You are on page 1of 13

232

Management and Economics

UNDERSTANDING THE TALENT


MANAGEMENT INTRICACIES
OF REMOTE CYBERSECURITY TEAMS
IN COVID-19 INDUCED TELEWORK
ORGANIZATIONAL ECOSYSTEMS

Darrell Norman BURRELL


The Florida Institute of Technology, Melbourne, Florida, USA
dburrell2@thechicagoschool.edu

ABSTRACT
The unanticipated disruption triggered by Coronavirus, also
known as COVID-19, has accelerated the shift to virtual workplace
ecosystems for employees in the government, business, and the
military. The accelerated move to whole organization telework has
also created new complex challenges around managing cybersecurity
risks. Complex business and governmental organizational ecosystems
have several significant and critical job tasks around cybersecurity.
These roles have the involved responsibility of functioning as effective
teams to handle incident responses, intrusion evaluations, crisis
management, crisis communications, forensic data examinations,
malware analyzations, firewall assessments, penetration testing,
disaster recovery, emergency response planning, risk management,
human factor analyzation, training assessment, and active network
monitoring. This qualitative research study explores the nuances of
employee engagement, organizational development, and the
management of virtual and remote cybersecurity teams in ways that
enhance complex business and organizational ecosystems in the world
of professional practice.

KEYWORDS: cybersecurity, organizational behavior, remote teams,


team management, virtual work groups, COVID 19, telework

1. Introduction remote teams. Business organizational


The disruption triggered by ecosystems with a competitive advantage
Coronavirus, also known as COVID-19, has successfully leverage both current
accelerated the shift to virtual remote technology and human resources to enhance
business workplace ecosystems for all their ability to engage in effective risk
employees. The move to telework has also management and information security
created new organizational challenges (Larrimore, 2018). As a result, many
around managing cybersecurity risks. As a organizations are using virtual teams as a
result of the changing nature of work, many cost-effective way to access and distribute
organizational managers lack the expertise knowledge expertise across the organization
and experience in effectively managing (Agbi, 2018).

DOI: 10.2478/raft-2020-0028
Management and Economics 233

2. Research Methodology especially those that most work virtually, this


The focus of the research is on adage has tremendous organizational
cybersecurity and information technology job repercussions. Effective cybersecurity teams
roles. The approach used a content analysis must respond to a variety of threats. As a
review of current and very recent literature result, building collaborative teams has never
around virtual teams, cybersecurity teams, been more critical to the effective prevention
and team success. The databases and their of cyber threats (Edwards, 2018). Business
hosts (shown in parentheses) included ABI organizational ecosystems that are effective
Inform Complete (ProQuest), Baidu Scholar, in cybersecurity prevention requires team
CNKI Scholar, Semantic Scholar, Polska collaboration between network and
Bibliografia Naukowa, Academia.edu, cybersecurity teams (Edwards, 2018).
Research Gate, Academic Search Premier Dysfunction between team members
(EBSCO), Business Source Premier represents some significant dangers and risks
(EBSCO), ERIC (EBSCO), and Google to organizations around data security
Scholar. Usage of these databases allowed a (Sousane, 2018). Effective collaborative
degree of assurance about the authority of the cybersecurity teams are critical to developing
data retrieved and that the research went an effective and holistic cybersecurity culture
through rigid, meticulous, and controlled (Sousane, 2018). The critical organizational
evaluation systems, which are the brands of need for more knowledgeable employees in
scholarly research and writing. Historical data cybersecurity and more cohesive workplace
located through Internet searches was relations has become more critical with the
consequently confirmed through explorations on-set of COVID 19.
using academic databases. The study A comprehensive cybersecurity
employed the use of qualitative focus group organizational culture is one where
methodology was used to collect, analyze, processes, operations, computer networks,
explore data, and provide results with a goal computer software applications, training,
of influencing the world of business in communications, and employees are
organizational practice. focused on furthering cybersecurity and
This research used a critical and data security within organizations (Sousane,
analytical review of the academic and 2018). It also includes the actions,
professional literature, to establish a behaviors, values, norms, assumptions,
conceptual framework for utilizing perceptions, and beliefs associated with
technology to improve communication, information and cybersecurity (Sousane,
trust, and relationship building for virtual 2018).
cybersecurity teams. By exploring the Traditional employee teams are those
complex nature of teams, especially virtual that work at the same location and
teams, an organization can improve the traditionally communicate and meet in person
high failure rates that are typically or face to face (Perkins, 2018). Virtual
associated with virtual teams. teams, on the other hand, engage each other
using technology in ways beyond the
3. Background limitations of having to be in the same
According to 2017, Cybersecurity physical location (Ng Lane, 2018). The
Trends report organizations are increasing utilization of virtual teams allows business
their spending on cybersecurity on average organizational ecosystems to harness
by 21% (National Center for Midmarket, intellectual capital, subject matter expertise,
2017). Consider the business adage that a and a diverse pool of talent and service
team is only as strong as its weakest link. based on specific situations or company
When it comes to your cybersecurity team, goals without the restriction of geography

