SlideShare una empresa de Scribd logo
1 de 40
© Copyright 2017 – B Dow, B Taylor
© Copyright 2017 – B Dow, B Taylor
Importance
of Project
Communicati
ons
1. Project Failures & Survey’s
2. Common Communication Problems
3. Project Communication Planning
4. Project Management & Social Media
5. Project Communications & Agile Projects
6. Project Management & Business Intelligence
Agenda
1. Major Risk Events
2. Purpose of Risk Management
3. Steps to effective Risk
Management (including Project
Drivers & Expected Value)
4. Risk Management Methods
5. Wrap-up
© Copyright 2017 – B Dow, B Taylor
Risk Events
© Copyright 2017 – B Dow, B Taylor
There is inherent uncertainty in every project…..
In everything we do!
Therefore there is Risk…..
Some good, some bad
Some positive, some negative.
© Copyright 2017 – B Dow, B Taylor
Fire on Apollo-1 Launch Pad
January 27, 1967
◦ Gus Grissom - Program team leader
◦ Ed White - 1st man to walk in space
◦ Roger Chaffee - Newcomer
© Copyright 2017 – B Dow, B Taylor
What Caused The Fire?
We just did not think of it.”
“Failure of imagination….
Astronaut Frank Borman
Apollo-1 Disaster Senate Hearing
© Copyright 2017 – B Dow, B Taylor
What Caused The Fire? – Root Cause Analysis
No Action Cause
1 Ability to Open the Hatch quickly Spacecraft hatch door took over 5 mins to open
2 Been clearer on contractor expectations and requirements Insulation defeated
3 Limit the amount of flammable materials on-board ship High concentration of combustible materials in
cabin
4 Reduce oxygen concentration for ground operations Pure oxygen was used in spacecraft
There has been may studies and reports as to what happened, and one of the reports had these findings:
Source: https://www.thinkreliability.com/case_studies/root-cause-analysis-of-the-fire-aboard-apollo-1/
© Copyright 2017 – B Dow, B Taylor
RISK
Sometimes
projects just
don’t do what
you want them to
do.
© Copyright 2017 – B Dow, B Taylor
Other Reasons why we don’t do Risk Management
• Fear
• No Control Over the Risks
• Lack of Commitment
• Lack of Experience or Education
• Avoidance of Risks
© Copyright 2017 – B Dow, B Taylor
IMPORTANCE OF THE PROJECT RISK PLAN
1. In your best interest
2. Gets everybody involved
3. Documents decisions
4. Gives stakeholders, true expectations
5. Understand the directions the project could take
6. Identifies everyone’s role
7. Documents risks in the scope, schedule, budget, and quality processes
8. Team buy-in
9. Shows what could changed
10. Good for lessons learned
© Copyright 2017 – B Dow, B Taylor
Risk Management Purpose
The essential purpose of Project Risk Management is to
improve the project’s performance by systematic:
 Identification
 Appraisal
 Management
 Control of the project’s risk
Focus:
 Reducing possible threats
 Adverse outcomes
 Eliminate or lower potential litigation & safety issues
Risk
Management
Purpose
© Copyright 2017 – B Dow, B Taylor
Planning
1
Identification
2
Quantitative Analysis
3
Risk Response Planning
4
5
6
Qualitative Analysis
Risk Monitor and Control
Risk Project Closeout & Lessons Learned7
Risk
Management
Steps
© Copyright 2017 – B Dow, B Taylor
The process of defining how to conduct risk management
activities for a project.
Why is it so important to plan the risk management process on a
project?
To ensure the level, the visibility, and the type of risk management to
be applied to the project is appropriate.
Planning1
© Copyright 2017 – B Dow, B Taylor
Project Risk –
A definition
Project risk is the amount or level of
uncertainty on a project.
It is not sum or the average of all the
risk events on the project.
A risk is an uncertain event or
condition that, if it occurs, has a
positive or negative effect on the
project objectives.
© Copyright 2017 – B Dow, B Taylor
The process of determining which risks events may affect the
project and documenting their characteristics.
• Identify as many risk events that might occur during the life
of the project.
This includes looking at the other Project Management Knowledge areas for risks.
Identification2
© Copyright 2017 – B Dow, B Taylor
The process of prioritizing risks for further analysis or action by
assessing and combining their probability of occurrence and
impact.
Tools: Risk Assessment form
Risk impact/probability matrix
Project risk model
3 Qualitative Risk Analysis
© Copyright 2017 – B Dow, B Taylor
The process of numerically analyzing the effect of identified risk on overall project objectives.
This process will associate time, budget and schedule impacts to our risk events.
The main objectives of quantitative risk analysis are to:
1. Identify realistic and achievable cost, schedule, quality and scope goals.
2. Determine the probability of achieving a specific project objective.
3. Quantify the risk exposure of the project.
4. Determine the size of cost and schedule contingency that may be needed.
5. Identify risk events that require the most attention.
Tools: Decision Tree Diagram
Monte Carlo Simulation
Expected Value
Quantitative Risk Analysis4
© Copyright 2017 – B Dow, B Taylor
This is the process of developing options and actions, to
enhance opportunities, and to reduce threats to the project
objectives.
Tools: Decision Tree Diagram
Expert Judgement
Risk Response Planning5
© Copyright 2017 – B Dow, B Taylor
The process of implementing risk response plans, tracking identified risks, monitoring residual
risks, identifying new risks, and evaluating risk processes effectiveness throughout the project.
The major purpose of risk monitoring and control is to answer the following questions:
1. Have risk responses been implemented as planned?
2. Are risk response actions as effective as expected?
3. Should new risk responses be developed?
4. Are the project assumptions still valid?
5. With the analysis of trends, has risk exposure changed from its prior state?
6. Has a risk trigger or warning occurred?
7. Are policies and procedures being followed?
8. Have risks and changes occurred that were not previously identified?
6 Risk Monitor and Control
© Copyright 2017 – B Dow, B Taylor
The purpose of risk closeout is the verification of the risk plan and how well the monitoring and
control was performed. Another element is to make certain all portions of the project contract
have been completed and closed with minimum litigation pending, and all risk documentation is
complete.
Risks still pending at project closeout:
• Warranties
• Liabilities
• Liens against the project
• On going litigations
Tools: Risk Register
Lessons learned document
Risk Project Closeout & Lessons Learned7
© Copyright 2017 – B Dow, B Taylor
Project
Drivers –
Effecting the
Risk Process
© Copyright 2017 – B Dow, B Taylor
Project Drivers/Constraints
SCOPE
TIME COST
© Copyright 2017 – B Dow, B Taylor
The effect of changing a Project Driver
It will have an effect on at least one of the other drivers, most likely both. It will create a risk. Known as an
unintended consequence.
A simple example: Lets shorten the project schedule by a month
Possible effects (risks):
• Increase in the budget
• Over time required
• Additional resources required
• May effect all subcontractor and suppliers
• Key equipment not delivered on time.
• Some material can’t meet the new delivery dates
• Major impact of the purchasing department
• Most training sessions and class will have to reschedule
• Testing equipment may not be ready
• Quality of the project will be lowered
• and on and on and on.
© Copyright 2017 – B Dow, B Taylor
TOOLS
© Copyright 2017 – B Dow, B Taylor
• Expected Value Calculations
• Convergence (Schedule Convergence)
• Critical Path Method (Problems with using)
Lets take a look at some of the tools used in supporting Risk Analysis
The three most popular include:
© Copyright 2017 – B Dow, B Taylor
Risk
Management
– Expected
Value
How long does it take you to drive to
work?
© Copyright 2017 – B Dow, B Taylor
Driving time to work
45 60 120
f
Time (mins)
© Copyright 2017 – B Dow, B Taylor
The Magic Formula (Expected Value)
Expected Value = O + 4*ML + P
6
O = Optimistic estimate
ML = Most likely
P = Pessimistic estimate
© Copyright 2017 – B Dow, B Taylor
Expected Value = 45 + 4*60 + 120
6
Expected Value = 67.5
The Magic Formula (Expected Value)
O = Optimistic estimate
ML = Most likely
P = Pessimistic estimate
© Copyright 2017 – B Dow, B Taylor
Driving time to work
45 60 120
f
Expected Value
67.5 minutes
Time
© Copyright 2017 – B Dow, B Taylor
8, 10, 18 days
8, 10, 18 days
8, 10, 18 days
Finish day 10?
8 + 4*10 + 18 = 66 = 11 days
6 6
Convergence Method (Schedule Convergence)
© Copyright 2017 – B Dow, B Taylor
Does not take Risk
into Consideration
Based on a single
point estimate
Near critical
activities are not
included
Ranges are
neglected
Highest Risk task
may not be on
critical path
Does not take
convergence into
consideration
Critical Path Method(Problems Using)
© Copyright 2017 – B Dow, B Taylor
Risk
Management
Methods
(including
software)
© Copyright 2017 – B Dow, B Taylor
Monte Carlo Simulation (Risk Management)
Lots of companies selling this software!
© Copyright 2017 – B Dow, B Taylor
Lets find out by doing a little
Risk Analysis
What are the odds of finishing on time?
© Copyright 2017 – B Dow, B Taylor
Project Schedule (Simple)
© Copyright 2017 – B Dow, B Taylor
Applying Automated Risk Software (Odds of finishing on time?)
Using Automated software will allow you to analyze your schedules quick!
Prob Date Prob Date
0.05 2/22/2017 0.55 03/21/2017
0.10 2/27/2017 0.60 3/26/2017
0.15 3/4/2017 0.65 3/29/2017
0.20 3/5/2017 0.70 4/1/2017
0.25 3/7/2017 0.75 4/3/2017
0.30 3/11/2017 0.80 4/8/2017
0.35 3/13/2017 0.85 4/11/2017
0.40 3/14/2017 0.90 4/17/2017
0.45 3/15/2017 0.90 4/23/2017
0.50 3/18/2017 1.00 5/10/2017
2/12/2017 3/21/2017 5/10/2017
© Copyright 2017 – B Dow, B Taylor
Summary
1
2
Risk Management is one of the most complex aspects of managing
your projects.
Many Project Managers take this task to lightly and don’t dedicate
the time and effort to it. Spend time and actively track your project
risks!
3
The more effective you manage your risks, the less likely you will have
major project problems. Be proactive in your risk management!
© Copyright 2017 – B Dow, B Taylor
ISO 31000 Training Courses
 ISO 31000 Introduction
1 Day Course
 ISO 31000 Foundation
2 Days Course
 ISO 31000 Risk Manager
3 Days Course
 ISO 31000 Lead Risk Manager
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/iso-31000-training-courses | www.pecb.com/events
© Copyright 2016 – B Dow, B Taylor
? THANK YOU
425-736-7171
billdow@dowpublishingllc.com
http://www.dowpublishingllc.com/
https://www.linkedin.com/in/bill-dow-pmp-itil-csm-sa-pmpo-0616131/
https://twitter.com/billdow

