• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Austin Distel@austindistel

Austin Distel

@austindistel

The Daily Drucker

February 28, 2021

I am blogging everyday (or nearly everyday) on The Daily Drucker: 366 Days of Insight and Motivation for Getting the Right Things Done.

Yesterday - Role of the Bystander

The action point is be a bystander and look at what needs to be done in an organization from a different angle. Then I act and that may shock people. I’ve never been opposed to bring forth or try an idea. I don’t know if I shock people. I will do things in ways outside the norm, either as an experiment or as something that I know needs to be done. I often find people unwilling to listen. That’s okay because as long as I get results I’ll start to get more people listening.

Today - The Nature of Freedom

The action point is to list specific goals for my work. What goals will meet my personal fulfillment. Within security our goals are usually identifying risk and securing our environment. We made some acquisitions recently and those are taking up a lot of our effort and time. For me I like some of the chaos. My goals are to make my team better and get more out of them. As they grow as professionals they should learn to do thinks more efficiently and effectively.

My personal goals largely revolve around security awareness. We run the phishing program and I give regular lunch and learns to the company for improving security mindsets. My leadership has always supported me in this. Prior to the pandemic I was provided a budget for supplying food at these lunch and learns. The presentations provide people a view and some insight into the security world. This helps them be more security minded in their day-to-day jobs.

← Find Yourself A CatoDaily Stoic(s) →

Latest PoDCASTS

Featured
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026
Feb 17, 2026
What are the AI Vulnerabilities We Need to Worry About
Feb 17, 2026
Feb 17, 2026
Feb 10, 2026
[RERELEASE] How to make time for a home lab
Feb 10, 2026
Feb 10, 2026
Feb 3, 2026
[RERELEASE] How to build a home lab
Feb 3, 2026
Feb 3, 2026
Jan 27, 2026
How to Build an AI Governance Program with Walter Haydock
Jan 27, 2026
Jan 27, 2026
Jan 20, 2026
Exploring Cribl: Sifting Gold from Data Noise for Cost and Security
Jan 20, 2026
Jan 20, 2026
Jan 13, 2026
What is BSides ICS?
Jan 13, 2026
Jan 13, 2026
Jan 6, 2026
Cybersecurity Career Panel: Transitioning from Technical to Leadership
Jan 6, 2026
Jan 6, 2026
Dec 30, 2025
What is React2Shell (CVE-2025-55182)?
Dec 30, 2025
Dec 30, 2025

Powered by Squarespace