SlideShare una empresa de Scribd logo
1 de 29
NAVIGATING THE RISKS IN IMPLEMENTING HYBRID

     CLOUD, AGILE AND PROJECT MANAGEMENT

                              METHODOLOGY
                           ROB LIVINGSTONE

                           Principal, Rob Livingstone Advisory Pty Limited

                           Fellow, University of Technology, Sydney
Agenda
 • Has business lost patience with Enterprise IT?
 • Systemic vs. Technical risk.
 • Aligning ‘best practice’ methodologies and
   technologies using ‘agile’
 • Along comes Cloud ……
 • Orchestrating the transition - 5 Pointers
Has business lost patience with Enterprise IT?
"Despite an abundance of IT Project Management
(ITPM) resources, such as the PMI Body of
Knowledge, IT standards and governance, a large
percentage of IT projects continue to fail and ultimately
get scrapped. Recent studies have shown an average
of 66% IT project failure rate, with 52% of the projects
being cancelled, and 82% being delivered late"
Kraft (2008). The Importance of Business Process Alignment for IT Project Management of Commercial
Software with Case Studies. Journal of Information Systems Applied Research, 1 (3)
Has business lost patience with Enterprise IT?
  The answer has to be ‘Yes’
  • Forces actively shaping the transformation of enterprise IT
  • Other than the failure rate of enterprise IT projects….
        • The need to ‘simplify IT’ in the eyes of the users, plus
        • The ‘need for speed’ , plus
        • The need to cut costs….
        ….Makes cloud particularly appealing compared to internal IT
  • This can trump appropriate risk, total cost, project management
    governance in organisations aggressively shifting to the Cloud
  • Where does that put the individual disciplines and conventional
    methodologies associated with application development, project and risk
    management?
  • The pressure on enterprise IT is mounting!
Systemic vs. Technical Risk
  Systemic Risks
  • Systemic risks are those with the greatest potential impact as they affect
     the entire system (ie: Organisation, government, country, world…)
  • How is that the finance industry, which is one of the more regulated, and
     invests heavily in risk identification, mitigation and transference could be
     the cause of the current global financial problems?
  • Systemic risk for the enterprise is the silent killer and is often the hardest
     to identify as only a few have a complete, transparent and objective
     overview of the overall enterprise.
  • Mitigation through approaches such as Enterprise Risk Management
     (ERM), origins in fraud, organisational governance, etc – Applicability to
     IT is evolving, however
Systemic vs. Technical Risk
 Technical (or functional) Risk
 • Identifying, categorising and ranking technical and functional risks is core
    to conventional IT risk assessment approaches:
      o Risk of a specific event = (Impact x Probability of that event
         occurring) + Risk Adjustment
 • Underpins conventional risk certification frameworks e.g. ISO 2700X
 • Certification does not necessarily equal security or effectiveness of your
    risk management model
 • Often focusing on the diverse range of technical risks, does not account
    for the interaction between risks.
 • Systemic risks are often more significant than the sum of the individual
    risks
Aligning ‘best practice’ methodologies and technologies
using ‘agile’
   The focus is on agile

   1.   What is agile?
   2.   Core values
   3.   Why agile?
   4.   Agile in application development
   5.   Agile in Project Management
   6.   Agile in Risk management
Aligning ‘best practice’ methodologies and technologies
using ‘agile’
   1. What is agile?
   Agile is about people, collaboration, working culture

   2. Core values
       Value Individuals and interactions over processes and tools
   Value Working software over comprehensive documentation
   Value Customer collaboration over contract negotiation
   Value Responding to change over following a plan
   Agile manifesto - Published in 2001, a one-sentence narrative, four core values, and 12 principles
   www.agilemanifesto.org
Aligning ‘best practice’ methodologies and technologies
using ‘agile’
   3. Why agile?


   'It is not necessary to change. Survival is not
         mandatory'

   - W. Edwards Deming
                                                     William Edwards Deming
                                                     (1900 – 1993)
Aligning ‘best practice’ methodologies and technologies
    using ‘agile’
           3. Why agile?
                         • Agile has its roots in postwar Japan, and was embodied
                           in the concept of Kaizen, or ‘continuous improvement’.
                         • The father of agile was William Edwards Deming, who
                           had a rather unique approach to that elusive attribute of
                           quality

William Edwards Deming
(1900 – 1993)
Aligning ‘best practice’ methodologies and technologies
    using ‘agile’
           3. Why agile?
                         Kaizen has spawned a vast array of methodologies
                         • ‘Lean’
                         • JIT - Just in Time [manufacturing]
                         • BPR - Business process reengineering
                         • Agile (commonly refers to software development)
                         • Six Sigma
William Edwards Deming   • Value stream mapping
(1900 – 1993)
                         … and many others
Aligning ‘best practice’ methodologies and technologies
using ‘agile’
   4. Agile in application development
   •   Alternative to the ‘waterfall’ development methodology
   •   Agile variants include Scrum, Adaptive Software
       Development, eXtreme Programming (XP), Dynamic Systems
       Development, and Feature Driven Development
   •   Most commonly deployed version of ‘agile’ is in software
       development
Aligning ‘best practice’ methodologies and technologies
     using ‘agile’
         5. Agile in Project Management



                                  Vs.




One-size-fits-all approach (PMBOK, PRINCE2)   Agile
Aligning ‘best practice’ methodologies and technologies
     using ‘agile’
         5




     Changes in master            Vs.         Changes in project
     project plan are                         plan seen as
     seen as ‘negative’ -                     ‘opportunities’ –
     Discouraged                              Inherent



One-size-fits-all approach (PMBOK, PRINCE2)            Agile
Aligning ‘best practice’ methodologies and technologies
using ‘agile’
   5. Agile in Project Management
  Based on two important concepts.
  1. Minimising risk by working on short iterations of clearly
     defined deliverables.
  2. Direct communication between players in the
     development process is the default. (ie: Not exhaustive
     project documentation).

  Rationale: Project team can rapidly adapt to the volatility
    in changing requirements or environment
Aligning ‘best practice’ methodologies and technologies
using ‘agile’
      6. Agile in Risk Management
  •    Time horizon misalignments:
        o Agile is based on short time cycles
        o Conventional Risk Management: Time to identify, plan
           mitigation and implement Risk management over a
           comparatively long timeframe
  •    Categorisation of risks as part of the conventional Risk
       Management process not helpful in identifying the
       enterprise-wide systemic risks
Along comes Cloud….

  Hybrid will be the dominant form in the enterprise
  “Within five years, it will be primarily deployed by enterprises
  working in a hybrid mode”. - Gartner



  Gartner "Predicts 2012: Cloud Computing Is Becoming a Reality”
  (Published: 8 December 2011 ID:G00226103)
Along comes Cloud….
   …. And with the Hybrid Cloud comes complexity….




Managing this ecosystem is not simple
Along comes Cloud….
   …. And with the Hybrid Cloud comes complexity….


                                V1.2       V2.3.1


             V2.4
                         V3.5
                                                    V5.3



Orchestrating versioning, change control and rollback
Along comes Cloud….
   …. And with the Hybrid Cloud comes complexity….


                           4 Years      6 Months


             1 Year
                       3.5 Years
                                             4.5 years



Life expectancy
Along comes Cloud….
   …. And with the Hybrid Cloud comes complexity….
                              Also:
                              • Business Continuity
                              • Security
                              • Identity Management
                              • Due diligence
                              • Forensics
                              • BYOD
                              • Mobility
                              • Legislative / Jurisdictional
                              • Contractual complexity
                              ….. To name but a few
Orchestrating the Transition

   •   Agile* is the expectation of enterprise IT by the business
       irrespective whether facilitated by Cloud or not.
   •   Business and environmental volatility and uncertainty
       shortens investment cycles, and drives a focus on fast ROI

   What can senior executives do to ensure they can meet the perfect
     storm of enterprise IT ?


   * The sentiment, not the methodology
Orchestrating the Transition
  Consider these 5 pointers:
Orchestrating the Transition
   #1: Adopt an integrated approach to function specific
       methodologies
   • Standardised, traditional methodologies within specific
       disciplines such as Project Management, agile and information
       security, in and of themselves, are self limiting.
   • Each discipline is only really effective when applied in a
       coordinated orchestration with the other key moving parts of the
       organisation

      Harmonization of functionally specific methodologies unleashes
       value and eliminates waste
Orchestrating the Transition
   #2: Manage the conflicting messages
   • 24% of CEOs surveyed in the 2012 PWC CEO Survey expect
       ‘major change’.
   • The eighth annual KPMG 2012 Audit Institute Report identified
       “IT Risk and Emerging Technologies” as the second-highest
       concern for audit committees, which is unprecedented in the
       history of the report.
   • Cloud evangelists see cloud as imperative, others not

      Develop an effective mechanism for interpreting these messages
       in the context of your business
Orchestrating the Transition
  #3: Actively identify, embrace and managing shadow IT

  “Shadow IT can create risks of data loss, corruption or misuse, and
     risks of inefficient and disconnected processes and information”
     – Gartner*

       Embrace shadow IT, and define what and what is not eligible to
        be considered enterprise IT
  *CIO New Year's Resolutions, 2012 ID:G00227785)
Orchestrating the Transition

   #4: Identify systemic risks across the organisation

   •   Systemic risks can kill your business

      Ensure your executives and key decision makers are aware of
       long term, systemic risks
      Consider implementing Enterprise Risk Management (ERM)
Orchestrating the Transition

   #5: Don’t gloss over complexity
   • Senior managers with functional responsibility over specific
       vertical silos of the organisation may underestimate the overall
       complexity of their own business as a whole.
   • From a functional perspective, specific methodologies exist to
       support specific activities.

      Don’t believe that simple IT solutions can paper over underlying
       business complexity. Test assumptions if critical.
Thankyou

      ROB LIVINGSTONE
      Principal, Rob Livingstone Advisory Pty Limited
      Fellow, University of Technology, Sydney

      W1:               www.rob-livingstone.com
      E:                rob@rob-livingstone.com
      P:                +61 2 8005 1972
      tw:               @rladvisory

© All rights reserved. Rob Livingstone Advisory Pty Ltd. Unauthorized redistribution prohibited without prior approval. ‘Navigating
through the Cloud’ is a Trademark of Rob Livingstone Advisory Pty Ltd.

Más contenido relacionado

La actualidad más candente

Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Livingstone Advisory
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Cloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorCloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorLivingstone Advisory
 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Livingstone Advisory
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the gameLivingstone Advisory
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Livingstone Advisory
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesLivingstone Advisory
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...Livingstone Advisory
 
Influence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITInfluence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITLivingstone Advisory
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...Health Level Seven
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructureAccenture
 
New Rules for the New IT
New Rules for the New ITNew Rules for the New IT
New Rules for the New ITNick Giglia
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19Katy Slemon
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010Tim Willoughby
 
CIO Advisory Services Guide | White Paper from Brittenford Systems
CIO Advisory Services Guide | White Paper from Brittenford SystemsCIO Advisory Services Guide | White Paper from Brittenford Systems
CIO Advisory Services Guide | White Paper from Brittenford SystemsBrittenford Systems
 
Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Global Business Events
 

La actualidad más candente (20)

Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Cloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorCloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance Director
 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the game
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
 
Influence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITInfluence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in IT
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
 
Guide to design_global_infrastructure
Guide to design_global_infrastructureGuide to design_global_infrastructure
Guide to design_global_infrastructure
 
New Rules for the New IT
New Rules for the New ITNew Rules for the New IT
New Rules for the New IT
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
 
CIO Advisory Services Guide | White Paper from Brittenford Systems
CIO Advisory Services Guide | White Paper from Brittenford SystemsCIO Advisory Services Guide | White Paper from Brittenford Systems
CIO Advisory Services Guide | White Paper from Brittenford Systems
 
Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...
 

Destacado

Exposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingExposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingLivingstone Advisory
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
 
Build a Brand From scratch
Build a Brand From scratchBuild a Brand From scratch
Build a Brand From scratchEthan Chazin MBA
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Livingstone Advisory
 
20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of ResilienceAlbert van der Kooij
 
Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Ethan Chazin MBA
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
 
Consumer behavior week4_attributes
Consumer behavior week4_attributesConsumer behavior week4_attributes
Consumer behavior week4_attributesEthan Chazin MBA
 
Consumer behavior week2_valuesculture
Consumer behavior week2_valuescultureConsumer behavior week2_valuesculture
Consumer behavior week2_valuescultureEthan Chazin MBA
 
Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Ethan Chazin MBA
 
A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013Ethan Chazin MBA
 
Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Ethan Chazin MBA
 

Destacado (15)

Exposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingExposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computing
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
 
Build a Brand From scratch
Build a Brand From scratchBuild a Brand From scratch
Build a Brand From scratch
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
 
20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience
 
Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
Mktg sales week2_part2
Mktg sales week2_part2Mktg sales week2_part2
Mktg sales week2_part2
 
Consumer behavior week4_attributes
Consumer behavior week4_attributesConsumer behavior week4_attributes
Consumer behavior week4_attributes
 
Consumer behavior week2_valuesculture
Consumer behavior week2_valuescultureConsumer behavior week2_valuesculture
Consumer behavior week2_valuesculture
 
Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1
 
Mktg sales week2_part2
Mktg sales week2_part2Mktg sales week2_part2
Mktg sales week2_part2
 
A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013
 
Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013
 
Mktg sales week2_part1
Mktg sales week2_part1Mktg sales week2_part1
Mktg sales week2_part1
 

Similar a Navigating the risks in implementing Hybrid Cloud, Agile and Project Management methodologies

Disciplined Agile Delivery: An Introduction
Disciplined Agile Delivery: An IntroductionDisciplined Agile Delivery: An Introduction
Disciplined Agile Delivery: An IntroductionIBM Rational software
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...Turja Narayan Chaudhuri
 
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practiceJohn Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practiceitSMF UK
 
Agile Project Management Methods of IT Projects
Agile Project Management Methods of IT ProjectsAgile Project Management Methods of IT Projects
Agile Project Management Methods of IT ProjectsGlen Alleman
 
Extending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsExtending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsAmin Bandeali
 
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...Turja Narayan Chaudhuri
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Business Case for Agile - Time for ROI Check
Business Case for Agile - Time for ROI CheckBusiness Case for Agile - Time for ROI Check
Business Case for Agile - Time for ROI CheckTathagat Varma
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and SecureDenim Group
 
Agile presentation adriana feb 2012
Agile presentation adriana feb 2012Agile presentation adriana feb 2012
Agile presentation adriana feb 2012Adriana Beal
 
The Agile Scaling Model (ASM): Be as Agile as You Need to Be
The Agile Scaling Model (ASM): Be as Agile as You Need to BeThe Agile Scaling Model (ASM): Be as Agile as You Need to Be
The Agile Scaling Model (ASM): Be as Agile as You Need to BeAgile Software Community of India
 
Fostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with CloudFostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with CloudAmazon Web Services
 
Cloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersCloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersDave Roberts
 
Cloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise PioneersCloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise PioneersServiceMesh
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019Stefan Streichsbier
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Strongback Consulting
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environmentsdanb02
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 

Similar a Navigating the risks in implementing Hybrid Cloud, Agile and Project Management methodologies (20)

Disciplined Agile Delivery: An Introduction
Disciplined Agile Delivery: An IntroductionDisciplined Agile Delivery: An Introduction
Disciplined Agile Delivery: An Introduction
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
 
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practiceJohn Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
 
Agile Project Management Methods of IT Projects
Agile Project Management Methods of IT ProjectsAgile Project Management Methods of IT Projects
Agile Project Management Methods of IT Projects
 
Extending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsExtending Agile to Suite Big Projects
Extending Agile to Suite Big Projects
 
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
DOIS22 Why you need Cloud-agnostic practices to fuel your DevSecOps adoption ...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...
 
Business Case for Agile - Time for ROI Check
Business Case for Agile - Time for ROI CheckBusiness Case for Agile - Time for ROI Check
Business Case for Agile - Time for ROI Check
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and Secure
 
Agile presentation adriana feb 2012
Agile presentation adriana feb 2012Agile presentation adriana feb 2012
Agile presentation adriana feb 2012
 
The Agile Scaling Model (ASM): Be as Agile as You Need to Be
The Agile Scaling Model (ASM): Be as Agile as You Need to BeThe Agile Scaling Model (ASM): Be as Agile as You Need to Be
The Agile Scaling Model (ASM): Be as Agile as You Need to Be
 
Fostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with CloudFostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with Cloud
 
Cloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise PioneersCloud Scars: Lessons from the Enterprise Pioneers
Cloud Scars: Lessons from the Enterprise Pioneers
 
Cloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise PioneersCloud scars: Lessons from the Enterprise Pioneers
Cloud scars: Lessons from the Enterprise Pioneers
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environments
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 

Más de Livingstone Advisory

How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)Livingstone Advisory
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Livingstone Advisory
 
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
Rob livingstone  - Australian Payroll Association's Annual Conference May 2011Rob livingstone  - Australian Payroll Association's Annual Conference May 2011
Rob livingstone - Australian Payroll Association's Annual Conference May 2011Livingstone Advisory
 
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneAustralian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneLivingstone Advisory
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone KeynoteLivingstone Advisory
 

Más de Livingstone Advisory (7)

How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011
 
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
Rob livingstone  - Australian Payroll Association's Annual Conference May 2011Rob livingstone  - Australian Payroll Association's Annual Conference May 2011
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
 
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneAustralian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Navigating the risks in implementing Hybrid Cloud, Agile and Project Management methodologies

