If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, we will demonstrate […]
- Home
- Posts tagged "business architecture" (Page 2)
20161205 Project Summit BA World New York – Can the Zombie Apocalypse help you survive your IT projects?
https://www.pmbaconferences.com/new-york/program.html If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, we will demonstrate […]
Business Analysis, business architecture, Disaster preparedness, Process improvement, Project Management20171128 Can the Zombie Apocalypse help you survive your IT projects?
Moncton November 27-28 If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, […]
Business Analysis, business architecture, Disaster preparedness, Process improvement, Project Management20160827 – Taking the Next Step: Starting a BA Community of Practice
IIBA Greater Atlanta Chapter 2016 BA Boot Camp Let’s face it. Some organizations are scared of any group that proclaims themselves as experts. Others don’t have the time, support, or accepted leadership to implement a Center of Excellence (COE). This session tells the tale of how a small team was able to establish a Business […]
Business Analysis, business architecture, Center of Execellence, COE, Community of Practice, CoP, organizational change management, Process improvement20160518 Atlanta SPIN – BA: First line of defense against a security breach
Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication; Atlanta SPIN; software improvement; process optimization20160513 IBADD – BA: First line of defense against a security breach
IBADD 2016, May 13, 2016, Meadows Events & Conference Center Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication20160509 BA World – Can the Zombie Apocalypse help you survive your IT projects?
If a zombie outbreak happened tomorrow, would you be ready? What happens when you find yourself in another death-march project or client? We learn the most valuable and long-lasting lessons when we face and overcome impossible situations, and what is more impossible than a zombie apocalypse? Using disaster preparedness as a backdrop, we will demonstrate […]
Business Analysis, business architecture, Disaster preparedness, Process improvement, Project Management20160509 BA World – BA: First line of defense against a security breach
Target, Home Depot, TJ Maxx and now Anthem BCBS… Aren’t you glad you weren’t the reason customer data was lost?! Well maybe you are. If security isn’t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape […]
access management, best practices, Business Analysis, business analyst, business architecture, data breach, non-functional requirements, security, user authentication