SlideShare una empresa de Scribd logo
1 de 48
Descargar para leer sin conexión
1




                  HANDLING RISK ON HIGH
                  TECHNOLOGY PROGRAMS
                  Without metrics, you’re just another guy with an opinion.
Niwot Ridge LLC   — Stephan Leschka, Hewlett Packard
Agenda for the Next 4 Hours
2


       Review the five principles of Risk Management.
       Introduce SEI’s Continuous Risk Management (CRM).
       Illustrate each CRM process area with example artifacts or
        outcomes.
       Familiarize all participants with the concept of Risk
        Management and their contributions to the 1st step –
        Identifying Risk.
       Understand what data needs to be gathered, so the 1st cut
        at a measure of program risk can be constructed.
But, Before we Start,
    Let’s Understand our Role Here …
3


       Risk Management is a profession.
       Risk Management is Program Management.
       Risk Management is how adults manage projects.
       Managing risks goes hand-in-glove with managing
        work, people, processes, vendors, and the client.
What’s Risk Management All About?
4
But we can’t make decisions until we
    get the right information, right?
5
Risks are part of the project, handled the same
    way all other work is handled – with a plan
6
Five
     Easy Pieces
         of
  Risk Management
  Risk Management is more
than the processes called out
   in PMBOK® (Chapter 11)
     Risk Management
             IS
    Project Management



                            7
1. Hope is not a strategy
2. No single point estimate of cost or schedule can be correct
3. Cost, Schedule, and Technical Performance are inseparable
4. Risk management requires adherence to a well defined process
5. Communication is the Number One success factor               8
A Ship on the Beach is a Lighthouse to the Sea – Dutch Proverb




I
              Hope is Not a Strategy                                 9
No Point
     Estimate
     By Itself
      Can Be
      Correct
II               10
Cost, Schedule, & Technical Performance are Inseparable




III                                                     11
Risk Management Demands a Well Defined Process




IV                                                    12
Risk
     Management
    Demands Direct
    Communication
     Between All
       Parties


V                    13
The Project Train Wrecks Starts When There is…
 Inattention to             Lack of predictive
  budgetary                   variance analysis
  responsibilities           Untimely and unrealistic
 Work authorizations         Latest Revised Estimates
  that are not always         (LRE)
  followed                   Progress not monitored
 Issues with Budget and      in a regular and
  data reconciliation         consistent manner
 Lack of an integrated      Lack of vertical and
  management system           horizontal traceability
 Baseline fluctuations       cost and schedule data
  and frequent replanning     for corrective action
 Current period and         Lack of internal
  retroactive changes         surveillance and
 Improper use of             controls
  management reserve         Managerial actions not     Mary K. Evans Picture Library


 EV techniques that do       demonstrated using
  not reflect actual          Earned Value
  performance                                                                            14
15   Putting these Principles into Practice
Principles and Practices are not the
     same
16




             In theory there is no difference
             between theory and practice. In
             practice there is.
Three Conditions of Risk
17


        The potential for loss must exist.
        Uncertainty with respect to the eventual outcome
         must be present.
        Some choice or decision is required to deal with the
         uncertainty and potential for loss.
Mission-Oriented Success Analysis and
     Improvement Criteria (MOSAIC)
18


