Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & ManagementSecurity Leadership and ManagementSecurity Education & Training

Leadership & Management

Absolutely the most important list you will ever read!

Tips to help security leaders navigate endless Internet lists about leadership.

By Michael Gips
Internet lists

pcess609 / iStock / Getty Images Plus via Getty Images

Leadership & Management - Michael Gips
Internet lists
Leadership & Management - Michael Gips
June 14, 2024

Say this, not that. Read that, not this. Do this, not that. You too can become a great leader if you simply follow the exhortations of leadership lists that can be found all over the Internet. 

Which phrases should good leaders never say? Dozens of articles purport to document the five, eight, 12, or 17 no-nos. Conversely, great leaders may exhibit their very greatness by injecting key incantations in their communications with staff. The Internet is rife with lists of books every effective leader should read, the most productive leadership habits, the top leaders to follow on social media, and probably even the ten best foods, seven best hats, and 12 best catchphrases.

At worst, these lists are silly or mere clickbait. At best, they are useful guides. But almost every tally is subjective, devoid of context, or pat. 

Keeping up with them is draining. The sheer number of them can make you, well, listless. 

Recognizing that items on such lists are often mere devices employed to make a larger point, below I identify reasonable examples of advice for leaders that come from reputable sources. Then I offer a different perspective. 


Things that leaders should never say

“I don’t know”: This phrase appears as taboo on several leadership lists, with critics emphasizing that leaders should add context and substance around these three words, lest the person look unprepared or foolish. But a simple “I don’t know,” especially among your reports, can be disarming, poignant, and honest. Used sparingly and strategically, it can even inspire staff to find the solution. 

“I’ll do it myself”: Commentators disparage this phrase because it suggests impatience and lack of faith in staff to accomplish important tasks. But “I’ll do it myself” can be an example of excellent servant leadership, especially if the task is no one’s responsibility, is particularly difficult, or qualifies as scut work. Some security executives have filled in for absent officers at key sites after their regular workday concludes. 


❝

Everyone loves lists — they are pointed, short, and easy to read. Most leadership lists contain at least some nuggets of wisdom, if not a catalog of best practices.”


“It’s good enough”: The knock here is that the phrase capitulates to mediocrity, that the quality of work must only exceed a low bar. However, the phrase can also mean "don’t let perfect be the enemy of the good,” which signifies that achieving a marginally better result is not worth significant time and effort. “It’s good enough” may represent the most efficient use of resources. 


Things that leaders should do

“Make their bed”: Admiral William McRaven’s premise is that making your bed every morning fosters discipline, diligence, intentionality, and organization. It gives you a win first thing in the morning. Although the admiral would probably approve of other actions to substitute for making your bed — washing the breakfast dishes, for example — one could argue that mundane tasks are a waste of time. Do Warren Buffett, Elon Musk, and Jeff Bezos make their beds every morning (I have no idea), or is their time better spent providing value for themselves, their staff, their shareholders, and the public? If making their bed motivates them, comforts them, or helps them clear their minds, great. But for many leaders, it’s a waste of time. 

Eat last: Per Simon Sinek, it’s not a good practice — or look — to relax, dine, or leave first when working with your staff in the trenches. Good leaders take care of their people first. Sometimes, though, an effective leader needs to stand on ceremony. In various cultures around the world, declining to break bread or share a first drink with your host is a grievous insult. Lucrative contracts have been lost due to less severe breaches of protocol. 

Meditate: All work and no play makes Jack a dull boy — and perhaps a candidate for a mental breakdown. Meditation has proven beneficial effects on blood pressure, memory, and stress, for example. But it’s not for everyone. Walking, jogging, napping, deep breathing, golf, reading, or martial arts can have many of the same effects, especially in combination. 

Everyone loves lists — they are pointed, short, and easy to read. Most leadership lists contain at least some nuggets of wisdom, if not a catalog of best practices. 

Read them critically, though, and in the context of yourself, your team, your organization, your industry, and your culture — or of whomever you are trying to assist or mentor. 

No list fits every purpose or applies universally. This one included. 


 

(Postscript: I wrote this piece on a Southwest flight from Dallas to Washington, DC. A fellow traveler mentioned that Admiral McRaven was on board — but up at the front, while we were in the rear. I did not suggest that the admiral title his next book, Leaders Sit in the Back.) 

KEYWORDS: best practices team collaboration workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-and-tablet.jpg

    The 5 most important aspects of a comprehensive cloud security program

    See More
  • Spy

    Why You Need TSCM Now More Than Ever

    See More
  • Office building

    The World's Most Reputable Companies -- Who Made the List?

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing