C-Suite Network™

Categories
Best Practices Growth Human Resources Management Skills Women In Business

Listen Different

Typically, I write about speech. But today I want to take a new look at the role of the listener in leadership communication. As Apple might say, you have to “Listen Different.”

Of course, as the speaker you need to present your information in a way that will make sense to that particular listener, which is an important leadership skill. But that’s only half the story.

Not everyone is going to be good at adapting their speech to fit your expectations for what good communication sounds like. That’s why it’s important to learn to listen differently, so as not to be at risk for missing some of the most valuable pieces of information.

As an example, I work with a lot of women’s groups, and one of the most common frustrations I hear is when a woman makes a comment in a meeting, which gets glossed over, and then five minutes later one of the men at the table says almost the exact same thing, but he is praised for the contribution. The following cartoon illustrates the sentiment.

Gender-bias issues aside, why this is such a common experience, and how can it be changed? The underlying principle stands for everyone – women and men alike. The truth is that the responsibility for change is shared by everyone present Here’s one reason why:

Sometimes the way a comment is framed makes it “fly under the radar” if listeners aren’t tuned into that frequency, so to speak. For example, they say something like “What about X? Should we look at that? Would that work?” If you heard this at a meeting, what would your response be?

While the person is technically making a suggestion, you might not register the value of the suggestion because it is framed as a series of questions that – on the surface – seem to be seeking validation or approval.

Believe it or not, many listeners don’t understand the nature of what they’re really hearing, and need to recognize the speaker’s intent

You might wish they had just said, “We haven’t tried X yet; let’s take a look at that option,” but they didn’t. So you need to learn to hear the message, no matter how it is framed. Make sure you’re fully present when someone is talking, because we first process tone and instinctive feeling before we process actual meaning. Otherwise, you risk missing out on critical information.

But even if you are just a participant in the conversation and you realize that you do hear the someone’s real message but believe the others in the group somehow missed it, or if “Ms./Mr. Triggs” offers an idea that is only praised when repeated by another person, it becomes your responsibility to diplomatically draw it to everyone’s attention: “Yes, Pat, I think you’re reinforcing what Chris said a moment ago about…” After all, if you’re not part of the solution, you’re part of the problem, right? Passive listening and lack of proactive participation are not qualities of effective leadership.

It may be frustrating to feel like you need to work harder at listening, that people should just “speak clearly,” in the end, communication is a two-way street, so if you want to be an effective communicator, learn to listen different.

********

Do you have trouble communicating effectively with someone, or feel like your contributions are often overlooked? If you have other questions or feedback about this issue, contact me at laura@vocalimpactproductions.com or click here to schedule a 20-minute focus call to discuss it with me personally!

 

 

 

 

 

 

 

Categories
Best Practices Growth Management Personal Development Technology

The Escape Artist – How to Stop the Data Thief

When you watch Ocean’s Eleven you know that breaking in is only half the battle; you also have to get out unnoticed or undetected. The same thing that is true for bank robbers and cat burglars also holds true for hackers.

If you are a business owner or executive responsible for keeping your customers or your corporate data secure and you think it’s all about stopping the bad guys (and gals) from accessing your data, you are missing what might be the biggest point of failure: their escape.

Over the years we have seen that many breaches are not noticed or identified for months and sometimes even years, which means not only did the bad guy get away with it, he (or she) was then able to unload their loot or start using the data without worry that they would be noticed. That’s good news for them, but not so good for you.

In order to fully discuss the escape portion of the breach, the part that most people forget to talk about or protect against, let’s look at the three main players or threat actors in this scenario. Going forward I will use the common term “hacker” to mean any of these threat actors.

  1. The external hacker with no authorized access to your network: These are the people who sit behind their computers anywhere in the world and try to find networks that are open or system vulnerabilities just waiting to be exploited. Open networks are typically those that do not have good firewall rules, have publicly facing systems that should not be publicly accessible, or have exploitable web application vulnerabilities. It only takes one bad line of code, one misconfigured firewall rule, or one forgotten system on the perimeter to leave your organization exposed.  Once you are exposed and they are in your network, that is where their fun begins.
  2. The third party vendor or partner who has direct access to your network (usually via VPN): These are the organizations outside of yours that you do business with and need access to your network. They might provide you data or receive data from you, they might monitor another system that you manage, or do a number of legitimate activities. However if you don’t know how secure their networks are, which you never truly will, or you don’t know who they employ, you have opened up your network to their network and their people. If they are hacked and that hacker finds the access to your network – boom, they are in.
  3. The trusted employee: Your employees are not going to harm you right? Most of them will not and even the ones that do are often not trying to harm you. But even those employees who mean no harm cause errors or misuse their credentials, which lead to breaches and data loss.

Once the data has been gathered by the hacker they need to get it out of your network and into their control, the escape. Allowing the escape is where many organizations fail by making this too easy or allowing the hacker to get out undetected. You must know all your outbound connections, they must all have a legitimate business need, they must be reviewed on a regular frequency to ensure they are still needed, and they must be monitored.

You may think this sounds like a lot of work, but if setup properly with the right tools and processes it does not have to be cumbersome going forward. If not built right the first time, it can take some time to put in place, but honestly the pain of discipline in this scenario is going to be much better than the pain of regret later.

If you are reading this and thinking, “I have no idea if data can get out of my network unnoticed,” start asking these questions to the people who work for you that manage your infrastructure. Here is the question you can ask, the answer you want to hear, and the next step if the answer is not what you are looking for. The Next Steps are high level and might require outside assistance or third party tools and vendors.

Question Answer Next Step
Do we have all our outbound firewall rules documented with business justifications?

You want the answer to be yes

Implement a plan to have the network team spend the next few months documenting all firewall rules. This will mean working with business owners to understand what traffic is necessary and where it has to go.
How often do we review the rules to ensure they are still needed? You want the answer to be at least every six months

 

Implement a plan, either manually or with automated tools to start reviewing rule sets at least every six months to ensure they are still needed, still use secure protocols, and are going to the correct destination outside your network.
What are we doing to monitor outbound traffic? You want someone to be able to give you specifics and have incident response plans that explain what they do if they see malicious or anomalous traffic. Document an incident response plan, determine what third party resources might be needed in the event of an incident, and put processes in place to monitor traffic for anomalies or suspicious behavior.
How would we know if sensitive data left the network? You want a specific answer that should be easy to find if it’s being done. Research data loss prevention solutions or other network detection tools.
Do we allow encrypted data out of the network?

The answer should be no – we only send encrypted data to organizations that we have vetted and only to specific IP addresses they have given us.

This is important because malicious users and hackers will actually steal your data and encrypt it with their encryption keys so that it is undetectable by Data Loss Prevention (DLP) software and so that no one can steal it from them. Yes they are often more aware of security than you are.

If no one can answer these questions or you are not happy with the answers, take a deep breath and start a new conversation. No finger pointing and no yelling, but an open and honest conversation with your staff about why this is important and how things are going to have to change in order to keep the data secure.

Lastly remember that tools do not solve all problems and only work when implemented correctly. There is no silver bullet no matter what a vendor tells you. Ensure you have the right people asking the right questions of the vendors if you are bringing in a tool or managed service offering to monitor your network.

This is of course just the start of the conversation and the beginning of what needs to be done. If this is overwhelming and you don’t know where to start or what to do next, I can answer your questions. Email sharon@c-suiteresults.com to discuss your questions or concerns on this topic. I am a 12-year security veteran and have seen 100s of different networks and situations and I am happy to discuss your situation with you.

Categories
Best Practices Growth Management Personal Development Technology

Belle’s World – Security

Has your personal information ever been hacked?

There are towns across the world, where people still leave their keys in their car and keep their houses unlocked. However, for many of us in urban or suburban areas that would be unheard of. If we were to do that the likelihood of having our car or having items from our house stolen would increase or has happened. Until people felt the effects of these robberies they continued to leave things unlocked and didn’t prepare with cameras and security systems which became the norm after these types of attacks happened. It wasn’t until individuals experienced it that they felt they should do something about it.

In today’s world we have another growing issue that is similar to the past but different in how its done – cyber security. Many of us have received phishing emails and the stats say that almost 30% of them get opened1. These phishing emails can come in both personal and professional emails. Therefore, as a company the risk is increased because the data is expansive and includes more

than just an individuals information. Why does it take an attack for a leader to realize they need to spend the money before to prevent these attacks versus after. Mostly, it about the human element of feeling too powerful and big that anything would happen to their company. Secondly, they are not truly understanding the power of cyber security to actually keep their companies safe.