        Establish and maintain confidence that objectives
         will be achieved successfully
        A suite of risk–based methods for assessing and
         managing complex projects and processes.
        Produces a broad overview of the current state of
         risk and opportunity for a project or process.
Mission                           Work Processes                              Constraints
   Tasking, Orders, and Plans              Operational Processes                           Resources
 Stability        Validity         Formality           Familiarity        Schedule           Budget
 Completeness     Feasibility      Suitability         Product Control    Staff              Facilities
 Clarity          Precedent        Process                                                     Tools
                   Timeliness        Control
       Mission Execution                    Maintenance Process                              Policies
 Efficiency       Timeliness       Formality           Familiarity        Laws and           Restrictions
 Effectiveness    Safety           Suitability         Service Quality     Regulations        Contractual
 Complexity                         Process                                                      Constraints
                                      Control
      Product and Service                 Management Processes                             Interfaces
 Usability        Accuracy         Planning            Management         Customer /         Senior
 Effectiveness    Correctness      Organization         Experience          User                Leadership
 Timeliness       Operational                           Program             Community          Vendors
                    Systems                                Interfaces         Associate          Politics
                                                                               Agencies
                                                                              Contractors
      Operational Systems                  Management Methods
 Throughput       Security         Monitoring          Quality
 Suitability      Inventory        Personnel            Assurance
 Usability        Installations     Management          Configuration
 Familiarity      System                                 Management
 Reliability       Support
                                              Work Environment
                                     Quality Attitude    Communication
                                                                                                                  19
                                     Cooperation         Morale
An Introduction to
20
     Continuous Risk Management (CRM)
     CRM is the Software Engineering Institute’s
     framework for managing risk in the context of
     system integration, technology based product
     development, and the management of these
     activities.
Continuous Risk Management has Six Components




                                                21
Continuous Risk Management
22




Stage          Actionable Steps
   Identify    Continually ask, “what could go wrong?”
               Continually ask, “which risks are most critical to
     Analyze
               mitigate?”
      Plan     Develop mitigation approaches for the most critical risks
    Track      Track the mitigation plan and the risk
   Control     Make decisions based on data
 Communicate   Ensure a free-flow of information throughout the project
Putting Continuous Risk Management
        Together
23


          Subproject and partner
         data/constraints, hazard
         analysis, FMEA, FTA, etc.
                                                Identify                     Statement of risk

                                        Identify Risk Issues and Concerns

         Risk data: test data, expert
                                                                             Risk classification, Likelihood
     opinion, hazard analysis, FMEA,
      FTA, lessons learned, technical          Analyze                       Consequence, Timeframe
                                                                             Risk prioritization
                             analysis
                                        Evaluate, classify, and prioritize
                                                      risks
      Resources                                                              Research, Watch (tracking requirements)
            Replan Mitigation
                                                   Plan                      Acceptance Rationale, Mitigation Plans
                                         Decide what should be done
                                                 about risks

                                                                             Risk status reports on:
         Program/project data
         (metrics information)                    Track                      Risks
                                                                             Risk Mitigation Plans
                                            Monitor risk metrics and
                                           verify/validate mitigations
                                                                             Close or Accept Risks
                                                Control                      Invoke contingency plans
                                                                             Continue to track
                                              Make risk decisions
Four (4) Steps to Deploying CRM
24




     Step                               Action
     Establish an enterprise risk       SEU CRM Process with Mitre Risk
1
     management process                 Registry
     Establish Risk Process owner and   Org chart Risk Manager
2    document the process               established, Risk owners for
                                        deliverables are next
     Provide training in the standard   Engage risk owners
3
     risk management process
     Monitor and enforce the            Weekly risk board meeting
4    implementation of Risk
     Management
Search for and locate risks before they become issues or problems. Capture statements of
risk and context.

                                                                                           25
Capture a Statement of Risk
26


        Consider and record the conditions that are causing
         concern
        Create a statement of the risk in a concise
         description, which can be understood and acted on
          Condition: a single phrase describing the circumstances
          Consequences: a single phrase describing the key,
           possible negative outcome(s)
Capture the Context of a Risk
27


        A brief, concise description of the conditions and
         consequences of the risk
        Provide enough information to ensure the original
         intent of the risk can be understood, especially
         after some time has passed
Transform risk data into decision making information. Risk analysis is performed to
determine what is important to the project and to set priorities.

