Know Your Enemy: Software Risk Management 1
|
|
|
- Naomi Ferguson
- 10 years ago
- Views:
Transcription
1 Know Your Enemy: Software Risk Management 1 Karl E. Wiegers Process Impact Software engineers are eternal optimists. When planning software projects, we often assume that everything will go exactly as planned. Or, we take the other extreme position: the creative nature of software development means we can never predict what s going to happen, so what s the point of making detailed plans? Both of these perspectives can lead to software surprises, when unexpected things happen that throw the project off track. In my experience, software surprises are never good news. Risk management is becoming recognized as a best practice in the software industry for reducing the surprise factor. While we can never predict the future with certainty, we can apply structured risk management practices to peek over the horizon at the traps that might be looming, and take actions to minimize the likelihood or impact of these potential problems. Risk management means dealing with a concern before it becomes a crisis. This improves the chance of successful project completion and reduces the consequences of those risks that cannot be avoided. What Is Risk? A simple definition of a risk is a problem that could cause some loss or threaten the success of our project, but which hasn t happened yet. (And we d like to keep it that way.) These potential problems might have an adverse impact on the cost, schedule, or technical success of the project, the quality of our products, or team morale. Risk management is the process of identifying, addressing, and eliminating these potential problems before they can damage our project. Whether we tackle them head-on or keep our heads in the sand, risks have a potentially huge impact on many aspects of our project. The tacit assumption that nothing unexpected will derail our project is simply not realistic. Our estimates should incorporate our best judgment about the potentially scary things that could happen on each project, and managers need to respect the assessments we make. Risk management is about discarding the rose-colored glasses and confronting the very real potential of undesirable events conspiring to throw our project off track. Why Manage Risks Formally? A formal risk management process provides a number of benefits to both the project team and the development organization as a whole. First, it gives us a structured mechanism to provide visibility into threats to project success. By considering the potential impact of each risk item, we 1 This paper was originally published in Software Development, October It is reprinted (with modifications) with permission from Software Development magazine.
2 Know Your Enemy: Software Risk Management Page 2 can focus on controlling the most severe risks first. We can combine risk assessment with project estimation to quantify possible schedule slippage if certain risks materialize into problems, thereby coming up with sensible contingency buffers. Sharing what does and does not work to control risks across multiple projects helps projects avoid repeating the mistakes of the past. Without a formal approach, we cannot ensure that our risk management actions will be initiated in a timely fashion, completed as planned, and effective. Controlling risks has a cost, which we must balance against the potential cost we could incur if the risk is not addressed and does indeed bite us. For example, if we are concerned about the ability of a subcontractor to deliver an essential component on time, we could engage multiple subcontractors to increase the chance that at least one will come through on schedule. That s an expensive remedy for a problem that may not even exist. Is it worth it? It depends on the down side we incur if indeed the subcontractor dependency causes the project to miss its planned ship date. Only you can decide for each individual situation. Typical Software Risks The list of evil things that can befall a software project is depressingly long. The enlightened project manager will acquire extensive lists of these risk categories to help the team uncover as many concerns as possible early in the planning process. Possible risks to consider can come from group brainstorming activities, or from a risk factor chart accumulated from previous projects. In one group I ve worked in, individual team members came up with insightful descriptions of their risk factors, which I edited together and we then reviewed as a team. The Software Engineering Institute (SEI) has assembled a taxonomy of hierarchicallyorganized risks in 13 major categories, with about 200 thought-provoking questions to help you spot the risks facing your project. These are listed in SEI Technical Report CMU/SEI-93-TR- 006, Taxonomy-Based Risk Identification, by Marvin Carr, et al. Steve McConnell s Jolt Award-winning Rapid Development (Microsoft Press, 1996) also contains excellent resource material on risk management. Following are several typical risk categories and risk items that may threaten your project. Have any of these things have happened to you? If so, add them to your master risk factor checklist to remind future project managers to ask themselves if it could happen to them, too. There are no magic solutions to any of these risk factors, so we need to rely on past experience and a strong knowledge of software engineering and management practices to control those risks we are most concerned about. Dependencies Many risks arise because of dependencies our project has on outside agencies or factors. We cannot usually control these external dependencies, so mitigation strategies may involve contingency plans to acquire a necessary component from a second source, or working with the source of the dependency to maintain good visibility into status and detect any looming problems. Here are some typical dependency-related risk factors: customer-furnished items or information internal and external subcontractor relationships inter-component or inter-group dependencies availability of trained, experienced people
