Posts by Glenn Abcede
How to communicate effectively and frequently
Contributor to the LinkedIn Community.
Read MoreHow can you manage ambiguity in program management?
Managing Ambiguity: Top Three Skills and Competencies Adaptability: As a program manager, I’ve found that being adaptable is key to managing ambiguity. This involves being open to new ideas, being flexible in the face of change, and being ready to pivot my strategies when necessary. It’s about seeing the potential of an uncertain situation, rather…
Read MoreHow to identify project stakeholders
When I need to identify stakeholders affected by a business intelligence issue, I employ a variety of methods and tools. I conduct a stakeholder analysis that involves categorizing and prioritizing stakeholders based on their power, interest, influence, and expectations. I can accomplish this analysis using a stakeholder analysis matrix or a stakeholder map. I find…
Read MoreHow to communicate with project stakeholders
To communicate with stakeholders during a business intelligence (BI) project or any project for that matter, it is important to prioritize three key competencies: understanding your audience, maintaining clarity and conciseness, and demonstrating honesty and transparency. By tailoring your communication style to meet their needs, using simple language to highlight essential messages and actions, and…
Read MoreWhat are the latest techniques for consulting project management?
Learn about the latest project management techniques.
Read MoreWhy is a business case critical?
Learn why having a business case is so important, and discover how to create one to help you get the green light for your next project.
Read MoreHow to Successfully Communicate Departmental Wins to Senior Leadership: Strategies for Maximizing Your Team’s Impact.
The department communication executive template is an invaluable tool for maximizing communication efforts and driving initiative outcomes forward. By providing input from each department on current wins and accomplishments, priorities, and blockers, the template helps create successful conversations between departments and leaders across organizations.
Read MoreA Tale of Unsecure Networks: The Dangers of Not Following a Cybersecurity Requirements Checklist
For businesses, large and small, it is essential to be aware of the ever-evolving threats posed by cybercriminals. These threat actors can quickly access private networks without proper cybersecurity measures and cause irreparable damage. This blog post will discuss the importance of having a comprehensive cybersecurity requirements checklist for enterprises to protect themselves. Furthermore, we will reveal the dangers of neglecting to follow a comprehensive cybersecurity protocol.
Read MoreIs the CIA Triad outdated?
The CIA Triad of Confidentiality, Integrity, and Availability is a fundamental element of modern cybersecurity. Non-repudiation and Authenticity measures help protect data from malicious actors and create a secure digital environment. The CIA Triad and its derivatives are essential for ensuring information security.
Read MoreThe CIA Triad: What it is and Why it matters
The CIA Triad is a cybersecurity concept. It was first introduced in the 1970s and remains a foundational element in cybersecurity today. Despite its age, the CIA Triad has proven resilient over time and is an invaluable part of cybersecurity strategy.
Read More