Introduction to Business Process Model and Notation (BPMN) - OSSCamp 2014OSSCube
BPMN is Method of illustrating business processes in the form of a diagram similar to a flowchart. Originally developed by the Business Process Management Initiative (BPMI).
Currently maintained by the Object Management Group (OMG). The current
version of BPMN is 2.0.
Introduction to Business Process Model and Notation (BPMN) - OSSCamp 2014OSSCube
BPMN is Method of illustrating business processes in the form of a diagram similar to a flowchart. Originally developed by the Business Process Management Initiative (BPMI).
Currently maintained by the Object Management Group (OMG). The current
version of BPMN is 2.0.
This deck provides a high-level framework to implement business process redesign within a business transformation initiative. It shows how to establish the team, define the approach, and identify some of the deliverables within this track of work.
The Business Process Management overview presentation is a comprehensive walkthrough of what Business Process Management is and how you implement it at your company or your customer company. for more detail keep updating here : http//www.wesrch.com
Slides from a webinar that I did recently for TIBCO. Full webinar replay with audio available at http://www.tibco.com/mk/2007/bpm-bpm11-jul-07usarc.jsp
Joint presentation to SME members on the benefits of Lean, a overview of Lean terminology, and how sequencing operations in a balanced flow reduces Lead Time.
BPM (Business Process Management) IntroductionIntegrify
An introduction to BPM for teams looking to improve business processes through business process management (BPM). This is an abridged version of the full BPM guide.
Business Process Model and Notation (BPMN)Peter R. Egli
Overview of Business Process Model and Notation (BPMN) language for modeling business processes.
When implementing business processes, there is usually a large gap between the business semantics (process, activity, participant, orchestration, choreography, data items etc.) and the technical implementation languages (REST, WSDL, transport protocol, message bus etc.). BPMN has the goal of bridging this gap by providing a standard notation for describing business processes plus a standard mapping of this notation into an executable description language like WSBPEL. The BPMN 2.0 standard even allows executing BPMN business models directly without the need of a translation.
The core notation elements of BPMN are flow objects to model activities and events, data objects to model pieces of information, connecting objects to model information and control flow, and swimlanes to model process participants. Four different diagram types allow the modeling of processes, process choreographies, collaboration between participants and conversations.
A flowchart is an outline or schematic drawing of the process your team is trying to measure or improve. It can also be a picture of an ideal process that you would like to use.
I invite you to join as a member of the PEX Network Group http://tinyurl.com/3hwakem, you will have access to Key Leaders Globally, Events, Webinars, Presentations, Articles, Case Studies, Blog Discussions, White Papers, and Tools and Templates. To access this free content please take 2 minutes for a 1 time FREE registration at http://tiny.cc/tpkd0
Warm Regards,
Steven Bonacorsi, LSS MBB, President
International Standard for Lean Six Sigma
Cell: 603-401-7047
skype: sbonacorsi
E-mail: sbonacorsi@comcast.net
Twitter: http://twitter.com/Sbonacorsi (Follow Lean Six Sigma Content)
LinkedIn: http://www.linkedin.com/in/StevenBonacorsi
FREE Lean Six Sigma and BPM content - register at http://tiny.cc/tpkd0
This presentation gives simple but effective techniques for mapping a business process. Process Mapping is a strong initial step in continuous improvement of any business process.
Business Process Management for Housing Operations describes how the University of Florida Department of Housing and Residence Education uses BPM to manage software development projects.
This deck provides a high-level framework to implement business process redesign within a business transformation initiative. It shows how to establish the team, define the approach, and identify some of the deliverables within this track of work.
The Business Process Management overview presentation is a comprehensive walkthrough of what Business Process Management is and how you implement it at your company or your customer company. for more detail keep updating here : http//www.wesrch.com
Slides from a webinar that I did recently for TIBCO. Full webinar replay with audio available at http://www.tibco.com/mk/2007/bpm-bpm11-jul-07usarc.jsp
Joint presentation to SME members on the benefits of Lean, a overview of Lean terminology, and how sequencing operations in a balanced flow reduces Lead Time.
BPM (Business Process Management) IntroductionIntegrify
An introduction to BPM for teams looking to improve business processes through business process management (BPM). This is an abridged version of the full BPM guide.
Business Process Model and Notation (BPMN)Peter R. Egli
Overview of Business Process Model and Notation (BPMN) language for modeling business processes.
When implementing business processes, there is usually a large gap between the business semantics (process, activity, participant, orchestration, choreography, data items etc.) and the technical implementation languages (REST, WSDL, transport protocol, message bus etc.). BPMN has the goal of bridging this gap by providing a standard notation for describing business processes plus a standard mapping of this notation into an executable description language like WSBPEL. The BPMN 2.0 standard even allows executing BPMN business models directly without the need of a translation.
The core notation elements of BPMN are flow objects to model activities and events, data objects to model pieces of information, connecting objects to model information and control flow, and swimlanes to model process participants. Four different diagram types allow the modeling of processes, process choreographies, collaboration between participants and conversations.
A flowchart is an outline or schematic drawing of the process your team is trying to measure or improve. It can also be a picture of an ideal process that you would like to use.
I invite you to join as a member of the PEX Network Group http://tinyurl.com/3hwakem, you will have access to Key Leaders Globally, Events, Webinars, Presentations, Articles, Case Studies, Blog Discussions, White Papers, and Tools and Templates. To access this free content please take 2 minutes for a 1 time FREE registration at http://tiny.cc/tpkd0
Warm Regards,
Steven Bonacorsi, LSS MBB, President
International Standard for Lean Six Sigma
Cell: 603-401-7047
skype: sbonacorsi
E-mail: sbonacorsi@comcast.net
Twitter: http://twitter.com/Sbonacorsi (Follow Lean Six Sigma Content)
LinkedIn: http://www.linkedin.com/in/StevenBonacorsi
FREE Lean Six Sigma and BPM content - register at http://tiny.cc/tpkd0
This presentation gives simple but effective techniques for mapping a business process. Process Mapping is a strong initial step in continuous improvement of any business process.
Business Process Management for Housing Operations describes how the University of Florida Department of Housing and Residence Education uses BPM to manage software development projects.
1
Introduction To Business Process Design
2
Overview
What is a business process?
Three definitions
Process types and hierarchies
Components of process architectures
The essence of Business Process Design (BPD)
Why is BPD important?
BPD and overall business performance
BPD and strategy
Why do inefficient processes exist?
Activity classification and BPD
3
What is a Business Process?
A pragmatic definition
A Business Process describes how something is done in
an organization
In general terms…
Business - Organizational entity that deploys resources to provide customers with desired products and services
Process (Merriam-Webster’s Dictionary)
(i)A natural phenomenon marked by gradual changes that
lead to a particular result
(ii)A natural continuing activity or function
(iii)A series of actions and operations conducing to an end
4
What is a Business Process?