3 Know Your Enemy: Software Risk Management Page 3 reuse from one project to the next Requirements Issues Many projects face uncertainty and turmoil around the product s requirements. While some of this uncertainty is tolerable in the early stages, the threat to success increases if such issues are not resolved as the project progresses. If we don t control requirements-related risk factors, we might either build the wrong product, or build the right product badly. Either situation results in unpleasant surprises and unhappy customers. Watch out for these risk factors: lack of a clear product vision lack of agreement on product requirements inadequate customer involvement in the requirements process unprioritized requirements new market with uncertain needs rapidly changing requirements ineffective requirements change management process inadequate impact analysis of requirements changes Management Issues Although management shortcomings inhibit the success of many projects, don t be surprised if your risk management plan doesn t list very many of these. After all, the project manager is usually the person who is writing the risk management plan, and most people don t wish to air their own weaknesses (assuming they even recognize them) in public. Nonetheless, issues like those listed here can make it harder for projects to succeed. If we don t confront such touchy issues, we shouldn t be surprised if they bite us at some point. Defined project tracking processes, and clear project roles and responsibilities, can address some of these risk factors. inadequate planning and task identification inadequate visibility into actual project status unclear project ownership and decision making unrealistic commitments made, sometimes for the wrong reasons managers or customers with unrealistic expectations staff personality conflicts
4 Know Your Enemy: Software Risk Management Page 4 Lack of Knowledge The rapid rate of change of software technologies, and the increasing shortage of skilled staff, mean our project teams may not have the skills we need to be successful. The key is to recognize the risk areas early enough so that we can take appropriate preventive actions, such as obtaining training, hiring consultants, and bringing the right people together on the project team. These factors might apply to your team: lack of training inadequate understanding of methods, tools, and techniques insufficient application domain experience new technologies or development methods ineffective, poorly documented, or ignored processes technical approaches that may not work Risk Management Approaches Risk management is the application of appropriate tools and procedures to contain risk within acceptable limits. It consists of several sub-activities. Risk assessment is the process of examining a project and identifying areas of potential risk. Risk identification can be facilitated with the help of a checklist of common risk areas for software projects, or by examining the contents of an organizational database of previously identified risks and mitigation strategies (both successful and unsuccessful).. Risk analysis involves examining how project outcomes might change with modification of risk input variables. Risk prioritization helps the project focus on its most severe risks by assessing the risk exposure. Exposure is the product of the probability of incurring a loss due to the risk and the potential magnitude of that loss. I usually estimate the probability from 0.1 (highly unlikely) to 1.0 (certain to happen), and the loss on a relative scale of 1 (no problemo) to 10 (deep tapioca). Multiplying these factors together provide an estimation of the risk exposure due to each item, which can run from 0.1 (don t give it another thought) through 10 (stand back, here it comes!). It may be easier to simply estimate both probability and impact as High, Medium, or Low. Those items having at least one dimension rated as High are the ones to worry about first. Risk avoidance is one way to deal with a risk: don t do the risky thing! You may avoid risks by not undertaking certain projects, or by relying on proven rather than cutting edge technologies when possible. Risk control is the process of managing risks to achieve the desired outcomes. Risk management planning produces a plan for dealing with each significant risk, including mitigation approaches, owners, and timelines. Risk resolution is execution of the plans for dealing with each risk. Finally, risk monitoring involves tracking your progress toward resolving each risk item. Simply identifying the risks facing your project is not enough. We need to write them down in a way that lets us communicate the nature and status of risk factors throughout the affected stakeholder community over the duration of the project. Figure 1 shows a form I have