Más contenido relacionado

La actualidad más candente

Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...Joe Cooper
 
Dealing With Troubled Projects in 8 Simple Steps
Dealing With Troubled Projects in 8 Simple StepsDealing With Troubled Projects in 8 Simple Steps
Dealing With Troubled Projects in 8 Simple StepsDoug Ziemke
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project ManagementFred Wiersma
 
Project Recovery
Project RecoveryProject Recovery
Project Recoverytrethard
 
Fme project-risk
Fme project-riskFme project-risk
Fme project-risksahil mehta
 
Immutable principles of project management
Immutable principles of project managementImmutable principles of project management
Immutable principles of project managementGlen Alleman
 
Critical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattCritical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattazadiriz
 
Lecture 2. project management – Description (1)
Lecture 2. project management – Description (1)Lecture 2. project management – Description (1)
Lecture 2. project management – Description (1)Dania Abdel-aziz
 
Breaking the Project Failure Cycle
Breaking the Project Failure CycleBreaking the Project Failure Cycle
Breaking the Project Failure CycleGlen Alleman
 
Why Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to SucceedWhy Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to SucceedKevin Wordon
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project ManagementShyam Kerkar
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project ManagementGhent University
 
SymEx 2015 - Troubled Project Recovery, The Story of Firefighter & Hero
SymEx 2015 - Troubled Project Recovery, The Story of Firefighter & HeroSymEx 2015 - Troubled Project Recovery, The Story of Firefighter & Hero
SymEx 2015 - Troubled Project Recovery, The Story of Firefighter & HeroPMI Indonesia Chapter
 
5 immutable principles of project success (v2)(notes)
5 immutable principles of project success (v2)(notes)5 immutable principles of project success (v2)(notes)
5 immutable principles of project success (v2)(notes)Glen Alleman
 
Identifying and Recovering Troubled Projects
Identifying and Recovering Troubled ProjectsIdentifying and Recovering Troubled Projects
Identifying and Recovering Troubled ProjectsRicardo Viana Vargas
 

La actualidad más candente (20)

Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...
 
Dealing With Troubled Projects in 8 Simple Steps
Dealing With Troubled Projects in 8 Simple StepsDealing With Troubled Projects in 8 Simple Steps
Dealing With Troubled Projects in 8 Simple Steps
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project Management
 
Project Recovery
Project RecoveryProject Recovery
Project Recovery
 
Fme project-risk
Fme project-riskFme project-risk
Fme project-risk
 
An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)
 
Immutable principles of project management
Immutable principles of project managementImmutable principles of project management
Immutable principles of project management
 
Critical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattCritical chain - Eliyahu goldratt
Critical chain - Eliyahu goldratt
 
final1139bye
final1139byefinal1139bye
final1139bye
 
Lecture 2. project management – Description (1)
Lecture 2. project management – Description (1)Lecture 2. project management – Description (1)
Lecture 2. project management – Description (1)
 
Breaking the Project Failure Cycle
Breaking the Project Failure CycleBreaking the Project Failure Cycle
Breaking the Project Failure Cycle
 
Why Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to SucceedWhy Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to Succeed
 
Saving time with CCPM
Saving time with CCPMSaving time with CCPM
Saving time with CCPM
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project Management
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
QRA for overall project risk - Dr David Hillson
QRA for overall project risk - Dr David HillsonQRA for overall project risk - Dr David Hillson
QRA for overall project risk - Dr David Hillson
 
SymEx 2015 - Troubled Project Recovery, The Story of Firefighter & Hero
SymEx 2015 - Troubled Project Recovery, The Story of Firefighter & HeroSymEx 2015 - Troubled Project Recovery, The Story of Firefighter & Hero
SymEx 2015 - Troubled Project Recovery, The Story of Firefighter & Hero
 
5 immutable principles of project success (v2)(notes)
5 immutable principles of project success (v2)(notes)5 immutable principles of project success (v2)(notes)
5 immutable principles of project success (v2)(notes)
 
Identifying and Recovering Troubled Projects
Identifying and Recovering Troubled ProjectsIdentifying and Recovering Troubled Projects
Identifying and Recovering Troubled Projects
 
Procept Risk Workshop 2007
Procept Risk Workshop 2007Procept Risk Workshop 2007
Procept Risk Workshop 2007
 

Similar a Project Management Communication Tools – A guide to Risk Management!

A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk ManagementProjectCon
 
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docxRunning head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docxcowinhelen
 
Project PlanProject ManagementSher.docx
Project PlanProject ManagementSher.docxProject PlanProject ManagementSher.docx
Project PlanProject ManagementSher.docxLynellBull52
 
Project Management Techniques For Success And Failure
Project Management Techniques For Success And FailureProject Management Techniques For Success And Failure
Project Management Techniques For Success And FailureAshley Thomas
 
RELLENAR TU SOLICITUD DE PMP EJEMPLOS
RELLENAR TU SOLICITUD DE PMP EJEMPLOSRELLENAR TU SOLICITUD DE PMP EJEMPLOS
RELLENAR TU SOLICITUD DE PMP EJEMPLOShugomanrique1966
 
5. project management – application (2)
5. project management – application (2)5. project management – application (2)
5. project management – application (2)Dania Abdel-aziz
 
Analyzing And Managing Project Risk
Analyzing And Managing Project RiskAnalyzing And Managing Project Risk
Analyzing And Managing Project RiskReema
 
Analyzing And Managing Project Risk
Analyzing And Managing Project RiskAnalyzing And Managing Project Risk
Analyzing And Managing Project RiskReema
 
Project Manager Primer
Project Manager PrimerProject Manager Primer
Project Manager PrimerTom Cremins
 
Introduce Project Management
Introduce Project ManagementIntroduce Project Management
Introduce Project Managementguest90bddb
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoringYb Yar
 
Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...write31
 
Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...write4
 
RISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docx
RISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docxRISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docx
RISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docxSUBHI7
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project ManagementKris Kimmerle
 
Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008enginerd
 

Similar a Project Management Communication Tools – A guide to Risk Management! (20)

A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk Management
 
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docxRunning head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
 
Project PlanProject ManagementSher.docx
Project PlanProject ManagementSher.docxProject PlanProject ManagementSher.docx
Project PlanProject ManagementSher.docx
 