2.Traditional Process definition in OM literature
A process specifies the transformation of inputs to outputs
Different types of transformations
Physical (Ex. raw material finished product)
Locational (Ex. flying from Denver to L.A.)
Transactional (Ex. depositing money in a bank)
Informational (Ex. accounting data financial statement)
The transformation model of a process
Inputs
Outputs
Process
5
What is a Business Process?
The Process View
Any organization entity or business can be characterized as a process or a network of processes
Based on the simple transformation model of a process
Has its origin in the areas of manufacturing and quality
The transformation model of a process
Inputs
Outputs
Process
6
What is a Business Process?
A more comprehensive process definition
A business process is a network of connected activities and buffers with well defined boundaries and precedence relationships, which utilize resources to transform inputs into outputs with the purpose of satisfying customer requirements
Process
Customers
Suppliers
Resources
Inputs
Outputs
7
Process Types and Hierarchies
Individual processes
Carried out by a single individual
2.Vertical or Functional processes
Contained within one functional unit or department
3.Horizontal or Cross Functional processes
Spans several functional units, departments or companies
Make up
Make up
8
Marketing
Operations
Accounting
CEO
Order Request
Order Fulfilled
Production planning
Vertical process
Horizontal process
Individual process
Buying a TV commercial
Illustration: Process Types and Hierarchies
9
Process Types and Hierarchies
Core cross-functional processes often have highest improvement potential
Core processes – essential for meeting market place demand through a specific strategy
Especially high improvement potential if a significant amount of non-manufacturing/service related activities
Reasons
Difficult to coordinate
Have not ke ...
Using agile and lean to lead business transformation agile 2010Dennis Stevens
Companies need a sustainable model for leading continuous change - yet most leadership teams are too busy running the business to effectively lead change. Many transformation efforts fail due to false starts, organizational resistance, and a lack of effective governance. We will explore a strategic change project management model that has repeatedly resulted in successful ongoing change initiatives. The model draws on Agile and Lean principles and techniques to lead change initiatives in a way that is simple, provides focus and transparency, and builds trust.
Creating Value Through Digital Enterprise Transformation
Originally presented to XPX, CT Chapter. We look at what it takes to create value and reduce risk using digital enterprise transformation to improve your business processes, technology, and talent foundations.
Topics covered include building a roadmap, process improvement, systems improvement including ERP, CRM, BI/Analytics, and eCommerce, how to build a global organization, and how to build a professional management team.
Happiness is a Warm Bot: How to Generate Value from Process Mining InsightCelonis
AkzoNobel is a global paint and coatings company looking for ways to enhance their operations through automation. The challenge? Moving from isolated areas with different functions to a place where different company interests could align and execute a new business model that would enable their overall goals. Hear how Celonis enabled them to build a business case for improvement — ultimately eliminating low-value-add manual tasks, introducing more process stability and saving time and money with a digital workforce. In this session you’ll learn how the right investment in technology can support your journey to operational excellence.
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
The global implications of DORA and NIS 2 Directive are significant, extending beyond the European Union.
Amongst others, the webinar covers:
• DORA and its Implications
• Nis 2 Directive and its Implications
• How to leverage directive and regulation as a marketing tool and competitive advantage
• How to use new compliance framework to request additional budget
Presenters:
Christophe Mazzola - Senior Cyber Governance Consultant
Armed with endless Excel files, a meme catalog worthy of the best X'os (formerly twittos), and a risk register to make your favorite risk manager jealous, I swapped my computer scientist cape a few years ago for that of a (cyber) threat hunter with the honorary title of CISO.
Ah, and I am also a quadruple senior certified ISO27001/2/5, Pas mal non ? C'est francais.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Date: April 25, 2024
Tags: Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: Digital Operational Resilience Act (DORA) - EN | PECB
NIS 2 Directive - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
In an era where digital transformation is inevitable, the landscape of cybersecurity is constantly evolving.
Amongst others, the webinar covers:
• DORA and its Implications
• ISO/IEC 27005: Risk Management in Information Security
• Leveraging Artificial Intelligence for Enhanced Cybersecurity
Presenters:
Geoffrey L. Taylor - Director of Cybersecurity
Geoffrey Taylor brings a wealth of experience from multiple roles within various industries throughout his career. As a Certified ISO 27001 Implementer and Auditor, as well as certified ISO 27005, CISM and CRISC, he brings a unique perspective on cybersecurity strategy, risk management and the implementation of an Information Security Management System, having helped multiple organizations in aligning their strategy based on their threat landscape.
Martin Tully - Senior Cyber Governance Consultant
Martin is a Senior Consultant at CRMG with over twenty years of experience, and has previously been employed at two of the ‘Big Four’ professional services firms. Martin has worked across most industry sectors in the development of the best practice guidance and risk analysis methodologies. Martin is also accomplished at: leading the implementation of an ISMS; delivering a number of information risk assessments; reviewing information security policies; assessing security requirements across the supply chain; and updating a complete framework of supporting standards. Prior to the ISF, Martin’s roles have included delivering operational risk reporting, running research projects and benchmarking information security investments for major clients. Martin holds a Bachelors degree from Royal Holloway University of London.
Date: March 27, 2024
Tags: ISO, ISO/IEC 27005, ISO/IEC 42001, Artificial Intelligence, Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27005 Information Security Risk Management - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/ffX-Xbw7XUk
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
In today’s rapidly evolving world, where Artificial Intelligence (AI) not only drives innovation but also presents unique challenges and opportunities, staying ahead means being informed.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 42001 and their key components
• Latest trends in AI Governance
• Ethical AI practices
• Benefits of Certification
Presenters:
Jeffrey Bankard - Cybersecurity & AI Leader, AI Management Systems: ISO/IEC 42001
Jeffrey provides executive leadership for AI product creation through the product incubation unit (PIU). Ensures the timely delivery of AI consulting engagements through cross-functional teams comprised of senior information and network security leaders to establish strategic goals for improving the security architecture and risk posture for clients. Consults with business leaders to define key performance indicators and service levels. Fosters employee development through mentoring and coaching. Decides how to achieve results within the organization’s strategic plans, policies, and guidelines. Develops new products and secures those products through current AI security guidelines (ISO 42001).
