It’s risky doing business these days, with so much confidential and critical information being kept online. Employees use many different applications to process, store, and receive information (some in the cloud, some on the desktop, some still manually performed with pen and paper). This talk will describe how to create a model of information that flows within, through and external to an organisation. The model can be used to identify business information at risk and all the business applications that are being used, especially those that need to be better managed.
This is a model that all Business Analysts should have in their toolkit. It is also what all organisations should be using to ensure there are no leaks of confidential or critical information (before they happen!) and that all applications (formally and informally) used within the organisation are tracked and properly managed.
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
With all the news about cyberattacks, it’s easy to feel like there aren’t enough people to cover all of the security bases. This means proper identification and management of threats and vulnerabilities is an absolute necessity to keep risk at its lowest levels.
These slides--based on the webinar featuring David Monahan managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and John Dasher, vice president of product marketing at RiskSense--highlight why a threat and vulnerability management solution is a must have for your security portfolio.
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
WHY IS THIS IT RISK ASSESSMENT WORKSHOP IMPORTANT?
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...360 BSI
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- FREE CD containing course material, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...360 BSI
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- Online access to course materials, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...360 BSI
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- Online access to course materials, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
With all the news about cyberattacks, it’s easy to feel like there aren’t enough people to cover all of the security bases. This means proper identification and management of threats and vulnerabilities is an absolute necessity to keep risk at its lowest levels.
These slides--based on the webinar featuring David Monahan managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and John Dasher, vice president of product marketing at RiskSense--highlight why a threat and vulnerability management solution is a must have for your security portfolio.
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
WHY IS THIS IT RISK ASSESSMENT WORKSHOP IMPORTANT?
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...360 BSI
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- FREE CD containing course material, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...360 BSI
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- Online access to course materials, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...360 BSI
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- Online access to course materials, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
How to Boost your Cyber Risk Management Program and Capabilities?PECB
The webinar explores how understanding your organization in crisis due to an exploitation of risk can develop the organization’s resilience and team in the drive for a stronger level of compliance maturity.
Main points covered:
• Information Security maturity
• ROPI
• Risk Management
• Incident Response
• Forensic Readiness
• Table Top Exercises
• Training
• Legislation
Presenter:
Our presenter for this webinar is Peter Jones, an experienced management professional, digital forensic analyst, cybersecurity professional, ISO 27001 and ISO 17025 auditor and University Lecturer. Peter has a wealth of experience and expertise which incorporates knowledge from being an academic and a practitioner in relation to best practice, data management, cyber security, digital system security and digital forensics, where he has conducted thousands of examinations on behalf of law enforcement and the private sector. Peter has extensive information technology and telecommunications experience which ranges from retail to enterprise environments including supporting the BBC with their hit drama series, ‘Silent Witness’.
Link the the YouTube video: https://youtu.be/aREo4l-pDgc
While there is a lot of buzz about advanced IT analytics (AIA), the global research from leading IT analyst firm Enterprise Management Associates (EMA) highlights what is actually going on, who is successful and why.
These slides - based on the webinar featuring Dennis Drogseth, VP of research at EMA - cover why successful AIA deployments leverage more 3rd party sources (the average is 15), support more roles (the average is 11), and why 96% of respondents want to integrate service interdependency data into their AIA solutions.
These slides cover:
**What are the more popular types of advanced IT analytics (AIA), and how are they being used?
**How have advanced IT analytics adoption patterns and priorities changed over the last 2 years?
**Who is driving AIA organizationally in the real world?
With a plethora of inventory and discovery tools, IT organizations often sink beneath an unreconciled data universe.
These slides, based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA), draw from extensive EMA research and consulting experience to explain how IT organizations can improve their effectiveness in ‘discovering the truth’ about their environments.
Presented cybersecurity for small business at a Score event. This is a short presentation that shows the basic things that employers and business owners should understand to reduce risk and protect their business.
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
As world economies reopen, businesses must adjust their risk management posture for the “new normal”, while continuing to drive digital transformation initiatives. The “new normal” has brought change to key risk vectors across people, process, and technology. To enable effective financial and operational controls, business teams must adapt to these changes and fully understand these new technology and security risks.
