The webinar covers:
• Why ISO 21500?
• What is PRINCE2 and the New Agile version of it.
• What are the advantages and value of each of the above?
• How do they both complement each other?
Presenter:
This webinar was presented by Orlando Odejide. He is an Enterprise Architect and Programme Director with over 15 years’ experience in the field of Computing and Information Technology Consulting. He has also trained over 2, 000 Professionals on (ITIL, TOGAF, Business Analysis, COBIT, CMMI, XBRL, ISO 20000, ISO 27001 and ISO 22301).
Link of the recorded session published on YouTube: https://youtu.be/ZML5eTxsEF8
Managing Organizational Influences on ISO 21500 ImplementationPECB
The discussion was focused on organizational influences/factors like organizational structure, project environmental factors and well as process assets.
Main points that have been covered are:
• ISO 25100 clauses 3.4. and 3.5
• Organizational Strategy and Projects as well as Project Environment
• Examine if peculiarities in individual organizations have an impact on how ISO 21500 is implemented in the organization
Presenter:
Oluseye Kolawole, an entrepreneur with a keen interest in Occupational Safety and Health, Business Process Improvement and Project Management. He is a member of the International Association of Safety Professionals (IASP), Chapter Coordinator of the IASP Lagos Chapter, member of the Project Management Institute, as well as a certified Project Management Professional (PMP) and an International Association of Safety Professional (IASP) certified Safety Manager/Trainer.
Link of the recorded webinar published on YouTube: https://youtu.be/FIwiQxIeOWg
ISO 21500: Generating Business Value through Strong Project ManagementBryghtpath LLC
In this presentation, Bryghtpath Principal Consultant & CEO Bryan Strawser, discusses how to generate business value through strong project management, highlighting the ISO 21500 Guidance on Project Management.
This presentation covers:
- Reducing the risk of project failure in your organization
- Overcoming obstacles and achieving project objectives within your budget and on-time
- Developing the necessary expertise to support your organization in implementing the Guidance on Project Management as specified in ISO 21500.
This presentation was prepared for PECB by Bryghtpath LLC.
There are 7 themes within Prince2 and they run through the project linking common items together. A theme is different to a principle in that the principles are like guidelines for the project whereas a theme runs through the project.
The 7 themes of Prince2 are:
Business Case
Organization
Quality
Plans
Risk
Change
Progress
Increasing Project Success through Project Management Maturity Based on ISO 2...PECB
The webinar presented has introduced the main project management methodology which project managers use nowadays. The methodology is based on best ISO 21500 practices. In addition, the presenter has provided useful information to the audience, in regards of survey findings and facts which PMs can use in their daily activities.
Main points covered:
• Short introduction of the project management methodology ISO 21500
• PM maturity, PM organizations
• Results of project survey including fact and findings
Presenter:
The webinar was presented by John Roos is project –en program manager on consultancy bases. He has an extended experience in many fields a.o. Business Improvement, ISO 27001/ISO 21500 and Total Quality Management (TQM).
Link of the webinar published on YouTube: https://youtu.be/ziqybFGtJDo
Managing Organizational Influences on ISO 21500 ImplementationPECB
The discussion was focused on organizational influences/factors like organizational structure, project environmental factors and well as process assets.
Main points that have been covered are:
• ISO 25100 clauses 3.4. and 3.5
• Organizational Strategy and Projects as well as Project Environment
• Examine if peculiarities in individual organizations have an impact on how ISO 21500 is implemented in the organization
Presenter:
Oluseye Kolawole, an entrepreneur with a keen interest in Occupational Safety and Health, Business Process Improvement and Project Management. He is a member of the International Association of Safety Professionals (IASP), Chapter Coordinator of the IASP Lagos Chapter, member of the Project Management Institute, as well as a certified Project Management Professional (PMP) and an International Association of Safety Professional (IASP) certified Safety Manager/Trainer.
Link of the recorded webinar published on YouTube: https://youtu.be/FIwiQxIeOWg
ISO 21500: Generating Business Value through Strong Project ManagementBryghtpath LLC
In this presentation, Bryghtpath Principal Consultant & CEO Bryan Strawser, discusses how to generate business value through strong project management, highlighting the ISO 21500 Guidance on Project Management.
This presentation covers:
- Reducing the risk of project failure in your organization
- Overcoming obstacles and achieving project objectives within your budget and on-time
- Developing the necessary expertise to support your organization in implementing the Guidance on Project Management as specified in ISO 21500.
This presentation was prepared for PECB by Bryghtpath LLC.
There are 7 themes within Prince2 and they run through the project linking common items together. A theme is different to a principle in that the principles are like guidelines for the project whereas a theme runs through the project.
The 7 themes of Prince2 are:
Business Case
Organization
Quality
Plans
Risk
Change
Progress
Increasing Project Success through Project Management Maturity Based on ISO 2...PECB
The webinar presented has introduced the main project management methodology which project managers use nowadays. The methodology is based on best ISO 21500 practices. In addition, the presenter has provided useful information to the audience, in regards of survey findings and facts which PMs can use in their daily activities.
Main points covered:
• Short introduction of the project management methodology ISO 21500
• PM maturity, PM organizations
• Results of project survey including fact and findings
Presenter:
The webinar was presented by John Roos is project –en program manager on consultancy bases. He has an extended experience in many fields a.o. Business Improvement, ISO 27001/ISO 21500 and Total Quality Management (TQM).
Link of the webinar published on YouTube: https://youtu.be/ziqybFGtJDo
A CCP is an experienced practitioner with advanced knowledge and technical expertise to apply the broad principles and best practices of Total Cost Management (TCM) in the planning, execution and management of any organizational project or program. CCPs also demonstrate the ability to research and communicate aspects of TCM principles and practices to all levels of project or program stakeholders, both internally and externally.
What is a project & Project management
Organization for industrial projects
The role of people at different positions,
Project environment
Project classification
Agile Network India | Risk Management in VUCA World | Ashwinee SinghAgileNetwork
Agile Network India Pune Chapter conducted an interesting Session Talk on ‘Risk Management in VUCA World‘.
It is scheduled on 29th May 2021 between 10:00 to 10:50 Hours IST.
Abstract- VUCA world requires new techniques and practices to manage Risks as both problem as well solution domain tends to be volatile and unpredictable. A paradigm shift is required in terms of empowering teams across organization to be responsible for effective risk management in a decentralized and collaborative fashion. Further, risk impact has to be looked from Outcome perspective vs. traditional output perspective. Application of BizDevOps telemetry for predictive foresights to Risks leveraging eco-system of cohesive toolsets is an emerging trend.
PRINCE2 key terms and free revision notes to pass the certification examprojectingIT
Ashish Dhoke, Project management trainer and consultant @ projectingIT, PRINCE2 ATO, presents this free exam tips, tricks and last minutes keyword revision notes materials to help pass the PRINCE2 certification exam in your first try.
Project Management Professional (PMP), Certification Study Guide. To assist PMI candidates for completing the PMI certification exam administered by the Project Management Institute. Content is from “A Guide To The Project Management Body Of Knowledge” (PMBOK)
www.pmi.org
For PMP Certification Training please contact us on +1 281-670-7466 || sabya@trainerkart.com || www.trainerkart.com
HD version: http://1drv.ms/1i8AvZc
This is my publication on the introduction to project management. In this publication I overview important project management terms, definitions, project life cycles, and key project management software and tools
Learn how to manage projects or to work in a project environment using the most internationally recognized project management method.
Ensure that team members focus on the viability of the project in relation to its business case objectives – rather than simply seeing the completion of the project as an end in itself.