Adrian Resag - Experienced in Risk and Control - ISO/IEC 27001 and ISO/IEC 42001
Adrian believes a stimulating career can span many disciplines and that leading organizations value versatile professionals. He has enjoyed managing teams spanning the globe by working in world-leading organizations as Chief Audit Executive, Head of Risk Management, Information Systems Auditor, Head of Internal Control, as a consultant, a statutory auditor and an accountant. To allow such a diverse career, his approach has been to pursue certifications in many fields (making him one of the most qualified and certified in some of them). He has written books and created professional certifications in audit & assurance and compliance & ethics, and teaches in subjects from information security to risk management. With a passion for education, Adrian founded an educational institution and has taught tens of thousands of students and professionals online, in companies, universities and in governmental organizations.
Date: February 28, 2024
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/DujXaxBhhRk
The importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27002 and ISO/IEC 27032 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• CMMC Frameworks
Presenters:
Dr. Oz Erdem
Governance, Risk and Compliance (GRC) consultant, trainer, auditor, and speaker
Dr. Erdem has over 25 years of experience in information security, trade compliance, data privacy, and risk management. He took leadership roles in governance and compliance at various Fortune 100-500 companies and SMBs, including Siemens Corporation, Siemens Industry, Linqs, Texas Instruments, Rtrust, ICEsoft Technologies, NATO C3A, and BILGEM. In addition, successfully managed software development (i.e., embedded, cloud, and SaaS) and digital product projects involving information security, mobile networks, and IoT networks. Further, Dr. Erdem led several non-profit organizations, such as National Association of District Export Councils (NADEC), Government Contractors Council (GovConCouncil), and Central-North Florida District Export Council as the Chairman of the Board.
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
George Usi - CEO of Omnistruct
An internet pioneer and award-winning leader in internet governance with over 25 years of experience, George Usi knows that getting hacked is not a matter of ‘if’ but, ‘when’ and the fiscal and reputational effects that has on a business, the executives, and the board. George is the Co-Founder of Omnistruct, a cyber risk company. Omnistruct protects and expands revenue creation, reputation, and customer retention through cyber risk transference, governance, and compliance. We ensure that security and privacy programs work.
Date: January 24, 2024
YouTube Video: https://youtu.be/9i5p5WFExT4
Website: https://bit.ly/3SjovIP
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
As we approach the new year, the importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 27035 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• Best practices for building a resilient cybersecurity strategy in 2024
Presenters:
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Loris Mansiamina
A Senior GRC Professional consultant for Small, Medium and large companies. Over 10 years, Loris has been assisting clients in both public and private sectors about various matters relating to Gouvernance, Risk Management and Compliance (GRC), Digital transformation, cyber security program management, ISO 27k & ISO 20k implementation, COBIT & ITIL implementation, etc.
Date: December 19, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27035, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27035 Information Security Incident Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/yT8gxRZD_4c
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) in business processes is becoming increasingly essential. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27005 and ISO/IEC 27001 and their key components
• The standard’s alignment
• Identifying AI risks and vulnerabilities
• Implementing effective risk management strategies
Presenters:
Sabrina Feddal
With more than 16 years of background in operational security, telco as engineer and project manager for major international companies. I have founded Probe I.T in 2016 to provide my customers (both national and international) with GRC services. Winner of the 2020 award, the CEFCYS – Main French Women in cybersecurity association - jury's favorite, she remains committed on a daily basis to maintaining diversity and gender diversity in her teams.
Passionate about Law, History & Cybersecurity. She has several professional certifications acquired over the course of her career: Prince2, CISSP, Lead Implementer ISO27001, Risk Manager, University degree in Cybercrime and Digital Investigation.
Her values: excellence, discretion, professionalism.
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Date: November 22, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27005, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27005 Information Security Risk Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/TtnY1vzHzns
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
In today's digital age, cybersecurity is more critical than ever. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27032:2023 and ISO/IEC 27701 and their key components
• The standard’s alignment
• Emerging Cybersecurity Threats
• What is new to the ISO/IEC 27032:2023
Presenters:
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Jeffrey Crump
Mr. Jeffrey Crump is the Principal Consultant at Arizona-based Cyber Security Training and Consulting LLC and a graduate of the Certified NIS 2 Directive Lead Implementer course. He is a Certified CMMC Assessor, Certified CMMC Professional, and Instructor. Mr. Crump is also the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. His book has been expanded into a triad of certification courses on cyber crisis planning, exercises, and leadership.
Date: October 25, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/a21uasr8aLs
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
Cybersecurity is an ongoing journey. The regular update and improvement of security measures is essential to stay ahead of evolving threats.
Amongst others, the webinar covers:
• Benefits of Compliance
• Digital Transformation: Why
• ISO/IEC 27001 and ISO/IEC 27032
• ISO/IEC 27001: Information Security Management System (ISMS)
• ISO/IEC 27032: Cybersecurity Framework
Presenters:
Douglas Brush
Douglas Brush is a federally court-appointed Special Master, and Court Appointed Neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.
He is an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues.
He is the founder and host of Cyber Security Interviews, a popular information security podcast.
Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, diversity, equity, and inclusion, in the information security industry.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Carole Njoya
Founder in 2018 of Alcees, a Paris-based management consulting fabric specialized in cybersecurity, data privacy governance and digital trust, Carole Njoya provides independent, tailored and expert advisory to companies doing business in European markets and serving both B2B and B2C customers. With more than 100 cybersecurity projects delivered, she assists entities in preparing, implementing and maintaining the right best practices under the ISO 27001 compliance framework and GDPR article 25 obligation (Privacy by design) for their vendors. Carole Njoya featured in the « Women Know Cybersecurity » 2019 Twitter list edited by Cybercrime Magazine. Carole Njoya is committed in science and engineering since pre-teen period.
Date: September 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
YouTube video: https://youtu.be/U7tyzUrh8aI
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
The management of AI systems is a shared responsibility. By implementing the ISO 31000 Framework and complying with emerging regulations like the EU ACT, we can jointly create a more reliable, secure, and trustworthy AI ecosystem.
Amongst others, the webinar covers:
• Understanding AI and the regulatory landscape
• AI and the threat landscape
• A risk driven approach to AI assurance - based on ISO 31000 principles
• Stress testing to evaluate risk exposure
Presenters:
Chris Jefferson
Chris is the Co-Founder and CTO at Advai. As the Co-Founder of Advai, Chris is working on the application of defensive techniques to help protect AI and Machine Learning applications from being exploited. This involves work in DevOps and MLOps to create robust and consistent products that support multiple platforms, such as cloud, local, and edge.
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG. Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant. In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense that prioritized key risks to the organisation and helped minimize disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicist in the Oil and Gas Industry.
Date: August 24, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/MXnHC6AvjXc
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
Generative AI offers great opportunities for innovation in various industries. Hence, by adopting ISO/IEC 27032, you can enhance your cybersecurity resilience and efficiently address the risks associated with generative AI.