A key change has been a move to a work from home workforce. Organizations must rethink their approach to approach to enabling employee access to key enterprise systems and sensitive data.
In this session, we will share our thoughts on where new risks have emerged and traditional risks have changed. In addition, we will provide a point of view on the latest technologies and techniques to help you assess and control risks in enterprise systems that enable business finance and operations management.
Join SafePaaS CEO Adil Khan and Director Dan Miller at Altum Strategy Group.
Forty eight percent of organizations had a security incident that caused moderate to severe business impact. Undoubtedly, delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.
These slides based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon provide insights into “identifying advanced threats” and “enhancing incident investigations” use cases based on EMA’s “Top 3 Decision-Makers’ Guide to Security Analytics” report.
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
An overview about ZIGRAM, our focus areas, work, use-cases and team. ZIGRAM is a high impact organization which operates in the Data Asset space. Our team is made up of professionals from varied domains like data science, technology, sales, financial services, research and business consulting. Our aim is to deliver value to clients by Building and Managing Data Assets across use cases - thereby boosting revenues and reducing the cost of doing business, in a data-driven world.
Our Vision is to integrate our products, data, and services in DIKW organizations globally, to help solve real-world problems by leveraging Data Assets
Organisational Transformation Meetup 13 Dec 2018 James PriceEdwin Roman
Leveraging data as a strategic asset. This presentation was delivered on 13 December by James Price from Experience Matters, for the Adelaide Organisational Transformation & Business Agility Meetup. Kindly hosted by WFI Insurance. Please acknowledge the source when quoting form this report.
Predictive Analytics to Discover Risk.
Organizations are seeking new ways to transform their rapidly growing data into insight that mitigates risks and unlocks new opportunities. However, using the traditional reporting tools to look for unusual patterns in large data sets is like finding a needle in a haystack.
The problem is not the resources, the personnel, or the data. It’s that many organizations simply don’t have the advanced analytics required to arrange the data, identify suspicious patterns and weaknesses; at least not fast enough. There’s too much data and not enough analytics!
We need a better way of knowing what the information means — of interpreting the data to discover an unknown business risk or opportunity as it happens or, even better, anticipate the next one. For most organizations, reducing transaction errors and misuse continues to be one of the largest untapped opportunities to manage costs, improve top-line revenue recognition, and ensure compliance with policies.
Join SafePaaS CEO Adil Khan as he discusses how to discover patterns in all types of structured and unstructured enterprise data, and use this insight to improve bottom line, significantly reduce cash leakage and post-audit recovery costs, improve revenue recognition timing, safeguard the integrity of financial statements, reduce the cost of internal and external audits, increase visibility into controls environment and mitigate exposure to fraud.
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Resolver Inc.
Every security organization needs data scientists! Expanding the utilization and influence of data scientists within corporate security risk intelligence teams will undoubtedly lead to enhancements for the organization’s risk exposure understanding and business decision-making, while also presenting analytical intelligence products in a more visually-appealing and quickly digestible format.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...AustraliaChapterIIBA
Catch up on the presentation by Maria Montgomery at IIBA® Melbourne's recent networking event.
At this event we dove into the world of Business Analysis and unlocked the secrets to building a top-notch BA team.
IIBA® Adelaide deliver a fishbowl discussion with a panel of seasoned Business Analysts. Delve into the strategies and insights on seamlessly hitting the ground running on Day 1.
More Related Content
Similar to IIBA Perth - Not so Risky Business with Ashley Aitken
How to Boost your Cyber Risk Management Program and Capabilities?PECB
The webinar explores how understanding your organization in crisis due to an exploitation of risk can develop the organization’s resilience and team in the drive for a stronger level of compliance maturity.
Main points covered:
• Information Security maturity
• ROPI
• Risk Management
• Incident Response
• Forensic Readiness
• Table Top Exercises
• Training
• Legislation
Presenter:
Our presenter for this webinar is Peter Jones, an experienced management professional, digital forensic analyst, cybersecurity professional, ISO 27001 and ISO 17025 auditor and University Lecturer. Peter has a wealth of experience and expertise which incorporates knowledge from being an academic and a practitioner in relation to best practice, data management, cyber security, digital system security and digital forensics, where he has conducted thousands of examinations on behalf of law enforcement and the private sector. Peter has extensive information technology and telecommunications experience which ranges from retail to enterprise environments including supporting the BBC with their hit drama series, ‘Silent Witness’.
