By: Ryan Meglathery, Senior Consultant, Impact Makers Over the past year, there have been several high-profile ransomware attacks in which…
Business Strategy Alignment
I would like to preface this article with a disclaimer: I am not now, nor have I ever been, nor am I likely to ever be a lawyer. I haven’t even played one on TV so, take what I say with a grain of salt with regards to the legal matters. That said, I am writing from the perspective of what should be rather than what necessarily is.
We understand maintaining delivery agility when your workforce is running remote Agile is critical to your business success.
Unfortunately, circumstances both within and outside of our control often create the need for remote working arrangements. While operating Agile can be a wonderful experience, when quickly altered from physical co-location to remote Agile, there are some challenges that can impede team progress, individual performance, and the overall sense of belonging to a community.
Wednesday marked the beginning of a new decade, and perhaps the beginning of a new era in digital, as the California Consumer Privacy Act (CCPA) went into effect as law. While the CCPA’s statutes are overly burdensome for today’s data-powered Internet economy, the law is a necessary step in restoring balance of power and trust across Internet behemoths, consumers and legislators.
We have been discussing System and Organization Controls (SOC) reports and how they can be a used to establish and maintain trust between service providers and their customers. In our first blog, we covered a basic understanding of the benefits of SOC reporting. In our second blog, we covered the various kinds and types of SOC reports as well as how they are used to support compliance requirements. In this blog, we will tackle one of the most important questions: What information is most important when reviewing a SOC report?
As noted in our earlier blog, System and Organization Controls (SOC) can be helpful tool in establishing and maintaining trust between service providers and their customers. Yet there are still a lot of questions around SOC reporting: Which SOC report is right for my organization?
The rise in cloud-based technology and third-party solutions increases both the complexity and uncertainty of security and compliance responsibilities. Service providers and their customers need to understand how responsibilities are shared and split. This includes Software as a Service (SaaS), Infrastructure as a Service (IaaS), as well as operational solutions, such as credit card processing and billing, and IT, such as security monitoring and hosting services.
What does it mean to ‘rock’ at Agile Project Management? Aligning with the three areas of the Talent Triangle takes agile beyond the mediocrity of ‘just doing agile’ and to the next level, the Rock Star enterprise level.
Below are our Senior Vice President, Jim Blizzard’s Top 7 ways to be an Enterprise Agile Rock Star.
Impact Makers recently hosted Capital Kanban’s “The Art of Agile: The Art of War Interpreted with an Agile Lens” with a fantastic turnout. Speaker Megan Windle, a Certified Agile Coach and Certified Scrum Master (CSM), compared the ideas in Sun Tzu’s The Art of War with the principles of Agile, discussing Agile concepts and quotes from the book.
Organizational risk management is too often treated as a compliance issue with complex rules that result in a back office tracking of risks that don’t see the light of day. This presentation contrasts a traditional view of organizational risk management with an alternative view provided in a Harvard Business Review article by Robert S. Kaplan and Anette Mikes. This categorization of risk allows executives to understand the qualitative distinctions between the types of risks that organizations face.