Amongst others, the webinar covers:
• AI & Privacy
• Generative AI, Models & Cybersecurity
• AI & ISO/IEC 27032
Presenters:
Christian Grafenauer
Anonymization expert, privacy engineer, data protection officer, LegalTech researcher (GDPR, Blockchain, AI) Christian Grafenauer is an accomplished privacy engineer, anonymization expert, and computer science specialist, currently serving as the project lead for anonymity assessments at techgdpr. With an extensive background as a senior architect in Blockchain for IBM and years of research in the field since 2013, Christian co-founded privacy by Blockchain design to explore the potential of Blockchain technology in revolutionizing privacy and internet infrastructure. As a dedicated advocate for integrating legal and computer science disciplines, Christian’s expertise in anonymization and GDPR compliance enables innovative AI applications, ensuring a seamless fusion of technology and governance, particularly in the realm of smart contracts. In his role at techgdpr, he supports technical compliance, Blockchain, and AI initiatives, along with anonymity assessments. Christian also represents consumer interests as a member of the national Blockchain and DTL standardization committee at din (German standardization institute) in ISO/TC 307.
Akin Johnson
Akin J. Johnson is a renowned Cybersecurity Expert, known for his expertise in protecting digital systems from potential threats. With over a decade of experience in the field, Akin has developed a deep understanding of the ever-evolving cyber landscape.
Akin is an advocate for cybersecurity awareness and frequently shares his knowledge through speaking engagements, workshops, and publications. He firmly believes in the importance of educating individuals and organizations on the best practices for safeguarding their digital assets.
Lucas Falivene
Lucas is a highly experienced cybersecurity professional with a solid base in business, information systems, information security, and cybersecurity policy-making. A former Fulbright scholar with a Master of Science degree in Information Security Policy and Management at Carnegie Mellon University (Highest distinction) and a Master's degree in Information Security at the University of Buenos Aires (Class rank 1st). Lucas has participated in several trainings conducted by the FBI, INTERPOL, OAS, and SEI/CERT as well as in the development of 4 cyber ISO national standards.
Date: July 26, 2023
YouTube Link: https://youtu.be/QPDcROniUcc
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
By embracing the importance of GDPR and leveraging ISO/IEC 27701, you can enhance your data protection practices, achieve compliance, and minimize the risk of penalties.
Amongst others, the webinar covers:
Importance of Data Protection
Understanding Data Collection and Challenges
Introduction to GDPR
Key Principles of GDPR
Who does GDPR Apply to and Its Global Implications
Introduction to ISO/IEC 27701
Implementing ISO/IEC 27701
Privacy by Design
Dealing with IT on a Daily Basis
Building Awareness and Training
Audit, Data Discovery, and Risk Assessments
Presenters:
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Lisa Goldsmith
Lisa Goldsmith is the founder of LJ Digital and Data Consultancy. Lisa has over 23 years’ experience of supporting leadership teams in membership, charity, and wider not-for-profit organisations to simplify their IT and digital strategy that allows them to sleep soundly at night, knowing their systems and processes are fit for purpose, GDPR compliant, secure and that they deliver value to staff, members, and stakeholders.
Prior to starting her own consultancy, Lisa gained extensive experience working for membership organisations and has knowledge and expertise at all levels of operations from working within careers and qualifications teams, as Membership Manager, as Head of Digital & IT for delivering large-scale digital, IT and GDPR compliance projects and serving on several Senior Leadership Teams. Lisa is also currently a Trustee of the BCLA and Groundwork East.
Date: June 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/lfJrSLaGDtc
Website: https://bit.ly/437GOnG
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
The EU has implemented a range of regulations aimed at strengthening its cybersecurity posture. In this context, the ISO/IEC 27001 standard offers a comprehensive framework for managing and safeguarding sensitive information, such as personal data.
Amongst others, the webinar covers:
• Quick recap on the ISO/IEC 27001:2013 & 2022
• ISO/IEC 27001 vs legislation
• The EU Cyber Legislation landscape
• Some considerations and consequences
• How to stay on top of the ever changing context
Presenters:
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
Jean-Luc Peters
Jean-Luc Peters brings 25 years of IT technology, information and cybersecurity expertise to boards, executives, and employees. Since the younger age he has held management positions in the private and government sector. He is currently the Head of the Cyber Emergency Response team for the National Cybersecurity Authority in Belgium. In addition to this, he is also a trainer, coach and trusted advisor focusing on enhancing cyber resilience.
Jean-Luc has helped in the technical implementation of the NIS 1 (Network and Information Security) Directive transposition in Belgium, defining the Baseline Security Guidelines governmental ISMS framework and many other projects. He holds several certifications, including ISO/IEC 27001 Lead Implementer, ISO/IEC 27005 Auditor, CISSP, GISP, Prince 2 Practitioner, ITIL etc.
Date: May 31, 2023
Tags: ISO, ISO/IEC 27001, Information Security, Cybersecurity
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/rsjwwF5zlK8
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
To protect your organization from cyber attacks, you need to implement a robust information security management system (ISMS) and business continuity management system (BCMS) based on international standards, such as ISO/IEC 27001 and ISO 22301.
Amongst others, the webinar covers:
• Why we need a cyber response plan to protect business operations
• Introduction to ISO/IEC 27001 and ISO 22301
• What do we need for a cyber security response plan?
• How do we develop a cyber security response plan?
Presenters:
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG.
Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant.
In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense, that prioritise key risks to the organisation and helped minimise disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicst in the Oil and Gas Industry.
Simon Lacey
Simon is a resourceful, creative Information & Cyber Security professional with a proven track record of instigating change, disrupting the status quo, influencing stakeholders and developing ‘big picture’ vision across business populations. Multiple industry experience; excels in building stakeholder engagement & consensus; and suporting organisations to make sustainable change.
Simon also has considerable experience of risk management, education and awareness, strategy development and consulting to senior management and is a confident and engaging public speaker.
Simon has previously worked within the NHS, Bank of England and BUPA, before setting out as an independent consultan forming Oliver Lacey Limited, supporting clients in multiple business sectors.
When not working, Simon loves to run – currently training for the Berlin Marathon, a Director of Aylesbury United Football Club, records vlogs and is an experienced standup comic.
Date: April 26, 2023
Find out more about ISO training and certification services
Training: https://bit.ly/3AyoyYF
https://bit.ly/3LbBVTx
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/i4qx5mjEqio
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
Integrating ISO/IEC 27001 and ISO 31000 can help organizations align their information security and risk management efforts with their overall business objectives, leading to more effective risk management and better decision-making.
Amongst others, the webinar covers:
• Aligning the ISMS process with ISO/IEC 27001
• Using ISO 31000 within the ISMS
• Aligning the RM process with ISO 31000
• How/where does ISO/IEC 27001 fit?
