• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Hal Gatewood@halacious

Hal Gatewood

@halacious

Autonomy in Knowledge Work

January 23, 2021

I am blogging everyday (or nearly everyday) on The Daily Drucker: 366 Days of Insight and Motivation for Getting the Right Things Done.

The action point is to write a work plan that includes your focus, desired results, and deadline. I use a Kanban board for work. I have four columns. Ready, In progress, Holding, and Done. Work that I do are in each of these columns. When I have work that needs to get done I create a ticket and put in there details for completion. With security, I don’t have the luxury always of creating a plan and working on just that to completion. Security incidents can wreck havoc on any plans. I will often start something and then have it drop due to other priorities that seem to pop up. Maybe others in security have a much more stable set of work they can accomplish. I don’t and maybe that’s a culture thing too.

One thing I am trying to be better about is creating acceptance criteria. What things do I need to complete to close the ticket. This could be considered the plan, which involves focus and desired results. The deadline is a bit more tricky. I will ask for a deadline and usually get a cold or hot response. I’m not given a deadline usually. Maybe I should set my own. I don’t. To me it’s done when it needs to get done. When I am given a deadline, my deadline is usually well ahead of the other persons deadline. I’d like to try deadlines, I’m just not sure how they work in security. Then again maybe security isn’t so special and there are other professions with similiar issues and I’m just making excuses.

← The Source of Your AnxietyA Proper Frame of Mind →

Latest PoDCASTS

Featured
Dec 2, 2025
Exploring the Next Frontier of IAM: Shared Signals and Data Analytics
Dec 2, 2025
Dec 2, 2025
Nov 25, 2025
How to Close the Cybersecurity Skills Gap with a Student Powered SOC
Nov 25, 2025
Nov 25, 2025
Nov 18, 2025
What is the 2025 State of the API Report From Postman?
Nov 18, 2025
Nov 18, 2025
Nov 11, 2025
How AI Will Transform Society and Affect the Cybersecurity Field
Nov 11, 2025
Nov 11, 2025
Nov 4, 2025
[RERELEASE] How Macs get Malware
Nov 4, 2025
Nov 4, 2025
Oct 28, 2025
[RERELEASE] Why communication in infosec is important - Part 2
Oct 28, 2025
Oct 28, 2025
Oct 21, 2025
[RERELEASE] Why communication in infosec is important
Oct 21, 2025
Oct 21, 2025
Oct 14, 2025
Exploring AI, APIs, and the Social Engineering of LLMs
Oct 14, 2025
Oct 14, 2025
Oct 7, 2025
How to Prepare a Presentation for a Cybersecurity Conference
Oct 7, 2025
Oct 7, 2025
Sep 23, 2025
Exploring the Rogue AI Agent Threat with Sam Chehab
Sep 23, 2025
Sep 23, 2025

Powered by Squarespace