  • 1. NAVIGATING THE RISKS IN IMPLEMENTING HYBRID CLOUD, AGILE AND PROJECT MANAGEMENT METHODOLOGY ROB LIVINGSTONE Principal, Rob Livingstone Advisory Pty Limited Fellow, University of Technology, Sydney
  • 2. Agenda • Has business lost patience with Enterprise IT? • Systemic vs. Technical risk. • Aligning ‘best practice’ methodologies and technologies using ‘agile’ • Along comes Cloud …… • Orchestrating the transition - 5 Pointers
  • 3. Has business lost patience with Enterprise IT? "Despite an abundance of IT Project Management (ITPM) resources, such as the PMI Body of Knowledge, IT standards and governance, a large percentage of IT projects continue to fail and ultimately get scrapped. Recent studies have shown an average of 66% IT project failure rate, with 52% of the projects being cancelled, and 82% being delivered late" Kraft (2008). The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies. Journal of Information Systems Applied Research, 1 (3)
  • 4. Has business lost patience with Enterprise IT? The answer has to be ‘Yes’ • Forces actively shaping the transformation of enterprise IT • Other than the failure rate of enterprise IT projects…. • The need to ‘simplify IT’ in the eyes of the users, plus • The ‘need for speed’ , plus • The need to cut costs…. ….Makes cloud particularly appealing compared to internal IT • This can trump appropriate risk, total cost, project management governance in organisations aggressively shifting to the Cloud • Where does that put the individual disciplines and conventional methodologies associated with application development, project and risk management? • The pressure on enterprise IT is mounting!
  • 5. Systemic vs. Technical Risk Systemic Risks • Systemic risks are those with the greatest potential impact as they affect the entire system (ie: Organisation, government, country, world…) • How is that the finance industry, which is one of the more regulated, and invests heavily in risk identification, mitigation and transference could be the cause of the current global financial problems? • Systemic risk for the enterprise is the silent killer and is often the hardest to identify as only a few have a complete, transparent and objective overview of the overall enterprise. • Mitigation through approaches such as Enterprise Risk Management (ERM), origins in fraud, organisational governance, etc – Applicability to IT is evolving, however
  • 6. Systemic vs. Technical Risk Technical (or functional) Risk • Identifying, categorising and ranking technical and functional risks is core to conventional IT risk assessment approaches: o Risk of a specific event = (Impact x Probability of that event occurring) + Risk Adjustment • Underpins conventional risk certification frameworks e.g. ISO 2700X • Certification does not necessarily equal security or effectiveness of your risk management model • Often focusing on the diverse range of technical risks, does not account for the interaction between risks. • Systemic risks are often more significant than the sum of the individual risks
  • 7. Aligning ‘best practice’ methodologies and technologies using ‘agile’ The focus is on agile 1. What is agile? 2. Core values 3. Why agile? 4. Agile in application development 5. Agile in Project Management 6. Agile in Risk management
  • 8. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 1. What is agile? Agile is about people, collaboration, working culture 2. Core values Value Individuals and interactions over processes and tools Value Working software over comprehensive documentation Value Customer collaboration over contract negotiation Value Responding to change over following a plan Agile manifesto - Published in 2001, a one-sentence narrative, four core values, and 12 principles www.agilemanifesto.org
  • 9. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 3. Why agile? 'It is not necessary to change. Survival is not mandatory' - W. Edwards Deming William Edwards Deming (1900 – 1993)
  • 10. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 3. Why agile? • Agile has its roots in postwar Japan, and was embodied in the concept of Kaizen, or ‘continuous improvement’. • The father of agile was William Edwards Deming, who had a rather unique approach to that elusive attribute of quality William Edwards Deming (1900 – 1993)
  • 11. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 3. Why agile? Kaizen has spawned a vast array of methodologies • ‘Lean’ • JIT - Just in Time [manufacturing] • BPR - Business process reengineering • Agile (commonly refers to software development) • Six Sigma William Edwards Deming • Value stream mapping (1900 – 1993) … and many others
  • 12. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 4. Agile in application development • Alternative to the ‘waterfall’ development methodology • Agile variants include Scrum, Adaptive Software Development, eXtreme Programming (XP), Dynamic Systems Development, and Feature Driven Development • Most commonly deployed version of ‘agile’ is in software development
  • 13. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 5. Agile in Project Management Vs. One-size-fits-all approach (PMBOK, PRINCE2) Agile