Presenters:
Nick Riemsdijk
As a highly experienced and multi-skilled leader in Information and Physical Security, Nick is known as a collaborative, focused, driven and highly analytical individual with a broad portfolio of successes in client engagements. His expertise spans devising, implementing, managing and delivering information security, physical security, organizational resilience and facilities management solutions for organizations. He is certified as a Certified Information Security Manager (CISM), Certified Protection Professional (CPP), in Project Management (Prince2), ISO 22301 (Business Continuity), ISO 27001 (Information Security), and ISO 31000 (Risk Management).
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Date: March 23, 2023
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/Xj0U2mbpZUs
IT Governance and Information Security – How do they map?PECB
Effective IT Governance requires proper Information Security practices to ensure that the organization's data is secure. On the other hand, Information Security policies and procedures must be aligned with the organization's overall IT Governance framework to ensure that security measures do not negatively impact business operations.
Amongst others, the webinar covers:
▪ Bring Governance and InfoSec Together
▪ Answering WIIFM
▪ Business Terms
Presenters:
Dr. Edward Marchewka
Dr. Edward Marchewka is a seasoned executive that has come up through the ranks in the IT vertical, expanding into information security, quality management, and strategic planning.
Edward founded and serves as the Principal for 3LC Solutions, enabling YOU to Tell a Better Story in business, with our vCIO, vCISO, quality, and strategy consulting services, through metrics and relating risk to the business with our CHICAGO Metrics® SaaS solution.
He has also held several roles leading information technology, most recently with Gift of Hope Organ and Tissue Donor Network, leading the Information and Technology Services department as the Director of IT, Data, and Security Services. Prior to Gift of Hope, he ran information security for Chicago Public Schools.
Edward has earned a Doctorate of Business Administration from California Southern University and Masters’ degrees in Business Administration and Mathematics from Northern Illinois University. He earned Bachelors’ degrees in Liberal Studies and Nuclear Engineering Technologies from Thomas Edison State College, N.J. Edward maintains several active IT, security, and professional certifications from (ISC)2, ASQ, ITIL, PCI, PMI, ISACA, Microsoft, and CompTIA. He has held legacy IT certifications from Cisco and HP, and a designation from the National Security Agency.
Date: February 22, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-38500
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/2bSbAdL5Idg
Student Information Session University Digital Encode.pptxPECB
oin us as our Director for Business Mustafe Bislimi teams up with Dr. Obadare Peter Adewale, our academic partner Digital Encode Limited, to provide valuable information about our programs, admissions process and specialization and elective courses.
Discover the opportunities available to you as a student at PECB University and get a firsthand look at what makes us a top choice for education.
Whether you're a prospective student or simply curious about PECB University, don't miss this informative session! Subscribe to our channel and stay tuned for more videos.
For inquiries regarding admission process contact us: university.studentaffairs@pecb.com
-EMBA in Cybersecurity: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbHJQUUpjMmY2NmcyeURhTzE5VlRSNjg2Y1hwd3xBQ3Jtc0tuLTZqdmZyWkc2VVNQV21YRTlKZUQ2SEtUenNXbzYyb1ZianV5cldDYTViWjZ1eVhCNWtxWHI3VTNwRS1BOE4wTERkZ3BtcndwM0sxdVoydWZYSXBkV2hYd2lwU0NLSTk5WERWMlhtVk1Ud2tuWTRjTQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fcybersecurity&v=3YJbbr708pk
-EMBA in Business Continuity Management: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3JQTGVhd1VfeG1weWNzUzRrMmg2bk0tc3kxUXxBQ3Jtc0tsOVF5VG82TkhRU3R5TVRWWmdhMzBrSTU2eW9wby1OYWN4VTg5bkJBY0lhTmNsOFhETzB5cVp0WU8zbTQwTlZkdk9Dby1fSXdhWmRpZFFPUmk3NS1QOGpMOVBlaDFhVVpwa2JZMkxKNGRnTnppMm93SQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fbusiness-continuity-management&v=3YJbbr708pk
-EMBA in Governance, Risk, and Compliance: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbUplMGtjOFRWbzdGWERmdTR2QjdSbTBuQUxCd3xBQ3Jtc0tsNVdOU1p6UERWM3ZySE55V2FlWlJ1aFlzUU85VEt0aVRoR0hyTjNHbUNVYVMyb0lzTkZycUtJRzNxazlDWGRqTHZQMWJPZEYwbG1xWjVJN1JNOW1QUjJBZDY3NkU5LVl0b2xxOFpkZW1ZX2F3QmF5cw&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fgovernance-risk-compliance&v=3YJbbr708pk
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
4. 4
What is a process
A process is defined as a repetitive and systematic series of actions or
operations whereby one or more inputs from suppliers is used to achieve an
output of value to the customer (internal/external)
Input Output
Process
Actions
Process Model
The Work Process
The Improvement Process
5. 5
Selecting the Process Improvement
Methodology
Process
Management Kaizen
SIX SIGMA
LSS DFLSS
Just Do It
LEAN
Process
performance
understood?
Can the
problem be
solved in less
than 5
days?
Is it a process
flow / cycle
time
problem?
Is it a
variation /
defect driven
problem?
Is a new
process or
redesign
required?
Is the solution
to the
problem
simple &
known?
Start
Yes
No
No
No
No
No
Yes
Yes
Yes
Yes
Yes
Explore Other Methodologies
No
7. 7
What makes a process efficient?
Efficient processes must be:
Easy to be defined;
Predictable
Measurable;
Easy to be documented;
Easy to communicate.
Able to face the risks
8. 8
Scale
Entire organization
Department
Project/ Section/ Team
Organization Readiness
Culture
Past process experience
Management team
Stability
Impact
Business Transformation
• Organization wide deployment
• Major culture change
Strategic improvement
• Targeted deployment on critical problems
• Projects necessary for success or survival
Problem solving
• Specific operational problems
• Incremental improvements in
organizational performance
Which Deployment Model To Use?
9. 9
There is no one “right” model
Adapt the deployment to the organization’s situation.
Four models to consider:
Enterprise wide (traditional model)
Department/business unit (scalable model)
Targeted (problem solving model)
Grass roots (bottom up model)
Deployment Models
10. 10
Characteristics
Top down driven
Comprehensive
Major culture change
Rapid, highly visible
deployment
Deployment considerations
Solid leadership from the top management is essential
Large infrastructure and full time staff
Significant planning and management over time
Integration with other management systems
Need for common language and problem solving
methodology
Need to address cross functionalprocesses
Five years to achieve lasting culture change
This is the traditional deployment model with a proven track record However, it is challenging to execute.
