Remove Application Development Remove Document Remove Technical Review
article thumbnail

ISO 27001 Annex A Technological Controls Explained

Alan Parker Blog

The technological infrastructure of an organisation plays a pivotal role in maintaining the security, integrity, and availability of information. Adhering to these technological controls can significantly reduce risk exposure and protect organisations' most valuable digital assets against internal and external threats.

article thumbnail

Agile Project Management: Principles, Meetings, Values & Tools

ProjectManager.com

Frustrated developers started to introduce new methods, such as Scrum, rapid application development, extreme programming, DSMD, features-driven development and pragmatic programming. Working software over comprehensive documentation. Agile processes promote sustainable development. Sprint Review.

Agile 311
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Make 2023 A Successful Year for Your Projects

Rebel’s Guide to PM

A well-documented plan? John is the co-author of Agile Project Management for Mobile Application Development. Whatever your level of commitment to this vital task, please review how you can do even better. For most project managers, your success in the new year has less to do with your technical project management skills.

2023 417
article thumbnail

Joint Application Development (JAD)

ActiveCollab

JAD allows clients to have full autonomy in project development and allows them to participate in their application’s development through a series of workshops. When business needs some technical input from the technical expertise, JAD session is required. Scribe is in charge of documenting the entire JAD process.

article thumbnail

Half Agile Isn’t Real Transformation

Leading Agile

Tech Infrastructure != Many organizations divide their technology stack between front-end and back-end systems and place an API boundary between the two. I’m including all IT resources “in front of” the API layer in the organization’s technical infrastructure. Value Stream. Half-Agile Transformations.

article thumbnail

Exploring the Policies Needed for ISO 27001

Alan Parker Blog

Management must define, approve, and review security policies regularly. Review and continuous improvement mechanisms. 5.10: This control mandates that rules for acceptable use of assets be documented and enforced. Periodic review of access rights. 8.23: Specifically addresses technical vulnerability management.

article thumbnail

What is Agile Project Management?

The IIL Blog

In 1991 the book Rapid Application Development was published and an approach of the same name, RAD, was born. Today, Agile practices are no longer confined to software development and have become popular in a wide variety of industries in which organisations need to be flexible and responsive.

Agile 88