How to Prepare for Your Next Network War Room Debate - Part 2
October 24, 2018

Jay Botelho
LiveAction

Share this

Whether proactive or reactive in nature, war room sessions fundamentally come down to problem solving. But the ultimate goal is to eliminate these sessions altogether.

Start with How to Prepare for Your Next Network War Room Debate - Part 1

However, sometimes problems still happen no matter how proactive you are. If you have to go to the war room, and you want to win, here are some key tips:

Populate the room wisely and sparingly

The old adage about the bigger the group, the less work gets done certainly holds true for the war room. You want all critical functions represented, but with a single representative. If someone needs access to their teams for more details, they should report back, not drag more participants into the meetings.

Define roles and responsibilities

Clearly define roles and responsibilities for the war room. In most cases, the primary responsibility is to develop a comprehensive proposal to present to executive management. When done well, the execs shouldn't even need to participate. The right team should be able to deliver a rock-solid proposal, regardless of whether the driving force is project-focused or response-focused.

Bring data

Bring all the data you have and be prepared to share it. There are no secrets in the war room. All corporate politics must be put aside for a successful resolution. Remove blinders regarding available data. For example, when dealing with a security issue, don't forget to involve the network team. They often have critical data that's overlooked, at least in the beginning of the situational analysis.

Know the end game

Have an idea of the ultimate win-win outcome before you enter the war room. This is probably easier when the situation is project-focused vs. response-focused, but it's critical either way.

Involve PR experts

Involve PR experts for events that will impact the external perception of the brand. This is extremely important when dealing with response-focused issues, especially security breaches. External communication is a legal requirement for security breaches, and you need to get it right. It's the responsibility of the entire team to craft an accurate and complete response, but it's best for all communication to funnel through a single PR representative.

Plan to communicate only once

Analyze ALL the data and get the full extent of the problem isolated as early as possible. Communicate as clearly as you can. A great example of what not to do would be the Equifax breach, where the initial breach announcement was made approximately 6 weeks after discovery, with news of ever-greater exposure continuing to be reported by Equifax for more than 6 months.

War rooms can be intimidating places with lots of finger pointing, blame and chaos. For the network team, having the proper visibility tools in place is a win-win. First, it helps reduce these sessions, and second, if called in to answer the bell, it gives you the data needed to properly contribute and help solve the problem quickly. When the fingers start pointing, will you be ready?

Jay Botelho is Director of Engineering at LiveAction
Share this

The Latest

February 20, 2020

Over 70% of C-Suite decision makers believe business innovation and staff retention are driven by improved visibility into network and application performance, according to Rethink Possible: Visibility and Network Performance – The Pillars of Business Success, a survey
conducted by Riverbed ...

February 19, 2020

Modern enterprises rely upon their IT departments to deliver a seamless digital customer experience. Performance and availability are the foundational stepping stones to delivering that customer experience. Along those lines, this month we released a new research study titled the IT Downtime Detection and Mitigation Report that contains recommendations on how to best prevent, detect or mitigate brownouts and outages, given the context of today’s IT transformation trends ...

February 18, 2020

While Application Performance Management (APM) has become mainstream, with a majority of tech pros using APM tools regularly, there's work to be done to move beyond troubleshooting ...

February 13, 2020

Over the last few decades, IT departments have decreased budgets in part because of recession. As a result, they have are being asked to do more with less. The increase in work has amplified the need for automation ...

February 12, 2020

Many variables must align for optimum APM, and security is certainly among them. I offer the following APM predictions for 2020, which revolve around the reality that we will definitely begin to see much deeper integration of WAN technology on the security front. Look for this integration to take shape in the following ways ...

February 11, 2020

When it comes to growing a successful company, research shows it isn't about getting the most out of employees, but delivering an experience that empowers them to be and do their best. And according to Priming a New Era of Digital Wellness, a new study conducted by Quartz Insights in partnership with Citrix Systems, technology is the secret to doing so ...

February 10, 2020

Only 11% of website decision-makers feel that they have complete insight into the scripts that they use on their websites. However, industry estimates state that about 70% of the code on a website comes from a third-party library or service. Research highlights a clear need to raise awareness of the potential threats associated with the vulnerabilities inherent in third-party code ...

February 06, 2020

The ever-increasing access and speeds offered by today's modern networks offer many advantages to businesses and consumers, but also make the integrity of their performance and security more paramount than ever before. Organizations are struggling to manage the constant fluctuations in network conditions and security threats. This has prompted many to explore how automation can help to streamline network management and security processes ...

February 05, 2020

The demand to deliver a consistently positive and innovative customer experience is something that many companies — more specifically, their DevOps teams — are currently grappling with. While the ability to push out multiple features a week may appear as a great accomplishment for DevOps teams, our survey showed that 82% commonly discover bugs in production ...

February 04, 2020

Ensuring reliable data security is a critical part of Application Performance Management (APM) — or at least it should be. The fact is, as a result of our need for speed, increasingly development teams are confronted with the problem of releasing applications faster without compromising security ...