Who implemented this model
Characteristics
Deployment considerations
Structured approach to deploying the new
function into the organization.
MBBs become local drivers
Drives operational excellence and routine
operations
Enterprise Wide Model
11. 11
Characteristics
Department leadership but enterprise management
support
Department pilot for enterprise
Comprehensive at the department level
Culture change
Deployment considerations
Easier to start due to smaller scale
Slower pace is possible; scale up after initial
success
Greater use of consultants and outside training
Less integration with management systems
Similar to enterprise model but on a smaller
scale
Risk of not getting beyond the department level
Good option for a strong mid level leader with a supportiveboss.
Who implemented the model
Characteristics
Deployment considerations
Department/Business Unit Model
12. 12
Characteristics
Top management leadership
Focused on a few specific business
problems
Driven by a desire for strategic impact
Culture change not a deployment
objective
Deployment considerations
Easy to get started
Quick results because problems are identified ahead of
time
Infrastructure needs are small; use contracted
resources
Risk of not sustaining the gains
Good model if LSS resources arelimited.
Can build momentum for organization wideefforts.
Who implemented the model
Characteristics
Deployment considerations
Targeted Model
13. 13
Characteristics
Originates at the bottom of the
organization
Highly motivated individuals lead the
effort
Project or problem specific
Culture change not an objective
Deployment considerations
Easy to do
Track record for sustainable improvement is not
good
Few if any infrastructure needs
Big success can lead to using other deployment
models.
Model can produce good results but often fades over time due to lack of top management attention.
Who implemented the model
Characteristics
Deployment considerations
Project based companies, with low
repeatability processes
Research institutes
Hospitals
Maintenance companies
Grass Roots Model
14. 14
Why Use Business Process Modeling?
Your first step in modeling is actually pen and paper.
Pen and paper to simply draw the process or… Post-it to draw activities
16. 16
Process Mapping - What?
What It Really Is...
S I P O C S I O CP
What You Think It Is...
Why map the process?
A visual representation of the process gives
the stakeholders an opportunity to define
and review the true current state process. It
is very common for stakeholders to only see
their part of the process and underestimate
the true complexity.
17. 17
Process maps allow you to break down the process into a step-by-step visual
representation. From this we can determine the basic elements of the process,
its flow and all functions involved. There are numerous types of process maps
ranging from the basic to very detailed. Some types of process maps are:
• SIPOC
• Functional Deployment Process Map
• Spaghetti Diagram
Process mapping
18. 18
The purpose of Process Maps is to:
• Identify the complexity of the process
• Communicate the focus of problem solving
Process Maps are living documents and must be changed as the process is changed
• They represent what is currently happening, not what you think is happening.
• They should be created by the people who are closest to the process
Step AStart FinishStep B Step C Step D
Process Map
Process Maps
19. 19
SIPOC
Elements of a Process
WHO are your
customers?
WHAT does the customer
receive? (Think of their
CCR’s)
What are the HIGH LEVEL
STEPS in the Process
today?
What are the inputs?Who PROVIDES the
input?
Step 1:
Step 2:
Step 3:
Step 4:
List Supplier
List Supplier
List Supplier
List Supplier
List Input
List Input
List Input
List Input
List Outputs
List Outputs
List Outputs
List Outputs
List Customer
List Customer
List Customer
List Customer
Process Name: Process Owner:
Start
Stop
Date:
1
2A
2B
34567
CustomerOutputProcessInputSupplier
(Who)(Vers) (Use Nouns)(Who)
PS I O C
(Use Nouns)
20. 20
CustomerOutputProcessInputSupplier
WHO are your
customers?
(From Step 1)
WHAT does the
customer receive?
(Think of their
CCR’s)
What STEPS are
Included in the
Process today?
(high level)
What is provided to
START the
process?
Who PROVIDES
the input?
(Who)(Verbs) (Use Nouns)(Who)
Step 1:
Step 2:
Step 3:
Step 4:
Step 5:
Step 6:
Step 7:
PPSS III OOO CC
(Use Nouns)
List Supplier
List Supplier
List Supplier
List Supplier
List Supplier
List Supplier
List Supplier
List Supplier
List Input
List Input
List Input
List Input
List Input
List Input
List Input
List Input
List Outputs
List Outputs
List Outputs
List Outputs
List Outputs
List Outputs
List Outputs
List Outputs
List Customer
List Customer
List Customer
List Customer
List Customer
List Customer
List Customer
List Customer
Functional deployment map
Sipoc – high- level process
map(10.000 ft)
Mapping process
21. 21
Cross Functional Process Map
When multiple departments or functional groups are involved in a complex
process it is often useful to use cross functional Process Maps.
Draw in either vertical or horizontal Swim Lanes and label the functional groups
and draw the Process Map
General
Accounting
BankFinancial
Accounting
VendorDepartment
Start
Request
transfer
Attach ACH
form to
Invoice
Produce an
Invoice
Fill out ACH
enrollment
form
Receive
payment End
Vendor
info in
FRS?
Input info into
web interface
Match against
bank batch
and daily cash
batch
Accepts transactions,
transfer money and
provide batch total
Review and
Process
transfer in
FRS
3.0
Journey Entry
21.0
Bank
Reconciliation
Maintain database
to balance ACH
transfers
ACH – Automated
Clearing House.
No
Yes
Sending Fund Transfers
22. 22
Functional deployment map
File is completed
Complete file
checklist
Print 2 signatures
pages & sign; print
contract; print
welcome letter
Send paper file to
QC
Review
required based
on tenure?
Verify address
Address good?
Return to
processor to
contact agent to
verify address
Mail welcome
letter/kit, signature
page, and contract
Agent receives
agent number
Review and score
file
Score = 100?
Send to processor
to correct
Second signature
page sent to
imaging for back
scan
Send welcome
letter, contract & 1
signature page to
mail out
No
No
No
Yes
Yes
Yes
• 19% of files reviewed contain
one or more errors (YTD ave;
range 6-31%)
• 37% are Fatal or Major errors*
(YTD ave; range 24-57%)
• 23% of completed files reviewed
(YTD ave; range 9-38%)
• Is there a correlation between
length of tenure and quality of
work?
QC process can delay welcome
letter/agent number being sent by
1-22 days
Opportunity: 100%
accuracy on fatal/major
errors
* Fatal error: stops agent from getting appointed or interferes with
commissions; Major error: contract can be mailed but errors must be
fixed to prevent impact to agent
ComplianceABTContracting Agent Imaging
Process Mapping
23. 23
Process Walk
Current state
Spaghetti Diagram allows you to visualize redundant activity and waste related
to motion. A spaghetti diagram is a good precursor to Functional Deployment
and Value Stream Maps
When developing a Process Map walk the process whenever possible or to
validate what you have documented as the “as is” process.