5 Know Your Enemy: Software Risk Management Page 5 found to be convenient for documenting risks; this information can also be stored in a spreadsheet. This risk list could be included as a section in your software project plan, or it could remain as a standalone document. Figure 1. Risk Documentation Form. ID: (sequence number is fine) Description: (List each major risk facing the project. Describe each risk in the form condition consequence.) Probability: (What s the likelihood of this risk becoming a problem?) Loss: (What s the damage if the risk does become a problem?) Exposure: (Multiply Probability times Loss to estimate the risk exposure.) First Indicator: (Describe the earliest indicator or trigger condition that might indicate that the risk is turning into a problem.) Mitigation Approaches: (State one or more approaches to control, avoid, minimize, or otherwise mitigate the risk.) Owner: (Assign each risk mitigation action to an individual for resolution.) Date Due: (State a date by which the mitigation approach is to be implemented.) When documenting risk statements, use a condition-consequence format. That is, state the risk situation (condition) that you are concerned about, followed by at least one potential adverse outcome (consequence) if that risk should turn into a problem. Often, people suggesting risks may state only the condition ( the customers don t agree on the product requirements ) or the consequence ( we can only satisfy one of our major customers ). Pull those together into the condition-consequence structure: The customers don t agree on the product requirements, so we ll only be able to satisfy one of our major customers. The P, L, and E cells in the form provide locations to capture the probability of a risk materializing into a problem (P), the loss we could incur as a result of that problem (L), and the overall risk exposure (P times L). Keep the high-exposure items at the top of your priority list. You can t address every risk item, so use this prioritization mechanism to learn where to focus your risk control energy. Set goals for determining when each risk item has been satisfactorily controlled. For some items, your mitigation strategies may focus on reducing the probability, while the approach for other items may emphasize reducing the loss. The cell labeled Risk Mitigation Approaches allows you to identify the actions you intend to take to keep the risk item under control. With any luck, some of your mitigation approaches can be used to address multiple risk factors. For example, one group I ve worked with identified several risks related to failures of components of their web delivery infrastructure (servers, firewall, interface, and so on). A mitigation strategy that addressed several of those risks was to implement an automated monitoring system that could check the status of the servers and communication functions periodically and alert us to any failures. As with other project management activities, you need to get into a rhythm of periodic monitoring. You may wish to appoint a risk czar for the project, who is responsible for staying on top of the things that could go wrong, just as the project manager is staying on top of the activities leading to project completion. One company I know of assigned an individual to such a
6 Know Your Enemy: Software Risk Management Page 6 role, and dubbed him Eeyore, after the Winnie-the-Pooh character who always bemoaned how bad things could become. Keep the top ten or so risks highly visible, and track the effectiveness of your mitigation approaches regularly. As the initial list of top priority items gradually gets beaten into submission, new items may float up into the top ten. Don t kid yourself into concluding that a risk is controlled simply because the selected mitigation action has been completed. Controlling a risk may mean that you have to change your mitigation strategy if you conclude it is ineffective. You can drop the risk off your threat-detection radar when you determine that your mitigation approaches have indeed reduced the loss exposure from that item to an acceptable level. Risk Management Can Be Your Friend The skillful project manager will use risk management as a technique for raising the awareness of conditions that could cause her project to go down the tubes. Consider a project that begins with an unclear product vision and a lack of customer involvement. The astute project manager will spot this situation as posing potential risks, and will document them in the risk management plan. Early in the project s life, the impact of this situation may not be too severe. However, if time continues to pass and the lack of product vision and customer involvement are not improved, the risk exposure will steadily rise. By reviewing the risk management plan periodically, the project manager can adjust the probability and/or impact of these risks. Those that don t get controlled can be brought to the attention of senior managers or other stakeholders who are in a position to either stimulate corrective actions, or make a conscious business decision to proceed in spite of the risks. We re keeping our eyes open and making informed decisions, even if we can t control every adverse condition facing our project. Learning from the Past While we can t predict exactly which of the many threats to our projects might come to pass, most of us can do a better job of learning from previous experiences to avoid the same pain and suffering on future projects. As you begin to implement risk management approaches, keep records of your actions and results for future reference. Try these suggestions: Record the results of even informal risk assessments, to capture the thinking of the project participants. Document the mitigation strategies attempted for each risk you chose to confront, noting which approaches worked well and which did not pay off. Conduct post-project reviews to identify the unanticipated problems that arose. Should you have been able to see them coming through a better risk management approach, or would you likely have been blindsided in any case? Do you think these same problems might occur on other projects? If so, add them to your growing checklist of potential risk factors that the next project can think about. Anything you can do to improve your ability to avoid or minimize problems on future projects will improve your company s business success. Risk management can also reduce the chaos, frustration, and constant fire-fighting that reduces the quality of work life in so many software organizations. The risks are out there. Find them before they find you.