                                                                                      28
Evaluating Attributes of Risks
29


        Impact: the loss or effect on the project if the risk
         occurs
        Probability: the likelihood the risk will occur
        Timeframe: the period when action is required in
         order to mitigate or retire the risk
Sample Risk Evaluation
30




                              A           B         C           D           E

                          Negligible    Minor    Moderate   Significant   Severe


     E     Very Likely    Low Med      Medium     Med Hi       High        High


     D       Likely          Low       Low Med   Medium      Med Hi        High


     C      Possible         Low       Low Med   Medium      Med Hi       Med Hi


     B      Unlikely         Low       Low Med   Low Med     Medium       Med Hi


     A    Very Unlikely      Low         Low     Low Med     Medium       Medium
Classifying Risks
31


        Grouping risks based on shared characteristics
        Identify duplicate risks
Risk Evaluation Classification
32




     Probability       Risk Rating      Budget Over Run        Impact Rating
       > 70%       E: Very Likely       > 15% of budget      E: Severe
     40% to 70% D: Likely             10% to 15% of budget   D: Significant
     10% to 40% C: Possible           6% to 10% of budget    C: Moderate
     1% to 40%     B: Unlikely         2% to 6% of budget    B: Minor
        < 1%       A: Very Unlikely      < 2% of budget      A: Negligible
Prioritizing Risks
33



        Partitioning risks or groups of risks based on the
         Borda “vital few” scale
        Ranking the risks based on a criteria
        Separate risk to be dealt with first (the vital few)
         when allocating resources
The Borda Rank
34


                         Which risk of more critical?
                         Where should resources be allocated to
                          eliminate the most troublesome areas in the
                          program?
                         Using this approach – ties for “the most
                          important – often result.
                         Borda Ranking deals with this result, which
                          ranks risks according to their probability of
 bi    N  rik        occurrence and their impact
       k
                      “Risk Matrix: An Approach for Identifying, Assessing, and Ranking Program Risks,” Paul Garvey
                      and Zachary Lansdowne, Air Force of Logistics, Vol XXII, Number 1
Translate risk information into decisions and mitigating actions and implement those
actions. Produce plans for mitigating risks.

                                                                                       35
Assign Responsibility
36


        Three choices for assigning responsibility
          Keep  the risk
          Transfer the risk upward in the organization or to
           another organization
          Delegate the risk within the organization
Determine the Approach
37


        Accept the risk – do nothing
        Mitigate the risk – eliminate or reduce
        Watch the risk – monitor for critical changes
Define Scope and Actions
38


        Action Item List for less complex mitigations
         A  simple means of documenting and tracking risk
           mitigations
        Task Plans with schedules and budgets for complex
         mitigations
          Theseplans must be embedded in the Integrated
           Master Schedule
Monitor risk indicators and mitigation plans. Indicators and trends provide information to
activate plans and contingencies. Review these plans periodically to measure progress and
identify new risks.
                                                                                             39
The Risk Registry
40
Integrate Risk with the Master Schedule
41


        Budget and resources assigned from Risk
         Management reserve.
        Activation of risk activities through the Risk
         Management Board.
        Adjustments to Performance Measurement Baseline
         reflect Risk activities.
        Measure risk activities in the same way as other
         planned activities.
Correct for deviations from the risk mitigation plans. Actions can lead to corrections in
products or processes. Changes to risks, risks that become problems, or faulty plans
require adjustments in plans or actions.
                                                                                            42
Analyze Risks
43


        Examine risks for trends, deviations, and anomalies.
        Achieve a clear understanding of the current status
         of each risk and mitigation plan.
Decide
44


        Replan
        Close the risk
        Invoke the contingency plan
        Continue tracking and executing the current plan
Execute
45


        If a planned action is made, open the Work
         Packages for the mitigation or retirement activities.
        If it decided to continue tracking, the risk remains in
         the tracking state until the next review.
Provide information and feedback to the project on the risk activities, current risks, and
emerging risks.

                                                                                             46
Risk Communication Process
 47

                Risk Management Processes and their Communication to the Program Team
Determine sources and categories                         Define parameters to analyze and categorize risks
Define parameters used to control the risk               Establish and maintain a strategy for risk
management effort                                        management
                                                         Evaluate and categorize each identified risk using
Identify and document risks                              defined categories and parameters and determine
                                                         relative priority
Develop risk Handling Plan for important risks as        Monitor status of risk periodically and implement risk
defined by the risk management strategy                  handling plan as appropriate
                                                         Provide adequate resources for performing risk
Establish and maintain organizational policy for
                                                         management, developing work products and
planning and performing risk management
                                                         providing services
Assign responsibility and authority for performing the
                                                         Train staff in support of risk management processes
process
Place designated work products under appropriate
                                                         Identify and involve relevant stakeholders
configuration management
                                                         Objectively evaluate adherence to risk management
Monitor and control risk management processes
                                                         processes
Glen B. Alleman
       4347 Pebble Beach Drive
        Niwot, Colorado 80503




     glen.alleman@niwotridge.com
           +1.303.241.9633


48

Más contenido relacionado

La actualidad más candente

Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
Nesma
 
Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)
Glen Alleman
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
Amandeep Midha
 

La actualidad más candente (20)

Project risk management
Project risk managementProject risk management
Project risk management
 
Cure for Cost and Schedule Growth
Cure for Cost and Schedule GrowthCure for Cost and Schedule Growth
Cure for Cost and Schedule Growth
 
112 risk management
112 risk management112 risk management
112 risk management
 
Managing Risk as Opportunity
Managing Risk as OpportunityManaging Risk as Opportunity
Managing Risk as Opportunity
 
Managing risk with deliverables planning
Managing risk with deliverables planningManaging risk with deliverables planning
Managing risk with deliverables planning
 
PMP - Risk Management plan & template
PMP - Risk Management plan & templatePMP - Risk Management plan & template
PMP - Risk Management plan & template
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 
Risk Analysis Workbook
Risk Analysis WorkbookRisk Analysis Workbook
Risk Analysis Workbook
 
Workshop project risk management (29 june 2012)
Workshop   project risk management (29 june 2012)Workshop   project risk management (29 june 2012)
Workshop project risk management (29 june 2012)
 
Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Notional cam interview questions (update)
Notional cam interview questions (update)Notional cam interview questions (update)
Notional cam interview questions (update)
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks Review
 
Pmp risk management
Pmp risk managementPmp risk management
Pmp risk management
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
Stephen Ward: Performance uncertainty management is a more effective approach...
Stephen Ward: Performance uncertainty management is a more effective approach...Stephen Ward: Performance uncertainty management is a more effective approach...
Stephen Ward: Performance uncertainty management is a more effective approach...
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshop
 

Destacado

Risk mangement
Risk mangementRisk mangement
Risk mangement
college
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
ansula
 
Fussell.louis
Fussell.louisFussell.louis
Fussell.louis
NASAPMC
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Nimat Khattak
 
Marketing vs selling
Marketing vs sellingMarketing vs selling
Marketing vs selling
Pratik Dighe
 
Communication:process functions barriers.
Communication:process functions barriers.Communication:process functions barriers.
Communication:process functions barriers.
soniya302
 
Risk identification
Risk identificationRisk identification
Risk identification
murukkada
 

Destacado (20)

Methods of handling risk
Methods of handling riskMethods of handling risk
Methods of handling risk
 
Risk management
Risk managementRisk management
Risk management
 
Risk mangement
Risk mangementRisk mangement
Risk mangement
 
Risk types
Risk  typesRisk  types
Risk types
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
Fussell.louis
Fussell.louisFussell.louis
Fussell.louis
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Entrepreneurial environment & infrastructure
Entrepreneurial environment & infrastructureEntrepreneurial environment & infrastructure
Entrepreneurial environment & infrastructure
 
Marketing vs selling
Marketing vs sellingMarketing vs selling
Marketing vs selling
 
Communication:process functions barriers.
Communication:process functions barriers.Communication:process functions barriers.
Communication:process functions barriers.
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Types of-risk
Types of-riskTypes of-risk
Types of-risk
 
Basic Risk Identification Techniques
Basic Risk Identification TechniquesBasic Risk Identification Techniques
Basic Risk Identification Techniques
 
Feasibility study about Poultry Business
Feasibility study about Poultry BusinessFeasibility study about Poultry Business
Feasibility study about Poultry Business
 
Principles of insurance
Principles  of  insurancePrinciples  of  insurance
Principles of insurance
 
Insurance
InsuranceInsurance
Insurance
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 

Similar a Handling risk

Ta Security
Ta SecurityTa Security
Ta Security
jothsna
 
Canga.m.wood.j
Canga.m.wood.jCanga.m.wood.j
Canga.m.wood.j
NASAPMC
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
Jorge Sebastiao
 
Amper ERM Presentation to FEI
Amper ERM Presentation to FEIAmper ERM Presentation to FEI
Amper ERM Presentation to FEI
jravi
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MIS
Hiren Selani
 
Development process of mis
Development process of misDevelopment process of mis
Development process of mis
Hiren Selani
 

Similar a Handling risk (20)

Safety Management Systems Process Vs Tradition
Safety Management Systems Process Vs TraditionSafety Management Systems Process Vs Tradition
Safety Management Systems Process Vs Tradition
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
Canga.m.wood.j
Canga.m.wood.jCanga.m.wood.j
Canga.m.wood.j
 
Third party independent test audit.
Third party independent test audit.Third party independent test audit.
Third party independent test audit.
 
Common Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAECommon Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAE
 
Safak Ebesek RiskSimple
Safak Ebesek RiskSimpleSafak Ebesek RiskSimple
Safak Ebesek RiskSimple
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance Services
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Amper ERM Presentation to FEI
Amper ERM Presentation to FEIAmper ERM Presentation to FEI
Amper ERM Presentation to FEI
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MIS
 
Development process of mis
Development process of misDevelopment process of mis
Development process of mis
 
Lowering business costs: Mitigating risk in the software delivery lifecycle
Lowering business costs: Mitigating risk in the software delivery lifecycleLowering business costs: Mitigating risk in the software delivery lifecycle
Lowering business costs: Mitigating risk in the software delivery lifecycle
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business Continuity
 
Risk management benchmarking 2013
Risk management benchmarking 2013Risk management benchmarking 2013
Risk management benchmarking 2013
 
Risk Management Benchmarking
Risk Management BenchmarkingRisk Management Benchmarking
Risk Management Benchmarking
 
R1
R1R1
R1
 
Risk management benchmarking 2013
Risk management benchmarking 2013Risk management benchmarking 2013
Risk management benchmarking 2013
 

Más de Glen Alleman

Más de Glen Alleman (20)

A Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMSA Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMS
 
Increasing the Probability of Project Success
Increasing the Probability of Project SuccessIncreasing the Probability of Project Success
Increasing the Probability of Project Success
 
Process Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPMProcess Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPM
 
Practices of risk management
Practices of risk managementPractices of risk management
Practices of risk management
 
Principles of Risk Management
Principles of Risk ManagementPrinciples of Risk Management
Principles of Risk Management
 
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
 
From Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems EngineeringFrom Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems Engineering
 
NAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guideNAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guide
 
Building a Credible Performance Measurement Baseline
Building a Credible Performance Measurement BaselineBuilding a Credible Performance Measurement Baseline
Building a Credible Performance Measurement Baseline
 
Integrated master plan methodology (v2)
Integrated master plan methodology (v2)Integrated master plan methodology (v2)
Integrated master plan methodology (v2)
 
IMP / IMS Step by Step
IMP / IMS Step by StepIMP / IMS Step by Step
IMP / IMS Step by Step
 
DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)
 
Making the impossible possible
Making the impossible possibleMaking the impossible possible
Making the impossible possible
 
Heliotropic Abundance
Heliotropic AbundanceHeliotropic Abundance
Heliotropic Abundance
 
Capabilities based planning
Capabilities based planningCapabilities based planning
Capabilities based planning
 
