{"id":585,"date":"2015-11-04T10:25:18","date_gmt":"2015-11-04T10:25:18","guid":{"rendered":"http:\/\/hanseckman.com\/guides\/?p=585"},"modified":"2015-11-08T16:58:50","modified_gmt":"2015-11-08T16:58:50","slug":"ba-first-line-of-defense-against-a-security-breach","status":"publish","type":"post","link":"https:\/\/hanseckman.com\/guides\/ba-first-line-of-defense-against-a-security-breach\/","title":{"rendered":"BA: First Line of Defense Against A Security Breach"},"content":{"rendered":"<p><a href=\"http:\/\/www.buildingbusinesscapability.com\/agenda\/2015_details\/2092\/\" target=\"_blank\">Building Business Capability (Annual conference for the International Institute of Business Analysis),\u00a0Wednesday, November 4, 2015, 10:25 am<\/a><a href=\"http:\/\/www.buildingbusinesscapability.com\/agenda\/2015_details\/2092\/\" target=\"_blank\">\u00a0<\/a><\/p>\n<p>Target, Home Depot, TJ Maxx and now Anthem BCBS&#8230;<\/p>\n<p>Aren\u2019t you glad you weren\u2019t the reason customer data was lost?! Well maybe you are. If security isn\u2019t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape and how to elicit, document and enforce security into your solutions. Learn how you as the BA or project leader can ensure that your solution isn\u2019t vulnerable.<\/p>\n<p>This session will be led by Hans Eckman whose teams have delivery responsibility for Client Authentication and Security, Governance, risk management, and compliance\/Information Security, and internal Identity Access Management for SunTrust\u2019s Technology Risk and Compliance teams. Through the SunTrust\u2019s BA Center of Excellence, Hans helped establish reusable non-functional requirements and review processes including application security and records retention.<\/p>\n<p>Attendees Will Learn:<\/p>\n<ul>\n<li>The security basics and terminology: Authentication vs Authorization, entitlements, encryption, records retention, challenge vs adaptive, security vs fraud<\/li>\n<li>How to use functional requirements, non-functional requirements and business rules to integrate your security teams into your projects and solutions<\/li>\n<li>How to build reusable requirements asset to provide continuity between applications, shorten requirements cycles and reduce missed requirements<\/li>\n<li>Who to engage and when for elicitation and validation<\/li>\n<\/ul>\n<p><a href=\"http:\/\/hanseckman.com\/guides\/wp-content\/uploads\/2015\/11\/20151104_BA_First_Defense_BBC.pdf\" target=\"_blank\">Download presentation<\/a><\/p>\n<p><a href=\"http:\/\/hanseckman.com\/guides\/wp-content\/uploads\/2015\/11\/20151104_BA_First_Defense_BBC_handout.pdf\" target=\"_blank\">Download handout<\/a><\/p>\n<div class=\"themeblvd-video-wrapper\">\n<div class=\"video-inner\"><div class=\"lyte-wrapper\" title=\"20151102 BA: First Line of Defense Against A Security Breach\" style=\"width:640px;max-width:100%;margin:5px;\"><div class=\"lyMe\" id=\"WYL_FApgR7gRTmw\" itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\"><div><meta itemprop=\"thumbnailUrl\" content=\"https:\/\/hanseckman.com\/guides\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FFApgR7gRTmw%2Fhqdefault.jpg\" \/><meta itemprop=\"embedURL\" content=\"https:\/\/www.youtube.com\/embed\/FApgR7gRTmw\" \/><meta itemprop=\"duration\" content=\"PT59M18S\" \/><meta itemprop=\"uploadDate\" content=\"2015-11-08T16:57:26Z\" \/><\/div><div id=\"lyte_FApgR7gRTmw\" data-src=\"https:\/\/hanseckman.com\/guides\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FFApgR7gRTmw%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\" itemprop=\"name\">20151102 BA: First Line of Defense Against A Security Breach<\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/FApgR7gRTmw\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hanseckman.com\/guides\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FFApgR7gRTmw%2F0.jpg\" alt=\"20151102 BA: First Line of Defense Against A Security Breach\" width=\"640\" height=\"340\" \/><\/a><\/noscript><meta itemprop=\"description\" content=\"Building Business Capability (Annual conference for the International Institute of Business Analysis), Wednesday, November 4, 2015, 10:25 am Target, Home Depot, TJ Maxx and now Anthem BCBS\u2026 Aren\u2019t you glad you weren\u2019t the reason customer data was lost?! Well maybe you are. If security isn\u2019t built into your systems from the beginning, it is very difficult to add it later. You owe it to your customers and employees to learn the security landscape and how to elicit, document and enforce security into your solutions. Learn how you as the BA or project leader can ensure that your solution isn\u2019t vulnerable. This session will be led by Hans Eckman whose teams have delivery responsibility for Client Authentication and Security, Governance, risk management, and compliance\/Information Security, and internal Identity Access Management for SunTrust\u2019s Technology Risk and Compliance teams. Through the SunTrust\u2019s BA Center of Excellence, Hans helped establish reusable non-functional requirements and review processes including application security and records retention. Attendees Will Learn: The security basics and terminology: Authentication vs Authorization, entitlements, encryption, records retention, challenge vs adaptive, security vs fraud How to use functional requirements, non-functional requirements and business rules to integrate your security teams into your projects and solutions How to build reusable requirements asset to provide continuity between applications, shorten requirements cycles and reduce missed requirements Who to engage and when for elicitation and validation\"><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px;\"> <a href=\"https:\/\/youtu.be\/FApgR7gRTmw\" target=\"_blank\">Watch this video on YouTube<\/a>.<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Building Business Capability (Annual conference for the International Institute of Business Analysis),\u00a0Wednesday, November 4, 2015, 10:25 am\u00a0 Target, Home Depot, TJ Maxx and now Anthem BCBS&#8230; Aren\u2019t you glad you weren\u2019t the reason customer data was lost?! Well maybe you are. If security isn\u2019t built into your systems from the beginning, it is very difficult [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2],"tags":[98,15,3,92,14,100,97,62,99],"class_list":["post-585","post","type-post","status-publish","format-standard","hentry","category-presentations","tag-access-management","tag-best-practices","tag-business-analysis","tag-business-analyst","tag-business-architecture","tag-data-breach","tag-non-functional-requirements","tag-security","tag-user-authentication"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_likes_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/p45zXQ-9r","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts\/585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/comments?post=585"}],"version-history":[{"count":0,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts\/585\/revisions"}],"wp:attachment":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/media?parent=585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/categories?post=585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/tags?post=585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}