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020



234
Management and Economics

(Ng Lane, 2018). For example, an Quisenberry (2018) stated that several
organization located in Claremont, California, types of virtual teams exist in business
could potentially leverage the human capital organizational ecosystems. They have
expertise and professionalism of an employee permeated many functions, departments, and
in Toronto, Canada, or Washington, DC, to industries in various forms (e.g., cross-
be part of a virtual or remote cybersecurity functional teams, project teams, account
team. The ability to leverage virtual or remote teams, product development teams, global
teams and opportunities becomes a vital teams, management teams, networked teams,
recruiting tool for organizations looking to etc.). As business organizational ecosystems
find expertise in cybersecurity job roles that become, more global and agile virtual teams
often face shortages of cybersecurity talent. are becoming just as critical traditional teams
The workforce development need is (Gelston, 2018). As a result, a virtual team
expected to increase by 18% for can only be as effective as its ability of its
cybersecurity and Information security team to collaborate, leverage each member’s
(Morgan, 2016). The potential risks of not expertise, and tap into each member’s
being able to fill the jobs with cybersecurity experience to accomplish tasks (Gelston,
teams that can work collaboratively together 2018).
are significant, with the costs of cybersecurity The significant benefit of the
breaches currently reaching $2.1 trillion utilization of virtual teams is that talent,
around the world (Morgan, 2016). experience, and expertise can be leveraged
New technologies have made it easier and harnessed quickly from anywhere in the
for professionals in different geographic world based on need rather than location
locations to collaborate and communicate, and without the added costs or time
which has enabled more meaningful use of associated with relocation or travel
virtual teams in organizations (Hagy, 2018). (Agbi, 2018; Martin, 2018; Perkins, 2018).
The formation and growth of virtual teams Additionally, according to Martin
in organizational ecosystems indicate (2018), as virtual team members span
significant shifts in how work is several time zones and geographies, the
accomplished and, more importantly, how added benefit of virtual teams is having
members collaborate to perform and resources available nearly twenty-four
manage the work (Gelston, 2018). hours a day. While viewed as an advantage
Functioning as a virtual team is to the organization, the notion of twenty-
conceptualized on a continuum in which the hour, round-the-clock access may be a
more dispersed a team is, the more virtual it disadvantage to the individual members
is (Martin, 2018; Quisenberry, 2018). The (impacting work-life balance).
concept of a virtual team acknowledges that With the growth of global virtual
there will be some variation in how cybersecurity teams, remote jobs, and
members interact, e.g., members may be telework the approach to managing and
geographically dispersed and communicate engaging employees has changed
only through e-mail, voicemail or other dramatically in ways that require new
communication technologies, they may be approaches to meetings, communications,
co-located and meet face-to-face, or they relationship building and trust in the
may be a combination of these (Martin, workplace as jobs move from face to face
2018; Quisenberry, 2018). In contrast to office locations to virtual ones (Gelston,
traditional face-to-face teams, working 2018).
virtually has some challenges, including Corporations must now continually
those around control and coordination, adapt their organizational structures and
knowledge development and transfer, team processes to meet the rapid pace of change
effectiveness, and trust (Hagy, 2018).