I am Continuously seeking to improve my competencies and skills to provide first class professional Project Management training courses; and develop my scope experience in Project Management functions.
I am confident that my innovative and results-focused approach would make significant contribution to the continued success of your organization.
this is the first presentations uploaded to Slide Share,
For more information do not hesitate to contact me.
Ahmad H. Maharma - PMP®
Ramallah, Palestine
Phone: + (972) (2) 2968644
Mobile: + (972) (599) 001155E-Mail: ahmad.maharma@gmail.com
A CCP is an experienced practitioner with advanced knowledge and technical expertise to apply the broad principles and best practices of Total Cost Management (TCM) in the planning, execution and management of any organizational project or program. CCPs also demonstrate the ability to research and communicate aspects of TCM principles and practices to all levels of project or program stakeholders, both internally and externally.
What is a project & Project management
Organization for industrial projects
The role of people at different positions,
Project environment
Project classification
Agile Network India | Risk Management in VUCA World | Ashwinee SinghAgileNetwork
Agile Network India Pune Chapter conducted an interesting Session Talk on ‘Risk Management in VUCA World‘.
It is scheduled on 29th May 2021 between 10:00 to 10:50 Hours IST.
Abstract- VUCA world requires new techniques and practices to manage Risks as both problem as well solution domain tends to be volatile and unpredictable. A paradigm shift is required in terms of empowering teams across organization to be responsible for effective risk management in a decentralized and collaborative fashion. Further, risk impact has to be looked from Outcome perspective vs. traditional output perspective. Application of BizDevOps telemetry for predictive foresights to Risks leveraging eco-system of cohesive toolsets is an emerging trend.
PRINCE2 key terms and free revision notes to pass the certification examprojectingIT
Ashish Dhoke, Project management trainer and consultant @ projectingIT, PRINCE2 ATO, presents this free exam tips, tricks and last minutes keyword revision notes materials to help pass the PRINCE2 certification exam in your first try.
Project Management Professional (PMP), Certification Study Guide. To assist PMI candidates for completing the PMI certification exam administered by the Project Management Institute. Content is from “A Guide To The Project Management Body Of Knowledge” (PMBOK)
www.pmi.org
For PMP Certification Training please contact us on +1 281-670-7466 || sabya@trainerkart.com || www.trainerkart.com
HD version: http://1drv.ms/1i8AvZc
This is my publication on the introduction to project management. In this publication I overview important project management terms, definitions, project life cycles, and key project management software and tools
Learn how to manage projects or to work in a project environment using the most internationally recognized project management method.
Ensure that team members focus on the viability of the project in relation to its business case objectives – rather than simply seeing the completion of the project as an end in itself.
I am Continuously seeking to improve my competencies and skills to provide first class professional Project Management training courses; and develop my scope experience in Project Management functions.
I am confident that my innovative and results-focused approach would make significant contribution to the continued success of your organization.
this is the first presentations uploaded to Slide Share,
For more information do not hesitate to contact me.
Ahmad H. Maharma - PMP®
Ramallah, Palestine
Phone: + (972) (2) 2968644
Mobile: + (972) (599) 001155E-Mail: ahmad.maharma@gmail.com
The funkiest PRINCE2 Processes revision guide on the internetKnowledge Train
A PRINCE2 Foundation course lasts about 3 days - that's a lot of information to take in. This e-book has been designed with the anxious student in mind, using simple descriptions and a graphical, cartoon-style mind map for each PRINCE2 Process.
For your PRINCE2 exam, you will need to master the PRINCE2 Principles, Themes and Processes. You can download the full set of PRINCE2 mind map e-books here:
http://www.knowledgetrain.co.uk/project-management-ebooks.php
Here is what others have said about the PRINCE2 revision e-books:
“Excellent PRINCE2 revision e-books. Extremely well put together and I’m very impressed! I’d say
that you’ve met or even exceeded your aims. They look brilliant, thanks very
much. The world needs more people like you :-)” - Dave Sands, Managing Director at DS Consulting (2005) Co Ltd
“The proof that a picture says more than a thousand words becomes reality within
these PRINCE2 revision e-books. Definitely worthwhile reading.” - Henny Portman, PMO consultant at ING Insurance
“These e-books are really well done! I secretly envy designers like you guys!” - Cesar Abeid, Project Manager at Remontech
“Never has PRINCE2 been explained so beautifully.” - Paul Naybour, Project Management Training Consultant at Parallel Project Training
prince2, prince2 course, prince2 foundation exam, prince2 processes, prince2 revision, prince2 training, project management, project management course, prince2 foundation course, revision guide, revision tips
Software Project Management | An Overview of the Software Project ManagementAhsan Rahim
Management is the process of getting things done through others, it is the process of coordinating people & other resources to achieve the goals of the organization. A project is a set of related tasks that are coordinated to achieve a specific objective in a given time limit. A project is well-defined task, which is a collection of several operations done in order to achieve a goal. Software is the program & all associated documentation & configuration data which is needed to make these programs operate correctly.
A Software Project is the complete procedure of software development from requirement gathering to testing & maintenance, carried out according to the execution methodologies, in a specified period of time to achieve intended software product.
Project Management Fundamentals is a beginner-level Project Management course that is ideal for individuals and enterprises that are looking to gain a fundamental understanding of project management best practices used globally.
This Project Management Fundamentals training course is ideal for anybody whose work directly or indirectly supports projects. (entry-level project/program managers or future project managers who desire an increased understanding of how to successfully manage a project and improve their day-to-day work by applying project management best practices.)
To know more about Project Management Fundamentals training worldwide,
please contact us at -
Email: support@invensislearning.com
Phone - US +1-910-726-3695,
Website: https://www.invensislearning.com
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
The global implications of DORA and NIS 2 Directive are significant, extending beyond the European Union.
Amongst others, the webinar covers:
• DORA and its Implications
• Nis 2 Directive and its Implications
• How to leverage directive and regulation as a marketing tool and competitive advantage
• How to use new compliance framework to request additional budget
Presenters:
Christophe Mazzola - Senior Cyber Governance Consultant
Armed with endless Excel files, a meme catalog worthy of the best X'os (formerly twittos), and a risk register to make your favorite risk manager jealous, I swapped my computer scientist cape a few years ago for that of a (cyber) threat hunter with the honorary title of CISO.
Ah, and I am also a quadruple senior certified ISO27001/2/5, Pas mal non ? C'est francais.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Date: April 25, 2024
Tags: Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: Digital Operational Resilience Act (DORA) - EN | PECB
NIS 2 Directive - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
In an era where digital transformation is inevitable, the landscape of cybersecurity is constantly evolving.
Amongst others, the webinar covers:
• DORA and its Implications
• ISO/IEC 27005: Risk Management in Information Security
• Leveraging Artificial Intelligence for Enhanced Cybersecurity
Presenters:
Geoffrey L. Taylor - Director of Cybersecurity
Geoffrey Taylor brings a wealth of experience from multiple roles within various industries throughout his career. As a Certified ISO 27001 Implementer and Auditor, as well as certified ISO 27005, CISM and CRISC, he brings a unique perspective on cybersecurity strategy, risk management and the implementation of an Information Security Management System, having helped multiple organizations in aligning their strategy based on their threat landscape.
Martin Tully - Senior Cyber Governance Consultant
Martin is a Senior Consultant at CRMG with over twenty years of experience, and has previously been employed at two of the ‘Big Four’ professional services firms. Martin has worked across most industry sectors in the development of the best practice guidance and risk analysis methodologies. Martin is also accomplished at: leading the implementation of an ISMS; delivering a number of information risk assessments; reviewing information security policies; assessing security requirements across the supply chain; and updating a complete framework of supporting standards. Prior to the ISF, Martin’s roles have included delivering operational risk reporting, running research projects and benchmarking information security investments for major clients. Martin holds a Bachelors degree from Royal Holloway University of London.
