Moncton November 27-28 If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, […]
- Home
- Posts tagged "Business Analysis" (Page 4)
20160827 – Taking the Next Step: Starting a BA Community of Practice
IIBA Greater Atlanta Chapter 2016 BA Boot Camp Let’s face it. Some organizations are scared of any group that proclaims themselves as experts. Others don’t have the time, support, or accepted leadership to implement a Center of Excellence (COE). This session tells the tale of how a small team was able to establish a Business […]
Business Analysis, business architecture, Center of Execellence, COE, Community of Practice, CoP, organizational change management, Process improvementBA 20/20 – Creating a Discrete Vision and Goals to Transform Your Practice
In “Good to Great”, Jim Collins found that the best companies set Big Hairy Audacious Goals (BHAGS). What would happen if you took the same approach for your practice? In 2007, SunTrust Enterprise Delivery Services transformed business analysis to follow the IIBA BABOK and industry parity. The transformation team also established a foundation of tools […]
Business Analysis, Center of Excellence, organizational change management, Process improvement, Strategic Planning20160607 #AskAnAnalyst Podcast Episode 13: Strategy Analysis and Strategic Thinking
by Kupe | Jun 7, 2016 This week I am joined by my good friend and fellow BA, Hans Eckman to discuss strategic thinking and strategy analysis. So many business analysts think this aspect of the role is above them and they aren’t in a position to have strategical input. Hans and I are here […]
Business Analysis, Strategic Thinking, Strategy Analysis20160518 Atlanta SPIN – BA: First line of defense against a security breach
Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication; Atlanta SPIN; software improvement; process optimization20160513 IBADD – BA: First line of defense against a security breach
IBADD 2016, May 13, 2016, Meadows Events & Conference Center Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication20160509 BA World – Can the Zombie Apocalypse help you survive your IT projects?
If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, we will demonstrate […]
Business Analysis, business architecture, Disaster preparedness, Process improvement, Project Management20160509 BA World – BA: First line of defense against a security breach
Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication