a banquet. Be grateful to be invited. Take our time and savor the moment. Don’t indulge too much in the food or drink. It’s not healthy. Offer assistance at the end to help cleanup which is selflessness. Finally, put on your own banquet of charity.

In Experiences Tags self improvement, Daily Stoic
← Daily Stoic(s) Daily Stoic(s) →

Latest PoDCASTS

Featured
Apr 28, 2026
[RERELEASE] What is the perception of information security - part 1
Apr 28, 2026
Apr 28, 2026
Apr 21, 2026
Exploring the Quantum Horizon: Why We Need CBOMs Today
Apr 21, 2026
Apr 21, 2026
Apr 14, 2026
Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Apr 14, 2026
Apr 14, 2026
Apr 7, 2026
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Apr 7, 2026
Apr 7, 2026
Mar 31, 2026
[RERELEASE] What is a SIEM?
Mar 31, 2026
Mar 31, 2026
Mar 24, 2026
[RERELEASE] What is threat modeling?
Mar 24, 2026
Mar 24, 2026
Mar 17, 2026
[RERELEASE] What is cryptography?
Mar 17, 2026
Mar 17, 2026
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026

Powered by Squarespace