Date: March 27, 2024
Tags: ISO, ISO/IEC 27005, ISO/IEC 42001, Artificial Intelligence, Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27005 Information Security Risk Management - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/ffX-Xbw7XUk
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
In today’s rapidly evolving world, where Artificial Intelligence (AI) not only drives innovation but also presents unique challenges and opportunities, staying ahead means being informed.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 42001 and their key components
• Latest trends in AI Governance
• Ethical AI practices
• Benefits of Certification
Presenters:
Jeffrey Bankard - Cybersecurity & AI Leader, AI Management Systems: ISO/IEC 42001
Jeffrey provides executive leadership for AI product creation through the product incubation unit (PIU). Ensures the timely delivery of AI consulting engagements through cross-functional teams comprised of senior information and network security leaders to establish strategic goals for improving the security architecture and risk posture for clients. Consults with business leaders to define key performance indicators and service levels. Fosters employee development through mentoring and coaching. Decides how to achieve results within the organization’s strategic plans, policies, and guidelines. Develops new products and secures those products through current AI security guidelines (ISO 42001).
Adrian Resag - Experienced in Risk and Control - ISO/IEC 27001 and ISO/IEC 42001
Adrian believes a stimulating career can span many disciplines and that leading organizations value versatile professionals. He has enjoyed managing teams spanning the globe by working in world-leading organizations as Chief Audit Executive, Head of Risk Management, Information Systems Auditor, Head of Internal Control, as a consultant, a statutory auditor and an accountant. To allow such a diverse career, his approach has been to pursue certifications in many fields (making him one of the most qualified and certified in some of them). He has written books and created professional certifications in audit & assurance and compliance & ethics, and teaches in subjects from information security to risk management. With a passion for education, Adrian founded an educational institution and has taught tens of thousands of students and professionals online, in companies, universities and in governmental organizations.
Date: February 28, 2024
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/DujXaxBhhRk
The importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27002 and ISO/IEC 27032 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• CMMC Frameworks
Presenters:
Dr. Oz Erdem
Governance, Risk and Compliance (GRC) consultant, trainer, auditor, and speaker
Dr. Erdem has over 25 years of experience in information security, trade compliance, data privacy, and risk management. He took leadership roles in governance and compliance at various Fortune 100-500 companies and SMBs, including Siemens Corporation, Siemens Industry, Linqs, Texas Instruments, Rtrust, ICEsoft Technologies, NATO C3A, and BILGEM. In addition, successfully managed software development (i.e., embedded, cloud, and SaaS) and digital product projects involving information security, mobile networks, and IoT networks. Further, Dr. Erdem led several non-profit organizations, such as National Association of District Export Councils (NADEC), Government Contractors Council (GovConCouncil), and Central-North Florida District Export Council as the Chairman of the Board.
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
George Usi - CEO of Omnistruct
An internet pioneer and award-winning leader in internet governance with over 25 years of experience, George Usi knows that getting hacked is not a matter of ‘if’ but, ‘when’ and the fiscal and reputational effects that has on a business, the executives, and the board. George is the Co-Founder of Omnistruct, a cyber risk company. Omnistruct protects and expands revenue creation, reputation, and customer retention through cyber risk transference, governance, and compliance. We ensure that security and privacy programs work.
Date: January 24, 2024
YouTube Video: https://youtu.be/9i5p5WFExT4
Website: https://bit.ly/3SjovIP
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
As we approach the new year, the importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 27035 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• Best practices for building a resilient cybersecurity strategy in 2024
Presenters:
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Loris Mansiamina
A Senior GRC Professional consultant for Small, Medium and large companies. Over 10 years, Loris has been assisting clients in both public and private sectors about various matters relating to Gouvernance, Risk Management and Compliance (GRC), Digital transformation, cyber security program management, ISO 27k & ISO 20k implementation, COBIT & ITIL implementation, etc.
Date: December 19, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27035, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27035 Information Security Incident Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/yT8gxRZD_4c
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) in business processes is becoming increasingly essential. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27005 and ISO/IEC 27001 and their key components
• The standard’s alignment
• Identifying AI risks and vulnerabilities
• Implementing effective risk management strategies
Presenters:
Sabrina Feddal
With more than 16 years of background in operational security, telco as engineer and project manager for major international companies. I have founded Probe I.T in 2016 to provide my customers (both national and international) with GRC services. Winner of the 2020 award, the CEFCYS – Main French Women in cybersecurity association - jury's favorite, she remains committed on a daily basis to maintaining diversity and gender diversity in her teams.
Passionate about Law, History & Cybersecurity. She has several professional certifications acquired over the course of her career: Prince2, CISSP, Lead Implementer ISO27001, Risk Manager, University degree in Cybercrime and Digital Investigation.
Her values: excellence, discretion, professionalism.
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Date: November 22, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27005, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27005 Information Security Risk Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/TtnY1vzHzns
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
In today's digital age, cybersecurity is more critical than ever. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27032:2023 and ISO/IEC 27701 and their key components
• The standard’s alignment
• Emerging Cybersecurity Threats
• What is new to the ISO/IEC 27032:2023
Presenters:
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Jeffrey Crump
Mr. Jeffrey Crump is the Principal Consultant at Arizona-based Cyber Security Training and Consulting LLC and a graduate of the Certified NIS 2 Directive Lead Implementer course. He is a Certified CMMC Assessor, Certified CMMC Professional, and Instructor. Mr. Crump is also the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. His book has been expanded into a triad of certification courses on cyber crisis planning, exercises, and leadership.
Date: October 25, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/a21uasr8aLs
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
Cybersecurity is an ongoing journey. The regular update and improvement of security measures is essential to stay ahead of evolving threats.
Amongst others, the webinar covers:
• Benefits of Compliance
• Digital Transformation: Why
• ISO/IEC 27001 and ISO/IEC 27032
• ISO/IEC 27001: Information Security Management System (ISMS)
• ISO/IEC 27032: Cybersecurity Framework
Presenters:
Douglas Brush
Douglas Brush is a federally court-appointed Special Master, and Court Appointed Neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.
He is an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues.
He is the founder and host of Cyber Security Interviews, a popular information security podcast.
Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, diversity, equity, and inclusion, in the information security industry.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Carole Njoya
Founder in 2018 of Alcees, a Paris-based management consulting fabric specialized in cybersecurity, data privacy governance and digital trust, Carole Njoya provides independent, tailored and expert advisory to companies doing business in European markets and serving both B2B and B2C customers. With more than 100 cybersecurity projects delivered, she assists entities in preparing, implementing and maintaining the right best practices under the ISO 27001 compliance framework and GDPR article 25 obligation (Privacy by design) for their vendors. Carole Njoya featured in the « Women Know Cybersecurity » 2019 Twitter list edited by Cybercrime Magazine. Carole Njoya is committed in science and engineering since pre-teen period.
Date: September 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
YouTube video: https://youtu.be/U7tyzUrh8aI
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
The management of AI systems is a shared responsibility. By implementing the ISO 31000 Framework and complying with emerging regulations like the EU ACT, we can jointly create a more reliable, secure, and trustworthy AI ecosystem.
Amongst others, the webinar covers:
• Understanding AI and the regulatory landscape
• AI and the threat landscape
• A risk driven approach to AI assurance - based on ISO 31000 principles
• Stress testing to evaluate risk exposure
Presenters:
Chris Jefferson
Chris is the Co-Founder and CTO at Advai. As the Co-Founder of Advai, Chris is working on the application of defensive techniques to help protect AI and Machine Learning applications from being exploited. This involves work in DevOps and MLOps to create robust and consistent products that support multiple platforms, such as cloud, local, and edge.
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG. Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant. In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense that prioritized key risks to the organisation and helped minimize disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicist in the Oil and Gas Industry.
Date: August 24, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/MXnHC6AvjXc
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
Generative AI offers great opportunities for innovation in various industries. Hence, by adopting ISO/IEC 27032, you can enhance your cybersecurity resilience and efficiently address the risks associated with generative AI.
Amongst others, the webinar covers:
• AI & Privacy
• Generative AI, Models & Cybersecurity
• AI & ISO/IEC 27032
Presenters:
Christian Grafenauer
Anonymization expert, privacy engineer, data protection officer, LegalTech researcher (GDPR, Blockchain, AI) Christian Grafenauer is an accomplished privacy engineer, anonymization expert, and computer science specialist, currently serving as the project lead for anonymity assessments at techgdpr. With an extensive background as a senior architect in Blockchain for IBM and years of research in the field since 2013, Christian co-founded privacy by Blockchain design to explore the potential of Blockchain technology in revolutionizing privacy and internet infrastructure. As a dedicated advocate for integrating legal and computer science disciplines, Christian’s expertise in anonymization and GDPR compliance enables innovative AI applications, ensuring a seamless fusion of technology and governance, particularly in the realm of smart contracts. In his role at techgdpr, he supports technical compliance, Blockchain, and AI initiatives, along with anonymity assessments. Christian also represents consumer interests as a member of the national Blockchain and DTL standardization committee at din (German standardization institute) in ISO/TC 307.
Akin Johnson
Akin J. Johnson is a renowned Cybersecurity Expert, known for his expertise in protecting digital systems from potential threats. With over a decade of experience in the field, Akin has developed a deep understanding of the ever-evolving cyber landscape.
Akin is an advocate for cybersecurity awareness and frequently shares his knowledge through speaking engagements, workshops, and publications. He firmly believes in the importance of educating individuals and organizations on the best practices for safeguarding their digital assets.
Lucas Falivene
Lucas is a highly experienced cybersecurity professional with a solid base in business, information systems, information security, and cybersecurity policy-making. A former Fulbright scholar with a Master of Science degree in Information Security Policy and Management at Carnegie Mellon University (Highest distinction) and a Master's degree in Information Security at the University of Buenos Aires (Class rank 1st). Lucas has participated in several trainings conducted by the FBI, INTERPOL, OAS, and SEI/CERT as well as in the development of 4 cyber ISO national standards.
Date: July 26, 2023
YouTube Link: https://youtu.be/QPDcROniUcc
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
By embracing the importance of GDPR and leveraging ISO/IEC 27701, you can enhance your data protection practices, achieve compliance, and minimize the risk of penalties.
Amongst others, the webinar covers:
Importance of Data Protection
Understanding Data Collection and Challenges
Introduction to GDPR
Key Principles of GDPR
Who does GDPR Apply to and Its Global Implications
Introduction to ISO/IEC 27701
Implementing ISO/IEC 27701
Privacy by Design
Dealing with IT on a Daily Basis
Building Awareness and Training
Audit, Data Discovery, and Risk Assessments
Presenters:
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Lisa Goldsmith
Lisa Goldsmith is the founder of LJ Digital and Data Consultancy. Lisa has over 23 years’ experience of supporting leadership teams in membership, charity, and wider not-for-profit organisations to simplify their IT and digital strategy that allows them to sleep soundly at night, knowing their systems and processes are fit for purpose, GDPR compliant, secure and that they deliver value to staff, members, and stakeholders.
Prior to starting her own consultancy, Lisa gained extensive experience working for membership organisations and has knowledge and expertise at all levels of operations from working within careers and qualifications teams, as Membership Manager, as Head of Digital & IT for delivering large-scale digital, IT and GDPR compliance projects and serving on several Senior Leadership Teams. Lisa is also currently a Trustee of the BCLA and Groundwork East.
Date: June 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/lfJrSLaGDtc
Website: https://bit.ly/437GOnG
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
The EU has implemented a range of regulations aimed at strengthening its cybersecurity posture. In this context, the ISO/IEC 27001 standard offers a comprehensive framework for managing and safeguarding sensitive information, such as personal data.
Amongst others, the webinar covers:
• Quick recap on the ISO/IEC 27001:2013 & 2022
• ISO/IEC 27001 vs legislation
• The EU Cyber Legislation landscape
• Some considerations and consequences
• How to stay on top of the ever changing context
Presenters:
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
Jean-Luc Peters
Jean-Luc Peters brings 25 years of IT technology, information and cybersecurity expertise to boards, executives, and employees. Since the younger age he has held management positions in the private and government sector. He is currently the Head of the Cyber Emergency Response team for the National Cybersecurity Authority in Belgium. In addition to this, he is also a trainer, coach and trusted advisor focusing on enhancing cyber resilience.
Jean-Luc has helped in the technical implementation of the NIS 1 (Network and Information Security) Directive transposition in Belgium, defining the Baseline Security Guidelines governmental ISMS framework and many other projects. He holds several certifications, including ISO/IEC 27001 Lead Implementer, ISO/IEC 27005 Auditor, CISSP, GISP, Prince 2 Practitioner, ITIL etc.
Date: May 31, 2023
Tags: ISO, ISO/IEC 27001, Information Security, Cybersecurity
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/rsjwwF5zlK8
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
To protect your organization from cyber attacks, you need to implement a robust information security management system (ISMS) and business continuity management system (BCMS) based on international standards, such as ISO/IEC 27001 and ISO 22301.
Amongst others, the webinar covers:
• Why we need a cyber response plan to protect business operations
• Introduction to ISO/IEC 27001 and ISO 22301
• What do we need for a cyber security response plan?
• How do we develop a cyber security response plan?
Presenters:
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG.
Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant.
In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense, that prioritise key risks to the organisation and helped minimise disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicst in the Oil and Gas Industry.
Simon Lacey
Simon is a resourceful, creative Information & Cyber Security professional with a proven track record of instigating change, disrupting the status quo, influencing stakeholders and developing ‘big picture’ vision across business populations. Multiple industry experience; excels in building stakeholder engagement & consensus; and suporting organisations to make sustainable change.
Simon also has considerable experience of risk management, education and awareness, strategy development and consulting to senior management and is a confident and engaging public speaker.
Simon has previously worked within the NHS, Bank of England and BUPA, before setting out as an independent consultan forming Oliver Lacey Limited, supporting clients in multiple business sectors.
When not working, Simon loves to run – currently training for the Berlin Marathon, a Director of Aylesbury United Football Club, records vlogs and is an experienced standup comic.
Date: April 26, 2023
Find out more about ISO training and certification services
Training: https://bit.ly/3AyoyYF
https://bit.ly/3LbBVTx
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/i4qx5mjEqio
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
Integrating ISO/IEC 27001 and ISO 31000 can help organizations align their information security and risk management efforts with their overall business objectives, leading to more effective risk management and better decision-making.
Amongst others, the webinar covers:
• Aligning the ISMS process with ISO/IEC 27001
• Using ISO 31000 within the ISMS
• Aligning the RM process with ISO 31000
• How/where does ISO/IEC 27001 fit?
