{"id":745,"date":"2015-12-08T08:00:05","date_gmt":"2015-12-08T08:00:05","guid":{"rendered":"http:\/\/hanseckman.com\/guides\/?p=745"},"modified":"2021-05-13T19:20:10","modified_gmt":"2021-05-13T19:20:10","slug":"mastering-business-analysis-podcast-mba049-the-first-line-of-defense-against-a-security-breach","status":"publish","type":"post","link":"https:\/\/hanseckman.com\/guides\/mastering-business-analysis-podcast-mba049-the-first-line-of-defense-against-a-security-breach\/","title":{"rendered":"20151208 Mastering Business Analysis Podcast &#8211; MBA049: The First Line of Defense Against a Security Breach"},"content":{"rendered":"<h3><a href=\"http:\/\/masteringbusinessanalysis.com\/mba049-the-first-line-of-defense-against-a-security-breach\/\" target=\"_blank\" rel=\"noopener\">Mastering Business Analysis Podcast &#8211; MBA049<\/a><\/h3>\n<p>December 8, 2015<\/p>\n<p>In this episode,\u00a0Hans Eckman helps us to understand how the Business Analyst is perfectly suited to be the first line of defense in preventing security breaches.\u00a0 Hans also shares some approaches and advice for handling security related requirements.<\/p>\n<ul>\n<li>Interview on Mastering Business Analysis:\u00a0<a href=\"http:\/\/masteringbusinessanalysis.com\/episode49\">http:\/\/masteringbusinessanalysis.com\/episode49<\/a><\/li>\n<li>Interview on iTunes:\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/mba049-first-line-defense\/id961865564?i=358553203&amp;mt=2\">https:\/\/itunes.apple.com\/us\/podcast\/mba049-first-line-defense\/id961865564?i=358553203&amp;mt=2<\/a><\/li>\n<li>Interview on Stitcher Radio:\u00a0<a href=\"http:\/\/www.stitcher.com\/s?eid=41552266\">http:\/\/www.stitcher.com\/s?eid=41552266<\/a><\/li>\n<\/ul>\n<hr \/>\n<h3>Mastering Business Analysis Podcast<\/h3>\n<p>The Mastering Business Analysis podcast is a program with the goal of elevating the role of the Business Analyst and enhancing the skills of Business Analysts everywhere.\u00a0 Episodes include interviews with leaders in the business analysis community, helpful techniques, and effective practices.\u00a0 Together we will explore the Business Analyst role and we\u2019ll share information you need to achieve mastery in your role and advance in your career as a Business Analyst and beyond.<\/p>\n<p>Find out more about the podcast by listening to the 7 minute introduction and begin your journey toward mastering business analysis.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/episode-001-introduction-to\/id961865564?i=334167703&amp;mt=2\" target=\"_blank\" rel=\"noopener\">Episode 1: Introduction to the Mastering Business Analysis Podcast<\/a><\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/mastering-business-analysis\/id961865564\" target=\"_blank\" rel=\"noopener\">Mastering Business Analysis podcast in iTunes (all episodes)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mastering Business Analysis Podcast &#8211; MBA049 December 8, 2015 In this episode,\u00a0Hans Eckman helps us to understand how the Business Analyst is perfectly suited to be the first line of defense in preventing security breaches.\u00a0 Hans also shares some approaches and advice for handling security related requirements. Interview on Mastering Business Analysis:\u00a0http:\/\/masteringbusinessanalysis.com\/episode49 Interview on iTunes:\u00a0https:\/\/itunes.apple.com\/us\/podcast\/mba049-first-line-defense\/id961865564?i=358553203&amp;mt=2 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[263,45],"tags":[],"class_list":["post-745","post","type-post","status-publish","format-standard","hentry","category-guest-podcast","category-guides-for-it-professionals"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_likes_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/p45zXQ-c1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts\/745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/comments?post=745"}],"version-history":[{"count":1,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts\/745\/revisions"}],"predecessor-version":[{"id":2394,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/posts\/745\/revisions\/2394"}],"wp:attachment":[{"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/media?parent=745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/categories?post=745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hanseckman.com\/guides\/wp-json\/wp\/v2\/tags?post=745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}