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020


Management and Economics 235

and complexity of a competitive global (Dechant, Marsick, & Kasl, 1993). The
marketplace (Al Amour, 2018; Gelston, ability to communicate and collaborate is
2018). Corporations recognize technology even more critical in a virtual environment
as an essential enabler of meeting its goals (Al Amour, 2018; Quisenberry, 2018).
through increasing organizational efficiency
and reducing costs as much as possible to 3.2. Trust, Relationship Building,
address the scope of change (Al Amour, and Communication
2018; Gelston, 2018). There are The main reasons that diverse virtual
organizational pressures to obtain workers teams fail are a lack of trust, lack of
in locations that can supply the right types collaboration, and a lack of knowledge
of skills at the correct cost (Al Amour, sharing (Hagy, 2018). According to Hagy
2018; Gelston, 2018). Corporate leaders (2018), trust is the main factor required to
want to take advantage of pockets of succeed in virtual teams because it is
expertise in various locations across the critical to team cohesiveness,
world by connecting them through utilizing communication, knowledge sharing, and
communication technology (Al Amour, engagement. Several researchers confirmed
2018; Gelston, 2018). As more and more the importance of trust and communication
corporations begin to use this strategy for in the leading and membership with virtual
organizing and communicating, the virtual teams (Perkins, 2018; Ng Lane, 2018;
team has now become a standard feature in Gelston, 2018; Al Amour, 2018; Agbi,
global corporations (Al Amour, 2018; 2018). Virtual teams cannot be managed the
Gelston, 2018). same way face-to-face teams were in the
past (Colfax et al., 2009; Al Amour, 2018;
3.1. Virtual Teams and Collaborative Agbi, 2018). To succeed, virtual team
Team Learning leaders must shift paradigms and train
Under Team Learning Conditions, managers to engage and communicate
Dechant, Marsick, and Kasl (1993) pinpoint differently with interactions and behaviors
three dimensions: Appreciation of focused on fostering collaborative
Teamwork, Individual Expression, and communication and trust (Al Amour, 2018;
Operating Principles. They believe that Agbi, 2018). A critical element of trust is
these conditions set the environment in building a team culture that embodies
which the team learning processes can psychological safety (Quisenberry, 2018).
effectively work with teams. For team members to feel comfortable
Communication was seen in the literature expressing their objections, the team must
as something important in ensuring that feel safe in its environment with no fear of
team members can express themselves to retribution (Quisenberry, 2018;
share their viewpoints. Based on Dechant, Edmondson, 1999). This need was
Marsick’s, Kasl’s (1993) definition of represented in the literature by the work of
“Appreciation of Teamwork,” communication Edmondson (1999) and termed as
appears to associate best with this dimension psychological safety or establishment of a
of Dechant, Marsick, and Kasl’s (1993) level of university trust. In the
model, which stresses the importance of organizational team, cultural context items
team members needing to communicate, such as discussing thoughts and feelings;
collaborate, and share ideas, experience, getting to know each other; balance task
and expertise consistently. Collaborative accomplishment and relationship building
problem solving and communication it; and team members able to express their
approaches between team members as a views appear to align with the concepts of
facilitator of the metacognition process trust, and psychological safety

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020



236
Management and Economics

(Edmondson, 1999; Quisenberry, 2018) and ● Virtual teams can work around the
these elements are critical to team cohesion clock (according to time-zone of course),
(Al Amour, 2018; Agbi, 2018; Quisenberry, thereby maximizing time on target (pass
2018). work onto the next individual/team),
internal office costs will be lower, higher
3.3. Data Collection employee satisfaction and work
This study utilized qualitative focus productivity, different viewpoints from
group research of a collection of people from different areas, etc.
cybersecurity professionals that have work ● Participant 1 said, “You could
experience as part of a virtual team for create cybersecurity teams that could
more than two years and had at least two function like 24-hour seven days a week
years of cybersecurity work experience. network and data security guards that could
There were three focus groups of 6 people work in various areas of the country and
or a total of 18 participants. Three separate around the world”.
groups were used to help address issues 2. What do you see are the most
around reliability and the validity of the critical elements of an effective virtual or
results. All 18 participants were men. remote cybersecurity team?
Fourteen of the participants were Caucasian ● Business continuity planning
American, and four were African- advantages that ensure that all critical
American. As a common practice in resources of employee talent and expertise
exploratory and participatory qualitative are not located in one geographical location.
research, participant responses in direct ● Cybersecurity expertise in a variety
quotes are used to elaborate and provide of critical areas.
more context to the developed themes and ● Risk management skills.
research responses (Creswell, 2019). ● Communications skills.
The following represent the questions ● Collaboration skills.
that were asked of the participants of the ● Critical thinking skills.
three focus groups. ● Adaptability to change skills.
1. What do you see as the benefits ● Leadership skills.
of using virtual teams for cybersecurity or ● Conflict management skills.
information security operations in Participant 1 said, “The ability to tap
organizations? into diverse knowledge, expertise,
The benefits of using virtual teams for education, and ability of all team members
cybersecurity or information security are the elements of an effective virtual
operations in organizations are the abilities to: cybersecurity team.”
● The ability to find employee talent Participant 2 said, “An effective virtual
with the expertise and not be crippled by cybersecurity team needs, ingenuity, creativity,
using just the talent around you. and innovation which includes developing
● The advantage to gain a diverse set new insights into situations; questions
of information and ideas from people from conventional approaches; encourages new
different geographical locations, ideas and innovations; designs and implements
perspectives, and experiences, especially new and effective approaches.”
those from different countries. Participant 3 said, “An effective
● The option of deploying people virtual cybersecurity team must have team
from different sections of the country in members that understand and keeps up-to-
case of an emergency (e.g., 911, fires, date on local, national, and international
earthquakes, tornadoes) in an area. policies and trends that affect the
organization's ability to be most secure.”