Presenters:
Nick Riemsdijk
As a highly experienced and multi-skilled leader in Information and Physical Security, Nick is known as a collaborative, focused, driven and highly analytical individual with a broad portfolio of successes in client engagements. His expertise spans devising, implementing, managing and delivering information security, physical security, organizational resilience and facilities management solutions for organizations. He is certified as a Certified Information Security Manager (CISM), Certified Protection Professional (CPP), in Project Management (Prince2), ISO 22301 (Business Continuity), ISO 27001 (Information Security), and ISO 31000 (Risk Management).
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Date: March 23, 2023
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/Xj0U2mbpZUs
IT Governance and Information Security – How do they map?PECB
Effective IT Governance requires proper Information Security practices to ensure that the organization's data is secure. On the other hand, Information Security policies and procedures must be aligned with the organization's overall IT Governance framework to ensure that security measures do not negatively impact business operations.
Amongst others, the webinar covers:
▪ Bring Governance and InfoSec Together
▪ Answering WIIFM
▪ Business Terms
Presenters:
Dr. Edward Marchewka
Dr. Edward Marchewka is a seasoned executive that has come up through the ranks in the IT vertical, expanding into information security, quality management, and strategic planning.
Edward founded and serves as the Principal for 3LC Solutions, enabling YOU to Tell a Better Story in business, with our vCIO, vCISO, quality, and strategy consulting services, through metrics and relating risk to the business with our CHICAGO Metrics® SaaS solution.
He has also held several roles leading information technology, most recently with Gift of Hope Organ and Tissue Donor Network, leading the Information and Technology Services department as the Director of IT, Data, and Security Services. Prior to Gift of Hope, he ran information security for Chicago Public Schools.
Edward has earned a Doctorate of Business Administration from California Southern University and Masters’ degrees in Business Administration and Mathematics from Northern Illinois University. He earned Bachelors’ degrees in Liberal Studies and Nuclear Engineering Technologies from Thomas Edison State College, N.J. Edward maintains several active IT, security, and professional certifications from (ISC)2, ASQ, ITIL, PCI, PMI, ISACA, Microsoft, and CompTIA. He has held legacy IT certifications from Cisco and HP, and a designation from the National Security Agency.
Date: February 22, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-38500
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/2bSbAdL5Idg
Student Information Session University Digital Encode.pptxPECB
oin us as our Director for Business Mustafe Bislimi teams up with Dr. Obadare Peter Adewale, our academic partner Digital Encode Limited, to provide valuable information about our programs, admissions process and specialization and elective courses.
Discover the opportunities available to you as a student at PECB University and get a firsthand look at what makes us a top choice for education.
Whether you're a prospective student or simply curious about PECB University, don't miss this informative session! Subscribe to our channel and stay tuned for more videos.
For inquiries regarding admission process contact us: university.studentaffairs@pecb.com
-EMBA in Cybersecurity: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbHJQUUpjMmY2NmcyeURhTzE5VlRSNjg2Y1hwd3xBQ3Jtc0tuLTZqdmZyWkc2VVNQV21YRTlKZUQ2SEtUenNXbzYyb1ZianV5cldDYTViWjZ1eVhCNWtxWHI3VTNwRS1BOE4wTERkZ3BtcndwM0sxdVoydWZYSXBkV2hYd2lwU0NLSTk5WERWMlhtVk1Ud2tuWTRjTQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fcybersecurity&v=3YJbbr708pk
-EMBA in Business Continuity Management: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3JQTGVhd1VfeG1weWNzUzRrMmg2bk0tc3kxUXxBQ3Jtc0tsOVF5VG82TkhRU3R5TVRWWmdhMzBrSTU2eW9wby1OYWN4VTg5bkJBY0lhTmNsOFhETzB5cVp0WU8zbTQwTlZkdk9Dby1fSXdhWmRpZFFPUmk3NS1QOGpMOVBlaDFhVVpwa2JZMkxKNGRnTnppMm93SQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fbusiness-continuity-management&v=3YJbbr708pk
-EMBA in Governance, Risk, and Compliance: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbUplMGtjOFRWbzdGWERmdTR2QjdSbTBuQUxCd3xBQ3Jtc0tsNVdOU1p6UERWM3ZySE55V2FlWlJ1aFlzUU85VEt0aVRoR0hyTjNHbUNVYVMyb0lzTkZycUtJRzNxazlDWGRqTHZQMWJPZEYwbG1xWjVJN1JNOW1QUjJBZDY3NkU5LVl0b2xxOFpkZW1ZX2F3QmF5cw&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fgovernance-risk-compliance&v=3YJbbr708pk
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
PECB Webinar: Aligning ISO 21500 and PRINCE2
1.
2. Aligning ISO 21500, PMBOK and PRINCE2
(+ P2Agile) for
Effective Project Management
By
Orlando Olumide Odejide
www.pecb.com www.trainingheights.net
3. Summary
• What does PRINCE2 have to
offer and what is contained in
the extensive body of
knowledge called PRINCE2.
• What is complementary that
ISO 21500 brings to an
organization.
4. What is PRINCE2 (327 Page Document)
• PRINCE2 is a non-proprietary method used extensively is more than 150
countries around the world, and its take-ups grows daily.
• It is widely considered as the leading method in project management, with
in excess of 20, 000 organizations already benefiting from its pioneering
and trusted approach.
• This is largely due to the fact that PRINCE2 is truly generic: it can be
applied to any progress of project scale, type, organization, geography and
culture.
• PRINCE2 achieves this by isolating the management aspects of project
work from the specialist contributions such as design, construction etc. The
specialist aspects of any type of project are easily integrated with the
PRINCE2 method and, used alongside PRINCE2, provide a secure overall
framework for the project work.
• The number of people taking PRINCE2 qualifications increases by around
20% year on year, and PRINCE2 remain a key contributor to the successful
delivery of projects. It is indispensable method for any organization wishing
to secure efficient and effective operational outcomes.
5. Importance of Projects
1. To maintain current business operations: profitability,
service quality, customer relationships, brand loyalty,
productivity, market confidence etc. – what is termed
“business as usual”.
2. To transform business operations in order to survive
and compete in the future – looking forward and
deciding how business change can be introduced to
best effect for the organization.
• Organizations need to balance 2 parallel competing imperatives:
6. PRINCE2 Definition of a Project and Project
Management
A Project is a temporary organization that is
created for the purpose of delivering one or more
business products according to an agreed
Business Case.
Project Management is the planning, delegating,
monitoring and control of all aspects of the project,
and the motivation of those involved, to achieve
the project objectives with the expected
performance targets for time, cost, quality, scope,
benefits and risks.
7. Things that make a Project Different (5)
1. Change: Projects are the different means by which we
introduce change.
2. Temporary: As the definition above states, projects are
temporary in nature. Projects should have a defined start and
defined end.
3. Cross-Functional: Projects involve a team of people with
different skills working together (on a temporary basis) to
introduce change that will impact others outside the team.
4. Unique: Every project is unique, An organization may
undertake many similar projects and establish a familiar,
proven pattern or project activity.
5. Uncertainty: Clearly, the characteristics already listed will
introduce threats and opportunities over and above those we
typically encounter in the course of business as usual.
8. What do Project Managers Do? (4)
PM
Responsi
bilities
Plan
Delegate
Monitor
Control
9. Role of Senior Management (8)
Project Board Duties and Behaviors
1. Be Accountable 2. Provide Unified
Direction
3. Delegate
Effectively
4. Facilitate Cross-
Functional
Integration
5. Commit
Resources
6. Effective
Decision Making
7. Support Project
Manager
8. Ensure
Effective
Communication
10. Benefits of PRINCE2 (8)
1. Applied to any type of project
2. Common vocabulary and approach
3. Integrates easily with industry specific models
4. Product focused and clarified for all parties what a project will
deliver to agreed quality standards
5. Applies “Management by Exception”, providing efficient use of
senior management time.
