Share

Online Webinar  – Recorded February 1st 2018
Activity Type: Education – Online or Digital Media Up to 1 PDU – Free
Provider:
ProjectManagement.com / Gantthead (REP #2488)
Once viewed your PDU Will automatically Be recorded with PMI®

ProjectManagement.com / Gantthead premium content
Is available to PMI® members.

This data security and compliance methodology is based on examining third-party vendors against the development of a three dimensional risk based model.

The final deliverables of the risk impacts, findings, enterprise requirements, and remediation are presented quantitatively.

A number of professional surveys indicated that information technology and security managers, directors and executives reported significant data breaches linked directly or indirectly to third-party access.

Unfortunately, these security breaches are trending upwards.   In addition, there is an absence of a structured and quantifiable methodology to measure the third-party risks on an enterprise, as well as what are the expected requirements from the third-party to substantiate the evidence that sound risk management practices are in place.

Types of risk a third-party may have on an enterprise when third-parties store, access, transmit or perform business activities.

It represents a probable risk exposure for the enterprise. The degree of risk and the material effect are highly correlated with the sensitivity and the transaction volume of data.

Outsourcing certain activities to a third-party poses potential risk to the enterprise.

Some of those risk factors could have adverse impacts in the form of, but not limited to, strategic, reputational, financial, legal or information security issues. Other adverse impacts include service disruption and regulatory noncompliance.

Examples of third-parties’ services include, but are not limited to, technology service providers; payroll services; accounting firms; invoicing and collection agencies; benefits management companies; consulting, design and manufacturing companies.

Most third-party commercial relationships require sending and receiving information, accessing the enterprise networks and systems, and using the enterprise’s computing resources. The risk posed at different levels and the impacts range from low to very significant.

Join Robert Putrus (LinkedIn profile) and learn how you as a program or project manager can adopt this methodology  in its entirety or adjust it to fit your enterprise’s uniqueness then build your own PMBOK process groups and knowledge areas.

Note: You have to sign in to ProjectManagement.com with your PMI® credentials to register for this opportunity. If you are not signed in with your PMI® credentials you will not see the “Register for this webinar” link

Click to register for:
A Risk-Based Management Approach
To Third-Party Data Security, Risk & Compliance

1.0 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Online Webinar Recorded – Dec 12, 2013
Activity Type: Education – Online or Digital Media 1 PDU – Free
Provider:  TechGIG

The session will explain definition of stakeholders and their importance in a project.

Some stories around stakeholder will be presented to describe how they can influence a project success or failure.

A details process of identification of the stakeholder using Onion diagram will be explained.

Presenter: Raghuraman Kadambi Sr. (LinkedIn profile) Consultant/Principal Instructor  Project Management, SKIL GLobal

Or Watch On YouTube:
Project Stakeholders Identification:
Critical Process In Project Management

1.0 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar February 15th, 2018, 11:00 am – 12:00 pm EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Addressing software as a service (SaaS) change management is ranked among the top five SaaS challenges for technical professionals.

Current software change management strategies are unsuitable for SaaS solutions as changes are typically rapid and inconsistent.

New change management strategies need to be formed specifically for a SaaS portfolio and take into account that the majority of changes will be pushed and controlled by the SaaS provider, not IT.

In this webinar Kyle Davis (LinkedIn profile, Gartner bio) Gartner Research Director will discuss the Gartner agile and risk-oriented approach that enables IT to perform SaaS change management focusing only on the upcoming changes that may disrupt the business and impact enterprise users.

Discussion Topics:

  • Why change management is one of the top 5 issues for technical professionals implementing SaaS
  • Using risk levels to determine if and when IT should control change management
  • Using shorter cycles for SaaS testing to keep up with change cadence

Click to register for:
How To Address SaaS Change Management

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Top Cybersecurity Trends For 2018

Share

Live Webinar February 12th, 2018, 10:00 am – 11:00 am EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them.

Threats to that technology and its supporting process are increasing in number and sophistication.

Traditional IT security leaders have now become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services.

In this webinar Earl Perkins, (LinkedIn profile, Gartner bio) reviews the cybersecurity lessons learned and informs you how to use the past to create the future.

Discussion Topics:

  • What technology and market trends are occurring to meet the changing digital security landscape
  • Which security technologies and processes have changed to accommodate the demands of digital business
  • How digital security leaders in organizations can use these trends to their advantage

Click to register for:
Top Cybersecurity Trends For 2018

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

State Of Data Security

Share

Live Webinar February 7th, 2018, 12:00 pm – 1:00 pm EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Warning: Your data is not all neatly defined, structured, organized and secured in your datacenter.

Determining or defining the data that matters most, where it is or will be stored, who is or will be responsible for it must be clearly understood and defined in order to be GDPR compliant and for your data to be properly secured.

The impact of big data projects, the continued migration to cloud platforms and applications, IoT projects, blockchain experiments can create new threats if a clear governance strategy is not in place.

In this webinar, Merv Adrian (LinkedIn profile, Gartner bio) Gartner Research VP will help you determine what you need to do to be compliant and ensure data security in 2018 and beyond.

Discussion Topics:

  • How to balance compliance with business requirements
  • Adequate data protection in a public cloud
  • Appropriate data security controls

Click to register for:
State Of Data Security

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar – January 18th, 2017 10:00 am – 11:00 am EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: MPUG WebnLearn ( REP 1369 )
Mpug Member Free – Members only event

Many clients are now demanding proposals include a schedule risk assessment and the more savvy are requesting forecast dates be presented at, for example, 80% levels of confidence.

  • What does this mean and how much effort will be involved to produce these deliverables?

This presentation will focus on how to satisfy these requests with the minimum of effort and how schedule risk analysis can actually reduce costs and improve profitability.

Presenter:  John Owen (LinkedIn profile) COO of Barbecana Inc, John has over 30 years of experience with using, supporting, and developing project management software tools across multiple industries.  Before joining Barbecana John was Product Director for Scheduling and Risk tools at Deltek.  Barbecana specializes in producing software for schedule risk analysis with the aim of helping customers improve confidence in their schedules.

If you are NOT ALREADY a member JOIN MPUG!

This event is for members only BUT… You can take one of the MPUG Certificated Masterclass (Usually 6 Category A PDUs) Or over 30 other Category A PDUs for free each year.  The $129 Per Year Membership Fee is a terrific value!

MPUG Membership includes:

  1. MPUG’s Project Server and SharePoint certificated courses available to members
  2. Over 30 other virtual PDU events per year
  3. You can network with other MPUG (Microsoft Project Users Group) members at in person meetings and events.
  4. Work with Microsoft MVPs in MS Project Project Server & SharePoint
  5. And so much more …

Seriously consider joining MPUG if you work with SharePoint or Project & earn all the PDUs you will need as a member of MPUG!

Click to register for:
What’s The Value Of Schedule Risk Analysis?

1.0 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.