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020


Management and Economics 237

Participant 4 said, “An effective Participant 1 said, “Any technology


virtual cybersecurity team needs to be tools that allow virtual teams to
buoyant and resilient in the way it handles communicate and collaborate more
pressure and is persistent even when there effectively are critical to helping the
are challenges and impediments.” cybersecurity teamwork effectively. These
Participant 6 said, “These teams must tools could be those like ZOOM that allow
have the ability to effectively set goals and participants to have meetings where they
priorities around the risks and interests of can see each other and view documents.”
the company.” 4. What role do you see that
Participant 7 said, “An effective communication plays in effective virtual
virtual cybersecurity team should be very cybersecurity team success?
results-oriented in ways that accountable ● Communication is needed to have
for measurable high-quality, timely, and effective virtual cybersecurity team success
cost-effective results.” because teams need well thought through
Participant 8 said, “An effective methods to work through concerns and
virtual cybersecurity team can make conflict.
educated, effective, and timely decisions, ● There needs to be a documented
even when data are limited.” process to hand off information and make
Participant 9 said, “An effective sure that all risks, methods, and approaches
virtual cybersecurity team can rapidly are understood and covered.
uncover and investigates problems in ways Participant 1 said, “Communication is
vital...without, there are just a bunch of
that generate multiple viable solutions and
rogue employees working online in
recommendations.”
different areas and time-zones.
Participant 10 said, “An effective
Collaboration is critical to ensure that our
virtual cybersecurity team keeps abreast of
areas of risk are covered and addressed”.
technological developments and advances
5. What role do you think that
in ways that use of technology to achieve management plays in virtual or remote
results.” cybersecurity team success?
3. What are the best ways to use ● Managers must be supportive from
technology to help make virtual and remote the top-down as well as the bottom up.
cybersecurity teams more effective? ● Management needs to understand
● Communication tools can assist the knowledge and skills of its team
with meetings and sharing ideas, especially members.
those with cameras or videos that allow ● Management must maintain current
participants to see each other during business continuity plans.
meetings. ● Management needs to clear any
● Project plans and update dashboards organizational barriers that would hamper
can be used so that all members of a team the team’s effectiveness.
understand the critical priorities and Participant 1 said, “Management
progress on projects. should make sure that the team has right
● The ability to use virtual labs and members on it with the right talent,
technology-driven scenario-based training expertise, education, and experience
to allow teams to practice working required to complete the project or to work
collaboratively. on the virtual team.”
● The ability to use show and tell Participant 2 said, “Management can
demonstrations via a secure visual and play a significant by understanding that
audible software is necessary for virtual virtual teams don’t have the formal
teams. opportunities to connect. This includes the