26. 26
Greet Guest
Take Guest
Information
Verify Guest Credit
Choose Available
Room
Provide Guest Key
Direct Guest to
Elevator
Guest
Check in
Assistant
Entity
Activity
Resource
Routing “Get” Resource
“Free” Resource
Arrival
Customer experience chart
(between swimlane and spaghetti)
Resource
27. 27
Initial
Process
Arrives at
first floor of
the
Compliance
Building
Information -
Clerks load files
into O drive
inventory
SP
First Sort
T'scripts
sorted in
loadingdock
for delivery
Transportati
on
T'scripts
sent to 3rd
floor File
Room
Transportatio
n
Clerical lead
picks up files
and locates
them in
Clerical area
Second
Sort
Clerical
lead sorts
files by
transcript
type
First
Batching
Batched by
25 and
distributed to
the 7 TE
units
Transportatio
n
Batches
routed to the
inventory
room waiting
for TE's to
pick up
Third Sort
TE leads
pick up work
and sort by
available
TEs and
skill codes
Information -
TDI t'script
tracking data
input into IDRS
Final
Process
IDRS sends
out
finished
job 3 days
after
closure
Control
"O" drive
report
Information -
DM compiles
team data
and puts
into WP&C
Information
-
TE closes
out case in
WP&C
USPS
Second
Batching
TE lead
loads
work into
each TEs
in basket
Transportati
on
Each TE
picks up
workload
Value
Added
TEs work
the cases
Transportation
Clerks return
unfinished work to
Inventory Room
Inventory Build-up
Unfinished work
accumulates into
the next days'
load
Transportati
on
Return
completed
work to TE
lead at the
EOD
COMPLETE
FileisStripped
Pull random
reviews
Pull random
reviews
File goes to
TE's
manager
Value Added
TE closes
case in
IDRS
Control
WP&C
Control
IDRS
Information
-
TE closes
out case in
IDRS
Information
IDRS holds
for three
days for any
possible
changes
CRITICALPATH
Initial
Process
Arrives at
first floor of
the
Compliance
Building
Information -
Clerks load files
into O drive
inventory
SP
First Sort
T'scripts
sorted in
loadingdock
for delivery
Transportati
on
T'scripts
sent to 3rd
floor File
Room
Transportatio
n
Clerical lead
picks up files
and locates
them in
Clerical area
Second
Sort
Clerical
lead sorts
files by
transcript
type
First
Batching
Batched by
25 and
distributed to
the 7 TE
units
Transportatio
n
Batches
routed to the
inventory
room waiting
for TE's to
pick up
Third Sort
TE leads
pick up work
and sort by
available
TEs and
skill codes
Information -
TDI t'script
tracking data
input into IDRS
Final
Process
IDRS sends
out
finished
job 3 days
after
closure
Control
"O" drive
report
Information -
DM compiles
team data
and puts
into WP&C
Information
-
TE closes
out case in
WP&C
USPS
Second
Batching
TE lead
loads
work into
each TEs
in basket
Transportati
on
Each TE
picks up
workload
Value
Added
TEs work
the cases
Transportation
Clerks return
unfinished work to
Inventory Room
Inventory Build-up
Unfinished work
accumulates into
the next days'
load
Transportati
on
Return
completed
work to TE
lead at the
EOD
COMPLETE
FileisStripped
Pull random
reviews
Pull random
reviews
File goes to
TE's
manager
Value Added
TE closes
case in
IDRS
Control
WP&C
Control
IDRS
Information
-
TE closes
out case in
IDRS
Information
IDRS holds
for three
days for any
possible
changes
CRITICALPATH
Arrives at
first floor
of the
Compliance
Building
Initial
Process
Suppllliiierrr::
: Butttlllerrr
Street
computtterrr
rrroom
Information -
Clerks load files
into O drive
inventory
SP
First Sort
T'scripts
sorted in
loading
dock for
delivery
Totttalll C///T = 0 miiinutttes Totttalll
C///T = 50 miiinutttes NVA = 0
minutesttii NVA = 50
miiinutttes
Transportati
on
T'scripts
sent to 3rd
floor File
Room
TotttalllC///T=10
miiinutttesNVA=10miiinutttes
Clerical
lead picks
up files
and
locates
them in
Clerical
area
Transportatio
n
TotttalllC///T=10
miiinutttesNVA=10miiinutttes
Clerical
lead sorts
files by
transcript
type
Second
Sort
TotttalllC///T=4hourrrs
NVA=4hourrrs
First
Batching
Batched by
25 and
distributed to
the 7 TE
units
Batches
routed to
the
inventory
room
waiting for
TE's to
pick up
Transportatio
n
TotttalllC///T=4hourrrs
NVA=4hourrrs
TE leads
pick up
work and
sort by
available
TEs and
skill codes
ThirdSort
TotttalllC///T=1hourrrs
NVA=1hourrrs
Information -
TDI t'script
tracking data
input into IDRS
TAXPAYE
R
IDRS
sends out
finished
job 3 days
after
closure
Final
Process
TotttalllC///T=0miiins.
NVA=0miiins.
Control
"O" drive
report
Information -
DM compiles
team data
and puts
into WP&C
Information
- TE closes
out case in
WP&C
USPS
TE lead
loads work
into each
TEs in
basket
Secon
d
Batchin
g
TotttalllC///T=1hourrrs
NVA=1hourrrs
Each TE
picks up
workload
Transportatio
n
TotttalllC///T=6hourrrs
NVA=6hourrrs
Value
Added
TEs work
the cases
TotttalllC///T=10
miiinutttes
attt
ttthe
EOD
?
Clerks return
unfinished
work to
Inventory
Room
Transportatio
n
No
Unfinished work
accumulates into
the next days'
load
Inventory Build-
up
Return
work to
TE lead
at the
EOD
Transportatio
n Lead
Revie
w
completed
Requiiirrred?
PAS
Revie
w
Requii
irrred?
No
FileisStripped
COMPLETE
No
Pull random
reviews
Yes
Acceptttabllle
?
No
Yes
Pull
random
reviews
Yes
Acceptttabllle
?
File goes
to TE's
manager
No
Yes
TE
closes
case in
IDRS
Case Value
Added
complllettted Yes
TotttalllC///T=0
miiinutttesNVA=0miiinutttes
Control
WP&C
Control
IDRS
Information
- TE
closes out
case in
IDRS
Information
IDRS holds
for three
days for
any
possible
changes
Totttalll C///T
= 3 days
NVA = 3 days
CRITICAL
PATH
Value Stream Mapping=VSM
28. 28
Process Mapping – Why?