Process Flow and Narrative for Agile
Process Flow and Narrative for AgileProcess Flow and Narrative for Agile
Process Flow and Narrative for Agile
 
Building the Performance Measurement Baseline
Building the Performance Measurement BaselineBuilding the Performance Measurement Baseline
Building the Performance Measurement Baseline
 
Program Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six SigmaProgram Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six Sigma
 
Policy and Procedure Rollout
Policy and Procedure RolloutPolicy and Procedure Rollout
Policy and Procedure Rollout
 
Integrated Master Plan Development
Integrated Master Plan DevelopmentIntegrated Master Plan Development
Integrated Master Plan Development
 

Último

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Handling risk

  • 1. 1 HANDLING RISK ON HIGH TECHNOLOGY PROGRAMS Without metrics, you’re just another guy with an opinion. Niwot Ridge LLC — Stephan Leschka, Hewlett Packard
  • 2. Agenda for the Next 4 Hours 2  Review the five principles of Risk Management.  Introduce SEI’s Continuous Risk Management (CRM).  Illustrate each CRM process area with example artifacts or outcomes.  Familiarize all participants with the concept of Risk Management and their contributions to the 1st step – Identifying Risk.  Understand what data needs to be gathered, so the 1st cut at a measure of program risk can be constructed.
  • 3. But, Before we Start, Let’s Understand our Role Here … 3  Risk Management is a profession.  Risk Management is Program Management.  Risk Management is how adults manage projects.  Managing risks goes hand-in-glove with managing work, people, processes, vendors, and the client.
  • 5. But we can’t make decisions until we get the right information, right? 5
  • 6. Risks are part of the project, handled the same way all other work is handled – with a plan 6
  • 7. Five Easy Pieces of Risk Management Risk Management is more than the processes called out in PMBOK® (Chapter 11) Risk Management IS Project Management 7
  • 8. 1. Hope is not a strategy 2. No single point estimate of cost or schedule can be correct 3. Cost, Schedule, and Technical Performance are inseparable 4. Risk management requires adherence to a well defined process 5. Communication is the Number One success factor 8
  • 9. A Ship on the Beach is a Lighthouse to the Sea – Dutch Proverb I Hope is Not a Strategy 9
  • 10. No Point Estimate By Itself Can Be Correct II 10
  • 11. Cost, Schedule, & Technical Performance are Inseparable III 11
  • 12. Risk Management Demands a Well Defined Process IV 12
  • 13. Risk Management Demands Direct Communication Between All Parties V 13
  • 14. The Project Train Wrecks Starts When There is…  Inattention to  Lack of predictive budgetary variance analysis responsibilities  Untimely and unrealistic  Work authorizations Latest Revised Estimates that are not always (LRE) followed  Progress not monitored  Issues with Budget and in a regular and data reconciliation consistent manner  Lack of an integrated  Lack of vertical and management system horizontal traceability  Baseline fluctuations cost and schedule data and frequent replanning for corrective action  Current period and  Lack of internal retroactive changes surveillance and  Improper use of controls management reserve  Managerial actions not Mary K. Evans Picture Library  EV techniques that do demonstrated using not reflect actual Earned Value performance 14
  • 15. 15 Putting these Principles into Practice
  • 16. Principles and Practices are not the same 16 In theory there is no difference between theory and practice. In practice there is.
  • 17. Three Conditions of Risk 17  The potential for loss must exist.  Uncertainty with respect to the eventual outcome must be present.  Some choice or decision is required to deal with the uncertainty and potential for loss.
  • 18. Mission-Oriented Success Analysis and Improvement Criteria (MOSAIC) 18  Establish and maintain confidence that objectives will be achieved successfully  A suite of risk–based methods for assessing and managing complex projects and processes.  Produces a broad overview of the current state of risk and opportunity for a project or process.
