Mon.Jan 27, 2025

article thumbnail

Stop Shipping Waste

Scrum.org

TL;DR: Stop Shipping Waste When product teams fail to establish stakeholder alignment and implement rigorous Product Backlog management, they get caught in an endless cycle of competing priorities, reactive delivery, and shipping waste. The result? Wasted resources, frustrated teams, and missed business opportunities. Success in 2025 requires turning your Product Backlog from a chaotic wish list into a strategic tool that connects vision to value delivery.

2025 158
article thumbnail

Design as Nature: A Call for Regenerative Leadership

Green Project Management

We Build Against Nature. Its Costing Us. Our cities flood, our buildings consume vast amounts of energy, and our supply chains accelerate biodiversity loss. These crises arent inevitablethey are the result of design choices that ignore natures intelligence. The past few years have made it painfully clear that the way we build, produce, and consume […] The post Design as Nature: A Call for Regenerative Leadership appeared first on The GPM Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving Strategic Traction Through an OKR Kanban System

Scrum.org

What gets measured gets managed. But setting OKRs isn't enough. The flow and traction of OKRs need to be managed as well - otherwise, you'll find yourself in the OKR swamp. Using an OKR Kanban can help you both see the swamp and improve the flow and traction of OKRs. Here's an example - Here are some of my favorite patterns for managing OKR flow using Kanban: Use One OKR Kanban board.

Executing 105
article thumbnail

Navigating Jira Implementation: Expert Insights from Atlassian Veterans

MPUG

When organizations adopt Jira for project management, they face critical questions about aligning traditional project management concepts with Jira’s framework. In a recent MPUG webinar, Atlassian experts J. Caldwell and Vlad Petrescu shared insights drawn from their combined 25+ years of experience supporting Fortune 500 companies and small teams alike.

PMI 52
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

ISO 27001 Control 7.3: Securing Offices, Rooms and Facilities

Alan Parker Blog

Enhancing Physical Security for Offices, Rooms, and Facilities Overview Ensuring the physical security of offices, rooms, and facilities is a foundational aspect of protecting an organisations sensitive information and associated assets. Effective physical security measures act as a vital line of defence against unauthorised access, physical damage, and interference, helping organisations to maintain the essential principles of confidentiality, integrity, and availability.

More Trending

article thumbnail

ISO 27001 Control 7.2: Physical Entry

Alan Parker Blog

Securing Physical Entry Safeguarding physical access to an organisations premises and information assets is paramount. Control 7.2, "Physical Entry," provides detailed guidance on how organisations can implement robust controls to ensure the confidentiality, integrity, and availability of their information. This article delves into the purpose, guidelines, and practical steps for achieving compliance with this critical control.

article thumbnail

Agile Project Management Methodology for Your Teams

Celoxis

Agile project management: Choose the right methodology for your team. Compare Scrum vs. Kanban that fits your to boost productivity, collaboration & delivery.

Agile 40
article thumbnail

ISO 27001 Control 7.4: Physical Security Monitoring

Alan Parker Blog

Strengthening Physical Security Monitoring for Organisational Resilience Introduction Physical security monitoring is a crucial component of an organisation's broader security framework. Continuous surveillance and monitoring of premises serve to detect and deter unauthorised access, protect critical systems, and uphold the principles of confidentiality, integrity, and availability.

article thumbnail

Streamlining Project Management for Healthcare: Solving Hospitals’ 4 Biggest Challenges

Workzone

Managing projects in a hospital environment isnt like managing any other business project. With multiple departments, strict regulations, and the overarching goal of delivering exceptional patient care, hospital operations directors face challenges that require both strategic planning and tactical execution. This blog dives deep into the most pressing challenges hospitals encounter and explores how project management software can help 1.

article thumbnail

The 2nd Generation of Innovation Management: A Survival Guide

Speaker: Chris Townsend, VP of Product Marketing, Wellspring

Over the past decade, companies have embraced innovation with enthusiasm—Chief Innovation Officers have been hired, and in-house incubators, accelerators, and co-creation labs have been launched. CEOs have spoken with passion about “making everyone an innovator” and the need “to disrupt our own business.” But after years of experimentation, senior leaders are asking: Is this still just an experiment, or are we in it for the long haul?

article thumbnail

Management by Exception at the Daily Scrum

Scrum.org

At a recent Professional Scrum Master Advanced course, we were discussing how to promote engagement at the Daily Scrum when Mark Kuzik , lean champion and Director at Argus Machine in Canada suggested shaking things up by trying Management by Exception at the Daily Scrum. What is Management by Exception? It's the idea that we should manage the things that are off track, rather than giving focus to things that are going well.

