Confidential Leadership Quotes

We've searched our database for all the quotes and captions related to Confidential Leadership. Here they are! All 8 of them:

It has been my impression that at any gathering, whether it be public or private, those who are quickest to inject words like sensitivity, empathy, consensus, trust, confidentiality, and togetherness into their arguments have perverted these humanitarian words into power tools to get others to adapt to them.
Edwin H. Friedman (A Failure of Nerve: Leadership in the Age of the Quick Fix)
As it turned out, Mary Jo White and other attorneys for the Sacklers and Purdue had been quietly negotiating with the Trump administration for months. Inside the DOJ, the line prosecutors who had assembled both the civil and the criminal cases started to experience tremendous pressure from the political leadership to wrap up their investigations of Purdue and the Sacklers prior to the 2020 presidential election in November. A decision had been made at high levels of the Trump administration that this matter would be resolved quickly and with a soft touch. Some of the career attorneys at Justice were deeply unhappy with this move, so much so that they wrote confidential memos registering their objections, to preserve a record of what they believed to be a miscarriage of justice. One morning two weeks before the election, Jeffrey Rosen, the deputy attorney general for the Trump administration, convened a press conference in which he announced a “global resolution” of the federal investigations into Purdue and the Sacklers. The company was pleading guilty to conspiracy to defraud the United States and to violate the Food, Drug, and Cosmetic Act, as well as to two counts of conspiracy to violate the federal Anti-kickback Statute, Rosen announced. No executives would face individual charges. In fact, no individual executives were mentioned at all: it was as if the corporation had acted autonomously, like a driverless car. (In depositions related to Purdue’s bankruptcy which were held after the DOJ settlement, two former CEOs, John Stewart and Mark Timney, both declined to answer questions, invoking their Fifth Amendment right not to incriminate themselves.) Rosen touted the total value of the federal penalties against Purdue as “more than $8 billion.” And, in keeping with what had by now become a standard pattern, the press obligingly repeated that number in the headlines. Of course, anyone who was paying attention knew that the total value of Purdue’s cash and assets was only around $1 billion, and nobody was suggesting that the Sacklers would be on the hook to pay Purdue’s fines. So the $8 billion figure was misleading, much as the $10–$12 billion estimate of the value of the Sacklers’ settlement proposal had been misleading—an artificial number without any real practical meaning, designed chiefly to be reproduced in headlines. As for the Sacklers, Rosen announced that they had agreed to pay $225 million to resolve a separate civil charge that they had violated the False Claims Act. According to the investigation, Richard, David, Jonathan, Kathe, and Mortimer had “knowingly caused the submission of false and fraudulent claims to federal health care benefit programs” for opioids that “were prescribed for uses that were unsafe, ineffective, and medically unnecessary.” But there would be no criminal charges. In fact, according to a deposition of David Sackler, the Department of Justice concluded its investigation without so much as interviewing any member of the family. The authorities were so deferential toward the Sacklers that nobody had even bothered to question them.
Patrick Radden Keefe (Empire of Pain: The Secret History of the Sackler Dynasty)
These should not be seen as predetermined or inevitable. Most often groups start by dealing with their own boundaries, membership and group rules and expectations. Schutz (1973) calls this ‘inclusion’; Tuckman (1965) ‘the stages of forming and norming’. This is often addressed in the ‘contracting’ stage in team development, where issues of confidentiality, commitment
Peter Hawkins (Leadership Team Coaching: Developing Collective Transformational Leadership)
The U.S. was able to impose its will and force this traditionally independent country to act, even though Switzerland has maintained its banking activities in a strictly confidential manner, for centuries. As set forth in detail in Chapter 8, America has been instrumental in the change in leadership of a number of foreign nations.  A fair analysis would have to conclude that America is by far the only real candidate for the position of “hammer of the whole world.” Who else thinks that America is the “hammer of the whole earth”?
