What he said “Steve Jobs Understands Team Building”

Richard Bejtlich ‘s TaoSecurity: Steve Jobs Understands Team Building.

I stumbled upon the following excerpt from the 1998 book In the Company of Giants by Rama Dev Jager and Rafael Ortiz. They interviewed Steve Jobs, who had the following to say about team building, as printed in BusinessWeek:

Q. What talent do you think you consistently brought to Apple and bring to NeXT and Pixar?

SJ. I think that I’ve consistently figured out who really smart people were to hang around with. No major work that I have been involved with has been work that can be done by a single person or two people, or even three or four people… In order to do things well, that can’t be done by one person, you must find extraordinary people.

The key observation is that, in most things in life, the dynamic range between average quality and the best quality is, at most, two-to-one…

But, in the field that I was interested in — originally, hardware design — I noticed that the dynamic range between what an average person could accomplish and what the best person could accomplish was 50 or 100 to 1. Given that, you’re well advised to go after the cream of the cream.

That’s what we’ve done. You can then build a team that pursues the A+ players. A small team of A+ players can run circles around a giant team of B and C players.

Q. So you think your talent is in recruiting?

SJ. It’s not just recruiting. After recruiting, it’s building an environment that makes people feel they are surrounded by equally talented people and their work is bigger than they are. The feeling that the work will have tremendous influence and is part of a strong, clear vision — all those things.

Recruiting usually requires more than you alone can do, so I’ve found that collaborative recruiting and having a culture that recruits the A players is the best way.

Q. Yet, in a typical startup, a manager may not always have the time to spend recruiting other people.

SJ. I disagree totally. I think it’s the most important job… When you’re in a startup, the first ten people will determine whether the company succeeds or not.

Steve is right. That is why I Tweeted this last week:

Real IT/security talent will work where they make a difference, not where they reduce costs, “align w/business,” or serve other lame ends.

I was emphasizing the point that motivated people want to make a difference. They want to bring good things to life. (I loved that motto — time to junk the present one, if you catch my drift, and go back!)

After Action from 12/28/10

What did I do you last night at the hacker space:

  • Built the contact mic (pictured)
  • Fired up & logged into the Cisco 2600 router, figured out that the IOS it’s running isn’t new enough to support VLANS. Need to sort that out.
  • Figure out that the ALFA I got from china is busted. (SAD puppy)
  • Got GPS/Kismet working on the toughbook.
  • Took out the trash

Not bad for a couple of hours at the space.

Information Security News: Call for Papers: Cyber Security in International Relations

Information Security News: Call for Papers: Cyber Security in International Relations.

Forwarded from: Brent Kesler <bdkesler (at) nps.edu>

Call for Papers: Cyber Security in International Relations
Submissions due: February 1, 2011

Strategic Insights, an online journal published by the Center on 
Contemporary Conflict at the Naval Postgraduate School, is seeking 
scholarly papers on the role that cyber security and information and 
communications technology (ICT) play in international relations and the 
strategic thinking of state and nonstate actors. This issue of SI seeks 
to inform policy makers and military operators of lessons drawn from 
real-world experience with computer and IT issues.

We seek assessment and analysis based on real-world events, not 
speculation regarding potential threats and perceived vulnerabilities. 
Papers that test or develop political theories and concepts are 
encouraged. We hold a broad definition of cyber security, and encourage 
submissions on a range of ICT topics related to threats to national 
security and individual liberties, responses to such threats from states 
and non-state actors, and emerging issues offering an over-the-horizon 
view of cyber security.

However, all submissions should be empirically based; we do not intend 
to publish work purely devoted to editorial opinion, threat 
anticipation, or policy advocacy. Submissions therefore should attempt 
to map capabilities based on available sources or game out real-world 
implications based on empirical data; any "digital Pearl Harbor" 
scenarios should attempt to measure the extent of the damage--tangible, 
social, or political--that could occur.

Sample Topics:

* Use of cyber attacks to influence government behavior (e.g., 2007 
  Estonia attacks)

* Cyber attacks as a force multiplier in conventional conflicts (e.g., 
  2008 Georgia attacks)

* Internet as a critical resource for political and social movements 
  (e.g., the Green Movement in Iran, electioneering in Moldova, Red 
  Shirt Movement in Thailand)

* Governments' efforts to contain popular movements that organize via IT 
  (e.g., shutting down or containing flash mobs, Chinese monitoring of 
  the Dalai Lama, software filtering and surveillance technologies)

* The role of information technology strategies in the US and other 
  states' foreign policy (e.g., US State Department intervention to 
  prevent Twitter shut-down during protests following the 2009 Iranian 
  elections)

* Regional cyber-conflicts (e.g., North and South Korea, India and 
  Pakistan, Israelis and Palestinians)

* Espionage and secrecy in a networked world (e.g., China and Google, 
  Wikileaks)

* Information technologies, civil liberties and privacy (e.g., RIM 
  Blackberry and Chinese, Indian and US efforts at surveillance;  
  Wikileaks; the Safe Harbor dispute)

* Strategic implications of cyber attacks against critical 
  infrastructures

* Innovative cyber attacks (e.g., Stuxnet and the Iranian nuclear 
  program)

* International cooperation to manage cyber-security and IT issues 
  (e.g., Internet governance, WSIS, ICANN, WIPO)

Submission Details: Submissions should be addressed to SI Editor Brent 
Kesler and sent in MS Word compatible format to ccc (at) nps.edu. They 
should range from 10 to 20 pages, double spaced, or 3,000 to 6,000 
words. For more information on submission guidelines, please consult:

http://www.nps.edu/Academics/Centers/CCC/Research-Publications/StrategicInsights/submissions.html

Time to put on the big thinking hat!