SlideShare a Scribd company logo
1 of 69
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Module 4
Risk Identification
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Summary
2
This module discusses the process for identifying the
various types of risks affecting an IT project. These
risks need to be identified during System Initiation
phase. A Project Risk Register will be developed by the
project team that will be referenced in the remaining
phases of the System Development Life Cycle.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risk Identification
PROJECT EXECUTION, MONITORING & CONTROL
COMMUNICATIONS MANAGEMENT
Risk
Identification
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 4
Define process
model and logical
data model.
Deliverables:
• Business
Requirements
• Functional
Specification
Sign off
Project Scope
Risk Register
Project Budget
Quality Plan
Project Charter
Sign off
Define technical
architecture,
create physical
database,
prototype system
components
Deliverables:
• Technical
Specification
• Project
Management
plan
Sign off
Program
development, system
installation for
development and test
environments,
physical database
creation, software
version control
management, backup
and recovery process,
preparation of test
cases, system
integration testing.
Detail Test plan
SIT sign off
Demonstrates that
developed system
conforms to
requirements
defined in the
Functional
Specification.
User acceptance
testing.
UAT sign-off
Execute the tasks
defined in the
Project Transition
plan to efficiently
migrate the project
from the
development
environment to the
production
environment.
Conduct end user
training,
Operations and
support training.
Project closeout.
Transition sign-off
REQUIREMENTS
DESIGN
INITIATION
CONSTRUCTION
ACCEPTANCE
IMPLEMENTATION
D O C U M E N T A T I O N
T R A I N I N G
P R O J E C T R I S K M A N A G E M E N T
P R O J E C T S C O P E M A N A G E M E N T
P R O J E C T C O M M U N I C A T I O N S M A N A G E M E N T
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
System Development Life Cycle
5
INITIATION REQUIREMENT DESIGN CONSTRUCTION ACCEPTANCE IMPLEMENTATION
Prepare for
System Initiation
Prepare for
Requirements
Analysis
Define Technical
Architecture
Prepare DEV
Environment
Prepare UAT
Environment
Prepare
PRODUCTION
Environment
Establish Project
Team
Determine Business
Requirements
Define System
Standards
Build, Test, &
Validate
Validate Data
Conversion
System Deployment
Define Scope Define Process
Model
Database Design Prepare SIT
Environment
Execute User
Acceptance
Testing
Transition
Management
Define Cost Define Logical Data
Model
Prototype System
Components
Conduct Integration
and System Testing
Issues
Management
Project Closeout
Identify Risk
Reconcile
Requirements /
Model
Develop Testing
Strategy
Scope Management Risk Management
Define Quality Produce Functional
Specification
Validate Work
Package
Develop Project
Documentations
Update Project
Documentations
Develop Project
Charter
Risk Assessment System
Acceptance
Develop Project
Management Plan
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
What is Risk Identification
6
Risk identification is the process of identifying the
threats and opportunities that could occur during the life
of the project along with their associated uncertainties.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 7
Risk Identification
The project should be analyzed for risk in areas such as:
• culture of the Performing Organization
• anticipated impact on the Performing Organization of
the resulting product or service
• the level to which the end result is defined (the more
complete the definition, the lower the possibility of
risk)
• technology used on the project (proven vs. new)
• relationships among team members
• impact on work units
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Types of Risk
EXTERNAL RISK
• Regulatory
• Natural hazards
• Market risks
• Currency changes
• Inflation
INTERNAL RISK
(non-technical)
• Management
• Schedule
• Cost
• Cash Flow
TECHNICAL
• Changes in
technology
• Design
• Performance
LEGAL
• Licenses
• Patents
• Contractual
• Force Majeure
8
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Technical Risk
 Inadequate or less capable resources.
 Subcontractor is not familiar with some aspect of the
project such as the technology or the application
area.
 Subcontractor does not follow a proven methodology.
 The subcontractor does not use project management
techniques that allow problems to be identified early.
 Physical separation leads to technical
incompatibilities: You cannot run what the
subcontractor has produced.
9
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Operational Risk
 The subcontractor’s staff goes on strike.
 The subcontractor lands a higher-priority project and
diverts key resources to other project.
 The physical distance to the subcontractor leads to
misunderstandings and confusion, as well as to
reduced visibility.
 Transportation causes problems. (The transporter is
also a subcontractor and is subject to many of these
risks.)
 Customs regulations delay import into your country
or export from the subcontractor’s country.
10
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 11
Financial Risk
 The subcontractor goes bankrupt.
 The subcontractor holds up shipment because your company
has not paid its last bills.
 The subcontractor uses your schedule as a means to extract
extra costs.
 The subcontractor “baits and switches,” replacing the high-
quality resources that were proposed with less capable
people.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Technical, quality or performance risks
 unproven or complex technology
 unrealistic performance goals
 changes to the technology used
 changes to the industry standards
12
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Project management risks
 poor allocation of time and resources
 inadequate quality of the project plan
 poor use of project management tools and techniques
13
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Organizational risks
 cost, time, and scope
objectives that are
internally inconsistent
 lack of prioritization of
projects
 inadequacy or
interruption of funding,
and resource conflicts
with other projects
14
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
External risks
 Changes in legal or
regulatory environment
 Labor issues, changing
owner priorities, country
risk, and weather.
 Force majeure risks
such as earthquakes,
floods, and tsunami
15
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Historical Information
Information on risk from past projects may
be available from project files or published
through commercial, public databases,
articles, international papers from
conferences, seminars, or academic
sources. This can be a quick and reliable
source of information in identifying risk.
16
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks associated with Subcontractor
 The subcontractor will not assign adequate or capable
resources.
 The subcontractor is not familiar with some aspect of
the project such as the technology or the application
area.
 The subcontractor does not follow a proven
methodology.
 The subcontractor does not use project management
techniques that allow problems to be identified early.
17
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks associated with Subcontractor
 The subcontractor’s staff goes on strike.
 The subcontractor lands a higher-priority project and
diverts key resources to another project.
 The physical distance to the subcontractor leads to
misunderstandings and confusion, as well as to reduced
visibility.
 Transportation causes problems. (The transporter is also
a subcontractor and is subject to many of these risks.)
 Customs regulations delay import into your country or
export from the subcontractor’s country.
18
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 19
Risks associated with Subcontractor
 The subcontractor goes bankrupt.
 The subcontractor holds up shipment because your
company has not paid its last bills.
 The subcontractor uses your schedule as a means to
extract extra costs.
 The subcontractor “baits and switches,” replacing the high-
quality resources that were proposed with less capable
people.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 20
Identify risks that impacted
Cost, Scope, Schedule, and Quality
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 21
Risk level varies depending upon how
much information received
No
Information
Partial
Information
Complete
Information
Unknown
Unknowns
Known
Unknown
Known
Known
Complete
UNCERTAINTY
Partial
UNCERTAINTY
Almost zero
UNCERTAINTY
degree of risks Very LowVery High
A project scope is subject to varying levels of risk depending
upon the information acquired regarding the risk and its
impact.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks affecting Scope of the project
Risks associated with changes in scope of the project
and/or scope of the product or service.
Risk conditions
 Additional requirements for “fixes” to achieve the required
technical deliverables.
 Poor definition of the scope breakdown.
 Inadequate scope control during implementation.
 Inadequate planning lead time.
 Unclear definition of business requirements.
22
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks affecting Quality
Failure to complete tasks to the required level of
technical or quality performance.
Risk conditions
 Substandard design / materials / workmanship
 Inadequate quality assurance program
 Poor attitude to quality
23
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks affecting project Schedule
Failure to complete the tasks within the project
schedule.
Risk conditions
 Errors in estimating time
 Errors in estimating resource availability
 Changes in scope of work without allowance for time
extensions
24
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks affecting project Budget
Failure to complete tasks within the budget.
Risk conditions
 Unpredictable price changes
 Changes in currency fluctuations during procurement of
materials and resources
 Poor estimation of risk contingencies affecting labor,
material, and expenses
 Uncontrollable third party cost of resources or services.
25
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Gathering information
26
Project
Sponsor
A person with the strategic vision is in a unique position
to identify risks that others may not know
Project Team
Members
Make certain to tap the team member’s knowledge
once the work has commenced
Stakeholders Stakeholders understand the risks associated with their
own business units and the business aspects of the
project.
Technical
Experts
IT experts, Engineers, Researchers, Construction
specialists, Policy makers, Business Process Analyst
can contribute toward the technical aspects of the
project
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Gathering information (contd.)
27
Customers
End Users
The customer, or end user, understands the goals of the
project from a different perspective than the other project
participants.
Vendors Have experience working on similar projects can provide
insights to risks that may occur in all stages of the project
Other Project
Managers
Other Project Managers may share their views on your
list of risks.
Industry group LinkedIn and other professional network will be a good
source of information.
People with
previous
experience
Identify employee with previous experience in one area
of the business, human resource skills profiling
database.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks affecting a project
 Scope – risks associated with changes in scope, or the
subsequent need for “fixes” to achieve the required technical
deliverables.
 Quality – failure to complete tasks to the required level of
technical or quality performance.
 Time – failure to complete tasks within the project schedule.
 Cost – failure to complete tasks within the agreed budget.
Risk Management is the process in which risks are identified,
analyzed, prioritized, and determine what actions need to be taken
to avert these threats. Scope, cost, time, and quality are affected
by these threats.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risk Owner
 Help develop the risk response and risk trigger and carry
out the execution of the risk response, if a risk event
occurs.
 Participate in the review, re-evaluation, and modification of
the probability and impact for each risk item on a weekly
basis.
 Identify and participate in the analysis of any new risks that
occur.
 Escalate issues/problems to Project Manager for those
risks :
 That significantly impact the projects triple constraint
 That require action prior to the next weekly review
 Where the risk response strategies are not effective
causing the need to execute the contingency plan.
29
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Project Manager’s role in managing
risk
 Developing the Risk Register and Risk Management Plan.
 Continuous monitoring of the risk defined in the Risk
Register.
 Implementing the planned mitigation strategies.
 Continuous monitoring of the effectiveness of the Risk
Management Plan.
 Regular reporting on the status of risk to the Project
Sponsor and the Steering Committee.
30
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Stakeholders role in risk management
 The Project Sponsor has ultimate accountability for risk
management. Project Sponsor ensure there are adequate
resources for managing the project’s risks and there is active
participation by a wide cross-section of stakeholders.
 The Steering Committee oversees the Risk Management
Plan and its periodic review.
 The Project Manager is responsible for monitoring and
managing all aspects of the risk management process under
the direction of the Project Sponsor/Steering Committee.
31
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 32
Impact to project objectives
The probability of risk occurring must be analysed against its impact to
project Budget, Scope, Schedule, Quality, and Resources.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 33
Document Risk
After risk has been identified , the list of risks are usually registered
in a document called the Risk Register.
OUTPUT
Initial
Risk
Register
Risk Worksheet
INPUT
Perform Risk Identification
PROCESS
Using available tools eg Excel, the Project Manager can easily
register project risk and update these further during Planning phase.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 34
Perform Risk Identification
Deliverable : Initial Risk Register
Initial Risk Register is the
only deliverable produced
after you have completed the
process “Perform Risk
Identification”
Initial Risk Register will be
revised further during
Planning phase to produce
the Project Risk Management
Plan.
Initial
Risk
Register
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Techniques in identifying risks
 Reviewing Project Documents
 Interviews
 Brainstorming
 Nominal Group Technique
 Delphi Technique
 Status Meeting
 Assumptions analysis
 Diagramming Technique
35
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Reviewing Project Documents
 Documentation reviews include a structured review of the
project plans and assumptions, both at the total project and
detailed scope levels as well as reviews of prior project files
and other information sources.
 Peer level reviews of project documentation, studies,
reports, preliminary plans, estimates and schedules are a
common and early method to help identify risks that may
affect project objectives.
36
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Interviews
 Interviewing technique involves question and answer
sessions with:
 Experts
 Stakeholders
 Managers
 Project team members
 Business Process Analysts
 Other Project Managers
 Use Project Scope document and Work Breakdown
Structure as your input during the interviewing process.
37
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Brainstorming
 Brainstorming is useful when project participants work at the
same location or are able to meet easily at a central location.
 Participants will highlight their risks interactively.
 Formal and informal brainstorming sessions are conducted in a
meeting room with project team members and other stakeholders
such as specialty groups and regulatory agency representatives.
 Performed by the project team, although a multidisciplinary set of
experts under the leadership of a facilitator or project manager.
 Sources of risk are identified in broad scope, posted, categorized
by type of risk, and then the definitions sharpened.
 Setback: Stronger group may dominate the discussion over more
timid group members.
38
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Nominal Group Technique
 Similar to brainstorming, the
difference is that the
participants are required to
write down the list of risks on a
piece of sticky paper to be
handed over to the facilitator.
 Risks are not addressed
interactively, avoiding
domineering by stronger group.
39
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Using the Delphi Technique
 Delphi technique uses questionnaires aimed at participants
who have subject matter expertise.
 Does not require a meeting.
 Questionnaires are distributed via emails or intranet site.
 Ideal for project participants who are not located together
geographically or those who find it difficult to attend a
meeting.
 The responses are submitted and then circulated to the
experts for further comment. Consensus may be reached in a
few rounds of this process.
 This technique helps reduce bias in the data and keeps any
person from having undue influence on the outcome.
40
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 41
Delphi Technique
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Status Meetings
 Access the current phase of the project and the risks
associated in that particular phase.
 Discuss the risks that have already occurred.
 Discuss the impacts of those risk events that have
happened.
 Review the risk plans, and determine if they are working
 Determine if new risk events are likely to surface as a
result of response plans on past risks.
 Open the meeting to discuss new risks not previously
identified.
42
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 43
Assumptions analysis
 Every project is conceived and developed based
on a set of hypotheses, scenarios, or
assumptions.
 Assumptions analysis is a technique that
explores whether or not the assumptions are
valid.
 Identifies project risks from inaccuracy,
inconsistency, or incompleteness of
assumptions.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Diagramming technique
44
Ishikawa diagram also known as “fishbone” diagram is a popular
technique to look at the root cause of problems or issues.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risk impact to project
 Analyze risk impact to the project objectives.
 Risks can result in four types of consequences:
 Changes affecting the project scope directly impacted
scope of the Product or Service
 The schedule may be extended
 Budget may increase
 Quality will be affected
45
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Grading risk based upon Likelihood
and Consequences
46
Risks should be analyzed and evaluated in terms of likelihood
of occurrences and magnitude of consequences if they do
occur.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 47
Extreme classification for Large or
Complex Project
In the case of larger or more complex projects, the matrix should be
expanded to ensure an “A” grading is automatically assigned to any risks
defined as extremely high consequences.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 48
Recommended actions for grading risk
Grade Risk Mitigation actions
A
Mitigation actions, to reduce the likelihood and seriousness, to be
identified and implemented as soon as the project commences as a
priority.
B
Mitigation actions, to reduce the likelihood and seriousness, to be
identified and appropriate actions implemented during project execution.
C
Mitigation actions, to reduce the likelihood and seriousness, to be
identified and costed for possible action if funds permit.
D To be noted - no action is needed unless grading increases over time.
N To be noted - no action is needed unless grading increases over time.
Mitigation of risks involves the identification of actions to reduce the
likelihood that a threat will occur (preventative action) or reduce the impact
of a threat that does occur (contingency action).
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risk Mitigation strategies
 Preventative - planned actions to reduce the likelihood a
risk will occur. In other words, what should you do to
reduce the likelihood of this risk from occurring?
 Contingency - planned actions to reduce the seriousness
of the risk if it does occur. In other words, once the risk has
occurred, what will be your recovery actions to allow you to
move on and these plans of actions should be built into the
work breakdown structure for your project.
49
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks affecting Scope of the Project
Changes in project scope to meet product requirements. e.g.
regulatory changes
Impact:
 More time is required to deliver additional material as a result of
changes in scope.
 More resources are required to execute the additional work
defined in the WBS.
 Additional work to meet the quality requirements of the project
has resulted in an increased in the project budget.
50
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks arising from Subcontracting work
- Poaching of personnel
Subcontractor may campaign to work directly with your
customer or recruit key personnel from your organization.
PREVENTATIVE MEASURES
 Ensure that the subcontract includes an appropriate clause to
prevent solicitation of work or recruitment of your employees by the
subcontractor.
 Ensure that all contractual communications are channelled via your
company.
 Where the subcontractor is a known competitor restrict access
appropriately.
 Be aware of the dangers and escalate to your commercial manager
should any contravention be suspected.
51
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks arising from Subcontracting work
- Poor Change Control
Subcontractor may initiate uncontrolled changes (e.g.
add/remove functionality) through ad-hoc
communications.
PREVENTATIVE MEASURES
 The Statement of Work (SOW) should include a full Change Control
Procedure and this should be referenced in the subcontract
document.
 Ensure that approval authority for changes is assigned by both
parties.
 Ensure that your customer is aware of the formal Change Control
Procedure and that changes cannot be introduced directly to
subcontractors.
52
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risk arising from Subcontracting work
- Incompatible Working Practices
Methods, standards and cultural differences may differ from expectations
and cause friction in communications and make it difficult to gauge progress.
PREVENTATIVE MEASURES
 Ensure that the SOW requires the subcontractor to supply a description
of its standard procedures and how these will be employed to undertake
the subcontract works.
 Detail the reporting requirements in the SOW.
 Obtain an organizational chart for the subcontracted resources to be
employed in the project with channels for escalation.
 Ensure that the subcontract kick-off meeting includes a review of
working practice alignment and have available templates for key
deliverable documents.
 Ensure that sufficient provision for progress meetings is made.
53
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks associated with Procurement of
Products / Services
 Limited availability
 Complex to manufacture
 Integration of the product into existing environment
 Delays in delivery, testing and installation
 Unsafe use of hazardous materials
 Final product or service does not meet expectations
54
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks associated with Procurement
Process
 Changes to scope or specifications
 Proper processes are not followed
 Risks are not adequately managed
 Tender process does not achieve value for money
 Government policies, not followed
55
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risks associated with Contract
Management
 Unrealistic time / cost expectations
 Conflict with existing contracts/supply
arrangements
 Limited capacity to access necessary information
 Legal complexities
 Delays in obtaining approvals
 Incorrect method of approach selected
56
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Fixed-Price Contract
 Fixed-price contracts (also known as firm-fixed-price and
lump-sum contracts) are agreements that define a total price
for the product that the Seller need to provide.
 Fixed-price contracts must clearly define the requirements
that will be provided by the Vendor.
 Fixed-price contracts may also provide incentives for meeting
or exceeding contract requirements such as meeting
deadlines.
 Fixed-price contracts usually require the Seller to assume the
risk of cost overruns.
57
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Cost-Reimbursable Contract
58
Contract Type Acronym Attribute Risk Issues
Cost Plus
Fixed Fee
CPFF Actual costs plus
profit margin for
seller
Cost overruns represent risk
to the buyer.
Cost Plus
Percentage of
Cost
CPPC Actual costs plus
profit margin for
seller.
Cost overruns represent risk
to the buyer. This is the
most dangerous contract
type for the buyer.
Cost Plus
Incentive Fee
CPIF Actual costs plus
profit margin for
seller.
Cost overruns represent risk
to the buyer.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 59
Types of Contract and Risk variations
Cost Plus Percentage of Costs
Cost Plus Fixed Fee
Cost Plus Incentive Fee
Fixed-Price Fee
Time and Material
Buyer’s Risk
Sellers’sRisk
Highest Risk
High Risk
Medium Risk
Low
LowRisk
High
LowRisk
LowRisk
T&M can be a high risk for Buyer if contract does not include a “total not-to-
exceed” (NTE) clause.
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Risk Breakdown Structure
60
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
 After you have identified the Risk, the next step is to develop the
Risk Register.
 Risk Register records details of all the risks identified at the
beginning and during the life of the project.
 Risk Register records their grading in terms of likelihood of
occurrences and seriousness of impact on the project.
 Risk Register record initial plans for mitigating each high level risk.
 Risk Register defines the costs and responsibilities of the prescribed
mitigation strategies and subsequent results.
 The Register should be maintained throughout the project and will
be updated regularly as existing risks are re-graded in the light of the
effectiveness of the mitigation strategy, and new risks are identified
61
Risk Register
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
 Has a unique Identifier for each risk item
 A description of each risk and how it will affect the project
 An assessment of the likelihood of occurrence and the
seriousness of an impact if it does occur (low, medium, high)
 A grading of each risk with reference to a risk assessment
table.
 A Risk Owner who is responsible for managing the risk
 An outline of proposed mitigation actions (prevention and
contingency)
 Costing for each mitigation strategy
62
Characteristics of a Risk Register
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Why Would You Develop the Risk
Register?
 It provides a useful tool for managing and reducing the risks
identified before and during the project
 It documents risk mitigation strategies in response to the identified
risks and their grading in terms of likelihood and seriousness
 It provides the Project Sponsor, Steering Committee with a
documented framework from which risk status can be reported.
 To ensure the communication of risk management issues to key
stakeholders
 It provides a mechanism for seeking and acting on feedback to
encourage the involvement of the key stakeholders
 To identify the mitigation actions required for implementation of the
risk management plan and associated costs.
63
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
When would You Develop the Risk
Register
 Risk should be documented at the Conceptual phase or the
Origination phase of a project  Initial Risk Assessment
document.
 This initial risk assessment will form part of the Project Proposal
or Business Case for the project.
 Once the project is approved the Risk Management Plan and
Risk Register should be fully developed.
 In the case of smaller projects the Risk Register is sufficient to
serve as the Risk Management Plan.
64
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Checklist prior to developing the Risk
Register
 Knowledge and understanding of the project.
 Knowledge and understanding of the Key Stakeholders.
 Knowledge and understanding of appropriate types of risk
management activities, or where to obtain them.
 Project Proposal/Brief, Project Business Case, or Project
Business Plan.
65
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Components of a Risk Register
 Dates: As the register is a living document, it is important to record the
date that risks are identified or modified. Optional dates to include are
the target and completion dates.
 Description of the Risk: A phrase that describes the risk.
 Risk type (business, project, stage): Classification of the risk, business
risks relate to delivery of achieved benefits, project risks relate to the
management of the project such as
 Timeframes and resources, stage risks are risks associated with a
specific stage plan.
 The likelihood of occurrence: Provides an assessment of how likely it
is that this risk will occur.
 Examples of classifications are: L-Low (<30%), M-Medium (31-70%),
H-High (>70%).
66
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
Components of a Risk Register
 Severity of effect: Provides an assessment of the impact that the
occurrence of this risk would have on the project.
 Counter Measures: Action to be taken to prevent, reduce or
transfer the risk. This may include production of contingency
plans.
 Owner: Individual responsible must ensure that this risk is
managed and counter measures are undertaken.
 Status: Indicates whether this is a current risk or if risk can no
longer arise and impact the project.
Example classifications are: C-current or E-ended.
 Other columns such as quantitative value can also be added if
appropriate.
67
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS
No. Rank Risk Description Category Root
Cause
Triggers Potential
Responses
Risk
Owner
Probability Impact Severity Status
R44 1
R21 2
R7 3
68
Sample
Risk Register
 Project severity = expectation (1-10) * impact (1-10)
 When should risk analysis be formed?
 Is not a time activity
 Periodic update and reviewed
© Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 69
end of module

More Related Content

Viewers also liked

We Have to Do Something with Social Media, But What?
We Have to Do Something with Social Media, But What?We Have to Do Something with Social Media, But What?
We Have to Do Something with Social Media, But What?Gerrit Heijkoop
 
Reverse Osmosis and Membrane Distillation
Reverse Osmosis and Membrane Distillation Reverse Osmosis and Membrane Distillation
Reverse Osmosis and Membrane Distillation Christos Charisiadis
 
#TECAdam: Live events als de kurk onder jouw content strategie
#TECAdam: Live events als de kurk onder jouw content strategie#TECAdam: Live events als de kurk onder jouw content strategie
#TECAdam: Live events als de kurk onder jouw content strategieGerrit Heijkoop
 
ESSEC_Asia-Pacific_Influential_Negotiation_for_Leaders
ESSEC_Asia-Pacific_Influential_Negotiation_for_LeadersESSEC_Asia-Pacific_Influential_Negotiation_for_Leaders
ESSEC_Asia-Pacific_Influential_Negotiation_for_LeadersTa Wei CHAO
 
ذهب مشروعي
ذهب مشروعيذهب مشروعي
ذهب مشروعيgoldd
 
địa chỉ bán đồng hồ casio tại hcm
địa chỉ bán đồng hồ casio tại hcmđịa chỉ bán đồng hồ casio tại hcm
địa chỉ bán đồng hồ casio tại hcmevette495
 
SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...
SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...
SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...Sadalit Van Buren
 
Risk Mitigation Checklist
Risk Mitigation ChecklistRisk Mitigation Checklist
Risk Mitigation ChecklistDemand Metric
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner, RCDD
 

Viewers also liked (16)

We Have to Do Something with Social Media, But What?
We Have to Do Something with Social Media, But What?We Have to Do Something with Social Media, But What?
We Have to Do Something with Social Media, But What?
 
Reverse Osmosis and Membrane Distillation
Reverse Osmosis and Membrane Distillation Reverse Osmosis and Membrane Distillation
Reverse Osmosis and Membrane Distillation
 
#TECAdam: Live events als de kurk onder jouw content strategie
#TECAdam: Live events als de kurk onder jouw content strategie#TECAdam: Live events als de kurk onder jouw content strategie
#TECAdam: Live events als de kurk onder jouw content strategie
 
ESSEC_Asia-Pacific_Influential_Negotiation_for_Leaders
ESSEC_Asia-Pacific_Influential_Negotiation_for_LeadersESSEC_Asia-Pacific_Influential_Negotiation_for_Leaders
ESSEC_Asia-Pacific_Influential_Negotiation_for_Leaders
 
Causative.pk
Causative.pkCausative.pk
Causative.pk
 
Iris
IrisIris
Iris
 
ذهب مشروعي
ذهب مشروعيذهب مشروعي
ذهب مشروعي
 
địa chỉ bán đồng hồ casio tại hcm
địa chỉ bán đồng hồ casio tại hcmđịa chỉ bán đồng hồ casio tại hcm
địa chỉ bán đồng hồ casio tại hcm
 
Dixtal Catálogo DX5020
Dixtal Catálogo DX5020Dixtal Catálogo DX5020
Dixtal Catálogo DX5020
 
A job interview
A job interviewA job interview
A job interview
 
Kyaw Zin Aung CV
Kyaw Zin Aung CVKyaw Zin Aung CV
Kyaw Zin Aung CV
 
SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...
SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...
SharePoint Maturity and Business Process - Why They're Inseparable! - as pres...
 
How To Iron Your Clothes
How To Iron Your ClothesHow To Iron Your Clothes
How To Iron Your Clothes
 
Risk Mitigation Checklist
Risk Mitigation ChecklistRisk Mitigation Checklist
Risk Mitigation Checklist
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering Biography
 
Amazon go
Amazon goAmazon go
Amazon go
 

Similar to IT Project Risk Identification

SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1Amr E. Mohamed
 
Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Skillogic Solutions
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...
Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...
Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...Project Controls Expo
 
Transforming Construction with Knowledge Management
Transforming Construction with Knowledge ManagementTransforming Construction with Knowledge Management
Transforming Construction with Knowledge ManagementShelley Armato
 
Risk Management Processes from Jerry Klanac
Risk Management Processes from Jerry KlanacRisk Management Processes from Jerry Klanac
Risk Management Processes from Jerry KlanacPMA Consultants
 
Detailed Programme Case Study
Detailed Programme Case StudyDetailed Programme Case Study
Detailed Programme Case StudySteve Syder
 
SE_Lec 11_ Project Management
SE_Lec 11_ Project ManagementSE_Lec 11_ Project Management
SE_Lec 11_ Project ManagementAmr E. Mohamed
 
A Methodology for Developing Web-based CAD/CAM systems
A Methodology for Developing Web-based CAD/CAM systemsA Methodology for Developing Web-based CAD/CAM systems
A Methodology for Developing Web-based CAD/CAM systemsEditor IJCATR
 
Accelerating and Optimizing Returns on Telecom Network Capital Investments
Accelerating and Optimizing Returns on Telecom Network Capital InvestmentsAccelerating and Optimizing Returns on Telecom Network Capital Investments
Accelerating and Optimizing Returns on Telecom Network Capital InvestmentsGaea Global Technologies, Inc.
 
12. Software Project Management.pptx
12. Software Project Management.pptx12. Software Project Management.pptx
12. Software Project Management.pptxmsohail37
 
GER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdfGER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdfTigabu Yaya
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementNajmul Hussain
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleRishi Kant
 

Similar to IT Project Risk Identification (20)

SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5Six Sigma Green Belt Training Part 5
Six Sigma Green Belt Training Part 5
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...
Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...
Project Controls Expo 18th Nov 2014 - "Cost Estimate Risk Analysis: For Capit...
 
VASUDEO RANE
VASUDEO RANEVASUDEO RANE
VASUDEO RANE
 
Transforming Construction with Knowledge Management
Transforming Construction with Knowledge ManagementTransforming Construction with Knowledge Management
Transforming Construction with Knowledge Management
 
Risk Management Processes from Jerry Klanac
Risk Management Processes from Jerry KlanacRisk Management Processes from Jerry Klanac
Risk Management Processes from Jerry Klanac
 
Detailed Programme Case Study
Detailed Programme Case StudyDetailed Programme Case Study
Detailed Programme Case Study
 
SE_Lec 11_ Project Management
SE_Lec 11_ Project ManagementSE_Lec 11_ Project Management
SE_Lec 11_ Project Management
 
Ch22
Ch22Ch22
Ch22
 
A Methodology for Developing Web-based CAD/CAM systems
A Methodology for Developing Web-based CAD/CAM systemsA Methodology for Developing Web-based CAD/CAM systems
A Methodology for Developing Web-based CAD/CAM systems
 
Accelerating and Optimizing Returns on Telecom Network Capital Investments
Accelerating and Optimizing Returns on Telecom Network Capital InvestmentsAccelerating and Optimizing Returns on Telecom Network Capital Investments
Accelerating and Optimizing Returns on Telecom Network Capital Investments
 
12. Software Project Management.pptx
12. Software Project Management.pptx12. Software Project Management.pptx
12. Software Project Management.pptx
 
GER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdfGER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdf
 
lec6.ppt
lec6.pptlec6.ppt
lec6.ppt
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 

More from GAFM Academy of Project Management ® - ISO 29990 Certified International Board of Standards

More from GAFM Academy of Project Management ® - ISO 29990 Certified International Board of Standards (12)

GAFM Academy - Agile Scrum Project Management ..get this and others at www.ga...
GAFM Academy - Agile Scrum Project Management ..get this and others at www.ga...GAFM Academy - Agile Scrum Project Management ..get this and others at www.ga...
GAFM Academy - Agile Scrum Project Management ..get this and others at www.ga...
 
PROJECT RISK MANAGEMENT ... complete training materials and others at www.ga...
PROJECT RISK MANAGEMENT ...  complete training materials and others at www.ga...PROJECT RISK MANAGEMENT ...  complete training materials and others at www.ga...
PROJECT RISK MANAGEMENT ... complete training materials and others at www.ga...
 
GAFM Academy Module 1 Project Quality Management
GAFM Academy Module 1  Project Quality ManagementGAFM Academy Module 1  Project Quality Management
GAFM Academy Module 1 Project Quality Management
 
GAFM Academy HOW TO MANAGE & CONTROL A PROJECT
GAFM Academy HOW TO MANAGE & CONTROL A PROJECTGAFM Academy HOW TO MANAGE & CONTROL A PROJECT
GAFM Academy HOW TO MANAGE & CONTROL A PROJECT
 
GAFM Academy HOW TO START A PROJECT
GAFM Academy HOW TO START A PROJECTGAFM Academy HOW TO START A PROJECT
GAFM Academy HOW TO START A PROJECT
 
GAFM Academy HOW TO DIRECT AND MANAGE A PROJECT
GAFM Academy HOW TO DIRECT AND MANAGE A PROJECTGAFM Academy HOW TO DIRECT AND MANAGE A PROJECT
GAFM Academy HOW TO DIRECT AND MANAGE A PROJECT
 
GAFM Academy - THE ESSENTIALS OF PLANNING AND SCOPING A PROJECT
GAFM Academy - THE ESSENTIALS OF PLANNING AND SCOPING A PROJECTGAFM Academy - THE ESSENTIALS OF PLANNING AND SCOPING A PROJECT
GAFM Academy - THE ESSENTIALS OF PLANNING AND SCOPING A PROJECT
 
CCPC Certified Construction Project Consultant by Syseneg Academy sysenegacad...
CCPC Certified Construction Project Consultant by Syseneg Academy sysenegacad...CCPC Certified Construction Project Consultant by Syseneg Academy sysenegacad...
CCPC Certified Construction Project Consultant by Syseneg Academy sysenegacad...
 
CPC Certified Project Consultant contact: sysenegacademy@gmail.com
CPC Certified Project Consultant   contact: sysenegacademy@gmail.comCPC Certified Project Consultant   contact: sysenegacademy@gmail.com
CPC Certified Project Consultant contact: sysenegacademy@gmail.com
 
GAFM Certifications > gafmacademy@gmail.com
GAFM Certifications > gafmacademy@gmail.com GAFM Certifications > gafmacademy@gmail.com
GAFM Certifications > gafmacademy@gmail.com
 
MPM Master Project Manager - contact sysenegacademy@gmail.com
MPM Master Project Manager - contact sysenegacademy@gmail.comMPM Master Project Manager - contact sysenegacademy@gmail.com
MPM Master Project Manager - contact sysenegacademy@gmail.com
 
Master Project Manager for Information Technology: sysenegacademy@gmail.com
Master Project Manager for Information Technology: sysenegacademy@gmail.comMaster Project Manager for Information Technology: sysenegacademy@gmail.com
Master Project Manager for Information Technology: sysenegacademy@gmail.com
 

Recently uploaded

Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...Henrik Hanke
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptxogubuikealex
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this periodSaraIsabelJimenez
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxCarrieButtitta
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 

Recently uploaded (20)

Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptx
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this period
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptx
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 

IT Project Risk Identification

  • 1. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Module 4 Risk Identification
  • 2. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Summary 2 This module discusses the process for identifying the various types of risks affecting an IT project. These risks need to be identified during System Initiation phase. A Project Risk Register will be developed by the project team that will be referenced in the remaining phases of the System Development Life Cycle.
  • 3. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risk Identification PROJECT EXECUTION, MONITORING & CONTROL COMMUNICATIONS MANAGEMENT Risk Identification
  • 4. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 4 Define process model and logical data model. Deliverables: • Business Requirements • Functional Specification Sign off Project Scope Risk Register Project Budget Quality Plan Project Charter Sign off Define technical architecture, create physical database, prototype system components Deliverables: • Technical Specification • Project Management plan Sign off Program development, system installation for development and test environments, physical database creation, software version control management, backup and recovery process, preparation of test cases, system integration testing. Detail Test plan SIT sign off Demonstrates that developed system conforms to requirements defined in the Functional Specification. User acceptance testing. UAT sign-off Execute the tasks defined in the Project Transition plan to efficiently migrate the project from the development environment to the production environment. Conduct end user training, Operations and support training. Project closeout. Transition sign-off REQUIREMENTS DESIGN INITIATION CONSTRUCTION ACCEPTANCE IMPLEMENTATION D O C U M E N T A T I O N T R A I N I N G P R O J E C T R I S K M A N A G E M E N T P R O J E C T S C O P E M A N A G E M E N T P R O J E C T C O M M U N I C A T I O N S M A N A G E M E N T
  • 5. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS System Development Life Cycle 5 INITIATION REQUIREMENT DESIGN CONSTRUCTION ACCEPTANCE IMPLEMENTATION Prepare for System Initiation Prepare for Requirements Analysis Define Technical Architecture Prepare DEV Environment Prepare UAT Environment Prepare PRODUCTION Environment Establish Project Team Determine Business Requirements Define System Standards Build, Test, & Validate Validate Data Conversion System Deployment Define Scope Define Process Model Database Design Prepare SIT Environment Execute User Acceptance Testing Transition Management Define Cost Define Logical Data Model Prototype System Components Conduct Integration and System Testing Issues Management Project Closeout Identify Risk Reconcile Requirements / Model Develop Testing Strategy Scope Management Risk Management Define Quality Produce Functional Specification Validate Work Package Develop Project Documentations Update Project Documentations Develop Project Charter Risk Assessment System Acceptance Develop Project Management Plan
  • 6. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS What is Risk Identification 6 Risk identification is the process of identifying the threats and opportunities that could occur during the life of the project along with their associated uncertainties.
  • 7. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 7 Risk Identification The project should be analyzed for risk in areas such as: • culture of the Performing Organization • anticipated impact on the Performing Organization of the resulting product or service • the level to which the end result is defined (the more complete the definition, the lower the possibility of risk) • technology used on the project (proven vs. new) • relationships among team members • impact on work units
  • 8. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Types of Risk EXTERNAL RISK • Regulatory • Natural hazards • Market risks • Currency changes • Inflation INTERNAL RISK (non-technical) • Management • Schedule • Cost • Cash Flow TECHNICAL • Changes in technology • Design • Performance LEGAL • Licenses • Patents • Contractual • Force Majeure 8
  • 9. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Technical Risk  Inadequate or less capable resources.  Subcontractor is not familiar with some aspect of the project such as the technology or the application area.  Subcontractor does not follow a proven methodology.  The subcontractor does not use project management techniques that allow problems to be identified early.  Physical separation leads to technical incompatibilities: You cannot run what the subcontractor has produced. 9
  • 10. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Operational Risk  The subcontractor’s staff goes on strike.  The subcontractor lands a higher-priority project and diverts key resources to other project.  The physical distance to the subcontractor leads to misunderstandings and confusion, as well as to reduced visibility.  Transportation causes problems. (The transporter is also a subcontractor and is subject to many of these risks.)  Customs regulations delay import into your country or export from the subcontractor’s country. 10
  • 11. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 11 Financial Risk  The subcontractor goes bankrupt.  The subcontractor holds up shipment because your company has not paid its last bills.  The subcontractor uses your schedule as a means to extract extra costs.  The subcontractor “baits and switches,” replacing the high- quality resources that were proposed with less capable people.
  • 12. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Technical, quality or performance risks  unproven or complex technology  unrealistic performance goals  changes to the technology used  changes to the industry standards 12
  • 13. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Project management risks  poor allocation of time and resources  inadequate quality of the project plan  poor use of project management tools and techniques 13
  • 14. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Organizational risks  cost, time, and scope objectives that are internally inconsistent  lack of prioritization of projects  inadequacy or interruption of funding, and resource conflicts with other projects 14
  • 15. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS External risks  Changes in legal or regulatory environment  Labor issues, changing owner priorities, country risk, and weather.  Force majeure risks such as earthquakes, floods, and tsunami 15
  • 16. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Historical Information Information on risk from past projects may be available from project files or published through commercial, public databases, articles, international papers from conferences, seminars, or academic sources. This can be a quick and reliable source of information in identifying risk. 16
  • 17. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks associated with Subcontractor  The subcontractor will not assign adequate or capable resources.  The subcontractor is not familiar with some aspect of the project such as the technology or the application area.  The subcontractor does not follow a proven methodology.  The subcontractor does not use project management techniques that allow problems to be identified early. 17
  • 18. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks associated with Subcontractor  The subcontractor’s staff goes on strike.  The subcontractor lands a higher-priority project and diverts key resources to another project.  The physical distance to the subcontractor leads to misunderstandings and confusion, as well as to reduced visibility.  Transportation causes problems. (The transporter is also a subcontractor and is subject to many of these risks.)  Customs regulations delay import into your country or export from the subcontractor’s country. 18
  • 19. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 19 Risks associated with Subcontractor  The subcontractor goes bankrupt.  The subcontractor holds up shipment because your company has not paid its last bills.  The subcontractor uses your schedule as a means to extract extra costs.  The subcontractor “baits and switches,” replacing the high- quality resources that were proposed with less capable people.
  • 20. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 20 Identify risks that impacted Cost, Scope, Schedule, and Quality
  • 21. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 21 Risk level varies depending upon how much information received No Information Partial Information Complete Information Unknown Unknowns Known Unknown Known Known Complete UNCERTAINTY Partial UNCERTAINTY Almost zero UNCERTAINTY degree of risks Very LowVery High A project scope is subject to varying levels of risk depending upon the information acquired regarding the risk and its impact.
  • 22. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks affecting Scope of the project Risks associated with changes in scope of the project and/or scope of the product or service. Risk conditions  Additional requirements for “fixes” to achieve the required technical deliverables.  Poor definition of the scope breakdown.  Inadequate scope control during implementation.  Inadequate planning lead time.  Unclear definition of business requirements. 22
  • 23. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks affecting Quality Failure to complete tasks to the required level of technical or quality performance. Risk conditions  Substandard design / materials / workmanship  Inadequate quality assurance program  Poor attitude to quality 23
  • 24. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks affecting project Schedule Failure to complete the tasks within the project schedule. Risk conditions  Errors in estimating time  Errors in estimating resource availability  Changes in scope of work without allowance for time extensions 24
  • 25. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks affecting project Budget Failure to complete tasks within the budget. Risk conditions  Unpredictable price changes  Changes in currency fluctuations during procurement of materials and resources  Poor estimation of risk contingencies affecting labor, material, and expenses  Uncontrollable third party cost of resources or services. 25
