Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
- Home
- Posts tagged "best practices" (Page 4)
BA: First line of defense against a security breach
Aren’t you glad you weren’t the reason customer data was lost?! Well, maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape and how to elicit, document, and enforce security in […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication7 Leadership Secrets from Battle School
For managers, authority is assigned and leadership assumed, but there are big differences between management and leadership. Leadership must be demonstrated and authority earned through trust and respect. Many employees feel frustrated that they aren’t in a position to be leaders, and they often feel alone and underappreciated. In “Ender’s Game” by Orson Scott Card, […]
best practices, leadership, leadership development, management20160314 Project Summit and BA World – BA: First line of defense against a security breach
Business Analyst World Atlanta, Atlanta, GA, March 14-16, 2016 Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authenticationBA: First Line of Defense Against A Security Breach
Building Business Capability (Annual conference for the International Institute of Business Analysis), Wednesday, November 4, 2015, 10:25 am Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authenticationThink you put customers first?
A lot of companies care deeply about their customers. How do we know? It’s in their mission statement, on their website and in their commercials. One of my favorite quotes mainly attributed to Ralph Waldo Emerson is “What you do speaks so loudly that I cannot hear what you say.” Rather than talk about where […]
best practices, customer service, emplowerment, valuesHeartbleed OpenSSL Account Vulnerability
You’ve probably heard the news and panic over the Heartbleed vulnerability. Here are a few recommended articles to help you understand the risk, and how to protect your identity. How to protect yourself in Heartbleed’s aftershocks: http://www.zdnet.com/how-to-protect-yourself-in-heartbleeds-aftershocks-7000028311/ CNET News Video: Tips to protect yourself from Heartbleed: http://www.cnet.com/videos/tips-to-protect-yourself-from-heartbleed/ Heartbleed bug: Check which sites have been patched – CNET: https://www.google.com/url?q=http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/&sa=U&ei=ffBHU93nF8q92gXl9YGABQ&ved=0CDUQFjAF&usg=AFQjCNGk1irLu2KRFTXbKuKOlvSCj5hHXA […]
best practices, privacy, securityGood to Great: Why Some Companies Make the Leap … And Others Don’t
Good to Great: Why Some Companies Make the Leap … And Others Don’t by Jim Collins Good to Great is a must read for all business people. Jim Collins and his research team examined public companies in the same sector to determine why some companies dramatically exceeded expectations, where their peer tracked with the market or […]
best practices, business, business operations, Process improvement