A Taxonomy of Operational Risks
|
|
|
- Claude Adams
- 10 years ago
- Views:
Transcription
1 Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1
2 Operational Risk By its nature, the uncertainty of war invariably involves the acceptance of risk...because risk is often related to gain, leaders weigh risks against the benefits to be gained from an operation. NDP-1 (Naval Warfare) 2005 by Carnegie Mellon University 2
3 History of SEI Risk Management Risk Program Initiated Interviews focus on practice of risk management Workshops focus on needs of community and practice of risk management Appraisal Report [Kirkpatrick 92] Taxonomy Report [Carr 93] TRM Report [Higuera 94] SRE Report [Sisti 94] Draft TRM Guidebook CRM Guidebook [Dorofee 96] Early Risk Assessments focus on risk identification and analysis Software Risk Evaluations (SREs) focus on risk identification, analysis, and planning Field Tests (baseline) focus on evolution of the Software Development Taxonomy and Taxonomy-Based Questionnaire Team Risk Management (TRM) focus on customer-supplier risk management activities Continuous Risk Management (CRM) focus on continuous activities to identify, analyze, plan, track, control, and communicate risk 2005 by Carnegie Mellon University 3
4 History of SEI Risk Management NASA/SEI CRM Course Dev t Risk Program Disbanded SRE MD [Williams 99] CMMI V1.02 ASP Program Established Software Risk Evaluations (SREs) Team Risk Management (TRM) Continuous Risk Management (CRM) focus on small dev t teams Risk Identification & Analysis maintain, promote, transition document & restart focus on teaching CRM course, Guidebook maintenance focus on aligning with CMMI Risk Process Checks additional pilots, document, transition 2005 by Carnegie Mellon University 4
5 Key Aspects of Continuous Risk Management Identify Continually asking, what could go wrong? Analyze Continually asking, which risks are most critical to mitigate? Plan Developing mitigation approaches for the most critical risks Track Tracking the mitigation plan and the risk Control Making decisions based on data Communicate Ensuring a free-flow of information throughout the project 2005 by Carnegie Mellon University 5
6 SEI s Risk Taxonomy Developed in 1993 to help software-intensive system developers systematically identify risks Used with the SEI s Software Risk Evaluation process or other risk identification techniques Used as a checklist or expanded radar screen to ensure a greater number of potential risks are identified when doing ongoing risk identification 2005 by Carnegie Mellon University 6
7 Taxonomy Structure Development Risk Class Product Engineering Development Environment Program Constraints Element Engineering Development Requirements Specialties Work Process Environment Resources Externals Attribute Stability Scale Formality Product Control Schedule Facilities 2005 by Carnegie Mellon University 7
8 Development Taxonomy A. Product Engineering 1. Requirements a. Stability b. Completeness c. Clarity d. Validity e. Feasibility f. Precedent g. Scale 2. Design a. Functionality b. Difficulty c. Interfaces d. Performance e. Testability f. Hardware Constraints g. Non-Developmental Software 3. Code and Unit Test a. Feasibility b. Testing c. Coding/Implementation 4. Integration and Test a. Environment b. Product c. System 5. Engineering Specialties a. Maintainability b. Reliability c. Safety d. Security e. Human Factors f. Specifications B. Development Environment 1. Development Process a. Formality b. Suitability c. Process Control d. Familiarity e. Product Control 2. Development System a. Capacity b. Suitability c. Usability d. Familiarity e. Reliability f. System Support g. Deliverability 3. Management Process a. Planning b. Project Organization c. Management Experience d. Program Interfaces 4. Management Methods a. Monitoring b. Personnel Management c. Quality Assurance d. Configuration Management 5. Work Environment a. Quality Attitude b. Cooperation c. Communication d. Morale C. Program Constraints 1. Resources a. Schedule b. Staff c. Budget d. Facilities 2. Contract a. Type of Contract b. Restrictions c. Dependencies 3. Program Interfaces a. Customer b. Associate Contractors c. Subcontractors d. Prime Contractor e. Corporate Management f. Vendors g. Politics 2005 by Carnegie Mellon University 8
9 Operational Organizations An Operational organization is any group of individuals teamed together to carry out a mission. Operational organizations consists of mission elements or teams that carry out mission requirements or subsets of requirements. Requirements could come from external customers or from internal sources by Carnegie Mellon University 9
10 Examples Examples of Operational organizations: - military units - educational institutions - health care facilities - fire and police units - non-profit organizations 2005 by Carnegie Mellon University 10
11 Task Defined Operational organizations perform tasks to satisfy mission requirements. Mission-essential tasks: A mission-essential task is any task that directly accomplishes mission requirements. examples: flight operations, satellite control, mission management, etc. Mission-support tasks: A mission-support task is any task that supports the accomplishment of mission requirements. examples: spares replenishment, mission planning, new employee orientation, etc by Carnegie Mellon University 11
12 Identifying Operational Risks When identifying risks in an operational environment, the Development Taxonomy doesn t work well Operational personnel don t do development per se Operational personnel don t feel comfortable with the definitions in the original Taxonomy Operational personnel need systematic tools to help identify mission-related risks 2005 by Carnegie Mellon University 12
13 Constructing an Operational Taxonomy Operational Risk Class Mission Work Processes Constraints Element Tasking Operational Operational Systems Work Process Environment Resources Interfaces Attribute Stability Timeliness Formality Product Control Schedule Tools 2005 by Carnegie Mellon University 13
14 Taxonomy of Operational Risks A. Mission B. Work Processes C. Constraints 1. Tasking, Orders and Plans a. Stability b. Completeness c. Clarity d. Validity e. Feasibility f. Precedent g. Timeliness 2. Mission Execution a. Efficiency b. Effectiveness c. Complexity d. Timeliness e. Safety 3. Product a. Usability b. Effectiveness c. Timeliness d. Accuracy e. Correctness 4. Operational Systems a. Throughput b. Suitability c. Usability d. Familiarity e. Reliability f. Security g. Inventory h. Installations i. System Support 1. Operational Processes a. Formality b. Suitability c. Process Control d. Familiarity e. Product Quality 2. Maintenance Processes a. Formality b. Suitability c. Process Control d. Familiarity e. Service Quality 3. Management Process a. Planning b. Organization c. Management Experience d. Program Interfaces 4. Management Methods a. Monitoring b. Personnel Management c. Quality Assurance d. Configuration Management 5. Work Environment a. Quality Attitude b. Cooperation c. Communication d. Morale 1. Resources a. Schedule b. Staff c. Budget d. Facilities e. Tools 2. Policies a. Laws and Regulations b. Restrictions c. Contractual Constraints 3. Program Interfaces a. Customers/User Community b. Associate Agencies c. Contractors d. Senior Leadership e. Vendors f. Politics by Carnegie Mellon University
15 Example Class/Element/Attribute: Mission A. Mission In an operational environment, a mission is considered to be the primary reason for the existence of the operational organization. The mission consists of a set of defined tasks that produce a product or service for a customer. The mission could be defense intelligence operations, banking, retail sales, manufacturing, or a variety of other missions, including those performed by civil agencies. The elements of the Mission class of operational risks cover traditional aspects of the mission, including planning, execution, and the products and services provided. Mission elements include attributes of the operational systems and the organizations that operate those systems. 1. Tasking, Orders, and Plans The Tasking, Orders, and Plans element contains attributes that are used to characterize aspects of the information contained in the tasks, orders, and plans of an operational organization. These attributes also describe the ability of an operational system and the organization that operates it to respond to requests. The following attributes characterize the Tasking, Orders, and Plans element. a. Stability The Stability attribute refers to the frequency with which tasks, orders, or plans change and the effect this has on the operational organization. It can also refer to the organizations that submit tasks or orders to an organization for execution. This attribute also addresses the flexibility of the operational entity in responding to changing tasks, orders, and plans and to handling multiple sources of tasks, orders, and plans by Carnegie Mellon University 15