6. It ensure a focus on the continuing viability of the project.
7. Provides explicit definition of roles and responsibilities so everyone
understands what is expected of them and what to expect of
others.
8. There are a lot of accredited organizations that provide expert
support and training for it.
11. PRINCE2 Principles (7)
1. It has continued business justification.
2. The project teams learn from previous experience
3. It has defined and agreed roles and responsibilities with
an organization structure.
4. It employs management by stages to plan, monitor and
control the project.
5. It uses management by exception to manage the
project tolerances for each project objective o establish
limits of delegated authority.
6. Focuses on the definition and delivery of products (in
particular their scope and quality requirements).
7. Tailored to suit the projects environment, size,
complexity, importance, credibility and risk.
12. PRINCE2 Themes (7)
Theme Answers
1. Business Case: Establish Mechanisms to judge whether the project is and remains
desirable, viable and achievable as a means to support decision making in its continued
investment. (Develop, Verify, Maintain and Confirm).
Why
2. Organization: To define and establish the projects structure of accountability and
responsibility. (the who).
Who
3. Quality: To define and implement the means by which the project will create and
verify products that are fit for purpose.
What
4. Plans: To facilitate communication and control by defining the means of delivering the
products (the where and how, by whom, and estimating the when and how much).
How? How much?
When?
5. Risk: To identify, assess and control uncertainty and, as a result, improve the ability of
the project to succeed. It can be a Threat or Opportunity.
What If?
6. Change: Identify, Assess and control any potential and approved changes to baselines.
PRINCE2 provides a common approach to issue and change control.
What is the
impact?
7. Progress: To establish mechanisms to monitor and compare actual achievements
against those planned, provide a forecast for the objectives of the project and its
continued viability, and control any acceptable deviations. It is the measure of the
achievement of the objectives of a plan.
Where are we
now? Where are
we going? Should
we carry on?
13. PRINCE2 Processes (7)
1. Starting up a Project
2. Directing a Project
3. Initiating a Project
4. Managing a Stage Boundary
5. Controlling a Stage
6. Managing Product Delivery
7. Closing a Project
14. PRINCE2 Management Stages (4) and
Technical (Subsequent Delivery) Stages (X)
• Management Stage: This is the section of a project that the Project Manager is managing
on behalf of the Project Board at any one time, at the end of which the project Board will
wish to review progress to date, the state of the project plan, the business case and risks,
and the next stage Plan in order to decide whether to continue with the project.
• Pre-Project (1): Project Mandate is a key part of this stage. It also helps to decide on
whether the project is viable.
• Initiation Stage (2): The period from where the Project Board authorizes initiation to when
they authorize the project (or decide not to go ahead with the project.
• Subsequent Delivery Stages (Technical Stages) – (X): A method of grouping work
together by the set of techniques used. Or the products created. This results in stages
covering elements such as design, build and implementation. Such stages are technical
stages and are a separate concept from management stages.
• Final Delivery Stage/Closing Stage – (3): this involves decommissioning the project. The
project board needs to be satisfied that the recipients of the projects products and are in a
position to own and use them on an ongoing basis and project documentation needs to be
tidied up. Others include closure activities and benefits review.
• Post Project Stage (4): Benefits Confirmation.
• 4 Management Stages and X number of Technical Stages.
15. PRINCE Levels of Management (4)
1. Corporate/Programme Management: While not part of the project
management team, this higher management level is an important
influence as it sets the business and strategic context for projects.
2. Direction (Project Board): This is the most senior level within the
project management team. The Project Board represents 3 key
interests (executive, users and suppliers).
3. Management (Project Manager): The Project Manager acts as the
single focus for the day-to-day management of the project. The
Project Manager has authority to run the project within constraints
approved by the Project Board.
4. Delivery (Team Manager): The Team Manager’s prime
responsibility is to supervise the creation of the products allocated
to the team by the Project Manager.
16. PRINCE2 Project Team Structure
Corporate or Programme Management
Project Board
Team
Manager
Team
Members
Project Manager
Executive
Project Support
Business, User and
Supplier Project
Assurance
Senior Supplier
Senior User
Change
Authority
17. PRINCE2 Project Management Roles (8)
1. Corporate or Programme Management
2. Executive
3. Senior User
4. Senior Supplier
5. Project Manager
6. Team Manager
7. Project Assurance
8. Project Support
18. PRINCE2 Activities (40) under 7 Processes.
Starting Up a
Project (6)
Directing a Project
(5)
Initiating a Project
(8)
Managing a Stage
Boundary (5)
Controlling a
Stage (8)
Managing Product
Delivery (3)
Closing a Project
(5)
1. Appoint the
Executive and
the Project
Manager
1. Authorize
initiation
1. Prepare Risk
Management
Strategy
1. Plan the next
Stage.`
1. Authorize a
Work Package
1. Accept a Work
Package.
1. Prepare
planned closure.
2. Capture
Previous Lessons
2. Authorize the
project
2. Configuration
Management
Strategy
2. Update the
Project Plan
2. Review Work
Package Status
2. Execute a
Work Package.
2. Prepare
premature
closure.
3. Design and
Appoint the
Project
Management
Team
3. Authorize a
Stage or
Exception Plan
3. Quality
Management
Strategy
3. Update the
Business Case.
3. Receive
Completed Work
Package
3. Deliver a Work
Package.
3. Hand over
products.
4. Prepare the
outline Business
Case
4. Give ad hoc
direction
4.
Communication
Management
Strategy
4. Report Stage
End
4. Review the
Stage Status
4. Evaluate the
project.
5. Select the
Project approach
and assemble
the Project Brief
5. Authorize
project closure.
5. Set up Project
controls
5. Produce an
Exception Plan.
5. Report
Highlights
5. Recommend
project closure.
6. Plan the
initiation Stage
6. Create the
Project Plan
6. Capture and
Examine Issues
and Risks
7. Refine
Business Case
7. Escalate Issues
and Risks
8. Assemble the
Project Initiation
8. Take
Corrective
Action.
19. PRINCE2 Management Products (26) = 26
PRINCE2 Templates
Baseline (12) Records (6) Reports (8)
1. Business Review Plan 13. Configuration Items Records 19. Checkpoint
2. Business Case 14. Daily Log 20. End Project
3. Communication Management
Strategy
15. Issue Register 21. End Stage
4. Configuration Management
Strategy
16. Lessons Log 22. Exception
5. Plan (Project, Stage and Team) 17. Quality Register 23. Highlight
6. Product Description 18. Risk Register 24. Issue
7. Project Brief 25. Lessons
8. Project Initiation Document
(PID)
26. Product Status
Account
9. Project Product Description
10. Quality Management Strategy
11. Risk Management Strategy
12. Work Package
20. Click to edit Master title style
PRINCE2 Project Interests (3)
The
Project
Business
SupplierUser
• Business: Business view of
point of meeting a business
need and justifying investment
in the project.
• User: the requirements of
those that will use the project’s
outputs. They specify the
desired outputs and ensure the
project delivers them.
• Supplier: These are the
people who provide the
necessary skills and produce
the project product.
These Interests and the core of it (Project) all make up the 4 assurance roles.
21. Business Case Theme: Investment Appraisal
Techniques (7)
Technique Description
Through-life Costs Analysing the total costs of implementation and any incremental
operations and maintenance costs.
Net Benefits Analysing the total value of the benefits less the cost of
implementation and ongoing operation calculated over a defined
period.
Return on Investment
(ROI)
Profits or savings resulting investments (this is the same as net
benefits if the benefits were only financial).