One of the stories I heard recently was how the Boomer generation is still all about interacting with humans and the millennials are about interacting with technology. There is a little truth in this statement but it is after all a generalization. As I work with folks who have experience and have been very successful, it is hard for them to wrap their head around how far technology has come and the fact that people who be stealing data. They get the concept but not the enormity of the issue. Unless they get hacked personally they really don’t understand the need for their companies. Large companies are still getting hacked and many times its because the leadership has decided that it won’t happen to them and the financials at the moment are more important than a potential risk. However, the potential risk is much larger than what they can truly understand. The younger folks on the other hard are unable to influence their leaders to make the change and connect with them from the human element and therein sometimes lies the issue.

Even when it comes to cybersecurity, it is all about people. The hackers are people who are preying on companies and individuals. They put phishing emails or hack into systems through individuals. Individuals who are part of companies that house lots of personally identifiable information for employees and customers. Each of our devices are becoming smarter and connect to each other in many ways that we may not even comprehend. These devices are going from our homes to work to public areas. In our home, each person that has a different device is being connected and will be able to “talk” even more. There are so many channels from which a hacker can now infiltrate and do what they need to do. It is a real problem and the leaders who think it won’t happen to them need to spend some time truly understanding what cybersecurity is all about and get the right products and safeguards in place for the benefit of their own career and their companies.

There are too many leaders sitting on their previous knowledge and not moving with the times. In our lifetimes, technology is changing at an exponential pace. If we want to be successful for 50, 60, 70 years (due to us living longer) we will have multiple lifetimes and will have to continue to learn and grow at each step. It’s not easy when you have been the best at what you do for years and now the world is changing around us. It takes times, motivation and the right guidance to change your mindset to be able to handle the new things happening in the world.

How are you protecting your personal and company security information?

Welcome to Belle’s world. Everything in this world is based on a bell curve. Our media concentrates on giving advice to make everyone be a part of the masses.

This is a weekly series of Urvi’s insights on her perception of the world. They say perception is reality and she lives in her own fantasy world. This allows her to delve into the human element of our lives, helping individuals decipher their own souls, to understand, who they are and what they want, in the journey of life.

Belle’s world explores the extremes and goes beyond the surface. Ready to read about some of the “elephants in the room?”

Contact urvi, to discover your self-awareness that will unleash the innovation mindset within you and help you become both emotionally and financially wealthy. https://www.radicalroamer.com/ belle-s-world #thehumanelement

Categories
Best Practices Entrepreneurship Management Marketing Skills

How To Use Mind Probing Questions to Negotiate Better

“Rest your mind when reflecting, move to action with conviction.” -Greg Williams, The Master Negotiator & Body Language Expert

When it comes to negotiating better, the questions you ask will be the gateway through which success awaits. The more probing the questions, the more engaging will be the mind. The more engaged the mind becomes, the greater the opportunity to alter the state of mind.

The following are mind probing questions you can pose to yourself and the other negotiator to achieve greater negotiation outcomes. By thinking deeper about the negotiation mindset you should possess, you’ll also deepen the thoughts that you engage in during the negotiation.

Questions to ask yourself and to consider about the other negotiator:

Do you know where you’re really going in the negotiation (i.e. end goal), and the detours you might have to make/take, if you encounter roadblocks you’d not considered? When putting your plan in place for the negotiation, you should consider the style of the other negotiator, what style you’ll display in response to the opposing negotiator’s style, and how you’ll attempt to sway his perspective once the negotiation has begun.)

Do you know how long it might take to reach your negotiation goal and what other obstacles might compete for your time and attention? In this sense, you have to consider how time might be used for and against you. The longer it takes to reach a negotiation outcome, the more likely you and the other negotiator may fall prey to the pressures of time, which means, you may make concessions that are not beneficial to the outcome you’re seeking.

At what possible points might you exit the negotiation based on what you’ve achieved or not achieved at that point? Always have exit points in mind whereby you’ll exit the negotiation if it’s not going according to your plans and you don’t see the opportunity to salvage a plausible outcome.

What’s your ‘fallback position’ if you have to exit the negotiation? You should always exit a negotiation by letting the other negotiator feel respected, even more so if you don’t come to an agreement when you exit.