16 A Short Taxonomy-based Questionnaire A. Mission Consider risks to the operation that can arise because of the nature of the mission that your organization is trying to accomplish. Tasking, Orders, and Plans Question: Are there risks that could arise from the way the mission is tasked, orders are provided, or operational plans developed? Examples: a. Stability b. Completeness c. Clarity d. Validity e. Feasibility f. Precedent g. Timeliness 2005 by Carnegie Mellon University 16
17 Using the Taxonomy of Operational Risks The Taxonomy can be used: - to establish a baseline set of operational risks - to perform ongoing operational risk identification - to help identify weaknesses in current operational capabilities and to help establish new statements of operational need - when working with acquisition or development organizations to identify the operational risks associated with accepting new systems into operational use - to participate with acquisition or development organizations using Team Risk Management techniques 2005 by Carnegie Mellon University 17
18 Example: System Acceptance Risks Context: A military unit is responsible for operating satellite systems. An acquisition organization is acquiring a replacement system to consolidate operations at one location and upgrade the hardware and software to prepare for future acceptance of new satellite systems. The program was late, and tension between the operators, the acquirers, and the developers was high. The SEI participated in a risk assessment using the SRE process and the Taxonomy of Operational Risks at the operational facility to help identify risks of accepting the new system and to uncover any root causes of the program delays. During the two-day risk identification and analysis activities, stakeholders from the operational squadron, operational test personnel, Contractor Logistics Support (CLS), and site management wrote seventy (70) risk statements over the course of four interview sessions by Carnegie Mellon University 18
19 The Risk Statement A standard format for risk statements provides: clarity consistency a basis for future risk processing Source Condition Consequence Context Risk Statement A good Risk Statement is fact-based actionable brief 2005 by Carnegie Mellon University 19
20 Example Risk Statements ORD does not levy requirements at the level of capability of legacy systems; system will be less capable, loss is visible at general officer level Loss of key technical experts (significant attribution); loss of continuity Positive "spin" put on info going up the chain; expectation mismatch Roles and responsibilities not defined under this implementation of TSPR. (Insight vs. Oversight); Confusion, delays, who's responsible, who's leading There is no official program schedule; Can't plan. Can't determine when to move personnel (out-year O&M and personnel costs) Test resources at the factory are currently insufficient; Late discovery of problems Training suite is sub-optimal, does not meet expectations or requirements, cannot perform integrated crew training; Will force training and evaluation on OPS floor 2005 by Carnegie Mellon University 20
21 Risk Areas Identified Results of Buckley SBIRS Risk Identification and Analysis Total Risk Statements SRE Team Top Risks P articipants Top Ris ks No. of Risk Statements Requirements Management People, Resources & Leadership Supression of Information Schedule Pressure and Veracity Testing Operability Reliability / Dependibility Funding 2005 by Carnegie Mellon University 21
