How to Prepare for Your Next Network War Room Debate - Part 2
October 24, 2018

Jay Botelho
LiveAction

Share this

Whether proactive or reactive in nature, war room sessions fundamentally come down to problem solving. But the ultimate goal is to eliminate these sessions altogether.

Start with How to Prepare for Your Next Network War Room Debate - Part 1

However, sometimes problems still happen no matter how proactive you are. If you have to go to the war room, and you want to win, here are some key tips:

Populate the room wisely and sparingly

The old adage about the bigger the group, the less work gets done certainly holds true for the war room. You want all critical functions represented, but with a single representative. If someone needs access to their teams for more details, they should report back, not drag more participants into the meetings.

Define roles and responsibilities

Clearly define roles and responsibilities for the war room. In most cases, the primary responsibility is to develop a comprehensive proposal to present to executive management. When done well, the execs shouldn't even need to participate. The right team should be able to deliver a rock-solid proposal, regardless of whether the driving force is project-focused or response-focused.

Bring data

Bring all the data you have and be prepared to share it. There are no secrets in the war room. All corporate politics must be put aside for a successful resolution. Remove blinders regarding available data. For example, when dealing with a security issue, don't forget to involve the network team. They often have critical data that's overlooked, at least in the beginning of the situational analysis.

Know the end game

Have an idea of the ultimate win-win outcome before you enter the war room. This is probably easier when the situation is project-focused vs. response-focused, but it's critical either way.

Involve PR experts

Involve PR experts for events that will impact the external perception of the brand. This is extremely important when dealing with response-focused issues, especially security breaches. External communication is a legal requirement for security breaches, and you need to get it right. It's the responsibility of the entire team to craft an accurate and complete response, but it's best for all communication to funnel through a single PR representative.

Plan to communicate only once

Analyze ALL the data and get the full extent of the problem isolated as early as possible. Communicate as clearly as you can. A great example of what not to do would be the Equifax breach, where the initial breach announcement was made approximately 6 weeks after discovery, with news of ever-greater exposure continuing to be reported by Equifax for more than 6 months.

War rooms can be intimidating places with lots of finger pointing, blame and chaos. For the network team, having the proper visibility tools in place is a win-win. First, it helps reduce these sessions, and second, if called in to answer the bell, it gives you the data needed to properly contribute and help solve the problem quickly. When the fingers start pointing, will you be ready?

Jay Botelho is Director of Engineering at LiveAction
Share this

The Latest

April 01, 2020

The role of the CIO is evolving with more of a focus on revenue and strategy, according to the 2019 Global CIO Survey from Logicalis ...

March 31, 2020

Organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments, according to new global survey conducted by Propeller Insights for Volterra ...

March 30, 2020

Developers spend roughly 17.3 hours each week debugging, refactoring and modifying bad code — valuable time that could be spent writing more code, shipping better products and innovating. The bottom line? Nearly $300B (US) in lost developer productivity every year ...

March 26, 2020

While remote work policies have been gaining steam for the better part of the past decade across the enterprise space — driven in large part by more agile and scalable, cloud-delivered business solutions — recent events have pushed adoption into overdrive ...

March 25, 2020

Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and missed opportunities to innovate, according to the State of Unplanned Work Report 2020, conducted by Dimensional Research for PagerDuty ...

March 24, 2020

In today's iterative world, development teams care a lot more about how apps are running. There's a demand for fixing actionable items. Developers want to know exactly what's broken, what to fix right now, and what can wait. They want to know, "Do we build or fix?" This trade-off between building new features versus fixing bugs is one of the key factors behind the adoption of Application Stability management tools ...

March 23, 2020

With the rise of mobile apps and iterative development releases, Application Stability has answered the widespread need to monitor applications in a new way, shifting the focus from servers and networks to the customer experience. The emergence of Application Stability has caused some consternation for diehard APM fans. However, these two solutions embody very distinct monitoring focuses, which leads me to believe there's room for both tools, as well as different teams for both ...

March 19, 2020

The 2019 State of E-Commerce Infrastructure Report, from Webscale, analyzes findings from a comprehensive survey of more than 450 ecommerce professionals regarding how their online stores performed during the 2019 holiday season. Some key insights from the report include ...

March 18, 2020

Robinhood is a unicorn startup that has been disrupting the way by which many millennials have been investing and managing their money for the past few years. For Robinhood, the burden of proof was to show that they can provide an infrastructure that is as scalable, reliable and secure as that of major banks who have been developing their trading infrastructure for the last quarter-century. That promise fell flat last week, when the market volatility brought about a set of edge cases that brought Robinhood's trading app to its knees ...

March 17, 2020

Application backend monitoring is the key to acquiring visibility across the enterprise's application stack, from the application layer and underlying infrastructure to third-party API services, web servers and databases, be they on-premises, in a public or private cloud, or in a hybrid model. By tracking and reporting performance in real time, IT teams can ensure applications perform at peak efficiency — and guarantee a seamless customer experience. How can IT operations teams improve application backend monitoring? By embracing artificial intelligence for operations — AIOps ...