About this deal
Analysis: Analyzing the results of the scans to determine the severity and potential impact of identified vulnerabilities, taking into account the organization's specific context and risk tolerance. To see how you might use the six hats in your own work, let us consider one of the examples mentioned already.
The problem is that there are complaints and continued customer dissatisfaction is not good for repeat business and reputation Consider rotating the hats between the groups to foster new ideas and get groups to consider the issue from various perspectivesRisk ranking digital asset vulnerabilities: Implementing robust prioritization of found flaws to ensure that the most critical vulnerabilities are remediated. A coffee house is getting a growing number of complaints from customers as they are having to wait too long for their coffee – how can they solve this problem?
How many complaints are we getting that relate to the problem of waiting times and the speed at which we can serve coffee? Yellow Hat– The yellow hat is the optimistic hat, used to consider the possible merits of ideas which may have been generated by the green hat process. You can reintroduce hats as and when needed, to provide more information in relation to new ideas or findings. In this sense, the process is iterative.
Who are Hackers? 6 Types of Hackers
To help alleviate this confusion he describes six different types of thinking, associating each with a different colour hat. What is Six Thinking Hats? Joe, the current store manager has a team of eight people who work in a variety of roles. As the shop is closed on a Sunday Joe has asked the team to come together for a problem-solving exercise.