22 Hierarchical Inter-relationship Digraph Schedule Pressure and Veracity Legend High Medium Suppression of Information Requirements Management Low Facility Funding People, Resources and Leadership Testing Operability Reliability and Dependability 2005 by Carnegie Mellon University 22
23 Outcome Risk assessments were also done at the developer s location using the development taxonomy and at acquirer s location using the SA-CMM as a taxonomy to get their unique perspectives With all three perspectives, the team was able to make informed recommendations back to the PEO Program was restructured 2005 by Carnegie Mellon University 23
24 Team Risk Management Team Risk Management (TRM) builds on healthy and active risk practices within diverse organizations, or organizational entities, teamed together for a common purpose. TRM works to aid decision making in supplier-acquirer relationships. Adding the end-user, or operator, TRM is the ideal method of managing risk during new system development by Carnegie Mellon University 24
25 TRM Vision Acquirer Commitment RQMTS, $, Direction TRM Operational Need, Advocacy Predictable Performance Operational Insight Developer Enhanced Capability Operator 2005 by Carnegie Mellon University 25
26 Conclusions New systems or capabilities delivered to operational forces should mitigate operational risk. Using a structured Taxonomy to help identify operational risk increases the likelihood of delivering usable systems or capabilities into operational use by Carnegie Mellon University 26
27 Contact Information Brian Gallagher Director, Acquisition Support Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA by Carnegie Mellon University 27
28 References A Taxonomy of Operational Risks (CMU/SEI-2005-TN-36). Gallagher, Brian P.; Case, Pamela J.; Creel, Rita C.; Kushner, Susan; Williams, Ray C. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Taxonomy-Based Risk Identification (CMU/SEI-93-TR-006, ADA266992). Carr, Marvin J.; Konda, Surish L.; Monarch, Ira; Ulrich, F. Carol; & Walker, Clay F. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Continuous Risk Management Guidebook. Murphy, Richard L.; Alberts, Christopher J.; Williams, Ray C.;Higuera, Ronald P.; Dorofee, Audrey J.; Walker Julie A. Pittsburgh, PA: Carnegie Mellon University, Software Risk Evaluation (SRE) Method Description (Version 2.0) (CMU/SEI- 99-TR-029, ADA001008). Williams, Ray C.; Pandelios, George J.; & Behrens, Sandra G. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, by Carnegie Mellon University 28
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
Improving Systems Engineering through Operational Risk Management
Improving Systems Engineering through Operational Risk Management Brian Gallagher SVP, Operational Excellence CACI, Inc. Dr. Ken Nidiffer Dir. of Strategic Plans for Government Programs Carnegie Mellon
CMMI Version 1.2. SCAMPI SM A Appraisal Method Changes
Pittsburgh, PA 15213-3890 CMMI Version 1.2 SCAMPI SM A Appraisal Method Changes SM CMM Integration, IDEAL, and SCAMPI are service marks of Carnegie Mellon University. Capability Maturity Model, Capability
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
Software Risk Management A Practical Guide. February, 2000
Department of Energy Quality Managers Software Quality Assurance Subcommittee Reference Document - 1999 Software Risk Management A Practical Guide February, 2000 Abstract This document is a practical guide
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
Use a Risk Breakdown Structure (RBS) to Understand Your Risks
Use a Risk Breakdown Structure (RBS) to Understand Your Risks David Hillson, PhD, PMP, FAPM, MIRM, MCMI, Director of Consultancy, Management Professional Solutions Limited Introducing the Risk Breakdown
Steve Masters (SEI) SEPG North America March 2011. 2011 Carnegie Mellon University
Using Organizational Business Objectives to Guide a Process Improvement Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 (SEI) SEPG North America March 2011 Agenda
Introduction to the CMMI Acquisition Module (CMMI-AM)
Pittsburgh, PA 15213-3890 Introduction to the CMMI Acquisition Module (CMMI-AM) Module 2: CMMI-AM and Project Management SM CMM Integration, IDEAL, and SCAMPI are service marks of Carnegie Mellon University.