What body language and other nonverbal signals will you be vigilant of in seeking added meaning to a statement or question made by the other negotiator? Negotiators exhibit body language signals that give insight into their mindset when they make offers/counteroffers. The better you are at deciphering such signals, the greater insight you’ll gain into what’s really on that negotiator’s mind.

What is the opposing negotiator really seeking from the negotiating, and what will he really settle for compared to what he says is his best offer/deal? The way he makes such statements (i.e. leaning towards/away from you when making such a declaration, exhaling strongly after making the statement, raising/lowering the tone of his voice, etc.)

Be very aware of the questions you ask during a negotiation. The quality of the questions will determine the quality of the answers you receive, which will enhance or detract from your opportunity to enhance the outcome of the negotiation. By being vigilant to the body language signals that are displayed, you’ll receive hidden meanings that’ll add value to the answers. Thus, by asking mind probing questions, coupled with reading body language, you can increase your negotiation win rates substantially … and everything will be right with the world.

Remember, you’re always negotiating!

 

 

Categories
Best Practices Entrepreneurship Human Resources Management Marketing Skills Women In Business

The 4 Word Secret to Confident Public Speaking

Today I had a first session with a new client whose primary focus is public speaking. Her story is common: While she’s confident in front of her team, when addressing larger groups, high-stakes audiences or people she doesn’t know as well, her heart starts to race, her face gets flushed, palms sweat, and a whole litany of self-defeating “what if” scenarios race through her mind.

What if I forget what I want to say?

What if I make a mistake?

What if they’re not interested in my topic?

What if I don’t seem expert enough?

What if I can’t answer a question?

 This kind of self-destructive talk is what is referred to as “head trash.” It piles up, festers, and can become overwhelming if you don’t get rid of it.

So I said to her: “I’m going to tell you the secret to changing everything and speaking with confidence. It’s four little words, and I want you to write them down in big letters and tape it to your bathroom mirror, computer, refrigerator or anywhere you’ll see it regularly, got it?”

“Got it,” she said, and grabbed her pen.

Then I told her the secret: “IT’S…NOT… ABOUT… YOU.”

She finished writing it down, then stared at the paper, processing its meaning.

“Here’s the thing,” I explained. As a presenter, you’re now in customer service. Your job is to make sure that the audience has the best experience possible. Do you love your topic or at least think it’s really important? Share that passion with them, and help them understand it.

“Don’t worry about being self-conscious when making eye contact with people. Each person there wants to feel like you’re talking to them personally. Look at each person so they know that they matter to you, that they feel like they’re part of the event.

“When you go to hear a speaker, or when someone is talking to your team, are you sitting there silently evaluating them the whole time, waiting to catch them in a mistake, or are you just hoping that they’ll be interesting and give you some important information? Of course it’s the latter. You don’t want a speaker to fall flat; that makes everyone uncomfortable. You are subconsciously rooting for their success, because if they have a good speaking experience, you’ll have a good listening experience, and that’s your main interest. That’s exactly what your audience is hoping for too.

“How do you feel about that?”

“Truthfully?” she began, “As soon as you said that, I felt instant relief. If I just focus on taking care of the audience, then I’m not worrying about my own perfection, whatever that means. It suddenly feels like a very realistic, attainable goal. I can do this.”

With that, I encourage you to take out your “head trash,” and turn your attention to serving your audience. A good place to start is with the goal of being the speaker you’d want to listen to if you were in audience. Put them first, and you’re guaranteed to come out on top.

********

Do you have questions or comments about the issues in today’s post, want to know how to apply them, or how to help others with them? If so, contact me at laura@vocalimpactproductions.com or click here to schedule a 20-minute focus call to discuss them with me personally!

 

 

 

 

Categories
Best Practices Entrepreneurship Human Resources Management Marketing Skills Women In Business

Truth Versus Lie

“Truth Versus Lie”

Have you ever been deceived, or lied to? The answer more than likely is, yes. When that occurred, how did you feel? Were you happy, elated, or overjoyed with a sense of exhilaration? Again, probably not.

Here’s the point, when we label an occurrence as a lie, it takes on a different meaning per the way we act, versus thinking of it as the truth. Nevertheless, in some situations, because someone has lied to us, we move towards a more positive outlook in our life but we don’t realize it at the time. Even though we may not know it at the time, that person has done us a favor. Now, I’m not suggesting that you seek to associate with those that lie to you to have them extend a favor. Instead, be mindful of the benefits derived from not being told the absolute truth about something, per the benefits it may hold for you. That may sound strange, but in life we get what we expect, so expect something good out of the situation.