Know Your Enemy: Introduction to Risk Management1
C06625211.fm Page 77 Tuesday, July 10, 2007 9:45 AM Chapter 6 Know Your Enemy: Introduction to Risk Management1 In this chapter: What Is Risk?...........................................................78
Negative Risk. Risk Can Be Positive. The Importance of Project Risk Management
The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests t of
Problems that haven t happened yet Why is it hard? Some are wary of bearing bad news. Define a strategy early in your project
1 Problems that haven t happened yet Why is it hard? Some are wary of bearing bad news No one wants to be the messenger Or seen as a worrier Define a strategy early in your project 2 Identification, Analysis,
DESCRIBING OUR COMPETENCIES. new thinking at work
DESCRIBING OUR COMPETENCIES new thinking at work OUR COMPETENCIES - AT A GLANCE 2 PERSONAL EFFECTIVENESS Influencing Communicating Self-development Decision-making PROVIDING EXCELLENT CUSTOMER SERVICE
15 Principles of Project Management Success
15 Principles of Project Management Success Project management knowledge, tools and processes are not enough to make your project succeed. You need to get away from your desk and get your hands dirty.
Specialists in Strategic, Enterprise and Project Risk Management. PROJECT RISK MANAGEMENT METHODS Dr Stephen Grey, Associate Director
BROADLEAF CAPITAL INTERNATIONAL PTY LTD ACN 054 021 117 23 Bettowynd Road Tel: +61 2 9488 8477 Pymble Mobile: +61 419 433 184 NSW 2073 Fax: + 61 2 9488 9685 Australia www.broadleaf.com.au [email protected]
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
Appendix V Risk Management Plan Template
Appendix V Risk Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of Acronyms Definitions
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History
Is Cloud ERP Really Cheaper?
Is Cloud ERP Really Cheaper? A Simple Guide to Understanding the Differences Between Cloud and On- Premise Distribution Software This guide attempts to outline all of the principal considerations that
Lesson 1: The more things change, the more they stay the same
413 CHAPTER 15 TEN LESSONS FOR INVESTORS While the investment stories examined in this book reflect very different investment philosophies and are designed for a wide range of investors, there are some
What does this mean for the Effective Practitioner?
Change Management Key Message Change is an inevitable part of life it s how we approach, manage and learn from change initiatives that can mean success or failure over the long term. The role of a leader,
Software Risk Management
Software Risk Management Former US Deputy Assistant Secretary of the Air Force Lloyd Mosemann said: Software is so vital to military system that, without it, most could not operate at all. Its importance
Example Material Change Management
Assessing Size and Complexity of Change - Overview Complex P R O C E S S Many processes Cross functional Critical processes Significant change P E O P L E Complex Many people New way of work Different
Afro Ant Conversation. Change Management Return on Investment 3 April 2014
Afro Ant Conversation Change Management Return on Investment 3 April 2014 Overview This report documents the information gathered at the Afro Ant Conversation held on the 3 rd of April 2014 on the topic
Step by Step Project Planning
Step by Step Project Planning Contents Introduction The Planning Process 1 Create a Project Plan...1 Create a Resource Plan...1 Create a Financial Plan...1 Create a Quality Plan...2 Create a Risk Plan...2
Learning to Delegate
Learning to Delegate Overview Tips for managers on how to delegate Why is delegation necessary? Why do many managers have a hard time delegating? What to delegate What not to delegate How to delegate Give
How to Convince Your Boss it s Time HOW TO CONVINCE YOUR BOSS IT S TIME. 2013 BambooHR LLC. All Rights Reserved.
1 HOW TO CONVINCE YOUR BOSS IT S TIME IT S OFFICIAL Your company needs HR software. You know how it will simplify HR by cutting out the busywork. Because most days, you feel isolated, holed up in your
RISK MANAGEMENT AND COMPLIANCE
RISK MANAGEMENT AND COMPLIANCE Contents 1. Risk management system... 2 1.1 Legislation... 2 1.2 Guidance... 3 1.3 Risk management policy... 4 1.4 Risk management process... 4 1.5 Risk register... 8 1.6
Risk Management: Pro-active Principles for Project Success. Liz Markewicz Don Restiano
Risk Management: Pro-active Principles for Project Success Liz Markewicz Don Restiano What is a Risk According to the Defense Acquisition University: Risk is a measure of the potential inability to achieve
Extracted from Strategic Planning for Political Parties: A Practical Tool International Institute for Democracy and Electoral Assistance 2013.