Taxonomy-Based Risk Identification
Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183 Taxonomy-Based Risk Identification Marvin J. Carr Suresh L. Konda Ira Monarch F. Carol Ulrich Clay F. Walker June 1993 Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
SOFTWARE RISK MANAGEMENT
SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team [email protected] PMB 383, 3000 Custer Road, Suite 270 Plano, TX 75075 972-867-1172 (voice) 972-943-1484 (fax) SUMMARY This paper reviews the basic
Software Process Improvement CMM
Software Process Improvement CMM Marcello Visconti Departamento de Informática Universidad Técnica Federico Santa María Valparaíso, Chile Software Engineering Institute Founded by the Department of Defense
Capability Maturity Model Integrated (CMMI)
When the Outcome Matters Capability Maturity Model Integrated (CMMI) Configuration Management Considerations Gerard Dache [email protected] 703-560-9477 Agenda SEI Overview Capability Maturity Models
The Capability Maturity Model for Software, Version 1.1
The Capability Maturity Model for Software, Version 1.1 Mark C. Paulk xxx 1998 Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense. 1997 by Carnegie Mellon
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
Using CMMI Effectively for Small Business Panel
Using CMMI Effectively for Small Business Panel (With interactive discussion from panel and audience recorded in slides) NDIA CMMI Working Group NDIA Systems Engineering Division 2010 CMMI Technology Conference
Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain
GSAW 2004 Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain Richard J. Adams and Suellen Eslinger Software Acquisition and Process Office
EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant
The Integrated CMMI-based Improvement Framework for Test and Evaluation Jeffrey L. Dutton Principal Consultant Engineering and Services Performance Improvement LLC 22 Copyrights and Service Marks CMMI
IA Metrics Why And How To Measure Goodness Of Information Assurance
IA Metrics Why And How To Measure Goodness Of Information Assurance Nadya I. Bartol PSM Users Group Conference July 2005 Agenda! IA Metrics Overview! ISO/IEC 21827 (SSE-CMM) Overview! Applying IA metrics
Scheduling Process Maturity Level Self Assessment Questionnaire
Scheduling Process Maturity Level Self Assessment Questionnaire Process improvement usually begins with an analysis of the current state. The purpose of this document is to provide a means to undertake
A Report on The Capability Maturity Model
A Report on The Capability Maturity Model Hakan Bayraksan hxb07u 29 November 2009 G53QAT Table of Contents Introduction...2 The evolution of CMMI...3 CMM... 3 CMMI... 3 The definition of CMMI... 4 Level
Introduction to the ITS Project Management Methodology
Introduction to the ITS Project Management Methodology In September 1999 the Joint Legislative Committee on Performance Evaluation and Expenditure Review (PEER) produced a report entitled Major Computer
ReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
Capability Maturity Model Integration (CMMI ) Version 1.2 Overview
Capability Maturity Model Integration (CMMI ) Version 1.2 Overview SM CMM Integration, IDEAL, Personal Software Process, PSP, SCAMPI, SCAMPI Lead Appraiser, Team Software Process, and TSP are service marks
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
Project success depends on
Project success depends on many factors both within and outside the control of the project team. One of the aspects that is within the control of the project team is the planning. Almost everything we
Business Analyst Work Plan. Presented by: Billie Johnson, CBAP CSM
Business Analyst Work Plan Presented by: Billie Johnson, CBAP CSM Agenda Topic Introduction Overview of a Business Analysis Work Plan Initiating a Business Analysis Effort Components of the Business Analysis
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
Teaching Continuous Risk Management Using A Requirements Management Tool
Teaching Continuous Risk Management Using A Requirements Management Tool James C. Helm, Ph.D., P. E. University of Houston-Clear Lake Delta 123 2700 Bay Area Blvd. Houston, TX 77058 [email protected] Phone
Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03
Software Acquisition Capability Maturity Model (SA-CMM ) Version 1.03 Editors: Jack Cooper Matthew Fisher March 2002 TECHNICAL REPORT CMU/SEI-2002-TR-010 ESC-TR-2002-010 Pittsburgh, PA 15213-3890 Software
A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools
A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools Bobby Hartway AEgis Technologies Group 631 Discovery Drive Huntsville, AL 35806 256-922-0802 [email protected]
Advanced Risk Analysis for High-Performing Organizations
Pittsburgh, PA 15213-3890 Advanced Risk Analysis for High-Performing Organizations Christopher Alberts Audrey Dorofee Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University page
SW Process Improvement and CMMI. Dr. Kanchit Malaivongs Authorized SCAMPI Lead Appraisor Authorized CMMI Instructor
SW Process Improvement and CMMI Dr. Kanchit Malaivongs Authorized SCAMPI Lead Appraisor Authorized CMMI Instructor Topics of Presentation Why improvement? What is CMMI? Process Areas and Practices in CMMI
Software Quality Subcontractor Survey Questionnaire INSTRUCTIONS FOR PURCHASE ORDER ATTACHMENT Q-201
PURCHASE ORDER ATTACHMENT Q-201A Software Quality Subcontractor Survey Questionnaire INSTRUCTIONS FOR PURCHASE ORDER ATTACHMENT Q-201 1. A qualified employee shall be selected by the Software Quality Manager
Applying CMMI SM In Information Technology Organizations SEPG 2003
Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University
APPENDIX 3 TO SCHEDULE 8.1
APPENDIX 3 TO SCHEDULE 8.1 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT 1.0 Transition Services and Affected Employees The highest priority in the design of Northrop Grumman s transition plan is to transfer
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Draft Document STATE OF MICHIGAN. SACWIS Planning Department of Human Services Strategic Implementation Plan: Project Staffing
STATE OF MICHIGAN SACWIS Planning Department of Human Services Strategic Implementation Plan: Project Staffing Executive Summary The State of Michigan has dedicated integrated team of resources for the
The Systems Security Engineering Capability Maturity Model (SSE-CMM)
The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development [email protected] 410-309-1780 Topics Why define security engineering
Accounting System. Page 1 of 9
Page 1 of 9 Accounting System In support of program management and Earned Value Management, the accounting system must be able to relate costs incurred to work accomplished. Not all accounting systems
5.2 A Software Process Improvement Solution for Small and Medium-Size Enterprises
5.2 A Software Process Improvement Solution for Small and Medium-Size Enterprises Authors Jose A. Calvo-Manzano, Gonzalo Cuevas Agustin, Ivan Garcia Pacheco, Tomas San Feliu Gilabert, and Ariel Serrano
The Software Engineering. Today and in the Future. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213
The Software Engineering Institute t (SEI): Today and in the Future Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Paul D. Nielsen 1 May 2008 Software Engineering Institute
[project.headway] Integrating Project HEADWAY And CMMI
[project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper
Technical Report CMU/SEI-88-TR-024 ESD-TR-88-025
Technical Report CMU/SEI-88-TR-024 ESD-TR-88-025 System Specification Document: Shipboard Inertial Navigation System Simulator and External Computer B. Craig Meyers Nelson H. Weiderman October 1988 Technical
Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk
Risk Lecture 5, Part 1: Risk Jennifer Campbell CSC340 - Winter 2007 The possibility of suffering loss Risk involves uncertainty and loss: Uncertainty: The degree of certainty about whether the risk will
A Framework for Categorizing Key Drivers of Risk
A Framework for Categorizing Key Drivers of Risk Christopher J. Alberts Audrey J. Dorofee April 2009 TECHNICAL REPORT CMU/SEI-2009-TR-007 ESC-TR-2009-007 Acquisition Support Program Unlimited distribution
Overview of the System Engineering Process. Prepared by
Overview of the System Engineering Process Prepared by Ed Ryen, PE Maintenance ITS March 2008 Introduction This document provides a high level look at the Systems Engineering Process for ITS projects.
