Software requirement arises out of a business need. Someone from the business sector feels that some critical business requirement can be met by building an application and shall provide some amount of automation and enhancement as compared to the manual process. They further desire it to be built by either internal software development team or an external/outsourced team. A business requirement document is then prepared to provide both ‘What Is’ and ‘What Needs To Be’ scenarios.

( Read more:   How Should a CISO choose the right Anti-Malware Technology? )

sys_media_89496.jpg?width=655

What Is’ cites the current process as it is – end to end as happening in the business i.e. manually or in a legacy standalone system. Due to this critical business process happening manually a lot of effort goes into translating the manual business information into some kind of system to acquire sensible reports and analysis out of this. The latter might also not be happening in an application; it might be drawn out through an excel sheet with the help of certain functions and queries.

( Read more:  Annual Survey on Cloud Adoption Status Across Industry Verticals )

This business requirement is then to be given to the project manager/product manager/development manager to discuss it with the business team and their teams so as to prepare a technical document based on which the development work begins. The 'Two Ends of The Bridge' need to be well connected and have a strong connecting factor in between having a 50:50 knowledge of both ends. He must be able to identify what exactly is the requirement, what does the technical translation intend to deliver and if there is any gap between the two in shape of a risk.
For Example, a vehicle starting from one end and after covering the 80% of bridge learns some disastrous fact about the bridge!

Have a new insight to share with the information security community? Share your views under the bridge, in the comments below or write your article

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"

    Date: December 1st - December 31st 2025

    Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata

    >> Register Here

  • Created by: Biswajit Banerjee

Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)

  • Description:

    We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass). 

    About Sandro:

    Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…

  • Created by: Biswajit Banerjee
  • Tags: ciso, sandro bucchianeri, nab