BradEgeland.com #agile #projectmanagement #pmp #certification #cybersecurity #marketing #ceo #esports
  • Welcome
  • Expertise
  • This Week in PM
  • Webinars / training / demos
  • Clients
  • Professional Services
  • Blog
  • PM Forum
  • PM Video Series
  • Software Reviews
  • Books
  • Awards/Recognition
  • White Papers
  • Templates & Downloads
  • Past Survey Results
  • Contact

3 Steps to Hiring the Best Project Manager Available

2/29/2016

 
If you want the best of the best, then be ready to go for it. And be ready to think a little outside the box in order to get that project talent.

It's OK. Think the sky is the limit. Dare to dream. You want the best, your projects are complex and need the best. Your project clients would appreciate having and paying for the best.So how do you get the best?

How do you locate and hire the best project management talent available? Be open, throw out your rigid hiring practices, and see what happens...to start with. And then stick to these three concepts...

Read the full article...

In Over Your Head on Project Work?

2/24/2016

 
No one ever wants to admit that they are in over their head. It’s a show of weakness or possibly a professional short coming. It may actually be neither – you simply may just be overworked, but it can feel like a weakness. And we are just not programmed to scream that out loud.

​We can try to “fake it till we make it”…which is what I like to do if it’s something new. I like to take on new projects, new challenges and learn along the way. I feel that as long as I’m in the ballpark, I can make it happen. But sometimes we all come up short. If that happens…what do we do? I’m focusing on technical projects here so let’s consider some options…
Read the full article...

Project Leadership vs. Just Being Loud

2/23/2016

 
We've all dealt with the loud leader. Are they really respected and followed? Here are the top four traits I believe a true leader should bring to the table.
​

You know the person or co-worker. That individual who complains more or shows more anger and aggression or is louder or whines more than the others around you or in the company or department. Is this person a leader? People seem to comply with their wants, needs and demands. Co-workers and employees of this person aren't pushing back or refusing to do the work this individual has bestowed upon them...
Read the full article...

Setting Up Reluctant Project Managers for Success

2/19/2016

 
Some of us choose to manage projects.  Some of us planned this process out for quite some time and took steps to move into the project management position.  Others fall into it by accident…some even against their will.  However we fall into the position, productivity and organization, it is expected of the project manager, no matter what.  And if you’re an accidental project manager, there’s no guarantee you can just jump back to your last position…you may be let go period if you fail to produce or succeed.
​
Let’s imagine you’re one of a group of project managers in your organization – or possibly even the only one if you’re new or a startup – and you are tasked with mentoring one or more non-project managers who are being tasked with leading projects.  What processes would you go through?  What are some of the high-level things you would be focusing on to bring those non-project managers up to speed – at least with some of the key best practice focuses to start building a consistent and effective project management process in the organization?  The key is this: keep it simple and practical.  I’ve been in these situations before, and I try to focus on the following three key concepts to help the new project managers start out as productively as possible…
Read the full article...

Should Apple be Required to Unlock a Terrorist's iPhone?

2/18/2016

 
Picture
​On December 2nd, 2015, 14 people were killed and 22 more were seriously injured when Syed Rizwan Farook and his wife, Tashfeen Malik opened fire and tried to engage a bomb at a San Bernardino County Department of Public Health training event and holiday party of about 80 employees in a rented banquet room in San Bernardino.  Both fled the scene and were killed four hours later in a shootout.
 
There is no question of their guilt, but as a result of the investigation, the situation right now is that the FBI wants the information on the the dead terrorist Farook’s iPhone.  They have a warrant to search the phone and - because it was Farook’s work phone - they also have obtained permission to do so from his employer.  The problem is, unless they hack it with the skills of the best black hat there ever was, it is likely that the data on the phone will be erased automatically when they fail too many times to crack his access code to the phone.
 
Enter Apple and the judge
 
The big news in all of this is that a judge is “asking” Apple to help hack the phone.  Farook, the male shooter, used an Apple iPhone 5c running Apple’s iOS 9 iPhone operating system. The issue isn’t whether the FBI or law enforcement is entitled to search the phone.  They definitely are.  The issue is can they – or should they be able to – force the phone’s manufacturer to create a way into the phone for them so they don’t risk losing whatever data is on the phone.  Apple says, “no way” because they know that it will set a precedent and they will be asked to do this many times over in future terrorist investigations or law enforcement situations. And they are wise in stating that once they have created that backdoor code into the phone, everyone is at risk because that code is only as safe as the protection around it. As we all know – if you read my articles and listen to those skilled hackers at the annual Black Hat conferences here in Las Vegas and around the world – every thing is hackable.  Period.  Even the protection surrounding the hacking code.
 
Should they or shouldn’t they – and the potential risks?
 
Does this concern you?  It does concern me.  I felt one way about it this morning, but as of now I feel differently after gathering more information about the situation.  What was originally a terrorist action leading to 14 deaths could now become a cybercrime situation if the code gets into the wrong hands.  And there are relatively easy ways that hackers can get the code onto your phone – even without you knowing it and likely in public places where you use unsecured networks like Starbucks, other coffee shops, buses and restaurants, etc.  And it would be completely invisible and unknown to you.  All that has to happen is for the code used to get into the terrorist’s phone to fall into the wrong hands…either through someone on the inside or a very good hacker…and this one-off move to get terrorist info could become an identity theft epidemic. 
 
