Mon.Jan 27, 2025

article thumbnail

Stop Shipping Waste

Scrum.org

TL;DR: Stop Shipping Waste When product teams fail to establish stakeholder alignment and implement rigorous Product Backlog management, they get caught in an endless cycle of competing priorities, reactive delivery, and shipping waste. The result? Wasted resources, frustrated teams, and missed business opportunities. Success in 2025 requires turning your Product Backlog from a chaotic wish list into a strategic tool that connects vision to value delivery.

2025 183
article thumbnail

Navigating Jira Implementation: Expert Insights from Atlassian Veterans

MPUG

When organizations adopt Jira for project management, they face critical questions about aligning traditional project management concepts with Jira’s framework. In a recent MPUG webinar, Atlassian experts J. Caldwell and Vlad Petrescu shared insights drawn from their combined 25+ years of experience supporting Fortune 500 companies and small teams alike.

PMI 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving Strategic Traction Through an OKR Kanban System

Scrum.org

What gets measured gets managed. But setting OKRs isn't enough. The flow and traction of OKRs need to be managed as well - otherwise, you'll find yourself in the OKR swamp. Using an OKR Kanban can help you both see the swamp and improve the flow and traction of OKRs. Here's an example - Here are some of my favorite patterns for managing OKR flow using Kanban: Use One OKR Kanban board.

Executing 148
article thumbnail

Design as Nature: A Call for Regenerative Leadership

Green Project Management

We Build Against Nature. Its Costing Us. Our cities flood, our buildings consume vast amounts of energy, and our supply chains accelerate biodiversity loss. These crises arent inevitablethey are the result of design choices that ignore natures intelligence. The past few years have made it painfully clear that the way we build, produce, and consume […] The post Design as Nature: A Call for Regenerative Leadership appeared first on The GPM Blog.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

ISO 27001 Control 7.3: Securing Offices, Rooms and Facilities

Alan Parker Blog

Enhancing Physical Security for Offices, Rooms, and Facilities Overview Ensuring the physical security of offices, rooms, and facilities is a foundational aspect of protecting an organisations sensitive information and associated assets. Effective physical security measures act as a vital line of defence against unauthorised access, physical damage, and interference, helping organisations to maintain the essential principles of confidentiality, integrity, and availability.

More Trending

article thumbnail

ISO 27001 Control 7.2: Physical Entry

Alan Parker Blog

Securing Physical Entry Safeguarding physical access to an organisations premises and information assets is paramount. Control 7.2, "Physical Entry," provides detailed guidance on how organisations can implement robust controls to ensure the confidentiality, integrity, and availability of their information. This article delves into the purpose, guidelines, and practical steps for achieving compliance with this critical control.

article thumbnail

Project Planning Software Guide for Project Managers in 2025

Celoxis

Discover the top features of project planning software in 2025. Learn how AI, predictive analytics, and centralized visibility can optimize project success.

2025 40
article thumbnail

ISO 27001 Control 7.4: Physical Security Monitoring

Alan Parker Blog

Strengthening Physical Security Monitoring for Organisational Resilience Introduction Physical security monitoring is a crucial component of an organisation's broader security framework. Continuous surveillance and monitoring of premises serve to detect and deter unauthorised access, protect critical systems, and uphold the principles of confidentiality, integrity, and availability.

article thumbnail

Agile Project Management Methodology for Your Teams

Celoxis

Agile project management: Choose the right methodology for your team. Compare Scrum vs. Kanban that fits your to boost productivity, collaboration & delivery.

Agile 40
article thumbnail

The 2nd Generation of Innovation Management: A Survival Guide

Speaker: Chris Townsend, VP of Product Marketing, Wellspring

Over the past decade, companies have embraced innovation with enthusiasm—Chief Innovation Officers have been hired, and in-house incubators, accelerators, and co-creation labs have been launched. CEOs have spoken with passion about “making everyone an innovator” and the need “to disrupt our own business.” But after years of experimentation, senior leaders are asking: Is this still just an experiment, or are we in it for the long haul?

article thumbnail

Management by Exception at the Daily Scrum

Scrum.org

At a recent Professional Scrum Master Advanced course, we were discussing how to promote engagement at the Daily Scrum when Mark Kuzik , lean champion and Director at Argus Machine in Canada suggested shaking things up by trying Management by Exception at the Daily Scrum. What is Management by Exception? It's the idea that we should manage the things that are off track, rather than giving focus to things that are going well.

