SlideShare a Scribd company logo
1 of 6
Download to read offline
06-Feb-2012




                            Session 3

                           Risk management




RISK is                                      What is risk management?

                                             • Risk Assessment
 an uncertain event or condition that, if       – Identification
                                                – Analysis
   occurs, has an effect on at least one        – Prioritisation
            project objective                • Risk Control
                                                – Risk management planning
                                                – Resolution
                                                – Monitoring




                                                                                      1
06-Feb-2012




STEP 1: Risk identification                                            Common projects risks

Group work:                                                            • Cause the project to be delayed and/or over budget
                                                                       • Where do they come from
The project: marketing and selling your IT outsourcing                    –   Planning assumptions
services in the EU.                                                       –   Estimation errors
                                                                          –   Process uncertainties
                                                                          –   Other eventualities
Objectives:
   – in 2011 to have at least 3 projects and 2 new clients in the EU
   – Planned export revenue from the EU – EUR 100.000,-


   Create a list of RISKS in offshore IT outsourcing




Planning assumptions                                                   Estimation errors

• Why do we have to make assumptions?                                  • Estimation is difficult
   – Because there are many uncertainties at the beginning of the         – Lack of experience with similar tasks
     project                                                              – Lack of historical data
• A common assumption:                                                    – Nature of the task
   – “Everything will go smoothly”




                                                                                                                                 2
06-Feb-2012




Common risk factors in software development                                Common risk factors in software development

Group Work:                                                                A.   The application itself
                                                                           B.   Staff
     Create a list of key risks in software development                    C.   Project specific risks
                                                                           D.   Hardware and software
                                                                           E.   Changeover
                                                                           F.   Supplier
                                                                           G.   Environment
                                                                           H.   Health and safety




A. Application                                                             B. Staff

• Nature of the application                                                •    Experience and skills
   – A data processing application or a life-critical system (e.g. X-ray   •    Staff satisfaction
     emission system)
                                                                           •    Staff turn-over rates
• Expected size of the application
                                                                           •    Offshore IT outsourcing: lack of proper HRM practices
   – The larger is the size, the higher is the chance of errors,
     communication and management problems




                                                                                                                                        3
06-Feb-2012




C. The project itself                                                   D. Hardware and software

• Project objectives:                                                   • New hardware & software
   – Not well defined                                                      – Stability, availability
   – Unclear to team members and stakeholders                           • Cross platform development
• Project plan and organisation:                                           – Development platform is not the operation platform
   – Not well specified                                                    – Does the language used support cross platform development?
   – Unstructured




E. Changeover                                                           F. Suppliers
• ‘All-in-one’ changeover                                               • OFFSHORE OUTSOURCING RISKS
   – The new system is put into operation in one single step               – Buyers: “Why not IT outsourcing” list
• Incremental or staged changeover                                         – Suppliers: risks embedded in the ITO process
   – Adding new components to the system by phases
• Parallel changeover
                                                                        • Late delivery
   – Both the existing system and the new system are used in parallel
                                                                        • Instability of software
                                                                        • Difficult integration of components




                                                                                                                                          4
06-Feb-2012




G: Environment                                                                       H. Health and safety

• Changes in government policies                                                     • Health and safety of staff and environment
• Changes in business rules                                                             – Staff sickness, death, pregnancy etc.
                                                                                        – Any tragic accident to staff
• Restructuring of organizations
• Changes in environment such as sw. and/or hw.
  platforms.
• Economic or industry crisis




STEP 2: Risk estimation                                                             Probability of 3 x Impact of 5 = Risk of 15
• Risk estimation is to assess the likelihood and impact of
  each risk element (hazard)

             Risk exposure = risk probability × risk impact

•   Risk exposure (risk rating): it is the importance of the risk
•   Risk probability (rank 1-10): The probability that a hazard is going to occur
•   Risk impact (rank 1-10): The effect of the problem caused by the hazard




                                                                                                                                             5
06-Feb-2012




STEP 3: Risk evaluation                                      Risk reduction strategies

1. Review and prioritize risks                               •   Prevention
2. Determining the corresponding risk reduction strategies   •   Likelihood reduction
                                                             •   Risk avoidance
                                                             •   Risk transfer
Example: late/slow communication by the European             •   Contingency planning
            partner
Priority: High
Risk reduction strategy: ?