The next time you catch someone in a lie, appreciate the fact that you’re seeing the person in a different light and be glad of that additional insight. You can use it to improve yourself, which might mean getting away from that person. If that turns out to be the case, you’ll be moving your life upon a path of future discovery and  be away from the environment that’s not serving as well otherwise … and everything will be right with the world.

What does this have to do with negotiations?

In a negotiation, deceit can reign supreme, as negotiators go about playing jet-eye mind tricks to position the other negotiator. It’s expected that neither will be so transparent as to disclose their full negotiation position. So, if it’s expected in a negotiation, and you’re always negotiating, why do you allow it to be permissible during a negotiation and not in other aspects of your life? The answer lies in the fact that you more than likely see one aspect, negotiations, as being something more formal than other aspects of your life. In essence, it’s the mindset you possess in one situation versus another. If that’s the case, and you’re the person controlling your mind, you can give the meaning of a lie a meaning that’s beneficial to you. That doesn’t mean you have to drop your guard, it means, be mindful and understanding of what you’re guarding. Do so … and everything will be right with the world.

Remember, you’re always negotiating!

Categories
Best Practices Entrepreneurship Human Resources Management Marketing Skills Women In Business

David, Goliath, and the Investor Pitch

I had the distinct honor and pleasure of coaching five Hero Club entrepreneurs in preparation for their pitch at the C-Suite Network Investors Summit in San Jose on September 11-12th. It was an exciting event and helping people with great ideas, products, and services tell their stories in a compelling way is one of my favorite parts of the job.

All five CEOs were terrific, poised and articulate with a solid pitch and great visuals, and they all reported being approached afterward by interested parties; what more could we ask for? But in retrospect, one pitch stood out uniquely, and offers a lesson about overcoming the odds and expectations, and why you should never underestimate anyone – including yourself.

David Williams is the CEO and superintendent of Village Tech Charter Schools in Cedar Hill, Texas, just outside of Dallas. Various people I spoke to after the fact confirmed that, before his presentation, there had been a general wondering about why a non-profit, specifically a Pre-K – 12 school, was pitching in Silicon Valley. At best, most admitted preliminary assumptions of it being something of a charity case, like when the older kids let the little one play with them, even though they know he’s not in the same league. There seemed to have been minimal expectations for his performance. Perhaps not so surprising was the fact that David himself later confessed to having similar concerns leading up to the event.

David may not be alone. How many times have you anticipated an event or opportunity with trepidation, based on feelings or concerns of inadequacy, of not belonging? Sometimes there’s a bit of the “Imposter Syndrome” that creeps in when surrounded by other highly expert, highly experienced, and/or highly reputed people. It might also occur if you’re just generally not comfortable presenting to large groups, if the event is particularly high-stakes, or if it’s your first time in the spotlight in a new context such as a conference presentation, in the media, or in this case, an investor pitch. The enormity of the pressure to perform and succeed in the public eye is enough to make most people’s hands shake – even if only a little.

But to David’s credit, he rose to the occasion and proved that he was not going to let this Goliath of an event get the best of him. He knew what was at stake, and he knew how much he wanted it for his company, his school, his teachers and his students, and that was the motivation he used to prepare for it.

The biggest challenge was the need to shift from “teacher” mode to “business executive” mode. Knowing your audience and figuring out how to angle your point so that it speaks to their unique perspectives and interests is a critical factor in the art of persuasion, and one of the most common areas where people fall short.

When speaking to an audience of teachers and school district members – his comfort zone – stories of children’s experiences and anecdotes of their funny and heartwarming comments will successfully convey all sorts of implicit information about the success of a program. But to a room of business executives and investors, those stories are just the sprinkles on the sundae: added for a little color and sweetness, but of minimal substance. We had to shift the focus to problems and solutions, to data and dollars – a philosophical shift that makes most teachers’ stomachs churn with disdain. And the whole thing had to be done in eight minutes.

To me, the key to his success was the fact that he was able to adapt his content to meet the needs and expectations of his audience, while still remaining completely authentic, and true to himself, both in preparation and on stage. This is often one of the greatest challenges we face when we find ourselves in new contexts with unfamiliar audiences.

