How does a Governance, Risk and Compliance (GRC) team use the Scrum approach to complete work assignments in a non-software development environment? Scrum emphasizes collaboration, team self-management, and the flexibility to adapt to emerging business realities. We want to share with you through lessons learned and discussion how we are executing this agile technique. This presentation is for new users that are interested in Scrum concepts.
Learning Objectives: Understand Scrum terms and basic principles; Utilize Scrum in a non-development environment; Learn how Team GRC is executing Scrum in a “user friendly” environment; Participate in a discussion and leverage “lessons learned"; Obtain other Scrum resources to assist you with implementation.
Every month we read about the latest, the greatest, or “the most significant cyber breach
ever.” Companies are jostling to figure out how to manage these challenging cyber security
issues – and it’s not just IT that’s scrambling. Cyber incidents affect every aspect of the
business, and cyber security has become one of the most pressing issues in business
continuity management today.
In many recent surveys, “C-ˇsuite” executives say that their number one concern is a cyber
breach or major malware incident. But how do you go about creating this type of exercise
that is, frankly, fraught with peril? Very carefully, obviously! The goal of this session is to
demonstrate the value of conducting such an exercise to improve your company’s overall
readiness. The session will describe how you can go about designing this type of exercise,
why it is different from other exercises, and how you can avoid pitfalls and career-ˇlimiting
moves this topic can lead to.
Topics Covered
• Discover how a cyber exercise is different from other exercises.
• Learn about the positive benefits of cyber exercise.
• Design an exercise that delivers on the stated goal.
• Determine the eight critical elements that make a cyber exercise work