Link the the YouTube video: https://youtu.be/aREo4l-pDgc
While there is a lot of buzz about advanced IT analytics (AIA), the global research from leading IT analyst firm Enterprise Management Associates (EMA) highlights what is actually going on, who is successful and why.
These slides - based on the webinar featuring Dennis Drogseth, VP of research at EMA - cover why successful AIA deployments leverage more 3rd party sources (the average is 15), support more roles (the average is 11), and why 96% of respondents want to integrate service interdependency data into their AIA solutions.
These slides cover:
**What are the more popular types of advanced IT analytics (AIA), and how are they being used?
**How have advanced IT analytics adoption patterns and priorities changed over the last 2 years?
**Who is driving AIA organizationally in the real world?
With a plethora of inventory and discovery tools, IT organizations often sink beneath an unreconciled data universe.
These slides, based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA), draw from extensive EMA research and consulting experience to explain how IT organizations can improve their effectiveness in ‘discovering the truth’ about their environments.
Presented cybersecurity for small business at a Score event. This is a short presentation that shows the basic things that employers and business owners should understand to reduce risk and protect their business.
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
As world economies reopen, businesses must adjust their risk management posture for the “new normal”, while continuing to drive digital transformation initiatives. The “new normal” has brought change to key risk vectors across people, process, and technology. To enable effective financial and operational controls, business teams must adapt to these changes and fully understand these new technology and security risks.
A key change has been a move to a work from home workforce. Organizations must rethink their approach to approach to enabling employee access to key enterprise systems and sensitive data.
In this session, we will share our thoughts on where new risks have emerged and traditional risks have changed. In addition, we will provide a point of view on the latest technologies and techniques to help you assess and control risks in enterprise systems that enable business finance and operations management.
Join SafePaaS CEO Adil Khan and Director Dan Miller at Altum Strategy Group.
Forty eight percent of organizations had a security incident that caused moderate to severe business impact. Undoubtedly, delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.
These slides based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon provide insights into “identifying advanced threats” and “enhancing incident investigations” use cases based on EMA’s “Top 3 Decision-Makers’ Guide to Security Analytics” report.
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
An overview about ZIGRAM, our focus areas, work, use-cases and team. ZIGRAM is a high impact organization which operates in the Data Asset space. Our team is made up of professionals from varied domains like data science, technology, sales, financial services, research and business consulting. Our aim is to deliver value to clients by Building and Managing Data Assets across use cases - thereby boosting revenues and reducing the cost of doing business, in a data-driven world.
Our Vision is to integrate our products, data, and services in DIKW organizations globally, to help solve real-world problems by leveraging Data Assets
Organisational Transformation Meetup 13 Dec 2018 James PriceEdwin Roman
Leveraging data as a strategic asset. This presentation was delivered on 13 December by James Price from Experience Matters, for the Adelaide Organisational Transformation & Business Agility Meetup. Kindly hosted by WFI Insurance. Please acknowledge the source when quoting form this report.
Predictive Analytics to Discover Risk.
Organizations are seeking new ways to transform their rapidly growing data into insight that mitigates risks and unlocks new opportunities. However, using the traditional reporting tools to look for unusual patterns in large data sets is like finding a needle in a haystack.
The problem is not the resources, the personnel, or the data. It’s that many organizations simply don’t have the advanced analytics required to arrange the data, identify suspicious patterns and weaknesses; at least not fast enough. There’s too much data and not enough analytics!
We need a better way of knowing what the information means — of interpreting the data to discover an unknown business risk or opportunity as it happens or, even better, anticipate the next one. For most organizations, reducing transaction errors and misuse continues to be one of the largest untapped opportunities to manage costs, improve top-line revenue recognition, and ensure compliance with policies.
