What Exactly Are You Disrupting?
What can be disrupted? How real is this threat / promise? It's not a deflection tactic - it's more about opening your eyes to the possibilities, and getting focus on the priorities.
What can be disrupted? How real is this threat / promise? It's not a deflection tactic - it's more about opening your eyes to the possibilities, and getting focus on the priorities.
Practical, tested suggestions and approaches that will help translate cybersecurity technology and process to concepts that will resonate with the Board.
Okay, the title is a bit of a false advertising. I'm not revealing the top five rules - I'm actually looking for help in defining rules #3-5. Any input is appreciated - care to weigh in with an opinion? I've had a number of discussions, with some of the best project managers I know, as we discuss ways to simplify methodologies and streamline our delivery process. Many organizations are trying to train their next generation of project managers, and all…
Project managers must communicate the trade-off between additional functionality and the time required to fully test the work. Don't assume testing will be completed - it's something that takes time!