SCRUM 145
article thumbnail

ISO 27001 Control 7.11: Supporting Utilities

Alan Parker Blog

Securing Supporting Utilities for Operational Continuity Introduction Supporting utilities play a crucial role in the smooth functioning of an organisations information processing facilities. Disruptions caused by utility failures, such as power outages or communication breakdowns, can lead to loss, damage, or compromise of information and other assets, as well as interruptions to organisational operations.

article thumbnail

ISO 27001 Control 7.14: Secure Disposal or Re-Use of Equipment

Alan Parker Blog

Protecting Organisational Information Introduction The secure disposal or re-use of equipment containing storage media is a vital component of an organisations information security strategy. Ensuring that sensitive data and licensed software are removed or securely overwritten prior to disposal or re-use prevents information leakage and protects against data breaches.

article thumbnail

ISO 27001 Control 7.6: Working in Secure Areas

Alan Parker Blog

Security Measures for Working in Secure Areas Introduction Secure areas are critical to the protection of an organisations information and associated assets. Ensuring robust security measures for personnel working in these areas is essential to safeguard against damage, unauthorised interference, and potential breaches. By establishing clear policies and controls, organisations can maintain the integrity, confidentiality, and availability of their sensitive resources.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

ISO 27001 Control: 7.7 Clear Desk & Clear Screen

Alan Parker Blog

Enhancing Security in the Workplace Introduction A clear desk and clear screen policy is an essential component of an organisations physical and information security strategy. By defining and enforcing clear rules for handling papers, removable storage media, and information displayed on screens, organisations can significantly reduce the risks of unauthorised access, loss, and damage to sensitive information.

article thumbnail

ISO 27001 Control 7.9: Security of Assets Off-Premises

Alan Parker Blog

Protecting Organisational Resources Beyond the Workplace Introduction As organisations increasingly rely on mobile and remote work environments, protecting assets used off-premises has become a critical aspect of information security. Devices and equipment that store or process organisational information outside of traditional office environments are subject to unique risks, such as theft, loss, damage, or compromise.

article thumbnail

ISO 27001 Control 7.12: Cabling Security

Alan Parker Blog

Protecting Critical Cabling Infrastructure Introduction Cabling forms the backbone of an organisations power and data infrastructure. Ensuring the security of cables that carry power, data, or support information services is essential to prevent interception, interference, or damage, and to maintain the continuity of operations. Robust cabling security measures safeguard organisational assets and reduce the risk of disruptions.

article thumbnail

ISO 27001 Control 7.13: Equipment Maintenance

Alan Parker Blog

Ensuring Operational Integrity and Security Introduction Proper equipment maintenance is essential to preserving the availability, integrity, and confidentiality of organisational information. By adhering to structured maintenance protocols, organisations can prevent loss, damage, theft, or compromise of information assets and minimise operational disruptions caused by equipment failures.

article thumbnail

Unlock The Blueprint: How To Construct A Better Payment Workflow

Speaker: Timothy Allsopp

Payment challenges often lead to delayed projects, financial bottlenecks, and strained relationships. With construction projects becoming more complex, outdated processes are no longer sustainable. By refining financial workflow, companies can improve cash flow, reduce error, and foster trust between stakeholders. Discover practical strategies for redesigning payment systems to overcome workflow challenges while creating a smoother, more reliable process for contractors and subcontractors alike.

article thumbnail

ISO 27001 Control 7.5: Protecting Against Physical and Environmental Threats

Alan Parker Blog

Mitigating Physical and Environmental Threats to Organisational Security Introduction Protecting against physical and environmental threats is an essential aspect of maintaining organisational resilience. These threats, ranging from natural disasters to human-caused incidents, can significantly impact infrastructure and operations. By proactively addressing these risks, organisations can prevent or mitigate potential damage and ensure the continuity of critical operations.

article thumbnail

ISO 27001 Control 7.8: Equipment Siting & Protection

Alan Parker Blog

Safeguarding Organisational Assets Introduction The secure siting and protection of equipment are vital components of an organisations information security framework. By addressing risks from physical and environmental threats, as well as unauthorised access, organisations can ensure the confidentiality, integrity, and availability of their critical assets.

article thumbnail

ISO 27001 Control 7.10: Storage Media

Alan Parker Blog

Managing Storage Media Throughout the Lifecycle Introduction The management of storage media is a critical component of an organisations information security strategy. By implementing robust policies and practices for the acquisition, use, transportation, and disposal of storage media, organisations can safeguard sensitive information and maintain the integrity, confidentiality, and availability of their data.