• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Hal Gatewood@halacious

Hal Gatewood

@halacious

Autonomy in Knowledge Work

January 23, 2021

I am blogging everyday (or nearly everyday) on The Daily Drucker: 366 Days of Insight and Motivation for Getting the Right Things Done.

The action point is to write a work plan that includes your focus, desired results, and deadline. I use a Kanban board for work. I have four columns. Ready, In progress, Holding, and Done. Work that I do are in each of these columns. When I have work that needs to get done I create a ticket and put in there details for completion. With security, I don’t have the luxury always of creating a plan and working on just that to completion. Security incidents can wreck havoc on any plans. I will often start something and then have it drop due to other priorities that seem to pop up. Maybe others in security have a much more stable set of work they can accomplish. I don’t and maybe that’s a culture thing too.

One thing I am trying to be better about is creating acceptance criteria. What things do I need to complete to close the ticket. This could be considered the plan, which involves focus and desired results. The deadline is a bit more tricky. I will ask for a deadline and usually get a cold or hot response. I’m not given a deadline usually. Maybe I should set my own. I don’t. To me it’s done when it needs to get done. When I am given a deadline, my deadline is usually well ahead of the other persons deadline. I’d like to try deadlines, I’m just not sure how they work in security. Then again maybe security isn’t so special and there are other professions with similiar issues and I’m just making excuses.

← The Source of Your AnxietyA Proper Frame of Mind →

Latest PoDCASTS

Featured
Apr 14, 2026
Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Apr 14, 2026
Apr 14, 2026
Apr 7, 2026
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Apr 7, 2026
Apr 7, 2026
Mar 31, 2026
[RERELEASE] What is a SIEM?
Mar 31, 2026
Mar 31, 2026
Mar 24, 2026
[RERELEASE] What is threat modeling?
Mar 24, 2026
Mar 24, 2026
Mar 17, 2026
[RERELEASE] What is cryptography?
Mar 17, 2026
Mar 17, 2026
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026
Feb 17, 2026
What are the AI Vulnerabilities We Need to Worry About
Feb 17, 2026
Feb 17, 2026
Feb 10, 2026
[RERELEASE] How to make time for a home lab
Feb 10, 2026
Feb 10, 2026

Powered by Squarespace