Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

11/15/2019
01:40 PM
Joshua Goldfarb
Joshua Goldfarb
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

12 Tips for Dealing with a Manipulative Security Manager

Don't let yourself be stuck in an unhealthy work environment with a toxic manager who takes advantage of your talent.

In my experience, top security performers love nothing more than to solve problems and improve the state of security where they work. These star professionals give much of themselves to any organization to which they belong. There are good managers who treat this type of exemplary employee in a healthy, constructive manner. There are also more than a few bad managers who use a variety of manipulative techniques to put problem solvers down.

Worse, while the personality type of many top performers empowers them to excel in our field, it also sets them up to be taken advantage of and exploited. Here are 12 warning signs to show how to distance yourself out of a toxic work environment and into a healthy one, before too much time has elapsed.

  1. No straight answers: Ask a question, get an answer, right? Not in an unhealthy situation. If you find yourself asking straightforward questions and not getting straightforward, direct answers, take notice.
  2. The story keeps changing: A famous quote attributed to Mark Twain says it all: "If you tell the truth, you don't have to remember anything." When the story keeps changing to suit whatever point is being made or whatever narrative is being told, be aware.
  3. Lack of focus: It's easier to move from one shiny object to the next than to focus on strategy, vision, goals, and objectives. Further, distraction and noise are great ways to cover lack of progress. If the security targets keeps moving, it's a sign.
  4. Lack of clarity: Do you find it hard to get any type of commitment or clarity in writing? Does written communication contain only vague statements or a promise to get back to you later? That makes it much easier to say "I never said that" or to change the story later.
  5. Blame game: A good manager will accept responsibility when things go wrong and distribute the credit when things go right. If your manager does the opposite, that's not a good sign. In particular, if you, as a top performer, always seem to be the problem, it could mean that your manager sees you as a threat and wants to keep you from succeeding. 
  6. No visibility: Even the most open of managers will have topics that they cannot share with their employees. That being said, a good manager will provide a decent amount of visibility into what they're up to. If, instead, he or she shrouds themselves in secrecy, be wary.
  7. No tangible accomplishments: At the end of every week, month, or year, a good manager should be able to provide a tangible list of their accomplishments to both senior leadership and his or her employees. Be worried if all you get is circular talk that gives you a headache.
  8. Lack of monetary success: At the end of the day, monetary success is hard to argue against. Whether it's a revenue target, investment capital, or a budgetary number, a good manager will work diligently to meet and exceed his or her goals in this area. If the manager talks a good game but can't deliver, that’s an indication that something is not right.
  9. A shred of truth: One proven tactic of manipulators is to include a shred of truth in every lie. That makes what their saying much harder to argue with, refute, or dismiss outright. If you find this happening over and over again, it’s time to find a healthier place to work. 
  10. Prying for details and offering none: Does your manager ask repeatedly for more information and more details while offering none in return? This is a common trick, and one that can take a long time for many employees to pick up on. 
  11. Seeking leverage at every opportunity: If every conversation with your manager seems like a debate team contest, that's another signal that something is awry. Those who can't succeed on merit often try to extract leverage in every possible interaction. This also involves putting down, blaming, or insulting the other person. 
  12. Taking: Some say that there are two types of people in the world: givers and takers. The best managers are givers — they want to do what's best for their employees and the organization as a whole. A manager who's a taker, on the other hand, will work to maximize his or her own personal gain. That's toxic, and a sure sign to move on.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "8 Backup & Recovery Questions to Ask Yourself."

Josh (Twitter: @ananalytical) is an experienced information security leader who works with enterprises to mature and improve their enterprise security programs.  Previously, Josh served as VP, CTO - Emerging Technologies at FireEye and as Chief Security Officer for ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...