Extracted from Strategic Planning for Political Parties: A Practical Tool International Institute for Democracy and Electoral Assistance 2013. International IDEA, Strömsborg, 103 34 Stockholm, Sweden Phone
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
HOW TO SOLVE DAILY LIFE PROBLEMS. The Steps to Solving Daily Life Problems
HOW TO SOLVE DAILY LIFE PROBLEMS Everyone has problems in their life. For the most part, we are able to quickly solve them without much trouble at all. We either come up with a quick solution or use a
Portfolio Management 101:
THOUGHT LEADERSHIP WHITE PAPER In partnership with Portfolio Management 101: Moving from Just Project Management to True PPM A lot of organizations claim that they carry out project & portfolio management
Small Business Checkup
Small Business Checkup How healthy is your business? www.aretehr.com TABLE OF CONTENTS The Four Keys to Business Health... 3 Management & Operations... 4 Marketing... 6 Financial & Legal... 8 Human Resources...
SOFTWARE RISK MANAGEMENT
SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team [email protected] PMB 383, 3000 Custer Road, Suite 270 Plano, TX 75075 972-867-1172 (voice) 972-943-1484 (fax) SUMMARY This paper reviews the basic
IT Project Management Methodology. Project Risk Management Guide. Version 0.3
NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA IT Project Management Methodology Project Risk Management Guide Version 0.3 Project Risk Management Support Guide version 0.3 Page 1 Version Date Author
WHY BUSINESS CONTINUITY PLANS FAIL
WHY BUSINESS CONTINUITY PLANS FAIL 12 COMMON CAUSES AND HOW TO PREVENT THEM By Keith Erwood The ProtectEr, CEO and Principal Consultant The Continuity Co., LLC All material in this report is the property
Risk Assessment Worksheet and Management Plan
Customer/Project Name: The Basics There are four steps to assessing and managing risks, and effective risk management requires all four of them. 1. Identify the risks 2. Qualify the risks a. Assess each
The business case for lowest price tendering?
The business case for lowest price tendering? Health Warning. The use of lowest price tendering may seriously damage your financial health and reputation and may have undesirable and unexpected side effects.
Lowering business costs: Mitigating risk in the software delivery lifecycle
August 2009 Lowering business costs: Mitigating risk in the software delivery Roberto Argento IBM Rational Business Development Executive Valerie Hamilton IBM Rational Solution Marketing Manager and Certified
The 2014 Bottleneck Report on Enterprise Mobile
The 2014 Bottleneck Report on Enterprise Mobile What s the big bottleneck for enterprise mobile app development this year, and how do you get past it? 1 / 32 The 2014 Bottleneck Report on Enterprise Mobile
The Battle for the Right Features or: How to Improve Product Release Decisions? 1
The Battle for the Right Features or: How to Improve Product Release Decisions? 1 Guenther Ruhe Expert Decisions Inc. [email protected] Abstract: A release is a major (new or upgraded) version of
Project Management Guidebook
METHOD 12 3 empowering managers to succeed Project Management Guidebook ISBN 0-473-10445-8 A bout this e-book This e-book was created by Method123 (see www.method123.com) to help provide you with a simple
Identifying and Managing Project Risk, Second Edition 2008 Tom Kendrick. The PERIL Database
The PERIL Database Good project management is based on experience. Fortunately, the experience and pain need not all be personal; you can also learn from the experience of others, avoiding the aggravation
OTC 12979. Managing the Cost & Schedule Risk of Offshore Development Projects Richard E. Westney Westney Project Services, Inc.
OTC 12979 Managing the Cost & Schedule Risk of Offshore Development Projects Richard E. Westney Westney Project Services, Inc. Copyright 2001, Offshore Technology Conference This paper was prepared for
Project Management Frequently Asked Questions:
Project Management Frequently Asked Questions: Risk Management Version:1.4, November 2008 Inter Agency Policy and Projects Unit Department of Premier and Cabinet What are the benefits of risk management?