  • 19. Mission Work Processes Constraints Tasking, Orders, and Plans Operational Processes Resources  Stability  Validity  Formality  Familiarity  Schedule  Budget  Completeness  Feasibility  Suitability  Product Control  Staff  Facilities  Clarity  Precedent  Process  Tools  Timeliness Control Mission Execution Maintenance Process Policies  Efficiency  Timeliness  Formality  Familiarity  Laws and  Restrictions  Effectiveness  Safety  Suitability  Service Quality Regulations  Contractual  Complexity  Process Constraints Control Product and Service Management Processes Interfaces  Usability  Accuracy  Planning  Management  Customer /  Senior  Effectiveness  Correctness  Organization Experience User Leadership  Timeliness  Operational  Program Community  Vendors Systems Interfaces  Associate  Politics Agencies  Contractors Operational Systems Management Methods  Throughput  Security  Monitoring  Quality  Suitability  Inventory  Personnel Assurance  Usability  Installations Management  Configuration  Familiarity  System Management  Reliability Support Work Environment  Quality Attitude  Communication 19  Cooperation  Morale
  • 20. An Introduction to 20 Continuous Risk Management (CRM) CRM is the Software Engineering Institute’s framework for managing risk in the context of system integration, technology based product development, and the management of these activities.
  • 21. Continuous Risk Management has Six Components 21
  • 22. Continuous Risk Management 22 Stage Actionable Steps Identify Continually ask, “what could go wrong?” Continually ask, “which risks are most critical to Analyze mitigate?” Plan Develop mitigation approaches for the most critical risks Track Track the mitigation plan and the risk Control Make decisions based on data Communicate Ensure a free-flow of information throughout the project
  • 23. Putting Continuous Risk Management Together 23 Subproject and partner data/constraints, hazard analysis, FMEA, FTA, etc. Identify Statement of risk Identify Risk Issues and Concerns Risk data: test data, expert Risk classification, Likelihood opinion, hazard analysis, FMEA, FTA, lessons learned, technical Analyze Consequence, Timeframe Risk prioritization analysis Evaluate, classify, and prioritize risks Resources Research, Watch (tracking requirements) Replan Mitigation Plan Acceptance Rationale, Mitigation Plans Decide what should be done about risks Risk status reports on: Program/project data (metrics information) Track Risks Risk Mitigation Plans Monitor risk metrics and verify/validate mitigations Close or Accept Risks Control Invoke contingency plans Continue to track Make risk decisions
  • 24. Four (4) Steps to Deploying CRM 24 Step Action Establish an enterprise risk SEU CRM Process with Mitre Risk 1 management process Registry Establish Risk Process owner and Org chart Risk Manager 2 document the process established, Risk owners for deliverables are next Provide training in the standard Engage risk owners 3 risk management process Monitor and enforce the Weekly risk board meeting 4 implementation of Risk Management
  • 25. Search for and locate risks before they become issues or problems. Capture statements of risk and context. 25
  • 26. Capture a Statement of Risk 26  Consider and record the conditions that are causing concern  Create a statement of the risk in a concise description, which can be understood and acted on  Condition: a single phrase describing the circumstances  Consequences: a single phrase describing the key, possible negative outcome(s)
  • 27. Capture the Context of a Risk 27  A brief, concise description of the conditions and consequences of the risk  Provide enough information to ensure the original intent of the risk can be understood, especially after some time has passed
  • 28. Transform risk data into decision making information. Risk analysis is performed to determine what is important to the project and to set priorities. 28
  • 29. Evaluating Attributes of Risks 29  Impact: the loss or effect on the project if the risk occurs  Probability: the likelihood the risk will occur  Timeframe: the period when action is required in order to mitigate or retire the risk
  • 30. Sample Risk Evaluation 30 A B C D E Negligible Minor Moderate Significant Severe E Very Likely Low Med Medium Med Hi High High D Likely Low Low Med Medium Med Hi High C Possible Low Low Med Medium Med Hi Med Hi B Unlikely Low Low Med Low Med Medium Med Hi A Very Unlikely Low Low Low Med Medium Medium
  • 31. Classifying Risks 31  Grouping risks based on shared characteristics  Identify duplicate risks