                                                                                                  6

More Related Content

What's hot

Horn thomas
Horn thomasHorn thomas
Horn thomas
NASAPMC
 
Terry.conroy
Terry.conroyTerry.conroy
Terry.conroy
NASAPMC
 
Bush.stewart
Bush.stewartBush.stewart
Bush.stewart
NASAPMC
 
Sally godfreyheatherrarick
Sally godfreyheatherrarickSally godfreyheatherrarick
Sally godfreyheatherrarick
NASAPMC
 
K.pagel.beene
K.pagel.beeneK.pagel.beene
K.pagel.beene
NASAPMC
 
Smalley sandra
Smalley sandraSmalley sandra
Smalley sandra
NASAPMC
 
Rackley mike
Rackley mikeRackley mike
Rackley mike
NASAPMC
 
Amer.tahani
Amer.tahaniAmer.tahani
Amer.tahani
NASAPMC
 
Gary.humphreys
Gary.humphreysGary.humphreys
Gary.humphreys
NASAPMC
 
Vonnie simonsen
Vonnie simonsenVonnie simonsen
Vonnie simonsen
NASAPMC
 
Law.richard
Law.richardLaw.richard
Law.richard
NASAPMC
 
Improving Cm Programs (Melbourne, 2008)
Improving Cm Programs (Melbourne, 2008)Improving Cm Programs (Melbourne, 2008)
Improving Cm Programs (Melbourne, 2008)
Chad Moffiet
 
C armstrong tbyers
C armstrong tbyersC armstrong tbyers
C armstrong tbyers
NASAPMC
 
Snow lee
Snow leeSnow lee
Snow lee
NASAPMC
 
Canga.m.wood.j
Canga.m.wood.jCanga.m.wood.j
Canga.m.wood.j
NASAPMC
 
Dan galorath
Dan galorathDan galorath
Dan galorath
NASAPMC
 
Baldwin.kristen
Baldwin.kristenBaldwin.kristen
Baldwin.kristen
NASAPMC
 
Rhodes.donna
Rhodes.donnaRhodes.donna
Rhodes.donna
NASAPMC
 
Lengyel dave
Lengyel daveLengyel dave
Lengyel dave
NASAPMC
 
Thomas.mc vittie
Thomas.mc vittieThomas.mc vittie
Thomas.mc vittie
NASAPMC
 

What's hot (20)

Horn thomas
Horn thomasHorn thomas
Horn thomas
 
Terry.conroy
Terry.conroyTerry.conroy
Terry.conroy
 
Bush.stewart
Bush.stewartBush.stewart
Bush.stewart
 
Sally godfreyheatherrarick
Sally godfreyheatherrarickSally godfreyheatherrarick
Sally godfreyheatherrarick
 
K.pagel.beene
K.pagel.beeneK.pagel.beene
K.pagel.beene
 
Smalley sandra
Smalley sandraSmalley sandra
Smalley sandra
 
Rackley mike
Rackley mikeRackley mike
Rackley mike
 
Amer.tahani
Amer.tahaniAmer.tahani
Amer.tahani
 
Gary.humphreys
Gary.humphreysGary.humphreys
Gary.humphreys
 
Vonnie simonsen
Vonnie simonsenVonnie simonsen
Vonnie simonsen
 
Law.richard
Law.richardLaw.richard
Law.richard
 
Improving Cm Programs (Melbourne, 2008)
Improving Cm Programs (Melbourne, 2008)Improving Cm Programs (Melbourne, 2008)
Improving Cm Programs (Melbourne, 2008)
 
C armstrong tbyers
C armstrong tbyersC armstrong tbyers
C armstrong tbyers
 
Snow lee
Snow leeSnow lee
Snow lee
 
Canga.m.wood.j
Canga.m.wood.jCanga.m.wood.j
Canga.m.wood.j
 
Dan galorath
Dan galorathDan galorath
Dan galorath
 
Baldwin.kristen
Baldwin.kristenBaldwin.kristen
Baldwin.kristen
 
Rhodes.donna
Rhodes.donnaRhodes.donna
Rhodes.donna
 
Lengyel dave
Lengyel daveLengyel dave
Lengyel dave
 
Thomas.mc vittie
Thomas.mc vittieThomas.mc vittie
Thomas.mc vittie
 

Similar to Planificación del proyecto análisis de riesgo

SDPM - Lecture 3 - Selecting an appropriate software development approach.pdf
SDPM - Lecture 3 - Selecting an appropriate software development approach.pdfSDPM - Lecture 3 - Selecting an appropriate software development approach.pdf
SDPM - Lecture 3 - Selecting an appropriate software development approach.pdf
OpenLearningLab
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
gnitu
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradability
Len Bass
 