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020



238
Management and Economics

meetings in the hallway or the ability to Participant 6 said, “Supervisors of


meet for coffee or lunch when you work in remote teams should schedule check-ins at
the same physical location. As a result, key milestones with individual team
management can host virtual events like members to assess progress, provide
birthday parties using ZOOM or Go-To- feedback and coaching, and make required
Meeting conferencing technology tools. course corrections”.
Management can schedule virtual coffee Participant 6 said, “Management sets
breaks using Zoom or Go-To-Meeting the tone for the team...he/she needs to
conferencing technology tools. Make anticipate and be readily available for all
“check-in calls” that do not have a work- types of project management concerns...the
related agenda to connect with team team will follow suit of the management
members on a personal level”. team”.
Participant 2 said, “Management Participant 7 said, “Management
needs to trust the knowledge and expertise should understand the nature of unique
of employees and give them autonomy by challenges around insolation that can
allowing them to determine the best way to diminish a remote employee's motivation.
organize their work. Building a culture of The insolation that virtual team members
trust is critical to team success, and experience can create a climate or feelings
management plays a significant role in where remote employees can lose sight of
creating a culture of trust and empowerment”. the value and significance of their
Participant 3 said, “Management contributions. Remote team members can
should create a culture of accountability for
face a lot of distractions. As a result,
the remote team. Virtual team members
regular, consistent, constructive, and
need to take more individual responsibility
positive feedback is critical to keeping
to meet deadlines, so it is critical for someone
remote employees engaged. This can occure
to hold them accountable. However, virtual
using video conferencing for face to face
managers have fewer opportunities to observe
their employees. This includes developing interactions”.
metrics that focus on results, not the number Participant 9 said, “Management
of hours worked. Still, these metrics should should ensure that everyone is properly
be developed in a collaborative or trained on the tools that are used to
participatory manner between management collaborate or communicate virtually”.
and the team members to make the theme Participant 10 said, “Management
realistic and feasible”. needs to encourage a culture of open,
Participant 4 said, “Management honest, and collaborative communication.
should have a project dashboard that has up Communication is the most important part
to date action plans with the entire team so of effective virtual teams. As a result,
that everyone is aware of the status of a management must set expectations;
project at any given time. Management everyone should be aware of the expected
needs to give employees tools and the time frame for responding to e-mails and
ability to access the documents they need voicemails. Management should consider
remotely securely. Using cloud-based file- ways to reduce unnecessary e-mails
sharing software that can help everyone whenever possible; quick chats or instant
easily share documents and stay organized”. messages are more effective. Management
Participant 5 said, “Management should ensure that virtual meetings are as
should include all team members in the effective as possible. Unnecessary and
work planning stages and should clearly ineffective virtual meetings are a significant
outline the roles and responsibilities of issue on teams. Managers of virtual teams
everyone on the team”. need always to consider if a meeting is

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020


Management and Economics 239

required, and if so, set clear objectives for – perhaps a little more than people in the
what needs to be accomplished”. workplace. Everyone must be productive;
6. How can management foster trust otherwise, the virtual team as productive.
in a virtual or remote cybersecurity team? Management must also effectively manage
● Managers must communicate with conflict because there can be
and get to know the strengths, talents, and misunderstandings around communication
abilities of every team member. where members on the team are using e-mail
● Managers should provide positive and other non-face to face communication
accolades when possible and convey the approaches. Misunderstandings need to be
information sincerely. managed”.
Participant 4 said, “Management needs 9. What do you see are the most
to respect the expertise of the team, listen to critical skills that are required to be
their recommendations, and empower them to effective working in a virtual cybersecurity
be part of the strategic decision-making team?
process around cybersecurity”. ● Flexibility and availability. Both of
7. In what ways can management which are critical because participants are
foster a healthy relationship building or in different locations and time zones.
cohesiveness in a virtual or remote ● Effective Communication around
cybersecurity team? listening and giving information.
● The manager can hold meetings to ● Expertise in the most critical areas
engage all team members. of cybersecurity.
● Remote team members should be ● Effective writing skills to document
given roles in meetings that are as meaningful processes.
as the roles of on-site team members. Participant 7 says, “Online teams
● Managers should not make negative need direction and expectations laid out for
comments about people working remotely. them – perhaps a little more than people in
● When possible, the manager should the workplace. Everyone must be
meet with remote team members. productive. Otherwise, the virtual team may
Participant 5 said, “Management must not be as productive as possible”.
establish a presence by being available for Participant 8 says, “Skills in
any question asked, and give the teams communication, project management,
tasks they can accomplish as a team versus technical application, self-motivation,
just solo...allow the team to come up with problem management, the ability to self-
ways to address any issue – this established learn new skills, patience, and a host of
buy-in from all participants”. other adaptive/social skills”.
8. In what ways does management 10. What are the additional risks and
have to manage a virtual cybersecurity team areas of concern concerning cybersecurity
differently than one working in the same because of telework and COVID -19?
physical location? Hackers are not taking off from
● Ensure that communication is often attacks because of COVID 19, and there
and consistent. could even be more vulnerabilities in
● Verify that information conveyed is organizations because of the use of
clear by asking questions. employee’s home Internet providers and
● Use virtual tools to communicate their personal computers. As a result of
these new risks, organizations and
(Skype, Go-to-meeting, telephone, mobile
cybersecurity management teams must
phone, VTC, etc.).
manage these new risks while helping all
Participant 6 said, “Online teams need
remote employees with telework
direction and expectations laid out for them
cybersecurity recommendations that include:

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020



240
Management and Economics

● Implement Mobile Device 4. Conclusions


Management (MDM) and Mobile Conclusions from the study are in line
Application Management (MAM). These with emerging trends from the literature.
solutions can help manage and secure mobile Due to the COVID-19 pandemic, many
devices and applications. These tools can also teams who enjoyed the benefits of working
allow organizations to remotely implement in the same physical space have become
several security measures, including data virtual teams overnight. Teams dealing with
encryption, malware scans, and wiping data an unplanned transition to remote work
on stolen devices. need help, especially with accomplishing
● Train employees on how to ensure work that requires interdependent,
that sensitive information is encrypted and coordinated effort (Bendaly, 2020).
safeguarded at home. Managers need to continue to remind
● Implement and enforce two-factor members of the team of adapting and
or multi-factor authentication (MFA) were changing roles and responsibilities.
a texted code or a call for verification is sent Coordinating and ensuring everyone on the
to the phone of the employee before access to team understands these changes is a crucial
the organizational network is granted. responsibility of team leaders (Bendaly,
● Ensure all computers and mobile 2020). Managers need to ensure the team
devices that are used to access work has regular communication about what is
networks are updated security patches and happening with critical stakeholders, such
virus protection. There are an increasing as customers, competitors, regulators,
number of Coronavirus (COVID 19)-based suppliers, the broader organization, or other
social engineering and malicious emails factors that could affect their work. Make
that can prey on individuals interested in sure everyone on the team is aware of the
the most relevant information about latest information about the situation and
COVID 19. how it may impact individual and team
● Implement policies that do not allow goals, priorities, and plans (Bendaly, 2020).
the sharing of work computers. These Given the magnitude and frequency of
policies reduce the risk of unauthorized or changes in our world today, teams need to
inadvertent access to protected company consider whether their goals and priorities
information. should change too proactively. Once goals
● Offer employees the ability to use and priorities are clear, managers must help
Virtual Private Networks (VPNs) to ensure the team identify and plan around newly
that internet utilization is encrypted and that emerged obstacles, such as resource
the employee user location when assessing constraints. As a result, managing remote
the company network is private teams and teleworkers require a recalibration
● Implement policies that sensitive of employee engagement on several levels
organizational information should never be (Bendaly, 2020).
downloaded or saved to employees’
personal devices or cloud services, 4.1. Clarifying Core Work Coverage
including employee computers, thumb Hours for All Employees
drives, or cloud services such as their Most teams have expectations about
personal Google Drive or Dropbox team members being present and available
accounts (Suciu, 2020). during work hours, even for remote
● Implement policies that prohibit employees (Suciu, 2020). Before the crisis,
access to company information systems most remote workers had a dedicated
while on public Wi-Fi with the use of a workspace and reliable childcare in place,
VPN. which allowed them to meet those

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020


Management and Economics 241

expectations. In the face of our new normal, commitment, and direct actions focused on
teams should explicitly review expectations sustaining cybersecurity within
about what constitutes business hours and organizations (Zuhdi, 2018; Nobles, 2018).
how much flexibility team members have The use of information technology
around working staggered shifts (Bendaly, and virtual teams provides substantial
2020). benefits to individuals and organizations,
but it also presents significant information
4.2. Having More Regular Meeting technology security risks or, more
Although managers and team leaders specifically, cybersecurity risks (Zuhdi,
should not have meetings for meeting sake, 2018; Sousane, 2018; Larrimore, 2018).
contact communication with colleagues and Approaching the elements of virtual teams
management helps to build a cohesive team from a holistic perspective contributes to a
and avoid employees having feelings of strategy and the ultimate result that is called
isolation (Bendaly, 2020). the “Virtual Team Cycle of Success”
(Quisenberry & Burrell, 2012). Once
4.3. Setting Communications leaders embrace this cycle of success and
Expectations institute processes and policies centered on
Teams usually have preferences about the theory, they stand to reap a harvest of
how quickly members need to respond and improved performance amongst virtual
which modes of communication should be teams (Quisenberry & Burrell, 2012). As
used (Bendaly, 2020). the marketplace continues to evolve, more
The increase in the occurrences and organizations will be forced to turn to
costs of cyber breaches and technologically virtual teams to accomplish the task and
driven crime has created some very operate efficiently (Quisenberry, 2018). The
complex workforce shortages, and organizations that discover how to lead and
workforce expertise challenges that all utilize virtual cybersecurity teams
organizations must develop effective accurately will ultimately create an
strategies to address (Morgan, 2016). The extremely beneficial and potentially
emergence of COVID 19 has created new sustainable competitive advantage for
complexities around cybersecurity and themselves (Nobles, 2018).
information security risk management
(Suciu, 2020). Given the impact of new 4.4. Darrell Burrell Self Reflection
cybersecurity risks, there forms a critical Leadership Unplanned Circumstances
need to create a cybersecurity culture that Adaptability Assessment
includes effective teams and processes that Below is a self-assessment tool
can address the emerging treats (Sousane, developed to managers that have been
2018; Nobles, 2018). The traditional forced to manage remote teams because of
approach taken by many organizations in COVID 19. The goal of this tool is the help
safeguarding their information assets has managers identify their strengths and find
been primarily to rely on technical controls managers that need additional
such as hardware and software (Zuhdi, developmental, and organizational support
2018). However, in today’s information- concerning adaptability in an environment
risk work environments, technical controls of constant change.
alone are not sufficient to combat Darrell Burrell Self Reflection
cybersecurity risks (Nobles, 2018). Leadership Unplanned Circumstances
Organizational cybersecurity culture can be Adaptability Assessment (2020).
broadly described as a union of people 5=Always 4=Very often 3=Sometimes
(employees), processes, procedures, 2= Not very often 1= Rarely, if ever.
symbols, technology, training, awareness,

