In recent years, cyber crime and unauthorized access to data became a very real and widespread problem. Terms like "zero trust" or "cyber security" are no longer considered nerd-only topics, but they rather became daily business. At Pertuniti, we try to make it easy for you to stay secure. Our main pillars to this goal are reduction of data processing complexity, end-user usability in user access control, and multi-factor authentication to access our service.
Business process modeling rarely happens just as an academic exercise in a vaccum — actual business processes in practice may have a wide range of internal and external stakeholders. While the role 'Customer' in a BPMN model almost always is a good hint on who should get special attention, it is rarely the only one. In this article, we depict an overview of whom to consider.