• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Austin Distel@austindistel

Austin Distel

@austindistel

The Daily Drucker

February 28, 2021

I am blogging everyday (or nearly everyday) on The Daily Drucker: 366 Days of Insight and Motivation for Getting the Right Things Done.

Yesterday - Role of the Bystander

The action point is be a bystander and look at what needs to be done in an organization from a different angle. Then I act and that may shock people. I’ve never been opposed to bring forth or try an idea. I don’t know if I shock people. I will do things in ways outside the norm, either as an experiment or as something that I know needs to be done. I often find people unwilling to listen. That’s okay because as long as I get results I’ll start to get more people listening.

Today - The Nature of Freedom

The action point is to list specific goals for my work. What goals will meet my personal fulfillment. Within security our goals are usually identifying risk and securing our environment. We made some acquisitions recently and those are taking up a lot of our effort and time. For me I like some of the chaos. My goals are to make my team better and get more out of them. As they grow as professionals they should learn to do thinks more efficiently and effectively.

My personal goals largely revolve around security awareness. We run the phishing program and I give regular lunch and learns to the company for improving security mindsets. My leadership has always supported me in this. Prior to the pandemic I was provided a budget for supplying food at these lunch and learns. The presentations provide people a view and some insight into the security world. This helps them be more security minded in their day-to-day jobs.

← Find Yourself A CatoDaily Stoic(s) →

Latest PoDCASTS

Featured
Apr 14, 2026
Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Apr 14, 2026
Apr 14, 2026
Apr 7, 2026
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Apr 7, 2026
Apr 7, 2026
Mar 31, 2026
[RERELEASE] What is a SIEM?
Mar 31, 2026
Mar 31, 2026
Mar 24, 2026
[RERELEASE] What is threat modeling?
Mar 24, 2026
Mar 24, 2026
Mar 17, 2026
[RERELEASE] What is cryptography?
Mar 17, 2026
Mar 17, 2026
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026
Feb 17, 2026
What are the AI Vulnerabilities We Need to Worry About
Feb 17, 2026
Feb 17, 2026
Feb 10, 2026
[RERELEASE] How to make time for a home lab
Feb 10, 2026
Feb 10, 2026

Powered by Squarespace