Join SafePaaS CEO Adil Khan as he discusses how to discover patterns in all types of structured and unstructured enterprise data, and use this insight to improve bottom line, significantly reduce cash leakage and post-audit recovery costs, improve revenue recognition timing, safeguard the integrity of financial statements, reduce the cost of internal and external audits, increase visibility into controls environment and mitigate exposure to fraud.
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Resolver Inc.
Every security organization needs data scientists! Expanding the utilization and influence of data scientists within corporate security risk intelligence teams will undoubtedly lead to enhancements for the organization’s risk exposure understanding and business decision-making, while also presenting analytical intelligence products in a more visually-appealing and quickly digestible format.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Similar to IIBA Perth - Not so Risky Business with Ashley Aitken (20)
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...AustraliaChapterIIBA
Catch up on the presentation by Maria Montgomery at IIBA® Melbourne's recent networking event.
At this event we dove into the world of Business Analysis and unlocked the secrets to building a top-notch BA team.
IIBA® Adelaide deliver a fishbowl discussion with a panel of seasoned Business Analysts. Delve into the strategies and insights on seamlessly hitting the ground running on Day 1.
IBA® Adelaide is excited to invite you to our year-end Lean Coffee session. This gathering offers an excellent opportunity for all attendees to engage in insightful discussions about FoBA and the myriad of acronyms that are a part of our professional landscape.
Hear from a panel of highly skilled BAs with over 60 years of combined experience. They'll share their mentorship journeys (as both mentee and mentors) and how it's impacted their personal and professional development.
Hosted by Michael Augello, the panel includes Liza Laya, Gerri Dickson, and Maria Montgomery. Discover the profound power of mentorship in their journeys and how it can transform yours! Mentorship benefits are boundless, whether you're a mentor or mentee. Break barriers, expand your horizons, and be inspired!
Come along and co-create Adelaide’s event schedule for the next couple of years. Alan Harrison will facilitate a Relative Value Workshop where we work together to assign “value” to a range of event topic ideas. You will learn an excellent technique for prioritising a large number of requirements in a very short space of time. You will take an active role in deciding what the IIBA® Adelaide team will deliver in the next two years.
Facilitator and Presenter Alan Harrison:
Alan Harrison is a Senior Business Analyst working across many domains here in Adelaide and has worked in the IT industry for around 35 years across a range of domains including finance, transport, utilities, and education, and in any number of roles – and still doesn’t know what he wants to be when he grows up. Alan’s passion lies in teaching and coaching (and roasting his own coffee beans).
Demystifying Scrum, the intent is to provide a general overview to those unfamiliar with the terms and jargon associated with Agile and Scrum This presentation will cover three main topics:
1. The key differences between Agile versus Waterfall Project Delivery
2. The core features of Scrum
3. The key concepts of Scrum
Speaker - Ben McDonnell
Ben McDonnell is the Capability Lead for Business Analysis at Expose. He has worked with multiple state, local and federal Government Agencies as well as utilities, mining and energy, and defence. He is currently working on an Agile Project in partnership with the Department for Education which will be used as a real case study of SCRUM for this presentation.
We look forward to seeing you there!
The "Simplifying Advanced Process Mapping" workshop is a valuable opportunity for professionals seeking to upskill in process mapping. Attendees will learn how to create effective process maps that are accessible to all stakeholders, using clear symbols and language.
The session will also cover good practices when it comes to process mapping, including defining maps at different levels and for different purposes, allowing participants to tailor their approach to suit the needs of their organisation.
By creating maps that are reusable and focused on delivering value to stakeholders and the organisation, attendees will be equipped to drive better results and improve communication throughout their team.
By the end of the workshop, participants will have a strong understanding of how to create process maps that deliver value and can be reused across different projects.
Speaker - Kevin Gupta
Kevin Gupta is a business analyst with a passion for value delivery. He has delivered major projects in various industries at operational, strategic, and tactical levels. He now shares his expertise and passion by helping individuals certify in business analysis through The BA Practice. With his extensive experience in the field, Kevin Gupta is dedicated to equipping others with the knowledge and skills necessary to excel in the world of business analysis.
