Tue.Jan 28, 2025

article thumbnail

How do I coach my Product Owner? First steps.

Scrum.org

Scrum Masters ask me for help with Product Owner coaching constantly. Its popular for good reasons. Scrum mastery is a career that evolves through professional experience, often ambushing you when you least expect it. Most Scrum Masters haven't navigated the product management landscape before landing in their coaching role. As a result, Scrum Masters typically excel at coaching Product Owners within the Scrum Guide but feel overwhelmed when venturing into product management tools, tactics, and

SCRUM 190
article thumbnail

The Industrial Talk Podcast with Scott MacKenzie

Clint Padgett – Project Success

Episode Information: Clint Padgett, founder and CEO of Project Success, Inc., discusses the challenges of project management, particularly the misconceptions around agile methodologies and the necessity of detailed planning. He highlights the importance of executive support, team collaboration, and the need for a balanced approach to project detail.

2025 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Is It Important for the Product Backlog to Be Ordered?

Scrum.org

Ordering a Product Backlog ensures that every step taken, every backlog item worked, is a step towards delivering value, satisfying stakeholders, and making the best use of the team's capabilities. This article was first published in the AskScrum.com newsletter. Subscribe to AskScrum.com to be the first to receive articles like this. An ordered Product Backlog ensures the team's efforts align with delivering the most value.

2024 162
article thumbnail

Mastering STP Marketing: A Practical Guide to Segmentation, Targeting, and Positioning

UPQODE

Knowing your audience is the foundation of every successful marketing strategy. At the heart of this lies the STP marketing model Segmentation , Targeting , and Positioning. This practical approach empowers businesses to identify the unique needs of their customers, tailor their offerings to meet these needs, and communicate their value proposition with precision.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Which is better: Scrum or Kanban?

Scrum.org

People often asked me, which is better between Scrum or Kanban? To know which one is better requires measurement. Evidence Based Management is a framework from Scrum.org for measuring organisation effectiveness in delivering value to customers. It is framework and method agnostic. In this vlog I share an overview about EBM and how organisation can start measuring their effectiveness in value delivery regardless what method of framework that is used.

SCRUM 149

More Trending

article thumbnail

Free Gantt Chart Templates for Excel, Google Sheets & More

ProjectManager.com

Gantt chart templates are tools for project scheduling. Theyre also a workaround as they provide a path that avoids the more effective Gantt chart that is included in most project management software. However, not everyone is ready to upgrade. Thats why we offer free project management templates that help during every phase of a project, across multiple industries.

article thumbnail

ISO 27001 Control 8.4: Access To Source Code

Alan Parker Blog

Secure Management of Source Code, Development Tools, and Software Libraries Introduction Source code is a vital part of any software development effort, representing both intellectual property and the foundation for organisational systems. Ensuring that read and write access to source code, development tools, and associated artefacts is strictly controlled helps prevent unauthorised changes, safeguards against malicious modifications, and maintains the confidentiality of valuable code assets.

article thumbnail

ISO 27001 Control 8.1: User Endpoint Devices

Alan Parker Blog

Protecting Organisational Data on the Go Introduction User endpoint devices form a critical link in any organisations information security chain. Whether owned by the organisation or personally by employees (BYOD), they can access, store, and process sensitive data, making them a prime target for adversaries. By establishing robust policies and controls, organisations can significantly reduce the security risks introduced by the use of such devices.

article thumbnail

ISO 27001 Control 8.2: Privileged Access Rights

Alan Parker Blog

Ensuring Authorised Use of Elevated Permissions Introduction Privileged access rights grant users and processes the ability to perform actions beyond those of standard accounts. If not carefully managed, these elevated permissions can introduce significant security risks. A proactive approach to allocating, monitoring, and reviewing privileged access is essential to maintaining confidentiality, integrity, and availability within an organisation.

article thumbnail

The 2nd Generation of Innovation Management: A Survival Guide

Speaker: Chris Townsend, VP of Product Marketing, Wellspring

Over the past decade, companies have embraced innovation with enthusiasm—Chief Innovation Officers have been hired, and in-house incubators, accelerators, and co-creation labs have been launched. CEOs have spoken with passion about “making everyone an innovator” and the need “to disrupt our own business.” But after years of experimentation, senior leaders are asking: Is this still just an experiment, or are we in it for the long haul?

article thumbnail

ISO 27001 Control 8.5: Secure Authentication

Alan Parker Blog

Safeguarding Access to Systems and Services Introduction Secure authentication mechanisms are essential for verifying the identity of users, software processes, and other entities before granting access to systems, applications, and services. By choosing appropriate authentication techniques and procedures, organisations can protect against unauthorised access and reduce the likelihood of data breaches.

article thumbnail

ISO 27001 Control 8.3: Information Access Restriction

Alan Parker Blog

Enforcing Authorised Use and Protecting Sensitive Assets Introduction Restricting access to information and other associated assets is paramount for maintaining confidentiality, integrity, and availability. By aligning with the organisations established policies on access control, unauthorised access can be minimised, and sensitive information can be safeguarded from potential breaches.