Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Managing versus leading

We assume that it is a natural progression for managers to become leaders, but this is often not the case.

How does a good manager become a leader?

Managing and leading have virtually nothing to do with one another. Managing implies supervision and providing direction, both which are of course necessary activities in any organization. Leading is all about creating a vision that is so compelling people will follow you without the exercise of any formal authority.

We assume that it is a natural progression for managers to become leaders, but this is often not the case. Many of the most extraordinary acts of leadership I have witnessed have come from people who had no management responsibility whatsoever.

I'm thinking about pursuing an MBA. What should I study? Finance. Strong financial skills are always valuable in business and are a great compliment to technical knowledge.

What major issues should an IT department be planning to address in the coming year?

Year after year, the answer to this question never changes for me. There is only one issue that IT departments should be addressing: Is IT able to make a material contribution to the advancement of your organization's business strategy? Confronting this issue may lead to some interesting decisions around analytics, the cloud and many other areas.

Michael Capone is the corporate vice president and CIO of Automatic Data Processing.

Follow CIO on

Twitter @cio_nz

Facebook

LinkedIn

Download CIO for your tablet here.

Click here to subscribe to CIO.

Sign up to receive free CIO newsletters.

Send news tips to divina@cio.co.nz

Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Whitepapers
  • Whitepaper: Preventing Data Loss Takes More Than MDM
    You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.
    Learn more »
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Top 8 Considerations to Enable and Simplify Mobility
    IT departments have a huge opportunity to make their enterprises more agile, cost efficient and competitive by embracing the opportunities available through mobile devices and connectivity. Embracing mobility doesn't have to be complicated or costly - this report tells you how.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Recent comments