Remove 2018 Remove Data Security Remove Requirements Gathering
article thumbnail

Audit, Report and Forensics

Business Analysts

One of the things that ANU couldn’t do in the breach in late 2018 and early 2019 was to identify what the hackers had stolen. This typically would follow the requirements gathering where stakeholders have indicated they need specific reports to ensure the right people have access. Requirements Gathering.