Business Analysis, Project Management, Business Consulting

The Do’s and Don’ts of a Business Analyst Venturing into an OCM Role

Having been a Business Analyst (BA) for many years, I was given the opportunity in 2015 to step into a role that I considered new territory. I accepted a project assignment as an OCM Practitioner/Analyst for a multi-year program, with multiple projects, that was introducing massive changes to the client. There were both enterprise-wide changes and cultural shifts that were required to support the future growth of the company.

Read More
By May Ann Lopez on May 10, 2018 11:59:02 AM
Leadership, Professional Effectiveness, Business Consulting

5 Tips for Dealing with Multi-Generational Teams

It’s no surprise that our workforce is changing. If your workplace is like most, a quick glance around the office will likely reveal that there are fewer Baby Boomer workers than in the past and more Gen X and Millennial workers. Canadian Business reports that Millennials are becoming the most sizable working generation in Canada, completely overtaking the other generations of employees.

Read More
By Heidi Deras on May 3, 2018 10:46:15 AM
Security, Privacy

Looking Back at RSA Conference 2018

With RSA Conference 2018 behind us, we asked Onliner Derek Nwamadi to share some of his observations from the conference floor. 

This year’s RSA Conference did not disappoint. Once again attendees were treated to a great line up of presentations, events, and an always impressive expo floor. Looking back at my week at RSA, one word kept coming to 

mind – 

Trust; we seem to be living in an age where we are technology and data rich but trust poor. 

As always, there are some technologies and buzzwords that become industry hot buttons and generally drive it for the rest of the year (more on that later). 

Read More
By Security Consulting Team on Apr 24, 2018 2:00:06 PM
Security

How Effective is Your Threat Detection and Response Management Program?

It’s not uncommon for me to be asked how often an organization should review its own InfoSec alerting framework and library. My answer usually goes as follows: Like so much of security, nothing is straightforward, but there are some fundamental best practices that provide critically helpful guidance. The bottom line is that Threat Detection and Response (TD&R) management is really a lifecycle operation.

Read More
By Will Armijo on Apr 11, 2018 1:07:24 PM
Digital Experience

Validating Digital Experiences - Part Two

In the first part of this blog, I covered how organizations of all kinds are increasingly adopting user centered Design Thinking practices instead of dreaming up features or digital products they think their users need. I then discussed the MVP Effort, Proposed Solution, and Aim steps of the infographic below. In this final part, we will be covering viability milestones during the post-launch impact stage, including how to track the milestone's using your metrics system and what warning signs to look for that could indicate you’re not hitting all six of them. 

Read More
By Kevin Guenther on Mar 28, 2018 10:00:00 AM
Digital Experience

Validating Digital Experiences - Part One

Organizations of all kinds are increasingly adopting user centered Design Thinking practices instead of sitting around boardroom tables with their peers, dreaming up the next big feature or digital product they think their users need. But depending on your company culture and organizational structure, you may still be finding it challenging to break the “grand assumption” habit.

Read More
By Kevin Guenther on Mar 16, 2018 1:31:53 PM