
Speakers:
Shifting Security Left: Business Analysis Techniques for Cybersecurity and Zero Trust
Date:
Thursday, June 12, 2025
Time:
1:30 pm
Summary:
This tutorial is designed for business analysts aiming to enhance their role in cybersecurity and secure application development. Over the course of the tutorial, participants will explore proactive strategies such as “shifting security left” in the application development lifecycle, and Zero Trust Architecture, applying business analysis techniques like stakeholder analysis and risk assessment to support cybersecurity initiatives. Through interactive exercises and case studies, attendees will gain practical skills to integrate security early in the system development lifecycle, aligning security needs with business objectives. Participants will also be introduced to the IIBA Certificate in Cybersecurity Analysis and offered a glimpse into the art of cybersecurity.
LEARNING OBJECTIVES
- Understand the business analyst’s role in cybersecurity and how they contribute to secure system development.
- Explore “shifting security left” as a proactive strategy to integrate security early in the SDLC.
- Apply Zero Trust Architecture principles in system design and analysis.
- Use business analysis techniques such as stakeholder analysis, process modeling, and risk analysis to support cybersecurity initiatives.
- Engage in hands-on exercises including threat modeling and risk analysis.