  • 32. Risk Evaluation Classification 32 Probability Risk Rating Budget Over Run Impact Rating > 70% E: Very Likely > 15% of budget E: Severe 40% to 70% D: Likely 10% to 15% of budget D: Significant 10% to 40% C: Possible 6% to 10% of budget C: Moderate 1% to 40% B: Unlikely 2% to 6% of budget B: Minor < 1% A: Very Unlikely < 2% of budget A: Negligible
  • 33. Prioritizing Risks 33  Partitioning risks or groups of risks based on the Borda “vital few” scale  Ranking the risks based on a criteria  Separate risk to be dealt with first (the vital few) when allocating resources
  • 34. The Borda Rank 34  Which risk of more critical?  Where should resources be allocated to eliminate the most troublesome areas in the program?  Using this approach – ties for “the most important – often result.  Borda Ranking deals with this result, which ranks risks according to their probability of bi    N  rik  occurrence and their impact k “Risk Matrix: An Approach for Identifying, Assessing, and Ranking Program Risks,” Paul Garvey and Zachary Lansdowne, Air Force of Logistics, Vol XXII, Number 1
  • 35. Translate risk information into decisions and mitigating actions and implement those actions. Produce plans for mitigating risks. 35
  • 36. Assign Responsibility 36  Three choices for assigning responsibility  Keep the risk  Transfer the risk upward in the organization or to another organization  Delegate the risk within the organization
  • 37. Determine the Approach 37  Accept the risk – do nothing  Mitigate the risk – eliminate or reduce  Watch the risk – monitor for critical changes
  • 38. Define Scope and Actions 38  Action Item List for less complex mitigations A simple means of documenting and tracking risk mitigations  Task Plans with schedules and budgets for complex mitigations  Theseplans must be embedded in the Integrated Master Schedule
  • 39. Monitor risk indicators and mitigation plans. Indicators and trends provide information to activate plans and contingencies. Review these plans periodically to measure progress and identify new risks. 39
  • 41. Integrate Risk with the Master Schedule 41  Budget and resources assigned from Risk Management reserve.  Activation of risk activities through the Risk Management Board.  Adjustments to Performance Measurement Baseline reflect Risk activities.  Measure risk activities in the same way as other planned activities.
  • 42. Correct for deviations from the risk mitigation plans. Actions can lead to corrections in products or processes. Changes to risks, risks that become problems, or faulty plans require adjustments in plans or actions. 42
  • 43. Analyze Risks 43  Examine risks for trends, deviations, and anomalies.  Achieve a clear understanding of the current status of each risk and mitigation plan.
  • 44. Decide 44  Replan  Close the risk  Invoke the contingency plan  Continue tracking and executing the current plan
  • 45. Execute 45  If a planned action is made, open the Work Packages for the mitigation or retirement activities.  If it decided to continue tracking, the risk remains in the tracking state until the next review.
  • 46. Provide information and feedback to the project on the risk activities, current risks, and emerging risks. 46
  • 47. Risk Communication Process 47 Risk Management Processes and their Communication to the Program Team Determine sources and categories Define parameters to analyze and categorize risks Define parameters used to control the risk Establish and maintain a strategy for risk management effort management Evaluate and categorize each identified risk using Identify and document risks defined categories and parameters and determine relative priority Develop risk Handling Plan for important risks as Monitor status of risk periodically and implement risk defined by the risk management strategy handling plan as appropriate Provide adequate resources for performing risk Establish and maintain organizational policy for management, developing work products and planning and performing risk management providing services Assign responsibility and authority for performing the Train staff in support of risk management processes process Place designated work products under appropriate Identify and involve relevant stakeholders configuration management Objectively evaluate adherence to risk management Monitor and control risk management processes processes
  • 48. Glen B. Alleman 4347 Pebble Beach Drive Niwot, Colorado 80503 glen.alleman@niwotridge.com +1.303.241.9633 48