Over the years I’ve watched far too many good people leave their team or stop doing their best work because of a bad manager. In fact, research shows that the number one reason an employee quits is their manager. (https://www.entrepreneur.com/article/249903) This doesn’t include the loss or productivity for teams under a bad manager. As my […]
- Home
- 2016 (Page 4)
20160518 Atlanta SPIN – BA: First line of defense against a security breach
Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication; Atlanta SPIN; software improvement; process optimization20160513 IBADD – BA: First line of defense against a security breach
IBADD 2016, May 13, 2016, Meadows Events & Conference Center Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication20160509 BA World – Can the Zombie Apocalypse help you survive your IT projects?
If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, we will demonstrate […]
Business Analysis, business architecture, Disaster preparedness, Process improvement, Project Management20160510 BA World – Marketing Yourself for a Better Career
You are confident of the work you do and your core skills, but feel you are not getting the recognition you deserve. Other people get placed on better projects or receive promotions that could have been yours. Maybe you are looking for a new job, but are having trouble getting to and through the interview […]
branding, career, job search, marketing, professional development, resume20160509 BA World – BA: First line of defense against a security breach
Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication20160405 Mastering Business Analysis Podcast – MBA066: Starting a BA Community of Practice
April 5, 2016 In this episode, Hans Eckman helps us to understand how to set up a Community of Practice or Center of Excellence, even in an organization that may be resistant to the idea. Starting a Business Analysis Community of Practice or Center of Excellence is a great was to develop the skills of all […]
Business Analysis, business architecture, Center of Execellence, COE, Community of Practice, CoP, organizational change management, Process improvementBA: First line of defense against a security breach

Aren’t you glad you weren’t the reason customer data was lost?! Well, maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape and how to elicit, document, and enforce security in […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication
