Sun.Jan 12, 2025

article thumbnail

Was machen Scrum Master wirklich? Die 10 Aufgaben von Scrum Mastern

Scrum.org

Flschlicherweise wird die Rolle von Scrum Mastern hufig darauf reduziert: Meetings einberufen Daily-Stand-ups moderieren Retrospektiven durchfhren Kapazitten planen So sollte es nicht sein. Die Aufgaben, die Scrum Master bernehmen, sind viel vielfltiger. Die Scrum.org hat vor Kurzem alle Aufgaben gesammelt und einer bersicht zusammengefasst. Diese mchte ich dir heute etwas nher erklren.

SCRUM 182
article thumbnail

ISO 27001 Control 5.3: Segregation of duties

Alan Parker Blog

Implementing Segregation of Duties for Enhanced Security Segregation of duties (SoD) is a fundamental principle of effective information security management. It aims to reduce risks associated with fraud, human error, and the bypassing of controls by distributing critical tasks and responsibilities across multiple individuals. This approach enhances both organisational resilience and trust in operational processes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Project Management Books: What are the Best 7 for You?

Online PM Courses

Project management books are a great way to learn - for new project managers and for those of us with experience under our belts. The post Project Management Books: What are the Best 7 for You? appeared first on OnlinePMCourses.

91
article thumbnail

ISO 27001 Control 5.2: Information security roles and responsibilities

Alan Parker Blog

Defining Information Security Roles and Responsibilities Establishing clear and well-defined information security roles and responsibilities is critical for organisations aiming to safeguard their sensitive data and assets. A structured approach ensures all aspects of information security are managed effectively, aligning with organisational objectives and compliance requirements.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Introducing My ISO 27001 Online Courses

Alan Parker Blog

I believe that robust security is not just a 'nice to have' in the modern world, but a necessity wherby if you are failing to address the security of the data you are processing on behalf of your customers, employees and the business you work for, then you are being negligent. I dont' need to create a host of nightmare tales about what can happen to vulnerable systems, or well meaning but poorly trained staff when it comes to the security of data - there's a host of stories o

More Trending

article thumbnail

ISO 27001 Control 5.6 Contact with special interest groups

Alan Parker Blog

Engaging with Special Interest Groups for Information Security Establishing and maintaining contact with special interest groups, security forums, and professional associations is a critical component of an organisations information security strategy. These groups provide essential resources and insights that enhance an organisation's ability to protect, respond to, and recover from security incidents.

article thumbnail

ISO 27001 Foundational Online Training

Alan Parker Blog

Get an Introduction to ISO 27001 with Our Comprehensive Online Training Course Are you looking to elevate your understanding of information security and achieve compliance with the globally recognised ISO 27001 standard? Look no further. Our ISO 27001 Online Training Course is designed to provide individuals and organisations with the tools and knowledge needed to implement and manage an effective Information Security Management System (ISMS).

article thumbnail

ISO 27002: Comprehensive Guidance for Effective Information Security Management

Alan Parker Blog

What is ISO 27002? Struggling to turn ISO 27001's Annex A (Statement of Applicability) requirements into actionable steps? Thats where ISO 27002 comes in. ISO 27002 is an international standard providing comprehensive guidelines for implementing and managing information security controls. You can learn more about the ISO standards directly from the ISO official website.

article thumbnail

ISO 27001 Control 5.5 Contact with authorities

Alan Parker Blog

Establishing and Maintaining Contact with Authorities Effective communication with relevant authorities is a cornerstone of an organisation's information security strategy. Establishing and maintaining these connections enhances compliance, improves incident management, and bolsters business continuity, all while keeping organisations prepared for regulatory changes.

article thumbnail

The 2nd Generation of Innovation Management: A Survival Guide

Speaker: Chris Townsend, VP of Product Marketing, Wellspring

Over the past decade, companies have embraced innovation with enthusiasm—Chief Innovation Officers have been hired, and in-house incubators, accelerators, and co-creation labs have been launched. CEOs have spoken with passion about “making everyone an innovator” and the need “to disrupt our own business.” But after years of experimentation, senior leaders are asking: Is this still just an experiment, or are we in it for the long haul?

article thumbnail

ISO 27001 Control 5.7 Threat Intelligence

Alan Parker Blog

Harnessing Threat Intelligence to Strengthen Information Security Threat intelligence is an essential component of modern information security, empowering organisations to understand and mitigate risks from evolving threats. By systematically collecting, analysing, and applying intelligence about current and emerging security threats, organisations can make informed decisions to safeguard their systems and data effectively.

article thumbnail

ISO 27001 Control 5.1: Policies for Information Security

Alan Parker Blog

Developing Comprehensive Information Security Policies Information security is fundamental to an organisation's ability to manage risks associated with sensitive data and operational processes. By adopting a well-structured approach to creating and maintaining information security policies, organisations can ensure their information's confidentiality, integrity, and availabilitywhile meeting business objectives and compliance requirements.

article thumbnail

6 Key Benefits of ISO 27001 Certification

Alan Parker Blog

ISO 27001 is the internationally recognised standard for information security management. It establishes the requirements for creating and maintaining a robust ISMS (information security management system) that mitigates risks related to people, processes, and technology. Achieving ISO 27001 certification involves undergoing a rigorous external audit to verify compliance.