I know inside he didn’t like having to cut out some of his favorite stories, but we found a way to use a couple of them in ways that made statistics personal, and humanized the call to action. And David was already a confident and competent public speaker, so it was really a matter of applying those skills with a different focus, and convincing himself and others that he was a much of a leader in the business world as in the academic sphere.

Sure, there were investors there who weren’t interested in adding a brick-and-mortar enterprise to their portfolios. But it was clear by the end that he was the crowd favorite and had earned the personal and professional respect of everyone there. The little non-profit venture had set the bar for what everyone else believed an investor pitch should look and sound like. As I heard several people say with genuine admiration that day: “He killed it.”

The moral of the story is that even when you feel like you’re out of your element – or even out of your league – do not let yourself be intimidated by the Goliath. Seek whatever guidance you need to put the pieces together, and play to win.

********

Are you preparing a pitch, or do you have questions about another critical presentation? If so, contact me at laura@vocalimpactproductions.com or click here to schedule a 20-minute focus call to discuss it with me personally!

 

Categories
Best Practices Growth Management Personal Development Technology

Security is Not Insurance – Debunking the Myth

Since 2005 I have been in the Information Security consultant and today I consult and coach security executives on strategy, compliance, messaging, and teams, so today I am going to talk about something that is critical to any organizational leader: information security. More specifically, the myth that security equates to insurance.

Many people in the security industry have used the security analogy for a very long time to explain the importance of security to an executive or client who has said,  “Why do I need security? It’s expensive and nothing has happened to my network; my company’s data is fine.”

The response often provided has been “for the same reason you need car insurance or medical insurance, you never know when there will be a problem.” Using a real-world situation to help explain something that is not always clear makes sense, but this analogy is not correct.

The reason it’s not a good analogy is because security is not insurance. Insurance attempts to make you whole again. It is there to replace your car, rebuild your house, allow you to replace lost or stolen items, or help you regain your health. Security on the other hand does not make you whole; once your data is stolen, your network breached, or your systems locked up with Ransomware it is not security that will make you whole again. There is insurance you can purchase to use when the hacker on the other end of the phone says we want 20 Million Dollars to unlock your systems, but that really is insurance.

If we are going to use analogies, then security is your force protection, it is proactive. You know the guys (or gals) at the perimeter with the big guns that are going to keep the bad guys (or gals) out in the first place. When I used to work at the Pentagon, there were armed guards with very big guns making sure only the people with the proper access could enter the building. Then there were locked doors within the building that could only be accessed by another select group of people. That is security! We don’t call them insurance guards we call them security guards (or in this case military police).

The same is true for access to your computer systems, network, and data. Your Information Security or Cyber Security (if you are using that term) team is the armed guards; it is their responsibility to keep the bad people out, to monitor for intrusions, and to react if or when a breach is observed. If you are treating this group as insurance you are not giving them the level of importance they deserve, the funding they need, or the authority they require.

For small organizations, you might think, “Who wants my data? I’m good till we get bigger; the hackers are out there looking for the big guys to steal from.” But that is not true at all. It’s like the burglar who will just move on to the next house when they see the ADT sign in your neighbors yard. If your neighbors are the bigger companies with the fancy security and armed guards it is your network the hackers are after because they know it will be easier.

But you want to say “I don’t have anything worth taking” and that might be true at the data level, but you do have something worth taking. It is your resources, your connection to other networks, and it is the fertile playground you are giving them to practice their craft. By allowing your network to go unprotected, you are allowing hackers to practice, to find vulnerabilities they can use against other networks, and to potentially use your network to launch an attack on another organization.

I am writing this so that we can stop equating security with insurance. Stop looking at this as a cost and start looking at is as a responsibility. You are not only protecting your data, your employees, and your customers; you are also protecting other organizations by putting the guards up around yours.

If you do not have a security team or strategy, don’t worry. It’s not too late and it does not have to be scary. There are lots of great consultants out there who can help. As a 12-year veteran of the information security and compliance space,  I invite you to send me an email at sharon@c-suiteresults.com or reach out via LinkedIn https://www.linkedin.com/in/smithsharonj/ to ask any questions you might have on this topic.