• So people can see the overall process for the first time
• So people see how their ‘piece’ impacts on other peoples pieces
• To give visibility to different types of activities
• To create a common base from which to improve
• To establish ownership of the process
29. 29
Why Use Business Process Modeling?
To maintain a performant business process, you will need to digitize that
process in a way that a workflow engine can understand.
Business process modeling tools allow you to represent your process in a
digital way that can then be transferred to a live automated process.
30. 30
Why Use Business Process Modeling?
Business Process Modeling is a combination of various
process related steps such as:
Process Mapping,
Process Discovery,
Process Simulation,
Process Analysis and
Process Improvement.
31. 31
Benefits of business process modelling
There are many benefits to business process
modeling:
Gives everyone a clear understanding of how the process works, even
during a crisis situation
Provides consistency and controls the process
Identifies and eliminates redundancies and inefficiencies
Sets a clear starting and ending to the process
32. 32
What BPMN brings to the business ?
A standard Business Process Model and Notation (BPMN 2.0) will provide
businesses with the capability of understanding their internal business
procedures in a graphical notation and will give organizations the ability to
communicate these procedures in a quick and standard manner.
Furthermore, the graphical notation will facilitate the understanding of the
performance collaborations and business transactions between the
organizations.
This will ensure that businesses will understand themselves and participants in
their business and will enable organizations to adjust to new risks and
business circumstances quickly
33. 33
What BPMN brings to the business ?
Business process modeling provides important benefits to companies and
organizations such as the ones listed below.
1. Align Operations with Business Strategy
2. Improve Process Communication
3. Increase Control and Consistency
4. Improve Operational Efficiencies
5. Gain Competitive Advantage
34. 34
Align Operations with Business Strategy
Business process modeling is a critical tool for management and executives to
guarantee that the business processes are consistent with and support
execution in the direction of attaining the overall strategy of the organization.
Business process modeling enable process agility, a capability to change and
communicate processes rapidly to take advantage of new business
opportunities or address business challenges.
35. 35
Improve Process Communication
Process modeling brings to the table a common unified language and
methodology for communicating processes and information about processes
and decision rules.
• Minimizes potential danger of loss of staff resulting in loss of business
process knowledge.
• It helps business managers communicate their ideas quickly and clearly.
• Turns the team's experience and "tribal knowledge" into documented
processes.
36. 36
Increase Control and Consistency
Business Process Modelling helps a company execute processes in
consistent way because instead of relying on people to remember to do the
right thing the documented process can be given to the business users.
More than this, BPMN helps to handle exceptions faster and in a better way.
37. 37
Improve Operational Efficiencies
BPMN it boosts a mind-set of continually optimizing business critical
processes to incrementally improve operational efficiencies.
Process analysis enables better resource utilization in case of a crisis, a
natural disaster, etc.
38. 38
Gain Competitive Advantage
A business that has aligned its operations to its strategy, is agile, that has
control over its processes, is running efficiently and has well trained staff is
indeed at the top of its game.
Having a clear process structure, the personnel can easily adapt to any
change, whether is a market change or a noise induced change (a natural
disaster).
43. 43
Alternatives in modelling
The central modelling includes
• a dedicated modelling team,
• that creates all models itself
• and ensure the functional quality of the models by permanent
discourse with the departments (process owners)
The decentral modelling is characterised by
• the creation of the models in the functional departments by the
respective experts,
• additionally a small central team, which guarantees particularly the
syntactical correctness and consistency of the models and
• provides if necessary. help in modelling.
44. 44
Evaluation of the central modelling
Dimension Evaluation
Costs • Permanent personnel costs by dedicated actors (-)
• Employees are possibly missing at a different location in the operating
business (-)
Quality • Technically matured models (+)
• Tendential subotimal technical quality as a result of a lack of expertise of
modellers (-)
• High coordination effort between the functional departments (-)
• After a professional training it is possible to identify interdepartmental
processes and interfaces (+)
Time • Modelling team needs time for each process for the functional
adjustment (-)
• Modelling team is reliant on the technical cooperation with the functional
department in the modeling processes (delays) (-)
• Finalisation of processes may require multiple feedback sessions with
the technical department (-)
45. 45
Evaluation of the decentral modelling
Dimension Evaluation
Costs • Minimal additional staff costs due to smaller central team (+)
• Casually limitation of productivity in the departments through modelling
workshops (-)
Quality • Functional process quality tends to increase (+)
• Know how, process awareness and acceptance is encouraged by
identification with the processes in the departments (+)
• Know How is sustainable anchored in the departments(+)
Time • Department requires only basic training in terms of process modelling
(tools and methods) (+)
• Faster acquisition and implementation of change requirements in
processes (+)
• Syntactic quality assurance through central authority is required (-)
46. 46
Pocess ControllerProcess
employee
Process Owner
Process Expert
Chief Process
Officer
Process Consultant
specific
business
process
Business Process Management System
performs collects data
reports to
is responsible for
supports
gives
methodological
support
gives
technical input
participates in
improvements
models
is responsible for
supports
46
Roles of the BPM system and their
interaction
47. 47
Responsibility for the optimisation of the whole business
process management
Improvement and further development of the BPM
system
Coordination of cross company business processes
Cooperation and if necessary, responsibility of strategic
process changes
Chief Process Officer
The role of the Chief Process Officer (CPO) refers to the whole business process management system of
the company.
This role can be the same as the role of the Chief Process Officer or be preceived outside of the
management.
In these slides, it is assumed that the role of the Chief Process Officer is not located in the executive, but
for example in the organisation department.
47
Roles of the Business Process Management
System (1/3)
48. 48
Responsible for the achievement of process objectives
Responsible for process execution
Responsible for the design of processes
Process owner
The role of the process owner refers to selected processes of the company.
Operational execution of business processes
Technical knowledge holders
Process employee
Has profound knowledge of the business process
Supports the process owners
Gives technical input for the business process modelling. If
necessary, performs them
Process expert
The role of the process experts is located in the department, and therefore refers to selected
processes of the respective department.
The process employee edits the selected business processes in the department. 48
Roles of the Business Process
Management System (2/3)
49. 49
Methodological support
Cooperation in planning and execution of BPM projects
Training of process methods and tools
Organisation and moderation of BPM workshops
BP modelling
Process consultant
The role of the process consultant is usually located in an organisation department and therefore refers to
the whole company.
In larger companies, a specialisation of the process consultants can be useful in terms of products.
Reporting about the achievement of process objectives
Reporting about the implementation of measures
Process controller
The role of the process controller is ideally seperated to the process owners, to achieve corresponding
objectivity. This role also refers to selected processes of the company.
49
Roles of the Business Process
Management System (3/3)