  • 26. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Gathering information 26 Project Sponsor A person with the strategic vision is in a unique position to identify risks that others may not know Project Team Members Make certain to tap the team member’s knowledge once the work has commenced Stakeholders Stakeholders understand the risks associated with their own business units and the business aspects of the project. Technical Experts IT experts, Engineers, Researchers, Construction specialists, Policy makers, Business Process Analyst can contribute toward the technical aspects of the project
  • 27. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Gathering information (contd.) 27 Customers End Users The customer, or end user, understands the goals of the project from a different perspective than the other project participants. Vendors Have experience working on similar projects can provide insights to risks that may occur in all stages of the project Other Project Managers Other Project Managers may share their views on your list of risks. Industry group LinkedIn and other professional network will be a good source of information. People with previous experience Identify employee with previous experience in one area of the business, human resource skills profiling database.
  • 28. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks affecting a project  Scope – risks associated with changes in scope, or the subsequent need for “fixes” to achieve the required technical deliverables.  Quality – failure to complete tasks to the required level of technical or quality performance.  Time – failure to complete tasks within the project schedule.  Cost – failure to complete tasks within the agreed budget. Risk Management is the process in which risks are identified, analyzed, prioritized, and determine what actions need to be taken to avert these threats. Scope, cost, time, and quality are affected by these threats.
  • 29. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risk Owner  Help develop the risk response and risk trigger and carry out the execution of the risk response, if a risk event occurs.  Participate in the review, re-evaluation, and modification of the probability and impact for each risk item on a weekly basis.  Identify and participate in the analysis of any new risks that occur.  Escalate issues/problems to Project Manager for those risks :  That significantly impact the projects triple constraint  That require action prior to the next weekly review  Where the risk response strategies are not effective causing the need to execute the contingency plan. 29
  • 30. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Project Manager’s role in managing risk  Developing the Risk Register and Risk Management Plan.  Continuous monitoring of the risk defined in the Risk Register.  Implementing the planned mitigation strategies.  Continuous monitoring of the effectiveness of the Risk Management Plan.  Regular reporting on the status of risk to the Project Sponsor and the Steering Committee. 30
  • 31. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Stakeholders role in risk management  The Project Sponsor has ultimate accountability for risk management. Project Sponsor ensure there are adequate resources for managing the project’s risks and there is active participation by a wide cross-section of stakeholders.  The Steering Committee oversees the Risk Management Plan and its periodic review.  The Project Manager is responsible for monitoring and managing all aspects of the risk management process under the direction of the Project Sponsor/Steering Committee. 31
  • 32. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 32 Impact to project objectives The probability of risk occurring must be analysed against its impact to project Budget, Scope, Schedule, Quality, and Resources.
  • 33. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 33 Document Risk After risk has been identified , the list of risks are usually registered in a document called the Risk Register. OUTPUT Initial Risk Register Risk Worksheet INPUT Perform Risk Identification PROCESS Using available tools eg Excel, the Project Manager can easily register project risk and update these further during Planning phase.
  • 34. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 34 Perform Risk Identification Deliverable : Initial Risk Register Initial Risk Register is the only deliverable produced after you have completed the process “Perform Risk Identification” Initial Risk Register will be revised further during Planning phase to produce the Project Risk Management Plan. Initial Risk Register
  • 35. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Techniques in identifying risks  Reviewing Project Documents  Interviews  Brainstorming  Nominal Group Technique  Delphi Technique  Status Meeting  Assumptions analysis  Diagramming Technique 35
  • 36. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Reviewing Project Documents  Documentation reviews include a structured review of the project plans and assumptions, both at the total project and detailed scope levels as well as reviews of prior project files and other information sources.  Peer level reviews of project documentation, studies, reports, preliminary plans, estimates and schedules are a common and early method to help identify risks that may affect project objectives. 36
  • 37. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Interviews  Interviewing technique involves question and answer sessions with:  Experts  Stakeholders  Managers  Project team members  Business Process Analysts  Other Project Managers  Use Project Scope document and Work Breakdown Structure as your input during the interviewing process. 37
  • 38. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Brainstorming  Brainstorming is useful when project participants work at the same location or are able to meet easily at a central location.  Participants will highlight their risks interactively.  Formal and informal brainstorming sessions are conducted in a meeting room with project team members and other stakeholders such as specialty groups and regulatory agency representatives.  Performed by the project team, although a multidisciplinary set of experts under the leadership of a facilitator or project manager.  Sources of risk are identified in broad scope, posted, categorized by type of risk, and then the definitions sharpened.  Setback: Stronger group may dominate the discussion over more timid group members. 38
  • 39. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Nominal Group Technique  Similar to brainstorming, the difference is that the participants are required to write down the list of risks on a piece of sticky paper to be handed over to the facilitator.  Risks are not addressed interactively, avoiding domineering by stronger group. 39
  • 40. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Using the Delphi Technique  Delphi technique uses questionnaires aimed at participants who have subject matter expertise.  Does not require a meeting.  Questionnaires are distributed via emails or intranet site.  Ideal for project participants who are not located together geographically or those who find it difficult to attend a meeting.  The responses are submitted and then circulated to the experts for further comment. Consensus may be reached in a few rounds of this process.  This technique helps reduce bias in the data and keeps any person from having undue influence on the outcome. 40
  • 41. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 41 Delphi Technique
  • 42. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Status Meetings  Access the current phase of the project and the risks associated in that particular phase.  Discuss the risks that have already occurred.  Discuss the impacts of those risk events that have happened.  Review the risk plans, and determine if they are working  Determine if new risk events are likely to surface as a result of response plans on past risks.  Open the meeting to discuss new risks not previously identified. 42
  • 43. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 43 Assumptions analysis  Every project is conceived and developed based on a set of hypotheses, scenarios, or assumptions.  Assumptions analysis is a technique that explores whether or not the assumptions are valid.  Identifies project risks from inaccuracy, inconsistency, or incompleteness of assumptions.
  • 44. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Diagramming technique 44 Ishikawa diagram also known as “fishbone” diagram is a popular technique to look at the root cause of problems or issues.
  • 45. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risk impact to project  Analyze risk impact to the project objectives.  Risks can result in four types of consequences:  Changes affecting the project scope directly impacted scope of the Product or Service  The schedule may be extended  Budget may increase  Quality will be affected 45
  • 46. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Grading risk based upon Likelihood and Consequences 46 Risks should be analyzed and evaluated in terms of likelihood of occurrences and magnitude of consequences if they do occur.
  • 47. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 47 Extreme classification for Large or Complex Project In the case of larger or more complex projects, the matrix should be expanded to ensure an “A” grading is automatically assigned to any risks defined as extremely high consequences.
  • 48. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 48 Recommended actions for grading risk Grade Risk Mitigation actions A Mitigation actions, to reduce the likelihood and seriousness, to be identified and implemented as soon as the project commences as a priority. B Mitigation actions, to reduce the likelihood and seriousness, to be identified and appropriate actions implemented during project execution. C Mitigation actions, to reduce the likelihood and seriousness, to be identified and costed for possible action if funds permit. D To be noted - no action is needed unless grading increases over time. N To be noted - no action is needed unless grading increases over time. Mitigation of risks involves the identification of actions to reduce the likelihood that a threat will occur (preventative action) or reduce the impact of a threat that does occur (contingency action).