John Price (The End of America: The Role of Islam in the End Times and Biblical Warnings to Flee America)
Just last year, Mrs. Clinton claimed that as secretary of state she didn’t carry a work phone. It was too cumbersome and inconvenient for her to carry two phones. She didn’t have room for them. Then we learned she carried an iPhone and BlackBerry, neither government issued nor encrypted. Then we learned she carried an iPad and an iPad mini. But she claimed she didn’t do email. Then we learned she had email—on a private server. But then she claimed her email was for personal correspondence, yoga, and wedding planning. Then we learned her email contained government business as well—lots of it. Listen, nobody transmits classified material on the Internet! Nobody! You transmit classified material via a closed-circuit, in-house intranet or even physically via courier. You can’t even photocopy classified data except on a machine specially designed for hush-hush material, and even then you still require permission from whatever agency and issuer the document originated. So the only way for that material to be transmitted over an email is for her or someone in her office to dictate, Photoshop, or white-out the classified material in question, to remove any letterhead, or to duplicate the material by rewriting it in an email. Government email accounts are never allowed to accept emails from nongovernment email accounts. We’re supposed to delete them right away. Exceptions exist for communications with private contractors, but those exceptions are built into the system. I repeat: To duplicate classified material without permission or to send it over an unsecured channel is completely illegal. That’s why every government agency employs burn bags, safes, and special folders for anything marked Confidential, Secret, and Top Secret. People have lost their careers and gone to jail for far less. Yet Hillary Clinton transmitted classified material by the figurative ton. No one else can operate like that in government. But she takes her normal shortcuts and continues to lie about it. There is no greater example of double standards in leadership than First Lady, Senator, and Secretary of State Hillary Clinton. Is it too inconvenient or cumbersome for her to follow the same rules that agents in the field have to follow? Maybe it would make morale too high? Clinton’s behavior harkens to the old motto: “The beatings will continue until morale improves.
Gary J. Byrne (Crisis of Character: A White House Secret Service Officer Discloses His Firsthand Experience with Hillary, Bill, and How They Operate)
Cybersecurity is the mission focused and risk optimized management of information which maximizes confidentiality, integrity, and availability using a balanced mix of people, policy and technology while perennially improving over time.
Mansur Hasib
I think mentoring is simply an inborn passion and not something you can learn in a classroom. It can only be mastered by observation and practice. I also realized that most mentees select you, and not the other way round. The mentor’s role is to create a sense of comfort so that people can approach you and hierarchy has no role to play in that situation. The mentee has to believe that when they share anything, they are sharing as an equal and that their professional well-being is protected, that they won’t be ridiculed or their confidentiality breached. As a mentor you have to create that comfort zone. It is somewhat like being a doctor or a psychiatrist, but mentoring does not necessarily have to take place only in the office. For example, if I was travelling I would often take along a junior colleague to meet a client. I made sure they had a chance to speak and then afterwards I would give them feedback and say, ‘You could have done this or that’. Similarly, if I observed somebody when they were giving a pitch or a talk, I would meet them afterwards or send them an e-mail to say ‘well done’ or coach them about how they could have done better. This trait of consciously looking for the bright spark amongst the crowd has paid me rich dividends. I spotted N. Chandrasekaran (Chandra), TCS’s current Chief Executive, when he was working on a project in Washington, DC in the early 1990s; the client said good things about him so I asked him to come and meet me. We took it from there. Similarly urging Maha and Paddy to move out of their comfort zones and take up challenging corporate roles was a successful move. From a leadership perspective I believe it is important to have experienced a wide range of functions within an organization. If a person hasn’t done a stint in HR, finance or operations, or in a particular geography or more than one vertical, they stand limited in your learning. A general manager needs to know about all functions. You don’t have to do a deep dive—a few months exploring a function is enough so long as you have an aptitude to learn and the ability to probe. This experience is very necessary today even from a governance perspective.
S. Ramadorai (The TCS Story ...and Beyond)
We can therefore define cybersecurity in the following manner: Cybersecurity is the mission-focused and risk optimized governance of information, which maximizes confidentiality, integrity, and availability using a balanced mix of people, policy, and technology, while perennially improving over time.
Mansur Hasib (Cybersecurity Leadership: Powering the Modern Organization)