My thoughts / call for input
 
So, my opinion is this…Apple should not comply with the judge’s request.  They are refusing to comply and they should stand firm in that refusal, in my best opinion.  And I just read that Google is standing with Apple on that decision.
 
What’s your take?  How do you feel about this?  Should Apple comply?  Should they be forced to comply (if that is an option)?  Please share your thoughts and let’s discuss.

3 Reasons Why Your Cybersecurity Plan Needs to be Revised

2/17/2016

 
Everything can be hacked. And hackers and black hats are already at least one step ahead of despite what we're doing to protect ourselves and our projects. If you have a plan it's outdated.

I wish I could tell you that if you have a cybersecurity plan then you’re covered.  But you are not.  Why?  Because the hackers and the black hats and the pursuers on the Dark Net and the Dark Web are one or more steps ahead of all of us all the time.  If they weren’t, then there would be no security breaches or identity thefts or deadly hacks. 
​
With that said, here are three key reasons why your cybersecurity plan is outdated and needs to be revised...
Read the full article...

Repeating Plans from Project Failures will Just Make Fresh Failures

2/9/2016

 
We must be aware and communicating and learning from our project mistakes so that we don't just keep repeating them. And you may not want to buy a new DeLorean, but that's up to you.

Recent news states that the DeLorean sports car – that unique vehicle that stopped production in 1982, is set to re-emerge on the general public in 2017 with 5,000 new units. The DeLorean caught everyone's attention in 1985 as the time-traveling vehicle for Marty and Doc in the “Back to the Future” movie trilogy.
​
Gone will be the extremely underpowered original 160hp V6 engine in favor of a more practical – for a sports car – 350-400 hp V6 engine.  Other than that, everything else will be the same – mostly being assembled from the remaining inventory of parts left over from the original production plant.  With a price tag of $100,000, this car won't be for everyone and it certainly won't be gobbled up by the general public, but movie and auto enthusiasts will most undoubtedly love it...
Read the full article...

    Authors:

    Picture

    Brad Egeland


    Brad Egeland has over 25 years of professional IT experience as a developer, manager, project manager, consultant and author.  He has written more than 6,000 expert online articles, eBooks, white papers and video articles for clients worldwide.  If you want Brad to write for your site, contact him.

    Picture

    Anna Egeland
    ​

    Anna Egeland is a self-professed tech girl and enthusiastic gaming follower, writer, and co-host of a podcast. She attends professional eSports competitions and gaming conferences, allowing her to write with a first hand experience from a female perspective about the Las Vegas gaming scene. Contact her for interviews, product/event reviews and article ideas.

    RSS Feed

    Picture
    Picture
    Picture
    Picture
    Picture

    Archives

    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012
    May 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    March 2011
    January 2011
    December 2010
    November 2010
    October 2010
    September 2010
    August 2010
    June 2010
    May 2010
    April 2010
    March 2010
    November 2009

    Categories

    All
    5 Reasons Why...
    Ad Agency
    Agile
    Apple
    Applications
    B2b
    Best Practices
    Best Practices
    BI
    Blogging
    Book
    Budget
    Business
    Business Continuity
    Business Intelligence
    Certification
    CES
    Change Management
    Cheap Trick
    Cloud Computing
    Coaching
    Collaboration
    Commentary
    Communication
    Conferences
    Conflict Resolution
    Consulting
    Content Marketing
    Contractors
    Control
    Creative
    Creative Management
    CRM
    Current Events
    Customer Management
    Customer Management
    Customer Service
    Customer Service
    Cybercrime
    Cybersecurity
    Cyber Security
    Data Security
    Decision Making
    Desktop Virtualization
    Disaster Recovery
    Documentation
    Document Management
    EBook
    Enterprise Ppm
    Eppm
    Estimating
    Expense Reporting
    Expense Reports
    Financials
    Forecasting
    Funding
    Government
    Green Pm
    Hackers
    Hacking
    Hosting
    Hvac
    Ipad
    IPhone
    IPhone6
    IPhone 6
    Issue Management
    Kickoff
    Leadership
    Lessons Learned
    Management
    Marketing
    Meetings
    Mentoring
    Methodology
    Milestones
    Music
    Negotiation
    Networking
    News
    Onboarding
    Opinion
    Outsourcing
    Paperless
    Performance
    Performance Management
    Planning
    Pm Career
    Pmo
    Pmo Director
    Pmp
    Pmp Exam
    Pm Roles
    Pm Roles
    Pm Tools
    Portfolio Management
    Ppm
    Presentations
    Pricing
    Productivity
    Project Approval
    Project Budget
    Project Management
    Project Management
    Project Management Office
    Project Manager
    Project Schedule
    Project Sponsor
    Project Team
    Quality
    Remote Project Management
    Reporting
    Requirements
    Resource Management
    Resource Planning
    Review
    Risk
    Risk Management
    Schedule
    Scope Management
    Scrum
    Security
    Small Business
    Smart Pm
    Social Media
    Soft Skills
    Software Development
    Software Review
    Stakeholders
    Startups
    Status Reporting
    Study
    Survey
    Task Management
    Teams
    Technology
    Telecommuting
    Templates
    Testing
    Time Management
    Tools
    Training
    Trends
    Vdi
    Video
    Virtual Desktop
    Virtualization
    Virtual Teams
    WBS
    Webinar
    What Would You Do
    White Paper
    Workflow Management
    Work Management
    Wwyd

    RSS Feed

Proudly powered by Weebly
✕