  • 14. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 5 Changes in master Vs. Changes in project project plan are plan seen as seen as ‘negative’ - ‘opportunities’ – Discouraged Inherent One-size-fits-all approach (PMBOK, PRINCE2) Agile
  • 15. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 5. Agile in Project Management Based on two important concepts. 1. Minimising risk by working on short iterations of clearly defined deliverables. 2. Direct communication between players in the development process is the default. (ie: Not exhaustive project documentation). Rationale: Project team can rapidly adapt to the volatility in changing requirements or environment
  • 16. Aligning ‘best practice’ methodologies and technologies using ‘agile’ 6. Agile in Risk Management • Time horizon misalignments: o Agile is based on short time cycles o Conventional Risk Management: Time to identify, plan mitigation and implement Risk management over a comparatively long timeframe • Categorisation of risks as part of the conventional Risk Management process not helpful in identifying the enterprise-wide systemic risks
  • 17. Along comes Cloud…. Hybrid will be the dominant form in the enterprise “Within five years, it will be primarily deployed by enterprises working in a hybrid mode”. - Gartner Gartner "Predicts 2012: Cloud Computing Is Becoming a Reality” (Published: 8 December 2011 ID:G00226103)
  • 18. Along comes Cloud…. …. And with the Hybrid Cloud comes complexity…. Managing this ecosystem is not simple
  • 19. Along comes Cloud…. …. And with the Hybrid Cloud comes complexity…. V1.2 V2.3.1 V2.4 V3.5 V5.3 Orchestrating versioning, change control and rollback
  • 20. Along comes Cloud…. …. And with the Hybrid Cloud comes complexity…. 4 Years 6 Months 1 Year 3.5 Years 4.5 years Life expectancy
  • 21. Along comes Cloud…. …. And with the Hybrid Cloud comes complexity…. Also: • Business Continuity • Security • Identity Management • Due diligence • Forensics • BYOD • Mobility • Legislative / Jurisdictional • Contractual complexity ….. To name but a few
  • 22. Orchestrating the Transition • Agile* is the expectation of enterprise IT by the business irrespective whether facilitated by Cloud or not. • Business and environmental volatility and uncertainty shortens investment cycles, and drives a focus on fast ROI What can senior executives do to ensure they can meet the perfect storm of enterprise IT ? * The sentiment, not the methodology
  • 23. Orchestrating the Transition Consider these 5 pointers:
  • 24. Orchestrating the Transition #1: Adopt an integrated approach to function specific methodologies • Standardised, traditional methodologies within specific disciplines such as Project Management, agile and information security, in and of themselves, are self limiting. • Each discipline is only really effective when applied in a coordinated orchestration with the other key moving parts of the organisation  Harmonization of functionally specific methodologies unleashes value and eliminates waste
  • 25. Orchestrating the Transition #2: Manage the conflicting messages • 24% of CEOs surveyed in the 2012 PWC CEO Survey expect ‘major change’. • The eighth annual KPMG 2012 Audit Institute Report identified “IT Risk and Emerging Technologies” as the second-highest concern for audit committees, which is unprecedented in the history of the report. • Cloud evangelists see cloud as imperative, others not  Develop an effective mechanism for interpreting these messages in the context of your business
  • 26. Orchestrating the Transition #3: Actively identify, embrace and managing shadow IT “Shadow IT can create risks of data loss, corruption or misuse, and risks of inefficient and disconnected processes and information” – Gartner*  Embrace shadow IT, and define what and what is not eligible to be considered enterprise IT *CIO New Year's Resolutions, 2012 ID:G00227785)
  • 27. Orchestrating the Transition #4: Identify systemic risks across the organisation • Systemic risks can kill your business  Ensure your executives and key decision makers are aware of long term, systemic risks  Consider implementing Enterprise Risk Management (ERM)
  • 28. Orchestrating the Transition #5: Don’t gloss over complexity • Senior managers with functional responsibility over specific vertical silos of the organisation may underestimate the overall complexity of their own business as a whole. • From a functional perspective, specific methodologies exist to support specific activities.  Don’t believe that simple IT solutions can paper over underlying business complexity. Test assumptions if critical.
  • 29. Thankyou ROB LIVINGSTONE Principal, Rob Livingstone Advisory Pty Limited Fellow, University of Technology, Sydney W1: www.rob-livingstone.com E: rob@rob-livingstone.com P: +61 2 8005 1972 tw: @rladvisory © All rights reserved. Rob Livingstone Advisory Pty Ltd. Unauthorized redistribution prohibited without prior approval. ‘Navigating through the Cloud’ is a Trademark of Rob Livingstone Advisory Pty Ltd.