How to Prepare for Your Next Network War Room Debate - Part 2
October 24, 2018

Jay Botelho
LiveAction

Share this

Whether proactive or reactive in nature, war room sessions fundamentally come down to problem solving. But the ultimate goal is to eliminate these sessions altogether.

Start with How to Prepare for Your Next Network War Room Debate - Part 1

However, sometimes problems still happen no matter how proactive you are. If you have to go to the war room, and you want to win, here are some key tips:

Populate the room wisely and sparingly

The old adage about the bigger the group, the less work gets done certainly holds true for the war room. You want all critical functions represented, but with a single representative. If someone needs access to their teams for more details, they should report back, not drag more participants into the meetings.

Define roles and responsibilities

Clearly define roles and responsibilities for the war room. In most cases, the primary responsibility is to develop a comprehensive proposal to present to executive management. When done well, the execs shouldn't even need to participate. The right team should be able to deliver a rock-solid proposal, regardless of whether the driving force is project-focused or response-focused.

Bring data

Bring all the data you have and be prepared to share it. There are no secrets in the war room. All corporate politics must be put aside for a successful resolution. Remove blinders regarding available data. For example, when dealing with a security issue, don't forget to involve the network team. They often have critical data that's overlooked, at least in the beginning of the situational analysis.

Know the end game

Have an idea of the ultimate win-win outcome before you enter the war room. This is probably easier when the situation is project-focused vs. response-focused, but it's critical either way.

Involve PR experts

Involve PR experts for events that will impact the external perception of the brand. This is extremely important when dealing with response-focused issues, especially security breaches. External communication is a legal requirement for security breaches, and you need to get it right. It's the responsibility of the entire team to craft an accurate and complete response, but it's best for all communication to funnel through a single PR representative.

Plan to communicate only once

Analyze ALL the data and get the full extent of the problem isolated as early as possible. Communicate as clearly as you can. A great example of what not to do would be the Equifax breach, where the initial breach announcement was made approximately 6 weeks after discovery, with news of ever-greater exposure continuing to be reported by Equifax for more than 6 months.

War rooms can be intimidating places with lots of finger pointing, blame and chaos. For the network team, having the proper visibility tools in place is a win-win. First, it helps reduce these sessions, and second, if called in to answer the bell, it gives you the data needed to properly contribute and help solve the problem quickly. When the fingers start pointing, will you be ready?

Jay Botelho is Director of Engineering at LiveAction
Share this

The Latest

May 21, 2019

Findings of the Digital Employee Experience survey from VMware show correlation between enabling employees with a positive digital experience (i.e., device choice/flexibility, seamless access to apps, remote work capabilities) and an organization's competitive position, revenue growth and employee sentiment ...

May 20, 2019

In today's competitive landscape, businesses must have the ability and process in place to face new challenges and find ways to successfully tackle them in a proactive manner. For years, this has been placed on the shoulders of DevOps teams within IT departments. But, as automation takes over manual intervention to increase speed and efficiency, these teams are facing what we know as IT digitization. How has this changed the way companies function over the years, and what do we have to look forward to in the coming years? ...

May 16, 2019

Although the vast majority of IT organizations have implemented a broad variety of systems and tools to modernize, simplify and streamline data center operations, many are still burdened by inefficiencies, security risks and performance gaps in their IT infrastructure as well as the excessive time it takes to manage legacy infrastructure, according to the State of IT Transformation, a report from Datrium ...

May 15, 2019

When it comes to network visibility, there are a lot of discussions about packet broker technology and the various features these solutions provide to network architects and IT managers. Packet brokers allow organizations to aggregate the data required for a variety of monitoring solutions including network performance monitoring and diagnostic (NPMD) platforms and unified threat management (UTM) appliances. But, when it comes to ensuring these solutions provide the insights required by NetOps and security teams, IT can spend an exorbitant amount of time dealing with issues around adds, moves and changes. This can have a dramatic impact on budgets and tool availability. Why does this happen? ...

May 14, 2019

Data may be pouring into enterprises but IT professionals still find most of it stuck in siloed departments and weeks away from being able to drive any valued action. Coupled with the ongoing concerns over security responsiveness, IT teams have to push aside other important performance-oriented data in order to ensure security data, at least, gets prominent attention. A new survey by Ivanti shows the disconnect between enterprise departments struggling to improve operations like automation while being challenged with a siloed structure and a data onslaught ...

May 13, 2019

A subtle, deliberate shift has occurred within the software industry which, at present, only the most innovative organizations have seized upon for competitive advantage. Although primarily driven by Artificial Intelligence (AI), this transformation strikes at the core of the most pervasive IT resources including cloud computing and predictive analytics ...

May 09, 2019

When asked who is mandated with developing and delivering their organization's digital competencies, 51% of respondents say their IT departments have a leadership role. The critical question is whether IT departments are prepared to take on a leadership role in which collaborating with other functions and disseminating knowledge and digital performance data are requirements ...

May 08, 2019

The Economist Intelligence Unit just released a new study commissioned by Riverbed that explores nine digital competencies that help organizations improve their digital performance and, ultimately, achieve their objectives. Here's a brief summary of 7 key research findings you'll find covered in detail in the report ...

May 07, 2019

Today, the overall customer scenario has digitally transformed and practically there is no limitation to the ways in which the target customers can be reached. These opportunities are throwing multiple challenges for brands and enterprises, and one of the prominent ones is to ensure Omni Channel experience for customers ...

May 06, 2019

Most businesses (92 percent of respondents) see the potential value of data and 36 percent are already monetizing their data, according to the Global Data Protection Index from Dell EMC. While this acknowledgement is positive, however, most respondents are struggling to properly protect their data ...