PHASE 3: PLANNING PHASE
PHASE 3: PLANNING PHASE The Planning Phase focuses principally on required project planning work. Proper comprehensive project planning is essential to a successful IT project, and incomplete project planning
Capability Maturity Model Integration (CMMI SM ) Fundamentals
Capability Maturity Model Integration (CMMI SM ) Fundamentals Capability Maturity Model Integration and CMMI are are service marks of Carnegie Mellon University 2008, GRafP Technologies inc. 1 What is
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director
Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology.......... June 2010 Ron Huston Director Message from the State Enterprise Portfolio Project
Capability Maturity Model Integration (CMMI ) Overview
Pittsburgh, PA 15213-3890 Capability Maturity Model Integration ( ) Overview SM CMM Integration, SCAMPI, SCAMPI Lead Appraiser, and SEI are service marks of Carnegie Mellon University., Capability Maturity
Identification and Assessment of Software Project s Risk
3 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 7 Identification and Assessment of Software Project s Risk Prof (Dr) P K Suri 1, Manoj Wadhwa 1 Professor, Dept
Program Management Toolkit Concept and Contents
Program Management Toolkit Concept and Contents Audrey Taub Charlene McMahon 15 Feb 2001 Organization: W063 Project: 01CCG100 Purpose of PM Toolkit The purpose of the this Toolkit is to provide convenient
Developing CMMI in IT Projects with Considering other Development Models
Developing CMMI in IT Projects with Considering other Development Models Anahita Ahmadi* MSc in Socio Economic Systems Engineering Organizational Process Development Engineer, International Systems Engineering
Report No. DoDIG-2012-081 April 27, 2012. Navy Organic Airborne and Surface Influence Sweep Program Needs Defense Contract Management Agency Support
Report No. DoDIG-2012-081 April 27, 2012 Navy Organic Airborne and Surface Influence Sweep Program Needs Defense Contract Management Agency Support Additional Copies To obtain additional copies of this
Information Asset Profiling
Information Asset Profiling Author James F. Stevens Principal Contributors Richard A. Caralli Bradford J. Willke June 2005 Networked Systems Survivability Program Unlimited distribution subject to the
Risk Management Adoption Framework for Software Projects: A Case Study for Kenyan Software Project Managers and Developers
www.ijcsi.org 365 Risk Management Adoption Framework for Software Projects: A Case Study for Kenyan Software Project Managers and Developers Noela Jemutai Kipyegen 1, Waweru Mwangi 2 and Stephen Kimani
Leveraging CMMI framework for Engineering Services
Leveraging CMMI framework for Engineering Services Regu Ayyaswamy, Mala Murugappan Tata Consultancy Services Ltd. Introduction In response to Global market demand, several OEMs adopt Global Engineering
Sound Transit Internal Audit Report - No. 2014-3
Sound Transit Internal Audit Report - No. 2014-3 IT Project Management Report Date: Dec. 26, 2014 Table of Contents Page Background 2 Audit Approach and Methodology 2 Summary of Results 4 Findings & Management
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example
Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example Mary Anne Herndon, SAIC Robert Moore, SAIC Mike Phillips, Software
Building CSIRT Capabilities
Building CSIRT Capabilities CERT CSIRT Development Team CERT Training and Education Center CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2005 by Carnegie Mellon
Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group
Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group Background Started in 1817, Bank of Montreal - BMO Financial Group (NYSE, TSX: BMO) is a highly diversified financial services
Concept of Operations for the Capability Maturity Model Integration (CMMI SM )
Concept of Operations for the Capability Maturity Model Integration (CMMI SM ) August 11, 1999 Contents: Introduction CMMI Overview Concept for Operational Use of the CMMI Migration to CMMI Models Concept
Using the Agile Methodology to Mitigate the Risks of Highly Adaptive Projects
Transdyne Corporation CMMI Implementations in Small & Medium Organizations Using the Agile Methodology to Mitigate the Risks of Highly Adaptive Projects Dana Roberson Quality Software Engineer NNSA Service
PHASE 3: PLANNING PHASE
PHASE 3: PLANNING PHASE The ning Phase focuses principally on required project planning work. Proper comprehensive project planning is essential to a successful IT project, and incomplete project planning
CDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
NEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
Process In Execution Review (PIER) and the SCAMPI B Method
Process In Execution Review (PIER) and the SCAMPI B Method Lorraine Adams, SEI Lynda Rosa, MITRE Fred Schenker, SEI Dale Swanson, MITRE November 17, 2005 Sponsored by the U.S. Department of Defense SM
Program Management Professional (PgMP) Examination Content Outline
Program Management Professional (PgMP) Examination Content Outline Project Management Institute Program Management Professional (PgMP ) Examination Content Outline April 2011 Published by: Project Management
Project Zeus. Risk Management Plan
Project Zeus Risk Management Plan 1 Baselined: 5/7/1998 Last Modified: N/A Owner: David Jones/Zeus Project Manager Page Section 1. Introduction 3 1.1 Assumptions, Constraints, and Policies 3 1.2 Related