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020



242
Management and Economics

With 5 being very high and 1 being 14. I think it is imperative to display
very low, circle the number that best respect, authentic concern, and empathy
matches your true self-assessment of your when I work with others on complex
leadership adaptability skills during an problems. 5 4 3 2 1
unexpected and urgent situation requiring 15. I attempt to identify each
you to lead change: employee’s strengths and try to find projects
5=Always 4=Very often 3=Sometimes and opportunities for them to leverage and
2= Not very often 1= Rarely, if ever develop and display those strengths,
The questions should be answered in competencies, and abilities. 5 4 3 2 1
the context of unplanned and urgent Add up your responses from each of
circumstances in need of attention. the questions and calculate your scores:
1. I insistently pursue crucial data, 65-75: Highly competent Adapter –
evidence, and knowledge. 5 4 3 2 1 You have the qualities necessary to lead
2. I use a variety of approaches to change and respond appropriately to
consistently and frequently communicate unexpected problems, crises, urgent
information, activities, and results to circumstances. You have the skills and
stakeholders on a variety of levels. 5 4 3 2 1 abilities that could allow you to assist those
3. I am proactive and not reactive in less skilled through mentoring and
ways that necessitate initiative during collaboration.
unexpected and urgent conditions. 5 4 3 2 1 64-51: Serviceable Adapter –
4. I am a critical, strategic, and clear You have the qualities necessary to lead
thinker in stressful conditions. 5 4 3 2 1 change and respond appropriately to
5. I display emotional intelligence, unexpected problems, crises, urgent
emotional self-regulation, and calm during circumstances, but you could strengthen
unexpected and urgent situations. 5 4 3 2 1 some areas to be more productive. Note the
6. When change is needed, I areas where you scored less than a five and
embrace it quickly and focus on creating focus your attention on improving them.
paths that help others see how the required 51-38: Slight Adapter – While you
change can occur. 5 4 3 2 1 have some strong leadership qualities, you
7. I am encouraging, optimistic, still have plenty of room for improvement
and in ways that attempt to find possibilities to successfully lead change and respond
from solving problems. 5 4 3 2 1 appropriately to unexpected problems,
8. I am resourceful, innovative, and crises, urgent circumstances by focusing on
creative when it comes to problem-solving. any areas where you did not score a 5.
54321 You could probably benefit from having a
9. I am mentally strong and recover highly competent adapter as a mentor.
quickly from setbacks. 5 4 3 2 1 37 or less: Apprentice Adapter – You
10. I behave fearlessly and take need to focus your professional
calculated risks. 5 4 3 2 1 development activities on enhancing the
11. I make decisions and come to skills and abilities to lead change and
conclusions in a timely and decisive respond appropriately to unexpected
fashion. 5 4 3 2 1 problems, crises, urgent circumstances
12. I create a clear path and vision through a focus on any areas where you did
concerning problems and solutions. 5 4 3 2 1 not score a 5. You could probably benefit
13. I value expertise and knowledge from having a highly competent adapter as
and am committed to continuous learning a mentor.
and development 5 4 3 2 1