  • 49. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risk Mitigation strategies  Preventative - planned actions to reduce the likelihood a risk will occur. In other words, what should you do to reduce the likelihood of this risk from occurring?  Contingency - planned actions to reduce the seriousness of the risk if it does occur. In other words, once the risk has occurred, what will be your recovery actions to allow you to move on and these plans of actions should be built into the work breakdown structure for your project. 49
  • 50. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks affecting Scope of the Project Changes in project scope to meet product requirements. e.g. regulatory changes Impact:  More time is required to deliver additional material as a result of changes in scope.  More resources are required to execute the additional work defined in the WBS.  Additional work to meet the quality requirements of the project has resulted in an increased in the project budget. 50
  • 51. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks arising from Subcontracting work - Poaching of personnel Subcontractor may campaign to work directly with your customer or recruit key personnel from your organization. PREVENTATIVE MEASURES  Ensure that the subcontract includes an appropriate clause to prevent solicitation of work or recruitment of your employees by the subcontractor.  Ensure that all contractual communications are channelled via your company.  Where the subcontractor is a known competitor restrict access appropriately.  Be aware of the dangers and escalate to your commercial manager should any contravention be suspected. 51
  • 52. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks arising from Subcontracting work - Poor Change Control Subcontractor may initiate uncontrolled changes (e.g. add/remove functionality) through ad-hoc communications. PREVENTATIVE MEASURES  The Statement of Work (SOW) should include a full Change Control Procedure and this should be referenced in the subcontract document.  Ensure that approval authority for changes is assigned by both parties.  Ensure that your customer is aware of the formal Change Control Procedure and that changes cannot be introduced directly to subcontractors. 52
  • 53. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risk arising from Subcontracting work - Incompatible Working Practices Methods, standards and cultural differences may differ from expectations and cause friction in communications and make it difficult to gauge progress. PREVENTATIVE MEASURES  Ensure that the SOW requires the subcontractor to supply a description of its standard procedures and how these will be employed to undertake the subcontract works.  Detail the reporting requirements in the SOW.  Obtain an organizational chart for the subcontracted resources to be employed in the project with channels for escalation.  Ensure that the subcontract kick-off meeting includes a review of working practice alignment and have available templates for key deliverable documents.  Ensure that sufficient provision for progress meetings is made. 53
  • 54. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks associated with Procurement of Products / Services  Limited availability  Complex to manufacture  Integration of the product into existing environment  Delays in delivery, testing and installation  Unsafe use of hazardous materials  Final product or service does not meet expectations 54
  • 55. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks associated with Procurement Process  Changes to scope or specifications  Proper processes are not followed  Risks are not adequately managed  Tender process does not achieve value for money  Government policies, not followed 55
  • 56. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risks associated with Contract Management  Unrealistic time / cost expectations  Conflict with existing contracts/supply arrangements  Limited capacity to access necessary information  Legal complexities  Delays in obtaining approvals  Incorrect method of approach selected 56
  • 57. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Fixed-Price Contract  Fixed-price contracts (also known as firm-fixed-price and lump-sum contracts) are agreements that define a total price for the product that the Seller need to provide.  Fixed-price contracts must clearly define the requirements that will be provided by the Vendor.  Fixed-price contracts may also provide incentives for meeting or exceeding contract requirements such as meeting deadlines.  Fixed-price contracts usually require the Seller to assume the risk of cost overruns. 57
  • 58. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Cost-Reimbursable Contract 58 Contract Type Acronym Attribute Risk Issues Cost Plus Fixed Fee CPFF Actual costs plus profit margin for seller Cost overruns represent risk to the buyer. Cost Plus Percentage of Cost CPPC Actual costs plus profit margin for seller. Cost overruns represent risk to the buyer. This is the most dangerous contract type for the buyer. Cost Plus Incentive Fee CPIF Actual costs plus profit margin for seller. Cost overruns represent risk to the buyer.
  • 59. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 59 Types of Contract and Risk variations Cost Plus Percentage of Costs Cost Plus Fixed Fee Cost Plus Incentive Fee Fixed-Price Fee Time and Material Buyer’s Risk Sellers’sRisk Highest Risk High Risk Medium Risk Low LowRisk High LowRisk LowRisk T&M can be a high risk for Buyer if contract does not include a “total not-to- exceed” (NTE) clause.
  • 60. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Risk Breakdown Structure 60
  • 61. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS  After you have identified the Risk, the next step is to develop the Risk Register.  Risk Register records details of all the risks identified at the beginning and during the life of the project.  Risk Register records their grading in terms of likelihood of occurrences and seriousness of impact on the project.  Risk Register record initial plans for mitigating each high level risk.  Risk Register defines the costs and responsibilities of the prescribed mitigation strategies and subsequent results.  The Register should be maintained throughout the project and will be updated regularly as existing risks are re-graded in the light of the effectiveness of the mitigation strategy, and new risks are identified 61 Risk Register
  • 62. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS  Has a unique Identifier for each risk item  A description of each risk and how it will affect the project  An assessment of the likelihood of occurrence and the seriousness of an impact if it does occur (low, medium, high)  A grading of each risk with reference to a risk assessment table.  A Risk Owner who is responsible for managing the risk  An outline of proposed mitigation actions (prevention and contingency)  Costing for each mitigation strategy 62 Characteristics of a Risk Register
  • 63. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Why Would You Develop the Risk Register?  It provides a useful tool for managing and reducing the risks identified before and during the project  It documents risk mitigation strategies in response to the identified risks and their grading in terms of likelihood and seriousness  It provides the Project Sponsor, Steering Committee with a documented framework from which risk status can be reported.  To ensure the communication of risk management issues to key stakeholders  It provides a mechanism for seeking and acting on feedback to encourage the involvement of the key stakeholders  To identify the mitigation actions required for implementation of the risk management plan and associated costs. 63
  • 64. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS When would You Develop the Risk Register  Risk should be documented at the Conceptual phase or the Origination phase of a project  Initial Risk Assessment document.  This initial risk assessment will form part of the Project Proposal or Business Case for the project.  Once the project is approved the Risk Management Plan and Risk Register should be fully developed.  In the case of smaller projects the Risk Register is sufficient to serve as the Risk Management Plan. 64
  • 65. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Checklist prior to developing the Risk Register  Knowledge and understanding of the project.  Knowledge and understanding of the Key Stakeholders.  Knowledge and understanding of appropriate types of risk management activities, or where to obtain them.  Project Proposal/Brief, Project Business Case, or Project Business Plan. 65
  • 66. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Components of a Risk Register  Dates: As the register is a living document, it is important to record the date that risks are identified or modified. Optional dates to include are the target and completion dates.  Description of the Risk: A phrase that describes the risk.  Risk type (business, project, stage): Classification of the risk, business risks relate to delivery of achieved benefits, project risks relate to the management of the project such as  Timeframes and resources, stage risks are risks associated with a specific stage plan.  The likelihood of occurrence: Provides an assessment of how likely it is that this risk will occur.  Examples of classifications are: L-Low (<30%), M-Medium (31-70%), H-High (>70%). 66
  • 67. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS Components of a Risk Register  Severity of effect: Provides an assessment of the impact that the occurrence of this risk would have on the project.  Counter Measures: Action to be taken to prevent, reduce or transfer the risk. This may include production of contingency plans.  Owner: Individual responsible must ensure that this risk is managed and counter measures are undertaken.  Status: Indicates whether this is a current risk or if risk can no longer arise and impact the project. Example classifications are: C-current or E-ended.  Other columns such as quantitative value can also be added if appropriate. 67
  • 68. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS No. Rank Risk Description Category Root Cause Triggers Potential Responses Risk Owner Probability Impact Severity Status R44 1 R21 2 R7 3 68 Sample Risk Register  Project severity = expectation (1-10) * impact (1-10)  When should risk analysis be formed?  Is not a time activity  Periodic update and reviewed
  • 69. © Copyright GAFM Academy® of Project Management - Managing RISKS in IT PROJECTS 69 end of module