Toolkit: Stakeholder Analysis

stakeholder analysis

Stakeholder analysis is a process of identifying and analyzing the stakeholders of an organization, project, or initiative. Stakeholders, in this perspective, are individuals, groups, or organizations that have an interest in or are affected by the outcomes of the project or initiative you are executing the stakeholder anaysis for. The goal of stakeholder analysis is …

Read more

Book Summary: One up on Wall street

Below you can find the main conclusions of the book “One up on Wall Street”. Recognize the main six categories of investments. Stalwarts: These are companies in a market that is relatively stable but still companies can make quite some profits. Cyclicals: These companies make earnings related to their business cycle. This means that companies …

Read more

IT Architecture Best Practices

In this article I will post standard patterns and best practices on certain design challenges. I aim to keep it concise which helps readability. 1. Store images in database It is possible to store images directly in an attribute of a table in your database. This can be basically done with all database, both SQL …

Read more

IT Risk Management Simply explained: Threat modelling

This is a process of preparing, identifying risks, mitigating them and regularly review the risks. Hence, this is a continuous process that requires regular review. Two well-known framework assist here: STRIDE (Spoofing, Tampering, Repudiation, Informaton Message disclosure, Denial of Service & Elevation of Privilege) PASTA Risk must be classified on the scale of risk of …

Read more

Cybersecurity: Penetration testing

Penetration testing is a technique applied by white hat hackers to test the security of their infrastructure. With penetration testing, a white hat hacker will try to exploit all existing vulnerabilities with the goal of further optimizing and securing the infrastructure of the target. Hence, penetration testing is often done by organizations to get a …

Read more