Project Management Techniques For Success And Failure
Project Management Techniques For Success And FailureProject Management Techniques For Success And Failure
Project Management Techniques For Success And Failure
 
Project Mangement
Project MangementProject Mangement
Project Mangement
 
RELLENAR TU SOLICITUD DE PMP EJEMPLOS
RELLENAR TU SOLICITUD DE PMP EJEMPLOSRELLENAR TU SOLICITUD DE PMP EJEMPLOS
RELLENAR TU SOLICITUD DE PMP EJEMPLOS
 
5. project management – application (2)
5. project management – application (2)5. project management – application (2)
5. project management – application (2)
 
Analyzing And Managing Project Risk
Analyzing And Managing Project RiskAnalyzing And Managing Project Risk
Analyzing And Managing Project Risk
 
Analyzing And Managing Project Risk
Analyzing And Managing Project RiskAnalyzing And Managing Project Risk
Analyzing And Managing Project Risk
 
Project Management Process
Project Management ProcessProject Management Process
Project Management Process
 
Project Manager Primer
Project Manager PrimerProject Manager Primer
Project Manager Primer
 
Introduce Project Management
Introduce Project ManagementIntroduce Project Management
Introduce Project Management
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoring
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...
 
Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...Harvard University Theories Tools and Techiques in Project Managagement Prese...
Harvard University Theories Tools and Techiques in Project Managagement Prese...
 
RISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docx
RISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docxRISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docx
RISK RESPONSE PLANNING6Christopher MihunRISK MANAGEMEN.docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008Risk Mitigation Epics Purdue 10 Sept 2008
Risk Mitigation Epics Purdue 10 Sept 2008
 

Más de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

Más de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Último

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Project Management Communication Tools – A guide to Risk Management!