Project Management. James M. Conrad
Project Management James M. Conrad Outline Introduction Motivation The Importance of Project Management Basic Skills of Project Management Exercise Recap and Discussion Project (from Wikipedia) A project
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Root Cause Analysis Concepts and Best Practices for IT Problem Managers
Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer
How To Consolidate A Service Desk
June 2005 Service Desk: Consolidation, Relocation, Status Quo Page 2 Contents Foreword So, you are going to consolidate or relocate your Service Desks 2 Foreword 3 Introduction 4 Select the transition
Choosing A Service Provider:
Choosing A Service Provider: Small businesses face many challenges every day finding good IT support is one of them. IT support can present unique challenges to business owners because many people feel
Improve Your Process With Online Good Practices 1
Improve Your Process With Online Good Practices 1 Karl Wiegers Process Impact www.processimpact.com Most software developers are allergic to paper. As organizations improve their software development and
MISTAKE #1: Too Much Detail
Twenty Common Mistakes Made by New or Inexperienced Project Managers By Harold Kerzner, Ph.D., PMP Published on Tuesday, August 17, 2010-12:49 PM You ve read the PMBOK Guide several times, taken the certification
Project management tutorial
Project management tutorial Purpose: To provide the basic skills and knowledge needed to effectively manage a group project. Importance: Project scheduling and understanding/handling risk is crucial to
Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge
1 Extreme Heritage, 2007 Australia, 19-21 July 2007, James Cook University, Cairns, Australia Theme 6: Heritage disasters and risk preparedness approach for Cultural Heritage Projects Based on Project
Best Practice. 4 Step ERP Evaluation Methodology. White Paper
Best Practice I 4 Step ERP Evaluation Methodology White Paper Introduction Typically, a company approaches ERP when its current business operations are causing it to suffer unbearable and costly pain.
Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have?
Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have? Are you unsure as to how to do this? If so, hopefully this article
Risk Management Primer
Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders
Analyzing Risks in Healthcare. February 12, 2014
Analyzing s in Healthcare February 12, 2014 1 Content What is Enterprise Management (ERM) ERM Benefits ERM Standards / ISO 31000:2009 ERM Process Register ERM Governance Model s Q&A 2 What is Enterprise
Using coping statements to avoid common thinking traps
Using coping statements to avoid common thinking traps Did you know that your thoughts affect how you see yourself and the world around you? You may look at a situation one way, even though there are many
The ITIL Guide to DevOps
Table of Contents Introduction Change Management Release & Deploy Management Incident Management 3 4 6 8 Knowledge Management 9 Conclusion 10 About the author... Alan Sharp-Paul is a Cofounder & Co- CEO
PROJECT RISK MANAGEMENT
11 PROJECT RISK MANAGEMENT Project Risk Management includes the processes concerned with identifying, analyzing, and responding to project risk. It includes maximizing the results of positive events and
White Paper. Fundamentals of Performance Testing
etri White Paper Fundamentals of Performance Testing The Increasing Need for Proper Performance Testing due to Increasing Software Complexity in the Enterprise There have been two significant changes in
Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?
Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means
NGO Self-assessment through a SWOT exercise
NGO Self-assessment through a SWOT exercise Step 1: Analyse your NGO s Capacity > page 2 Step 2: Do the SWOT Exercise > page 5 Step 3: Make a Strategic Plan > page 8 Step 4: Implement, Monitor, Evaluate
Motivations. spm - 2014 adolfo villafiorita - introduction to software project management
Risk Management Motivations When we looked at project selection we just took into account financial data In the scope management document we emphasized the importance of making our goals achievable, i.e.
Software Requirements, Third Edition
j Microsoft Software Requirements, Third Edition Karl Wiegers and Joy Beatty Contents Introduction Acknowledgments xxv xxxi PART I SOFTWARE REQUIREMENTS: WHAT, WHY, AND WHO Chapter 1 The essential software
Visit salonbooker.com or Call 1.866.966.9798
Visit salonbooker.com or Call 1.866.966.9798 What s the Top 5 all about? Welcome curious salon owners and managers! Our years of experience and passion for the beauty industry have left us knowledgeable,
Risk/Issue Management Plan
Risk/Issue Management Plan Centralized Revenue Opportunity System November 2014 Version 2.0 This page intentionally left blank Table of Contents 1. Overview... 3 1.1 Purpose... 3 1.2 Scope... 3 2. Roles
5 costly mistakes you should avoid when developing new products
5 costly mistakes you should avoid when developing new products By Paul Forsythe Managing Director at Alemare Solutions And Product Development expert with 25 years experience Hello, As you will know,
TECH. Tracking Progress. Project Schedule PHASE 1 STEP 1 ACTIVITY 1.1. Activity and Milestone STEP 1 STEP 2 : ACTIVITY 2.2 : ACTIVITY 1.
