Professional Documents
Culture Documents
PROCESS
IMPROVEMENT
PRACTICES
ISAD
LEARNING OBJECTIVES REPORTERS
This is where you define the processes that need to be automated, and
map out how they will work.
The most common ways to model processes are:
-Flowcharts -Process maps
-Data flow diagrams -Swimlane diagrams
- Business Process Model and Notation
BUSINESS PROCESS LIFE CYCLE
EXECUTION
This is when the processes and tools that were designed in the
previous stage are put into action.
The goal of this stage is to ensure that the BPM system is
running smoothly and efficiently.
BUSINESS PROCESS LIFE CYCLE
MONITORING
https://www.reallygreatsite.com
Applications Systems
Software Software
Developers Developers
APPLICATIONS SOFTWARE DEVELOPERS
OVERVIEW
Client-focused
Design software for the end user to interact
with
Develop applications for iOS, Android,
Windows, Linux, and more
Conduct requirements analysis
Tweak software and release updates regularly
Front-end or back-end
SYSTEMS SOFTWARE DEVELOPERS
OVERVIEW
Think of them as a
ISO - The
FORMULA that
International
describes the BEST
Organization for
way of doing
Standardization
something.
ISO/IEC 33001
Set of technical
ISO/IEC 33001
standards documents
for the computer
software development
Information technology -- process and related
business management
Process assessment --
functions.
Concepts and terminology
ISO/IEC 33001:2015 provides
a repository for key
ISO/IEC 33001: 2015 terminology relating to process
assessment. It gives overall
information on the concepts of
process assessment, the
Revision of ISO/IEC 15504, also application of process
termed Software Process assessment for evaluating the
Improvement and Capability achievement of process quality
Determination (SPICE). characteristics, and the
application of the results of
The ISO/IEC 330xx family process assessment to the
conduct of process
superseded the ISO/IEC 155xx
management.
family.
MANAGING
THIRD
PARTIES
Best Practices for
Third-Party Management
01 Asses Risks 06 Evaluate Investments and Staffing
Protect 02
You can put the
NIST Cybersecurity
Framework to work Detect 03
in your business in
these five areas: Respond 04
Recover 05
THANK
YOU!