IIBA® Sydney - From Isolation to Innovation: Effective Communities PracticeAustraliaChapterIIBA
The purpose of this presentation is to share our (EndeavourX) experience of setting up a robust and burgeoning BA Practice and a number of Chapters over the last 3 years. Our speakers will walk through their generic and comprehensive Practice Playbook that could be used by anyone looking to set up or mature a practice/chapter.
The speakers will cover the following areas:
Agile Practice Playbook – The context
This playbook is a live reference for new adopters of agile chapters / practices, as well as existing practices to mature their ways of working, and it is intended to speak to leaders (tribe, product, agile, tech, practice, chapter leaders etc.), practitioners, coaches, People & Culture, and the team.
Why do we need Practices and Chapters?
Align your organisation's values and goals to your Practice
Define your levels of capability
Capability matrices and practical application
Roles & responsibilities
Define your specialisms
The essentials, ceremonies and operating rhythms
Culture
Continuous improvement
Engagement model in matrix organisational structure
Strategic partnerships (Offshore and other capability partnerships, IIBA, etc.)
Leaving a positive imprint within and beyond the organisation
Practical ways to streamline:
Onboarding
Learning and development
Recruitment
Employee satisfaction and retention
Potential & Performance management
Career Pathways and Progression
Where are we going from here?
Join us to
Learning best practices from ASX 50 company EndeavourX in BA skillset
Benefits of chapter practices in the workplace
Presenters include
Ramya Palraj, Business Analysis Practice Leader – EndeavourX
Mike Harris, Chapter Leader – Digital & Technology Enablers BA Chapter
Megha Satish, Chapter Leader – Digital Ninjas BA Chapter
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the KeyAustraliaChapterIIBA
Unlocking the Power of Low Code No Code: Why Business Analysts Hold the Key
Join us for an upcoming virtual event to explore how business analysts can drive low code no code adoption within their organisations. Taking place on Wednesday 29th March at 6pm - 7pm AEDT, this event is a must-attend for Australian businesses looking to simplify processes, reduce costs, and achieve more with less using low code and no code strategies.
According to Gartner, the low code development platform market is predicted to grow at a pace of 23% through 2026, reaching $23.3 billion in revenue. As digital transformation continues to accelerate and skilled developers remain in short supply, the adoption of low code and no code is set to soar in the coming years.
Hear from industry experts from Microsoft Power Platform and Increment as they discuss the latest trends in low code and no code adoption, the benefits of these platforms, and the pivotal role that business analysts play in driving their adoption. Discover how the Business Analyst is uniquely positioned to spearhead the success of low code no code by streamlining operations, automating processes, speeding up time to market, and improving ROI.
As chatbots and artificial intelligence (AI) continue to advance, there are growing concerns about the potential threat they pose to traditional business analysis professionals. However, there are also opportunities for these professionals to leverage these technologies to improve their skills and add value to their organisations. This presentation will explore the rise of chatbots, AI, and specifically ChatGPT, and their impact on the business analysis profession. Through this presentation, attendees will gain a deeper understanding of the ways in which these technologies can be both a threat and an opportunity for their careers, and what steps they can take to stay ahead of the curve in this rapidly changing landscape.
Learning Objectives:
1. We will discuss the current state of the technology, its potential applications, and the benefits and challenges it presents for business analysis professionals.
2. How business analysis professionals can stay ahead of the curve in this rapidly changing landscape.
Speaker Details:
Ronak Mathur - Automation Architect
Ronak Mathur is a software professional, International Speaker, tech community leader, mentor, and co-author with 6+ years of multinational leadership experience in Australia, the United States of America, and India, with specialisation across the verticals of Financial Services, Insurance and Healthcare. He has played various senior roles like Chief Operations Officer, Automation Architect, Automation Specialist and Automation Analyst in his career so far. Ronak has represented in many national and international conferences in Australia and the United States of America and being a tech community leader, he has played a key role in creating the ecosystem of Artificial Intelligence, Automation and Machine Learning in Queensland, Australia. He is also a mentor of university students and shares his industrial experience and guides them on their journey of becoming a professional. Ronak is also the “business Mentor – Technology” for Queensland Government and provides mentorship to businesses and helps them in scaling up their operations with the use of technology. Ronak’s tech articles and journals are published in the United States of America, based tech media house “Acceleration Economy”. His articles and journals are helping various businesses across the world in forming their strategies for leveraging technologies like AI and automation.