  • 1. © Copyright 2017 – B Dow, B Taylor
  • 2. © Copyright 2017 – B Dow, B Taylor Importance of Project Communicati ons 1. Project Failures & Survey’s 2. Common Communication Problems 3. Project Communication Planning 4. Project Management & Social Media 5. Project Communications & Agile Projects 6. Project Management & Business Intelligence Agenda 1. Major Risk Events 2. Purpose of Risk Management 3. Steps to effective Risk Management (including Project Drivers & Expected Value) 4. Risk Management Methods 5. Wrap-up
  • 3. © Copyright 2017 – B Dow, B Taylor Risk Events
  • 4. © Copyright 2017 – B Dow, B Taylor There is inherent uncertainty in every project….. In everything we do! Therefore there is Risk….. Some good, some bad Some positive, some negative.
  • 5. © Copyright 2017 – B Dow, B Taylor Fire on Apollo-1 Launch Pad January 27, 1967 ◦ Gus Grissom - Program team leader ◦ Ed White - 1st man to walk in space ◦ Roger Chaffee - Newcomer
  • 6. © Copyright 2017 – B Dow, B Taylor What Caused The Fire? We just did not think of it.” “Failure of imagination…. Astronaut Frank Borman Apollo-1 Disaster Senate Hearing
  • 7. © Copyright 2017 – B Dow, B Taylor What Caused The Fire? – Root Cause Analysis No Action Cause 1 Ability to Open the Hatch quickly Spacecraft hatch door took over 5 mins to open 2 Been clearer on contractor expectations and requirements Insulation defeated 3 Limit the amount of flammable materials on-board ship High concentration of combustible materials in cabin 4 Reduce oxygen concentration for ground operations Pure oxygen was used in spacecraft There has been may studies and reports as to what happened, and one of the reports had these findings: Source: https://www.thinkreliability.com/case_studies/root-cause-analysis-of-the-fire-aboard-apollo-1/
  • 8. © Copyright 2017 – B Dow, B Taylor RISK Sometimes projects just don’t do what you want them to do.
  • 9. © Copyright 2017 – B Dow, B Taylor Other Reasons why we don’t do Risk Management • Fear • No Control Over the Risks • Lack of Commitment • Lack of Experience or Education • Avoidance of Risks
  • 10. © Copyright 2017 – B Dow, B Taylor IMPORTANCE OF THE PROJECT RISK PLAN 1. In your best interest 2. Gets everybody involved 3. Documents decisions 4. Gives stakeholders, true expectations 5. Understand the directions the project could take 6. Identifies everyone’s role 7. Documents risks in the scope, schedule, budget, and quality processes 8. Team buy-in 9. Shows what could changed 10. Good for lessons learned
  • 11. © Copyright 2017 – B Dow, B Taylor Risk Management Purpose The essential purpose of Project Risk Management is to improve the project’s performance by systematic:  Identification  Appraisal  Management  Control of the project’s risk Focus:  Reducing possible threats  Adverse outcomes  Eliminate or lower potential litigation & safety issues Risk Management Purpose
  • 12. © Copyright 2017 – B Dow, B Taylor Planning 1 Identification 2 Quantitative Analysis 3 Risk Response Planning 4 5 6 Qualitative Analysis Risk Monitor and Control Risk Project Closeout & Lessons Learned7 Risk Management Steps
  • 13. © Copyright 2017 – B Dow, B Taylor The process of defining how to conduct risk management activities for a project. Why is it so important to plan the risk management process on a project? To ensure the level, the visibility, and the type of risk management to be applied to the project is appropriate. Planning1
  • 14. © Copyright 2017 – B Dow, B Taylor Project Risk – A definition Project risk is the amount or level of uncertainty on a project. It is not sum or the average of all the risk events on the project. A risk is an uncertain event or condition that, if it occurs, has a positive or negative effect on the project objectives.
  • 15. © Copyright 2017 – B Dow, B Taylor The process of determining which risks events may affect the project and documenting their characteristics. • Identify as many risk events that might occur during the life of the project. This includes looking at the other Project Management Knowledge areas for risks. Identification2
  • 16. © Copyright 2017 – B Dow, B Taylor The process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact. Tools: Risk Assessment form Risk impact/probability matrix Project risk model 3 Qualitative Risk Analysis
  • 17. © Copyright 2017 – B Dow, B Taylor The process of numerically analyzing the effect of identified risk on overall project objectives. This process will associate time, budget and schedule impacts to our risk events. The main objectives of quantitative risk analysis are to: 1. Identify realistic and achievable cost, schedule, quality and scope goals. 2. Determine the probability of achieving a specific project objective. 3. Quantify the risk exposure of the project. 4. Determine the size of cost and schedule contingency that may be needed. 5. Identify risk events that require the most attention. Tools: Decision Tree Diagram Monte Carlo Simulation Expected Value Quantitative Risk Analysis4
  • 18. © Copyright 2017 – B Dow, B Taylor This is the process of developing options and actions, to enhance opportunities, and to reduce threats to the project objectives. Tools: Decision Tree Diagram Expert Judgement Risk Response Planning5
