Some time or another nearly every single betrayer was accepted as an O.K. person by someone whom they eventually deceived or perhaps even killed. Frightening but, unfortunately, true. ITP is difficult because humanity comes with a vein of cruelty thrown in for bad measure. —RLN
Securing Continuous Performance Management Through Strategic Insider Threat Prevention Cyber Security Unification
Systems Management Institute Press · May 1, 2020
Continuous Performance Management (CPM) has emerged as the dominant organization model for building high performance teams. Challenged by the necessity for implementing new models of workplace relationships, mangers have become coaches as their employees learn to collaborate as members of self-directed teams. Common employee assessments have become uncommon as employees assess the skill of their coaches in real time. Beyond these common hallmarks of Continuous Performance Management, however, a new spirit of openness has emerged that grants employees access to data, systems, and business information in unprecedented ways. Skills assessment and performance evaluation has given way to a new corporate spirit of trust and openness. In a world of Cyber Terror and Insider Threat Prevention Cyber Security, Continuous Performance Management may well become a “formula for failure”.
“It would be nice if we knew a person’s conceptual scheme before we began communicating with that person. Unfortunately this requires much more magic than simple mind reading. In this case, ignorance may be bliss because the minds of some people would put you to sleep while with other people, it would terrify you.”
— Ray Newkirk