Hadi Hormozi - Senior Business Analyst
Hadi Hormozi is a highly industrious, practical, and detail-oriented Business Analyst with an extensive focus on requirement business process changes and improvements, along with proactively developing and maintaining technical business analysis awareness. Combine a strong passion for business and information technology to attain the goals of enterprise organisations.
Professional development is important for business analysts because it helps them stay current with industry trends and advancements, as well as improve their skills and knowledge in areas relevant to their job. This can lead to increased effectiveness and efficiency in their work, which can ultimately benefit the organisation they work for.
By engaging in professional development activities, business analysts can stay competitive in the job market, which can be especially important in times of economic uncertainty. It also empowers them to bring more value to their organisation and its clients.
This session will speak on a number of practical approaches to making an effective and tailored professional development plan for individual BAs.
IIBA Brisbane - Business Analysis Trends 2023 Lightning talksAustraliaChapterIIBA
Celebrate the start of 2023 with the team from IIBA® Brisbane. Our first event in the new year is a series of lightning talks where industry leaders will share their thoughts on the expected Business Analysis trends for 2023. They will delve into what’s hot and what’s not! This will be followed by a Q&A and networking.
Are you a business analyst and want to know more about the opportunities in your field? Or, have you started a career in business analysis and would like to find out how to go further?
Join us on Thursday 8th December to discuss how to unlock the pathways to further advancing your career – a great opportunity to meet new people, exchange experiences and learn from experts!
Hear it from inspiring people who are top performers in their fields, get insights on how they got there, and learn how you can too. We will also share how IIBA® and Robert Walters can support you on your journey.
IIBA® Melbourne - Unlock your full potential as a BA, an EOY event AustraliaChapterIIBA
Are you a business analyst and want to know more about the opportunities in your field? Or, have you started a career in business analysis and would like to find out how to go further?
Join us on Thursday 8th December to discuss how to unlock the pathways to further advancing your career – a great opportunity to meet new people, exchange experiences and learn from experts!
Hear it from inspiring people who are top performers in their fields, get insights on how they got there, and learn how you can too. We will also share how IIBA® and Robert Walters can support you on your journey.
Some of our industry experts speaking include:
Michael Augello
Xavier Treguer
Liza Laya
Charmaine Mckie
Lloyd Blunden
Sponsored by Robert Walters.
BA VALUE FOR AN ESG FRAMEWORK FOR A SUSTAINABLE BUSINESS MODEL IIBAAustraliaChapterIIBA
James Barnes discusses the BA capability in the Environment/Society/ Governance Framework world (ESG). Learn something new while also sharing your ideas and networking with like-minded people.
Stakeholder Engagement:
Strategic Alignment
BU Functional Analysis
Measurement
(Scaling) agile through the lens of a Business Analyst using SAFeAustraliaChapterIIBA
Join IIBA® Brisbane and speakers Joeri (Yuri) Timmermans and Ishan Roy host an online event.
This event covers the evolution of agile ways of working through the lens of a Business Analyst. It will also look at how this role is evolving as organisations move to achieve business agility using scaled agile frameworks such as SAFe.
IIBA® Adelaide are hosting an educational event with speaker Alan Harrison. We look at “Requirements” – what they are and ways we can elicit them. In a group setting, we’ll look at the different types of requirements (using the BABOK® definition), how they relate to each other (hierarchy) and why we need to understand that relationship (traceability). We’ll explore some of the most common ways of eliciting them (interviews, workshops, observations, document analysis, process analysis and others). We’ll also look at ways of figuring out who our stakeholders are.
We’ll dive deeper into interviewing techniques (both online and face-to-face) and managing stakeholders by working through a fun scenario in an interactive workshop.
IIBA® Melbourne brings you the topic of producing Functional and Non-Functional requirements. This can be a challenge because the demarcation between FR and NFR ‘s is often blurred and subject to debate.
