AUTHOR ARCHIVES

Scott Eblin

Executive Coach Executive coach Scott Eblin’s goal is to help you succeed at the next level of leadership. Throughout the week, he’ll offer his take on the leadership lessons in the news and his advice on your most pressing leadership questions. A former government executive, Scott is a graduate of Harvard’s Kennedy School of Government and is the author of The Next Level: What Insiders Know About Executive Success.
Results 361-370 of 671

What I learned on a Coast Guard cutter

August 22, 2011 For the past few years, I've had the opportunity each Fall to talk leadership with the newly promoted admirals of the U.S. Coast Guard and their Senior Executive Service counterparts from the Department of Homeland Security. I'll be joining the group again this October and will be bringing a new...

To Coach or Not to Coach? The August Leadership Development Challenge

August 17, 2011 It's time for this month's Leadership Development Roundtable Challenge. Executive coach and blogger Mary Jo Asmus has written up a "ripped from today's headlines," case involving a manager who says he wants coaching but doesn't follow through. The question is, if you're the coach, what do you do to get...

The Lost Art of Killing Time

August 16, 2011 This past weekend, I had the great opportunity to spend a couple of days with the crew of the U.S. Coast Guard cutter Venturous on patrol in the Florida Straits. I'm organizing my thoughts, pictures and videos from the trip and will have more to share on that in the...

Three Signs It's Time to Shut Up

August 11, 2011 If you're a sports fan (guilty as charged), you've likely heard by now about golf caddie Stevie Williams' interview after his new boss, Adam Scott, won the WGC-Bridgestone Invitational last weekend. It's the talk of the sports world this week. Williams, in case you don't know, was Tiger Woods' caddie...

A Strength When Overused

August 8, 2011 One of the great truisms in leadership coaching is that a strength when overused becomes a weakness. For example, the strength of confidence, when overused, looks like arrogance. The overconfident leader is so convinced of his or her world view that they quit questioning, listening or observing anything that might...

Micromanagement and Curing The Curse of the V-Bobs

August 4, 2011 One of the things I enjoy the most in my work as a coach is helping my clients come up with regular practices that will make them better leaders. One of my guiding principles as a coach is the line from Aristotle, "We are what we repeatedly do. Excellence, then,...

Five Signs That Your HR Chief is Trouble

August 1, 2011 With a shout out to the folks at SmartBrief on Leadership for pointing it out, I recommend to you a deeply reported article in Fortune magazine about how and why Pfizer CEO Jeff Kindler was pushed out of his job last year. It's an excellent, real life case study in...

The Leadership Theory Lack

July 29, 2011 Today's post is a guest post by David Burkus, the force behind the LeaderLab blog where he focuses on how to put leadership theory into practice. If you like, what David shares in this post, you'll love his new book, The Portable Guide to Leading Organizations. Airport bookstores are crowded...

Are You an Apple or a Google?

July 27, 2011 A couple of weeks ago, I wrote a post titled "Are You an IBM or a Dell?" Today's post continues with the tech ID theme and is inspired by an article in the New York Times by Randall Stross. In it, he makes the point that the big decisions at...

One More Question

July 26, 2011 Sometimes the simplest things make the biggest difference. I see this all the time in coaching leaders. In fact, it's usually the simplest things that make the biggest difference. Here's an example from my executive coaching files. One of my clients was a senior executive I'll call Sam. He was...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.