 

Categories
Best Practices Growth Leadership Personal Development

5 Easy Steps to Writing Your First Book

“Everybody does have a book in them, but in most cases, that’s where it should stay.” – Christopher Hitchens (maybe)

There are several variations of that quote and some dispute as to who first came up with the snarky witticism. But one thing’s for certain: It wasn’t Keith Leon. The co-founder of Leon Smith Publishing has been helping would-be authors become published authors for nearly 15 years.

As the author of three books on extreme leadership, I’ve long been a student of good writing and of writing processes. So I was curious about the advice Leon offers when he speaks to groups, teaches writing classes, or mentors individuals who want to turn their message into a book. Here are five tips he shared with me during a recent conversation:

  1. CREATE A ROADMAP

Most folks give up on their idea because they start without knowing where the book will begin or where it will end. A roadmap provides the path.

Once you decide the type of book you want to write – a memoir on launching your business, for example – start by writing down a series of one-line answers to a simple question: “If I were to write this book, what would I want to share?”

Don’t worry about the order. Just brainstorm things like key stories and processes. Keep writing them until you look at the list and say, “That’s it. That’s what I want to say in my book.”

Then make a second list using the first. This time, ask, “Who wants to go first?” Inevitably, one will jump up and say, “Me! Me! Me!” If not, ask, “Which one feels easiest?” Then ask who wants to go next and keep going until you have your roadmap complete.

  1. START WITH WHAT FEELS RIGHT

The roadmap provides the path the book will follow, but not necessarily the path you’ll take to write it. Begin by writing the chapter that feels “juiciest” or “easiest,” Leon says. Then do the next one that gets you most excited. And so on.

“You build momentum, and it doesn’t feel like a chore,” he says, “so you keep coming back.”

  1. FINISH WHAT YOU START

One of Leon’s rules is to complete the chapter you start before moving on to another chapter.

I didn’t quit my day job when I wrote my leadership books, so I know this challenge well. When you step away from your writing project for a few days, sometimes you return to find the chapter you were working on no longer is the “easiest” or the “juiciest.” If that happens, Leon says, re-read the last few pages of what you’ve written in the chapter. That’s usually enough to get you back into it and rolling again. But don’t leave it unfinished, because that’s just asking for trouble.

“If you have a chapter that’s undone, your subconscious knows it and it’s hard to complete the next one,” Leon says. “Then you get writer’s block, which is really just a pissed off inner child, right?”

  1. HONOR YOUR INNER CHILD

Leon tells his students to set an alarm and write in 50-minute blocks. When the alarm goes off, get up and do something else – stretch, go outside, put on some music. Do something for your inner child for 10 minutes. Then have a conversation with your inner child – out loud – before you return to your writing.

“OK, it’s my time to play,” you say. “But don’t worry. I’ll be back in another 50 minutes.”

Many of Leon’s students resist this idea, he says, but they inevitably find it “profound” after they give it a try.

  1. WORRY ABOUT THE ROCK, NOT THE DIAMOND

We’re conditioned to think that what we read is exactly what an author wrote. New authors can tend to expect perfection in the first draft, and that seldom happens. Writing is an artistic process that’s sometimes sloppy. Books go through revisions and an editing process. And editors, as Leon points out, take your rock and polish it into a diamond.

The freedom in knowing someone has your back allows you to focus on writing without judging what you’re writing.

“I encourage people to free-form write,” he said. “Then read it one time from beginning to end. If something makes you want to hurl, change it. If not, keep it.”

Then let the editors take over.

Leon’s advice here applies primarily to non-fiction books. Some authors also use it with novels, while some stick more to a storyboard. But if you’re convinced you have a story to tell or a message to share – fiction or non-fiction – and you aren’t sure how to get it from your head and heart to a finished document, Leon’s roadmap will show you a way.

 

Categories
Best Practices Entrepreneurship Human Resources Management Marketing Personal Development Women In Business

Accountability: 3 Steps to Holding Yourself Accountable to Grow Your Influence

Click here to watch Accountability: 3 Steps to Holding Yourself Accountable to Grow Your Influence 

It’s not the skills and techniques you and your team learn that make you more influential.  It’s what you do with what you learn.

Accountability is the most difficult aspect of having influence Monday to Monday®.

This video will share with you three steps you can take today to avoid slipping into your old habits.  These three steps will keep you focused and disciplined to do the work of communicating with influence Monday to Monday® until it becomes ingrained in you.