CH03 Planning and Managing the Project * Tracking Progress * Project Personnel * Effort Estimation * Risk Management * The Project Plan * Process Models and Project Management Tracking Progress Questions
A Human Resource Capacity Tool for First Nations // planning for treaty
A Human Resource Capacity Tool for First Nations // planning for treaty table of contents Introduction //...3 Tools //... 9 HR Planning Timeline... 9 Stage 1 Where are we now?...11 Stage 2 Where do we
Risk Mitigation, Monitoring and Management Plan
Risk Mitigation, Monitoring and Management Plan Introduction Scope and intent of RMMM activities The goal of the risk mitigation, monitoring and management plan is to identify as many potential risks as
Card sort analysis spreadsheet
Interaction Design Instructions for use: Card sort analysis spreadsheet June 2007 Page Card sort analysis spreadsheet About the spreadsheet I have an Excel spreadsheet that I use to analyze data from physical
Project Management. Software Projects vs. Engineering Projects
Read Chapters (a) Project Management, (b) Project Scheduling and (c) Risk Management from Pressman for this lecture. Project Management Rahul Premraj + Andreas Zeller reliability of data questioned! Software
Client Relationship Management. LIA Cork 9 th September 2008. Eanna McCloskey Wealth Options Ltd. Know your customer. Definition. Know your customer
Eanna McCloskey Wealth Options Ltd. Client Relationship Management LIA Cork 9 th September 2008 Definition Knowledge of your CUSTOMER, his/her needs, wants and motives Appreciation of the length, width
Project Risk Management
Project Risk Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Risk Management
Incorporating Risk Assessment into Project Forecasting
Incorporating Risk Assessment into Project Forecasting Author: Dione Palomino Conde Laratta, PMP Company: ICF International - USA Phone: +1 (858) 444-3969 [email protected] Subject Category: Project
Welcome to the Data Analytic Toolkit PowerPoint presentation an introduction to project management. In this presentation, we will take a brief look
Welcome to the Data Analytic Toolkit PowerPoint presentation an introduction to project management. In this presentation, we will take a brief look at project management to understand the process and some
MODULE 13 CASE MANAGEMENT
MODULE 13 CASE MANAGEMENT Module 13: Case Management Table Of Contents TABLE OF CONTENTS... II MODULE 13: CASE MANAGEMENT...... 1 BACKGROUND.. 1 Emergency needs... 2 Case management needs 2 INTRODUCTION...
Practice makes perfect Simulation games to increase the return-on-investment of ITIL training
Practice makes perfect Simulation games to increase the return-on-investment of ITIL training By Paul Wilkinson, GamingWorks * In an effort to improve the performance of IT service delivery many IT organizations
Psychic Guide 101 Written by: Jennifer A. Young www.bestonlinepsychics.net
Written by: Jennifer A. Young www.bestonlinepsychics.net Page 1 Table of Contents Chapter Title Page 01 Consulting a Psychic 03 02 Why Should You Consult a Psychic? 04 03 What Is a Psychic? 05 04 Choosing
How To Measure Quality
Introduction Metrics for Software Testing: Managing with Facts Part 4: Product Metrics In the previous article in this series, we moved from a discussion of process metrics to a discussion of how metrics
Think about how often you check your own email and find tons of messages with subject lines like this:
Writing Effective Subject Lines By now you are probably getting pretty anxious to get out there and send your first email promotion. You might even have a great idea all ready for a campaign that you re
APICS INSIGHTS AND INNOVATIONS UNCOVERING CHRONIC DISRUPTION IN SUPPLY CHAIN AND OPERATIONS MANAGEMENT
APICS INSIGHTS AND INNOVATIONS UNCOVERING CHRONIC DISRUPTION IN SUPPLY CHAIN AND OPERATIONS MANAGEMENT APICS INSIGHTS AND INNOVATIONS ABOUT THIS REPORT Sudden, acute supply chain disruptions such as those
You Must Ask Your Internet Marketing Consultant to Multiply Results
The 25 Things You Must Ask Your Internet Marketing Consultant to Multiply Results Learn the Secret Methods of Internet Success from one pioneer who cut his teeth on the internet in the mid-1990 s; and
5 Steps to Implement & Maintain PCI DSS Compliance. www.alienvault.com
5 Steps to Implement & Maintain PCI DSS Compliance www.alienvault.com 5 Steps to Implement and Maintain PCI DSS Compliance If you haven t guessed it by now, achieving and maintaining Payment Card Industry
An Introduction to Agile Performance Management
! 1 An Introduction to Agile Performance Management by Jeffrey B. Rothman, Ph.D. An Introduction to Agile This is a high level introduction to Agile -- a well known productivity framework for software
