Skip to main content

Security

Tutorials

TM Innovation Thinking: Evolve and Expand Your Capabilities NEW
Jennifer Bonine, tap|QA, Inc.
Tue, 11/11/2014 - 1:00pm

Innovation is a word frequently tossed around in organizations today. The standard cliché is “Do more with less.” People and teams want to be innovative but often struggle with how to define, prioritize, implement, and track their innovation efforts. Jennifer Bonine shares the Innovation Types model to give you new tools to evolve and expand your innovation capabilities. Find out if your innovation ideas and efforts match your team and company goals. Learn how to classify your innovation and improvement efforts as core (to the business) or context (essential but non-revenue generating).

Read more

Concurrent Sessions

BW3 This Is Not Your Father's Career: Advice for the Modern Information Worker
James Whittaker, Microsoft
Wed, 11/12/2014 - 11:30am

In an era where college dropouts run successful companies and creative entrepreneurs out-earn corporate vice presidents, working smart is clearly the new working hard. James Whittaker turns on their head the career rules that guided past generations and provides a new career manual for working smarter that speaks to the need for creativity, innovation, and insight. James teaches a set of skills designed for the modern era of working for companies, both big and small.

Read more
BW7 You Said What? Becoming Aware of the Things We Say
Doc List, Doc List Enterprises
Wed, 11/12/2014 - 1:30pm

Most of us take language for granted. We use words without thinking about how they may affect others and then are surprised at the reaction we get. Learn the importance of language in building and maintaining high performing agile teams. Become more aware of the words you choose and the impact of those words on your listeners. Doc List presents a series of exercises in a game show format. Participants attempt to identify loaded words in seemingly simple statements and questions. Some of the exercises are written; others are acted out in role play.

Read more
BW8 Tips and Tricks for Building Secure Mobile Apps
Jeff Payne, Coveros, Inc.
Wed, 11/12/2014 - 1:30pm

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do not understand how to build and test secure mobile applications. Jeff Payne discusses the risks associated with mobile platforms/applications and describes best practices for ensuring mobile applications are secure.

Read more
BW9 Gamification and Arbejdsglæde (Danish: Work Gladness/Joy)
Ryan Kleps, Boeing IT
Wed, 11/12/2014 - 2:45pm

You get paid for doing that? Is it possible to both work and have fun in a large corporate setting? Can joy be made part of the workplace? For the past few years Ryan Kleps and his colleagues have been conducting an informal social experiment using gamification (before they knew it had a name) in their corporate training modules to encourage participation, engagement, and enjoyment.

Read more
BW11 You, Inc.: Building Your Personal Brand
Jennifer Bonine, tap|QA, Inc.
Wed, 11/12/2014 - 2:45pm

Building the right personal brand is one of the most critical success factors in today’s workplace. Organizations develop a brand and image, but not many individuals think about their brand on sites like Facebook, LinkedIn, and other social media outlets. Every person with career aspirations should be actively shaping their brand. As we interact with people, we want to influence them to support our efforts—approving projects, budgets, and funding; supporting our next career move; or recommending us for that promotion or raise we want.

Read more
BW16 Privacy and Data Security: Minimizing Reputational and Legal Risks
Tatiana Melnik, Melnik Legal, PLCC
Wed, 11/12/2014 - 4:15pm

Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past several years, data breaches have occurred in the hospitality, software, retail, and healthcare industries. Join Tatiana Melnik to see how stakeholders can minimize data breach risks, and privacy and security concerns by integrating the Privacy by Design Model into the software development lifecycle.

Read more