  • 19. © Copyright 2017 – B Dow, B Taylor The process of implementing risk response plans, tracking identified risks, monitoring residual risks, identifying new risks, and evaluating risk processes effectiveness throughout the project. The major purpose of risk monitoring and control is to answer the following questions: 1. Have risk responses been implemented as planned? 2. Are risk response actions as effective as expected? 3. Should new risk responses be developed? 4. Are the project assumptions still valid? 5. With the analysis of trends, has risk exposure changed from its prior state? 6. Has a risk trigger or warning occurred? 7. Are policies and procedures being followed? 8. Have risks and changes occurred that were not previously identified? 6 Risk Monitor and Control
  • 20. © Copyright 2017 – B Dow, B Taylor The purpose of risk closeout is the verification of the risk plan and how well the monitoring and control was performed. Another element is to make certain all portions of the project contract have been completed and closed with minimum litigation pending, and all risk documentation is complete. Risks still pending at project closeout: • Warranties • Liabilities • Liens against the project • On going litigations Tools: Risk Register Lessons learned document Risk Project Closeout & Lessons Learned7
  • 21. © Copyright 2017 – B Dow, B Taylor Project Drivers – Effecting the Risk Process
  • 22. © Copyright 2017 – B Dow, B Taylor Project Drivers/Constraints SCOPE TIME COST
  • 23. © Copyright 2017 – B Dow, B Taylor The effect of changing a Project Driver It will have an effect on at least one of the other drivers, most likely both. It will create a risk. Known as an unintended consequence. A simple example: Lets shorten the project schedule by a month Possible effects (risks): • Increase in the budget • Over time required • Additional resources required • May effect all subcontractor and suppliers • Key equipment not delivered on time. • Some material can’t meet the new delivery dates • Major impact of the purchasing department • Most training sessions and class will have to reschedule • Testing equipment may not be ready • Quality of the project will be lowered • and on and on and on.
  • 24. © Copyright 2017 – B Dow, B Taylor TOOLS
  • 25. © Copyright 2017 – B Dow, B Taylor • Expected Value Calculations • Convergence (Schedule Convergence) • Critical Path Method (Problems with using) Lets take a look at some of the tools used in supporting Risk Analysis The three most popular include:
  • 26. © Copyright 2017 – B Dow, B Taylor Risk Management – Expected Value How long does it take you to drive to work?
  • 27. © Copyright 2017 – B Dow, B Taylor Driving time to work 45 60 120 f Time (mins)
  • 28. © Copyright 2017 – B Dow, B Taylor The Magic Formula (Expected Value) Expected Value = O + 4*ML + P 6 O = Optimistic estimate ML = Most likely P = Pessimistic estimate
  • 29. © Copyright 2017 – B Dow, B Taylor Expected Value = 45 + 4*60 + 120 6 Expected Value = 67.5 The Magic Formula (Expected Value) O = Optimistic estimate ML = Most likely P = Pessimistic estimate
  • 30. © Copyright 2017 – B Dow, B Taylor Driving time to work 45 60 120 f Expected Value 67.5 minutes Time
  • 31. © Copyright 2017 – B Dow, B Taylor 8, 10, 18 days 8, 10, 18 days 8, 10, 18 days Finish day 10? 8 + 4*10 + 18 = 66 = 11 days 6 6 Convergence Method (Schedule Convergence)
  • 32. © Copyright 2017 – B Dow, B Taylor Does not take Risk into Consideration Based on a single point estimate Near critical activities are not included Ranges are neglected Highest Risk task may not be on critical path Does not take convergence into consideration Critical Path Method(Problems Using)
  • 33. © Copyright 2017 – B Dow, B Taylor Risk Management Methods (including software)
  • 34. © Copyright 2017 – B Dow, B Taylor Monte Carlo Simulation (Risk Management) Lots of companies selling this software!
  • 35. © Copyright 2017 – B Dow, B Taylor Lets find out by doing a little Risk Analysis What are the odds of finishing on time?
  • 36. © Copyright 2017 – B Dow, B Taylor Project Schedule (Simple)
  • 37. © Copyright 2017 – B Dow, B Taylor Applying Automated Risk Software (Odds of finishing on time?) Using Automated software will allow you to analyze your schedules quick! Prob Date Prob Date 0.05 2/22/2017 0.55 03/21/2017 0.10 2/27/2017 0.60 3/26/2017 0.15 3/4/2017 0.65 3/29/2017 0.20 3/5/2017 0.70 4/1/2017 0.25 3/7/2017 0.75 4/3/2017 0.30 3/11/2017 0.80 4/8/2017 0.35 3/13/2017 0.85 4/11/2017 0.40 3/14/2017 0.90 4/17/2017 0.45 3/15/2017 0.90 4/23/2017 0.50 3/18/2017 1.00 5/10/2017 2/12/2017 3/21/2017 5/10/2017
  • 38. © Copyright 2017 – B Dow, B Taylor Summary 1 2 Risk Management is one of the most complex aspects of managing your projects. Many Project Managers take this task to lightly and don’t dedicate the time and effort to it. Spend time and actively track your project risks! 3 The more effective you manage your risks, the less likely you will have major project problems. Be proactive in your risk management!
  • 39. © Copyright 2017 – B Dow, B Taylor ISO 31000 Training Courses  ISO 31000 Introduction 1 Day Course  ISO 31000 Foundation 2 Days Course  ISO 31000 Risk Manager 3 Days Course  ISO 31000 Lead Risk Manager 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/iso-31000-training-courses | www.pecb.com/events
  • 40. © Copyright 2016 – B Dow, B Taylor ? THANK YOU 425-736-7171 billdow@dowpublishingllc.com http://www.dowpublishingllc.com/ https://www.linkedin.com/in/bill-dow-pmp-itil-csm-sa-pmpo-0616131/ https://twitter.com/billdow