This interactive presentation analyses some of these challenges in clearly categorizing a Solution Requirement as a FR or NFR. A case study will also be presented which specifically looks at WCAG 2 requirements to include clients with special needs.
121022 - The art of getting business analysis right - slide deck.pptxAustraliaChapterIIBA
IIBA® Melbourne brings you a virtual event where you learn from Maria's wealth of knowledge and experience in business analysis. Maria will take you through her business analysis journey and the complexity of the business world, in particular she will cover the 7 key ingredients in getting business analysis right.
IIBA Sydney - How To Be The Perfect Ba (According To A Product Owner)AustraliaChapterIIBA
The IIBA® Sydney brings to you an engaging virtual discussion on being a BA in today's world and how this has never been more complicated - agile, scaled agile, fixed deadlines, hybrid working, organisational changes and the list goes on. What does it take to succeed?. In this 45 minute, engaging presentation, Craig will discuss what it takes to be a perfect BA from the perspective of the Product Owner. He will explore the hard and soft skills that BAs need to have to succeed in working well with product owners in today's every changing environment,PLUS share with you the 3 biggest de-railers to avoid.
Exploring Career Paths in Cybersecurity for Technical CommunicatorsBen Woelk, CISSP, CPTC
Brief overview of career options in cybersecurity for technical communicators. Includes discussion of my career path, certification options, NICE and NIST resources.
New Explore Careers and College Majors 2024.pdfDr. Mary Askew
Explore Careers and College Majors is a new online, interactive, self-guided career, major and college planning system.
The career system works on all devices!
For more Information, go to https://bit.ly/3SW5w8W
Resumes, Cover Letters, and Applying OnlineBruce Bennett
This webinar showcases resume styles and the elements that go into building your resume. Every job application requires unique skills, and this session will show you how to improve your resume to match the jobs to which you are applying. Additionally, we will discuss cover letters and learn about ideas to include. Every job application requires unique skills so learn ways to give you the best chance of success when applying for a new position. Learn how to take advantage of all the features when uploading a job application to a company’s applicant tracking system.
The Impact of Artificial Intelligence on Modern Society.pdfssuser3e63fc
Just a game Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
This comprehensive program covers essential aspects of performance marketing, growth strategies, and tactics, such as search engine optimization (SEO), pay-per-click (PPC) advertising, content marketing, social media marketing, and more
IIBA Perth - Not so Risky Business with Ashley Aitken
1. IIBA® Perth
Not So Risky Business with Ashley Aitken
29 August 2023
IIBA® Global 2022 Chapter of the Year
2. IIBA® Australia acknowledges the Traditional Owners of
country throughout Australia and recognise their continuing
connection to land, waters and culture.
We pay our respects to Elders past, present and emerging
and extend our respects to all Aboriginal and Torres Strait
Islander people present with us today.
Acknowledgement of Country
3. Thank you to our Venue and F&B
Sponsor for tonight
4. Festival of Business Analysis
16 – 20 of October 2023
Australia & New Zealand
https://festivalofbusinessanalysis.org
5. https://festivalofbusinessanalysis.org
Mary Karborani
Chief Technology Officer | Capricorn
Eddie Zhang
Founder and Managing Director
Zhamatix
Helen McLeish
Chief Cyber Security Officer | East
Metropolitan Health Service
Phil Delalande
Managing Director | Symphonia
and Neovate Education and
Founder - UXCamp
IIBA® Perth
Speakers
Anna Rajander
Senior Manager
Business Analysis | RAC
6. The main reference for Business Analysis in Brazil. The first Latin American
CBAP in 2008, he is also certified as PMP, AAC, and CPOA.
Consultant and instructor for more than 25 years working with methodology,
solution development, business analysis, systems analysis, project
management, business architecture, and systems architecture.
Performing live, on YouTube, or in his online courses, he always explains
complex things in a charming and approachable way.
His online courses are appreciated by students in more than 65 different
countries.
https://thebrazilianba.com
https://www.youtube.com/TheBrazilianBA
Keynote: Fabricio Laguna
The Future of Business Analysis with Artificial Intelligence
IIBA Perth Business Analysis Day 2023
19 October 2023 @ Mecure Perth