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020


Management and Economics 243

REFERENCES

Agbi, R. O. (2018). Leadership communications strategies for enhancing virtual team


performance (Order No. 10748206), available from ProQuest Central; ProQuest Dissertations
& Theses Global. (2026711541).
Al Amour, M. (2018). Leadership for virtual teams: Perspectives on communications,
leader traits, and job satisfaction (Order No. 10828994), available from ProQuest Central;
ProQuest Dissertations & Theses Global. (2072579991).
Bendaly, N. (2020). Your Team Is Now Working Remotely 5 Ways to Strengthen
Communication and Team Cohesion in the COVID-19 World. Forbes.
Colfax, R. S., Santos, A. T., & Diego, J. (2009). Virtual leadership: A green possibility
in critical times, but can it work? Journal of International Business Research, Vol. 8,
133-139, available at: http://www.jibs.net/, accessed on 20 April 2020.
Creswell, J.W. (2019). Research Design: Qualitative, Quantitative, and Mixed Methods
Approaches. London: Sage Publication Inc.
Dechant, K., Marsick, V. J., & Kasl, E. (1993). Towards a model of team learning.
Studies in Continuing Education, Vol. 15, Issue 1, 1-14.
Edmondson, A. C. (1999). Psychological safety and learning behavior in work teams.
Administrative Science Quarterly, Vol. 44, 350-383.
Edwards, M. M. (2018). Identifying factors contributing towards information security
maturity in an organization (Order No. 10746212), available from ProQuest Central;
ProQuest Dissertations & Theses Global. (2018859946).
Gelston, G. M. (2018). Virtual leadership in complex multi-organizational research and
development programs (Order No. 10829139), available from ProQuest Dissertations &
Theses Global. (2058035370).
Hagy, M. R. (2018). Trust at no sight: Establishing trust in the process rather than in
the individual members of a global virtual team (Order No. 10813764), available from
ProQuest Dissertations & Theses Global. (2099573117).
Larrimore, N. P. (2018). Risk management strategies to prevent and mitigate emerging
operational security threats (Order No. 10747292), available from ProQuest Dissertations &
Theses Global. (2023213918).
Martin, K. A. (2018). Study of productivity rates for geographically distributed agile
teams (Order No. 10826315), available from ProQuest Dissertations & Theses Global.
(2057566211).
Morgan, S. (2016). African Americans Underrepresented in the Cybersecurity Field.
Forbes, available at: https://www.forbes.com/sites/stevemorgan/2016/04/07/african-
americans-underrepresented-in-the-cvbersecuritv-.field/#3c1ad72915c9, accessed on
20 April 2020.
National Center for Middle Market. (2017). Cybersecurity and the middle market: The
importance of cybersecurity and how middle market companies manage cyber risks. National
Center for Middle Market, available at: http://cybersecuritycenter.
middlemarketcenter.org/Media/Documents/NCMM_Cybersecurity_Report_FINAL.pdf,
accessed on 20 April 2020.
Ng Lane, J. (2018). Teams and organizing in the digital age: How team networks form
and why they perform (Order No. 10817033), available from ProQuest Dissertations & Theses
Global. (2070941894).
Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business
Organizations. Holistica-Journal of Business and Public Administration, Vol. 9, 71-88.

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020



244
Management and Economics

Perkins, M. J. (2018). Organizational leadership activities that positively influence


virtual employee engagement (Order No. 10785852), available from ProQuest
Dissertations & Theses Global. (2031062890).
Quisenberry, W., Burrell, D. (2012). Review of Management Innovation & Creativity.
Winter, Vol. 5, Issue 16, 97-116.
Quisenberry, W. (2018) Exploring how emotional intelligence contributes to virtual
teams: Interpretive Analysis of a Phenomenological Study. European Scientific Journal,
Vol. 14, No 5.
Sousane, R. (2018). Understanding federal cybersecurity culture: An expert perspective
on current and ideal state (Order No. 10785377), available from ProQuest Central;
ProQuest Dissertations & Theses Global. (2030526181).
Suciu, P. (2020). COVID-19 and Computer Security, Part 2: Shoring Up Systems for
Remote Workers. Tech News World.
Zuhdi, B. (2018). Information security risk analysis and advanced persistent threat:
A multiple case study (Order No. 10837747), available from ProQuest Central;
ProQuest Dissertations & Theses Global. (2085189586).

REVISTA ACADEMIEI FORŢELOR TERESTRE NR. 3 (99)/2020

You might also like