Payback Period Calculating the period of time required for the ROI to “repay” the
sum of the original investment.
Discounted Cash
Flow
A means of expressing future benefits based on the current value of
money.
Net Present Value The total value of discounted future cash inflows less the initial
investment.
Sensitivity Analysis Business Cases are based on uncertain forecast. In order to identify
how robust the Business Case is, it is useful to understand the
relationship between input and output factors.
22. Plans Theme: Estimating Techniques (8)
Techniques Description
Top-down Estimating Once a good overall estimate has been arrived at for the plan (by whatever means), it
can be subdivided through the levels of the product breakdown structure.
Bottom-up Estimating Each individual piece of work is estimated on its own merit. These are then summed
together to find the estimated efforts for the various summary level activities and
overall plan.
Top-down and bottom-
up approach
An overall estimates is calculated for the plan. Individual estimates are then
calculated or drawn from previous plans, to represent the relative weighs of the tasks.
Comparative Estimating Much data exist about the effort required and the duration of particular items of
work.
Parametric Estimating Basing estimates on measure/empirical data where possible (for example, estimating
models exist that predict materials, efforts and specification for buildings in the
construction industry).
Single-point Estimating The use of sample data to calculate a single value which is to serve as “best guess” for
the duration of an activity.
Three-point Estimating Ask appropriately skilled resource (s) for their best-case, most likely and worst-case
estimates.
Delphi Technique This relies on obtaining group input for ideas and problem solving without requiring
face to face participation.
23. Risk Theme: Techniques
Risk Identification
Techniques
Risk Estimation Techniques Risk Evaluation Techniques
1. Review Lessons 1. Probability Trees 1. Risk Models
2. Risk Checklists 2. Expected Value
3. Risk Prompt Lists 3. Pareto Analysis 2. Expected Monetary
Value
4. Brainstorming 4. Probability Impact Grid
5. Risk Breakdown
Structure
Risk
Cause
An
Objective
Risk
Event
May result in Which may affect
24. Progress Theme: PRINCE2 Tolerances (6)
Tolerance Area Description
1. Time +/- Amounts of time on target completion dates.
2. Cost +/- Amounts of Planned Budget
3. Scope +/- Permitted variation of a scope of project solution (e.g.
MOSCOW prioritization of requirements).
4. Risk Limited on the aggregated value of threats (e.g. expected
monetary value to remain less that 10% of the plan’s budget and
limit on any individual threat (e.g. any threat to operational
service).
5. Quality Defining quality targets in terms of ranges e.g. product that
weighs 300g +/- 10g.
6. Benefits Defining target benefits in terms of ranges e.g. achieve minimum
cost savings of 5% per branch, with an average of 7% across all
branches.
25. Business Case Theme
• Output: any of the projects specialist products(tangible or
intangible)
• Outcome: the result of the change derived from using the project’s
outputs
• Benefit: measurable improvement resulting from an outcome that is
perceived as an advantage by one or more stakeholders.
4 Steps for Developing a Business in PRINCE2
1. Develop means getting the right information upon which decisions
can be made.
2. Verify means assessing whether the project is (still) worthwhile.
3. Maintain means to update the business case with actual costs,
benefits and current forecast for cost and benefit.
4. Confirm means assessing whether the intended benefits have
been (or will be) realized. Confirming benefits will take place mostly
post project.
Output, Outcome and Benefit.
26. Organization Theme – Stakeholder
Management
• Identifying Stakeholders (Who?)
• Creating and analyzing Stakeholder Profiles (What?)
• Defining the Stakeholder Engagement Strategy (How?)
• Planning the engagements (When?)
• Engagement Stakeholders (Do?)
• Measuring Effectiveness (Results?)
Types of Stakeholders
1. Support or Oppose the Project. 2. Gain or lose as a result of project
delivery.
3. See the project as a threat or
enhancement to their solution.
4. Become active supporters or
blockers of the project and its progress.
Stakeholder Categories
1. Locus of Pain 2. Locus of Interest
3. Locus of Power 4. Locus of Influence
27. Risk Theme – Threat and Opportunity Responses
and the Risk Management Procedure.
Threat Responses Opportunity Responses
1. Avoid 1. Exploit
2. Reduce (probability and /or impact) 2. Enhance
3. Fallback (reduces impact only)
4. Transfer (reduces impact only, and
often only the financial impact)
5. Share 3. Share
6. Accept 4. Reject
The Risk Management Procedure
1. Identify
1. Context
2. Risk
2. Assess
1. Estimate
2. Evaluate
3. Plan 4. Implement 5. Communicate
28. Change Theme: 5 Step Procedure for
Managing Issues and Changes
5 Step Procedure Explanation
1. Capture Identify and register the issue.
2. Examine Undertake impact assessments.
3. Propose Evaluate options to address the issue.
4. Decide Ensure the right level of management approves
the option.
5. Implement Incorporate the option into the appropriate level
of plan.
29. Quality Theme – Quality Audit Trail
From Customer Project
Response
Quality
components
Quality Review
Team Roles
Quality Planning Customers Quality
Expectation
1. Chair
Acceptance Criteria 2. Presenter
Project Product
Description
Quality
Management
Strategy
3. Reviewer
PRINCE2 product-
based planning
technique.
Product Description Quality criteria and
tolerances
4. Administrator
Quality methods
Quality
responsibilities
Quality Register Quality Control.
PRINCE2 quality
review technique.
Product
Quality and
approval records
Acceptance records
30. Plans Theme – 5 Types of Plans, PRINCE2 Approach to
Plans and Product Based Planning Technique
5 Types of Plans PRINCE2 Approach to Plans Product-based planning
technique (4 Steps).
1. Corporate of
Programme Plan
1. Design the plan. This is a
perquisite.
1. Write the Project Product
Description
2. Project Plan 2. Define and analyze the
products.
You have to
analyze the
risks for steps 2
to step 5.
Steps 2 to step
6 have to be
repeated for
Project and
stage plans.
They are
optional for
Team Plans.
2. Create the product
breakdown structure
3. Stage Plans 3. Identify activities and
dependencies. 3. Write the Product
Descriptions
4. Team Plans 4. Prepare estimates. 4. Create the product flow
diagram.
5. Exception (when
necessary)
5. Prepare the schedule.
6. Document the Plan
31. Product Based Planning, 3 Types of Issues
and other Key words in PRINCE2
PRINCE2 Key Words
Exception Concession Product Programme Project
Mandate
Risk actionee Risk appetite Reviewer Release RFC
Risk owner Risk profile Risk register Risk response schedule
Specialist
product
Tolerance Checkpoint Highlight Work Package
• Product Based Planning: A technique leading to a comprehensive
plan based on the creation and delivery of required outputs. The
technique considers prerequisite products, quality requirements and
the dependencies between products.
3 Types of Issues
Request for Change Off – Specification. Problem/Concern.
32. Project Environment (2) – Embedding and
Tailoring
Embedding Tailor
Done by the organization to adopt
PRINCE2.
Done by the Project Management Team
to adapt the method to the context of a
specific project.
Focus on:
• Process responsibilities
• Scaling rules/guidance (e.g. scorecard)
• Standards (templates and definitions)
• Training and development
• Integration with business processes
• Tools
• Process assurance
Focus on:
• Adapting the themes (through the
strategies and controls)
• Incorporating specific terms/language
• Revising the Product Descriptions for
the management products
• Revising the role descriptions for the
PRINCE2 project roles
• Adjusting the processes to match the
above.
Done by the organization to adopt
PRINCE2.
Done by the Project Management Team
to adapt the method to the context of a
specific project.