SCRUM 173
article thumbnail

Sometimes it’s best not to offer your feedback

Projectmanagement Advisor

Despite my very best intentions, there are some people I have encountered throughout my life who simply are not interested in and do not want my feedback. I would spend a lot of time writing behaviors down, focusing on how I thought others perceived their behavior, and desired changes to behavior. I would focus on facts and keep things as unemotional as possible during the feedback session.

article thumbnail

ISO 27001 Control 7.11: Supporting Utilities

Alan Parker Blog

Securing Supporting Utilities for Operational Continuity Introduction Supporting utilities play a crucial role in the smooth functioning of an organisations information processing facilities. Disruptions caused by utility failures, such as power outages or communication breakdowns, can lead to loss, damage, or compromise of information and other assets, as well as interruptions to organisational operations.

article thumbnail

ISO 27001 Control 7.14: Secure Disposal or Re-Use of Equipment

Alan Parker Blog

Protecting Organisational Information Introduction The secure disposal or re-use of equipment containing storage media is a vital component of an organisations information security strategy. Ensuring that sensitive data and licensed software are removed or securely overwritten prior to disposal or re-use prevents information leakage and protects against data breaches.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

ISO 27001 Control 7.6: Working in Secure Areas

Alan Parker Blog

Security Measures for Working in Secure Areas Introduction Secure areas are critical to the protection of an organisations information and associated assets. Ensuring robust security measures for personnel working in these areas is essential to safeguard against damage, unauthorised interference, and potential breaches. By establishing clear policies and controls, organisations can maintain the integrity, confidentiality, and availability of their sensitive resources.

article thumbnail

ISO 27001 Control: 7.7 Clear Desk & Clear Screen

Alan Parker Blog

Enhancing Security in the Workplace Introduction A clear desk and clear screen policy is an essential component of an organisations physical and information security strategy. By defining and enforcing clear rules for handling papers, removable storage media, and information displayed on screens, organisations can significantly reduce the risks of unauthorised access, loss, and damage to sensitive information.

article thumbnail

ISO 27001 Control 7.9: Security of Assets Off-Premises

Alan Parker Blog

Protecting Organisational Resources Beyond the Workplace Introduction As organisations increasingly rely on mobile and remote work environments, protecting assets used off-premises has become a critical aspect of information security. Devices and equipment that store or process organisational information outside of traditional office environments are subject to unique risks, such as theft, loss, damage, or compromise.

article thumbnail

ISO 27001 Control 7.12: Cabling Security

Alan Parker Blog

Protecting Critical Cabling Infrastructure Introduction Cabling forms the backbone of an organisations power and data infrastructure. Ensuring the security of cables that carry power, data, or support information services is essential to prevent interception, interference, or damage, and to maintain the continuity of operations. Robust cabling security measures safeguard organisational assets and reduce the risk of disruptions.

article thumbnail

The Constructor's Digital Transformation Playbook: Reducing Risk With Technology

Speaker: Dylan Secrest

Construction projects are high-stakes operations where even minor inefficiencies can lead to costly delays, safety concerns, and budget overruns. Managing risk in construction has always been a challenge, but as projects grow in complexity, traditional methods no longer cut it. Enter Digital Transformation - a game changer approach that replaces inefficiency with AI-powered analytics, real-time monitoring, and automated workflows to proactively manage risk.

article thumbnail

ISO 27001 Control 7.13: Equipment Maintenance

Alan Parker Blog

Ensuring Operational Integrity and Security Introduction Proper equipment maintenance is essential to preserving the availability, integrity, and confidentiality of organisational information. By adhering to structured maintenance protocols, organisations can prevent loss, damage, theft, or compromise of information assets and minimise operational disruptions caused by equipment failures.

article thumbnail

ISO 27001 Control 7.5: Protecting Against Physical and Environmental Threats

Alan Parker Blog

Mitigating Physical and Environmental Threats to Organisational Security Introduction Protecting against physical and environmental threats is an essential aspect of maintaining organisational resilience. These threats, ranging from natural disasters to human-caused incidents, can significantly impact infrastructure and operations. By proactively addressing these risks, organisations can prevent or mitigate potential damage and ensure the continuity of critical operations.

article thumbnail

ISO 27001 Control 7.8: Equipment Siting & Protection

Alan Parker Blog

Safeguarding Organisational Assets Introduction The secure siting and protection of equipment are vital components of an organisations information security framework. By addressing risks from physical and environmental threats, as well as unauthorised access, organisations can ensure the confidentiality, integrity, and availability of their critical assets.

article thumbnail

ISO 27001 Control 7.10: Storage Media

Alan Parker Blog

Managing Storage Media Throughout the Lifecycle Introduction The management of storage media is a critical component of an organisations information security strategy. By implementing robust policies and practices for the acquisition, use, transportation, and disposal of storage media, organisations can safeguard sensitive information and maintain the integrity, confidentiality, and availability of their data.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.