Notas del editor

  1. 1
  2. 1
  3. 1
  4. The essential purpose of project risk management is to improve the project's performance by using systematic identification, appraisal, management and control of project risk. Not only should the focus be on reducing the possible threats and adverse outcomes, but especially on construction projects there should be a concentrated focus and effort to eliminate or at least lower any potential litigation and safety issues.
  5. We think there should be 7 major processes for the best practices of managing project risk (One more than PMI). Whiich one is not a PMI process? Although the list of processes is shown here as discrete, in practice they will overlap and interact with each other. They also interact with all the other areas of a project. Risk like communication is an integral part of all processes being preformed on any project
  6. It is important to plan the risk management processes to ensure the level, the visibility, and the type of risk management to be applied on the project is appropriate. These elements have to match with the risk level and importance of the project. It makes no sense to incorporate a lot of risk effort and processes if the project is of a low risk nature and visa-versa.
  7. An individual project risk is an uncertain event that generally has a negative effect on the project’s objectives and goals, although some risks can have a positive effect on the project (CC Myers and the Northridge earthquake or a light drizzle on curing concrete).
  8. During this stage of the risk management process you should be involved in identifying which risk events might affect the project and determining their impact on the project's objectives and outcome. Almost every stakeholder needs to be involved to some extent in risk identification.   Risk identification is an iterative process that lasts throughout the life cycle of the project. We has found even simple and effective risk responses can be developed and implemented as soon as the risk event is identified.
  9. This is one of our specialties. The process of assessing the impact and the probability of a risk actually happening on the project, can be used as a major team building experience. It allows risk events to be prioritized according to their potential impact on the project. Qualitative risk analysis requires the probability and the impact of the risk event to be evaluated using the established qualitative-analysis tools. One of the tools used in this process is the probability/impact risk-rating matrix.
  10. Not all risks need to be analyzed in detail. The quantitative risk analysis process uses the information gathered from the identification and qualitative processes. This step aims to analyze numerically the probability of each selected risk and the consequence on the project. This process uses tools and techniques such as sensitivity analysis, decision analysis and Monte Carlo simulation.   The main objectives of quantitative risk analysis are to:   1. Identify realistic and achievable cost, schedule, quality and scope goals. 2. Determine the probability of achieving a specific project objective. 3. Quantify the risk exposure of the project. 4. Determine the size of cost and schedule contingency that may be needed. 5. Identify risk events that require the most attention.
  11. The effectiveness of risk response planning will directly determine whether risk decreases or increases for the project. The process of risk response planning is to develop alternatives to determine actions to reduce threats to the projects goals and objectives. Among other things it identifies and assigns individuals to take responsibility for each agreed upon risk response. This process assures that selected risks will be appropriately handled. Choosing the best risk response from several options is often required.
  12. By the time this process is implemented the project is underway. Risk monitoring and control is the process of keeping track of selected risk events, continue monitoring on going risks, and identifying new ones. It also makes sure the risk event plans are being executed along with the evaluation of their effectiveness in reducing the over all project risk. This process records information that leads to the implementation of contingency plans and workarounds. Risk monitoring and control is a continuous ongoing effort through out the life of the project and sometimes beyond (warranties). As the project matures risks change, new risks are discovered and anticipated risks disappear.   Best practices in risk monitoring and control provide information that will assist with the making of effective decisions in advance of risks occurring, thus working in a proactive environment instead of a negative, reactive environment.   The major purpose of risk monitoring and control is to answer the following questions:   1. Have risk responses been implemented as planned? 2. Are risk response actions as effective as expected? 3. Should new risk responses be developed? 4. Are the project assumptions still valid? 5. With the analysis of trends has risk exposure changed from its prior state? 6. Has a risk trigger or warning occurred? 7. Are policies and procedures being followed? 8. Have risks and changes occurred that were not previously identified?   Risk control involves implementing contingency plans, taking corrective action, possibly choosing alternative strategies or even replanning the remaining portion of the project.
  13. Risk project closeout and lessons learned process is sometimes called the risk review process. The major element of the risk closeout is the verification of the risk plan and how well the monitoring and control was performed. Another element is to make certain all portions of the project contract have been completed and closed with minimum litigation pending.   One of the concerns at project closeout for the risk process is the warranties, liabilities and liens against the project that will carry on after the project has closed. They must be identified.   A documented risk audit should be performed to enhance the lessons learned. Most lessons will be obvious. But a systematic study to draw out lessons that were not obvious is important. Missing important lessons means mistakes will be made again. We have found, if short risk lessons learned are documented each week during the execution of the project, the final document is simple to compile and rewarding for the next similar project.