33. PRINCE2 Agile = PRINCE2 + Scrum
1. Definition of Scrum
2. Scrum Theory
3. The Scrum Team (Product Owner + Development Team
+ Scrum Master)
4. Scrum Events (Sprint + Sprint Planning + Daily Scrum +
Sprint Review + Sprint Retrospective)
5. Scrum Artifacts (Product Backlog + Sprint Backlog +
Increment)
6. Artifacts Transparency (Definition of “Done”).
Scrum Guide – Ken Schwaber + Jeff Sutherland
34. Purpose of the Scrum Guide
• Scrum is a framework for developing and sustaining
complex products. This Guide contains the definition of
Scrum.
• This definition consists of Scrum’s roles, events,
artifacts, and the rules that bind them together.
• Ken Schwaber and Jeff Sutherland developed Scrum;
the Scrum Guide is written and provided by them.
Together, they stand behind the Scrum Guide.
Definition of Scrum
• Scrum (n): A framework within which people can address
complex adaptive problems, while productively and
creatively delivering products of the highest possible
value.
35. • Scrum is a process framework that has been used to manage
complex product development since the early 1990s.
• Scrum is not a process or a technique for building products;
rather, it is a framework within which you can employ various
processes and techniques.
• Scrum makes clear the relative efficacy of your product
management and development practices so that you can
improve.
• The Scrum framework consists of Scrum Teams and their
associated roles, events, artifacts, and rules. Each component
within the framework serves a specific purpose and is
essential to Scrum’s success and usage.
• The rules of Scrum bind together the events, roles, and
artifacts, governing the relationships and interaction between
them. The rules of Scrum are described throughout the body
of this document.
36. • Scrum Theory Scrum is founded on empirical process control theory,
or empiricism.
• Empiricism asserts that knowledge comes from experience and
making decisions based on what is known.
• Scrum employs an iterative, incremental approach to optimize
predictability and control risk.
• Definition of “Done” When a Product Backlog item or an Increment is
described as “Done”, everyone must understand what “Done”
means.
• Although this varies significantly per Scrum Team, members must
have a shared understanding of what it means for work to be
complete, to ensure transparency.
• This is the definition of “Done” for the Scrum Team and is used to
assess when work is complete on the product Increment.
• End Note: Scrum is free and offered in this Guide. Scrum’s roles,
artifacts, events, and rules are immutable and although
implementing only parts of Scrum is possible, the result is not
Scrum. Scrum exists only in its entirety and functions well as a
container for other techniques, methodologies, and practices.
38. Project Definition
21500 Definition
Section 3.2
• Unique set of processes
consisting of coordinated
and controlled activities
with start and finish dates
undertaken to achieve an
objective.
PMBoK Definition
• A project a temporary
endeavor undertaken to
create a unique product,
service or result.
• The temporary nature of
projects indicates that a
project has a definite
beginning and end.
39. Project Management Process Groups
ISO 21500 PM BoK Guide
Initiating Initiating
Planning Planning
Implementing Executing
Controlling Monitoring and Controlling
Closing Closing
40. ISO 21500 Subjects and PMBoK Knowledge
Areas
ISO 21500 PMI PMBoK PRINCE2 Themes
Integration Integration Plans Theme
Stakeholder Stakeholder Organization Theme
Scope Scope Plans Theme
Resource ** Human Resources Organization Theme
Cost Cost Business Case
Time Time Plans Theme
Risk Risk Risk Theme
Quality Quality Quality Theme
Communication Communication Progress Theme
Procurement Procurement Plan and Change Theme
45. Time
ISO 21500 PMBok Guide
6.1 Plan Schedule Management
Moved to Scope Subject 6.2 Definite Activities
4.3.21 Sequence Activities 6.3 Sequence Activities
Moved to Resource Subject 6.4 Estimate Activity Resources
4.3.22 Estimate Activity Durations 6.5 Estimate Activity Duration
4.3.23 Develop Schedule 6.6 Develop Schedule
4.3.24 Control Schedule 6.7 Control Schedule
46. Cost
ISO 21500 PMBok Guide
7.1 Plan Cost Management
4.3.25 Estimate Costs 7.2 Estimate Costs
4.3.26 Develop Budget 7.3 Determine Budget
4.3 27 Control Costs 7.4 Control Costs
47. Risk
ISO 21500 PMBoK Guide
11.1 Plan Risk Management
4.3.28 Identify Risks 11.2 Identify Risks
4.3.29 Assess Risks 11.3 Perform Qualitative Risk Analysis
11.4 Perform Quantitative Risk Analysis
4.3.30 Treat Risks 11.5 Plan Risk Responses
4.3.31 Control Risks 11.6 Monitor and Control Risks
48. Quality
ISO 21500 PMBoK Guide
4.3.32 Plan Quality 8.1 Plan Quality Management
4.3 33 Perform Quality Assurance 8.2 Perform Quality Assurance
4.3.34 Perform Quality Control 8.3 Quality Control
49. Procurement
ISO 21500 PMBoK Guide
4.3.35 Plan Procurement 12.1 Plan Procurement Management
4.3.36 Select Suppliers 12.2 Conduct Procurements
4.3.37 Administer Contracts 12.3 Control Procurements
12.4 Close Procurements
50. Communication
ISO 21500 PMBoK Guide
4.3.38 Plan Communications 10.1 Plan Communication Management
4.3.39 Distribute Information 10.2 Management Communications
4.3. 40 Manage Communication 10.3 Control Communications
51. Conclusion
• We have explored PRINCE2, ISO 21500 and PMBoK.
• It reality it does not matter what methodology is being
used to manage and deliver a Project, the most
important thing is to be able to deliver a project:
– 1. To Objective
– 2. To Time
– 3. To Quality
– 4. To Scope
– 5. To Budget/Cost
– 6. To surpass stakeholders expectation/satisfaction.
– 7. To deliver measurable and sustainable business
benefits,
52. Top 11 Qualities of a Project Manager
1. Excellent People Management Skills (Understanding
Personality types and being able to adapt accordingly).
2. Great ability to understand Business Strategy and
Objectives using tools like Balanced Scorecard, Blue
Ocean Strategy, SWOT, PESTLE Analysis etc.
3. Excellent Communication Skills (Speaking, Writing and
Presentation).
4. Excellent Negotiation Skills (To negotiate scope,
change, time, resources and everything else on a
project).
5. Excellent ability to use tools like Microsoft Office and a
tool like Project Professional including developing and
reworking templates.
53. Top 11 Qualities of a Project Manager Cont.
6. Excellent Business Analysis Skills (Requirements
Management, Prototyping and Agile – SCRUM Skills).
7. Clear understanding of Organizational Change
imperatives and Benefits Realization essentials.
8. Leadership and Team Management/Development Skills
with excellent ability to coach and manage people.
9. A combination of System + Critical + Creative Thinking.
10.Domain Mastery/Expertise: IT, Construction,
Procurement, Human Resources or Industry Expertise
like Media, Financial Services etc.
11.Excellent understanding and ability to use a certain
Project Management methodology like PRINCE2 and
PMBoK.
54. Thank You and Questions
orlando@trainingheights.net
N.B: Some Content, Diagrams and Trademarks belong to
Axelos PRINCE2, PMI and ISO Organization.
Also references to the work of Stanislaw Gasik on ISO
21500 and PMBoK.
Editor's Notes
Credits:
Tony Aliu-PECB (Team Leader)
Lorika Bina-PECB
Narta Voca-PECB
Angelo Scangas- Quality Support Group/ASQ
Shannon Craddock-PJR
Vanessa Delisle-TRC
Bill Thoms
Gretchen Merriman
Phil Dobyns