Application Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerApplication Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability Manager
Denim Group
 
P&msp2010 08 development-management
P&msp2010 08 development-managementP&msp2010 08 development-management
P&msp2010 08 development-management
Emanuele Della Valle
 
¿Cómo gestionar un proyecto aspectos clave
¿Cómo gestionar un proyecto   aspectos clave¿Cómo gestionar un proyecto   aspectos clave
¿Cómo gestionar un proyecto aspectos clave
ProColombia
 
Warren Marquis Value Summary
Warren Marquis Value SummaryWarren Marquis Value Summary
Warren Marquis Value Summary
wbm1701
 
E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010
bdwwork
 

Similar to Planificación del proyecto análisis de riesgo (20)

Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
SDPM - Lecture 3 - Selecting an appropriate software development approach.pdf
SDPM - Lecture 3 - Selecting an appropriate software development approach.pdfSDPM - Lecture 3 - Selecting an appropriate software development approach.pdf
SDPM - Lecture 3 - Selecting an appropriate software development approach.pdf
 
My talk at PMI Sweden Congress 2013 on Agile and Large Software Products
My talk at PMI Sweden Congress 2013 on Agile and Large Software ProductsMy talk at PMI Sweden Congress 2013 on Agile and Large Software Products
My talk at PMI Sweden Congress 2013 on Agile and Large Software Products
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradability
 
Intoduction to software engineering part 1
Intoduction to software engineering part 1Intoduction to software engineering part 1
Intoduction to software engineering part 1
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and Secure
 
Application Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerApplication Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability Manager
 
P&msp2010 08 development-management
P&msp2010 08 development-managementP&msp2010 08 development-management
P&msp2010 08 development-management
 
Process Improvement for better Software Technical Quality under Global Crisis...
Process Improvement for better Software Technical Quality under Global Crisis...Process Improvement for better Software Technical Quality under Global Crisis...
Process Improvement for better Software Technical Quality under Global Crisis...
 
Another Agile Intro
Another Agile IntroAnother Agile Intro
Another Agile Intro
 
¿Cómo gestionar un proyecto aspectos clave
¿Cómo gestionar un proyecto   aspectos clave¿Cómo gestionar un proyecto   aspectos clave
¿Cómo gestionar un proyecto aspectos clave
 
Warren Marquis Value Summary
Warren Marquis Value SummaryWarren Marquis Value Summary
Warren Marquis Value Summary
 
Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?
 
E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010E2 Manage Tech Design Implementation General 2010
E2 Manage Tech Design Implementation General 2010
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Skeletons in the Closet: Securing Inherited Applications
Skeletons in the Closet: Securing Inherited ApplicationsSkeletons in the Closet: Securing Inherited Applications
Skeletons in the Closet: Securing Inherited Applications
 

More from ProColombia

La cadena de valor de las bodas de destino y el impacto social en las comunid...
La cadena de valor de las bodas de destino y el impacto social en las comunid...La cadena de valor de las bodas de destino y el impacto social en las comunid...
La cadena de valor de las bodas de destino y el impacto social en las comunid...
ProColombia
 

More from ProColombia (20)

8 Inversiones para el desarrollo sostenible (1).pdf
8 Inversiones para el desarrollo sostenible (1).pdf8 Inversiones para el desarrollo sostenible (1).pdf
8 Inversiones para el desarrollo sostenible (1).pdf
 
7 Iniciativas Innovadoras (1).pdf
7 Iniciativas Innovadoras (1).pdf7 Iniciativas Innovadoras (1).pdf
7 Iniciativas Innovadoras (1).pdf
 
6 Territorios como destino de inversión (1).pdf
6 Territorios como destino de inversión (1).pdf6 Territorios como destino de inversión (1).pdf
6 Territorios como destino de inversión (1).pdf
 
5 Estrategia de Procolombia (3).pdf
5 Estrategia de Procolombia (3).pdf5 Estrategia de Procolombia (3).pdf
5 Estrategia de Procolombia (3).pdf
 
4 Tendencias Globales (3).pdf
4 Tendencias Globales (3).pdf4 Tendencias Globales (3).pdf
4 Tendencias Globales (3).pdf
 
3 Política de Reindustrialización (2).pdf
3 Política de Reindustrialización (2).pdf3 Política de Reindustrialización (2).pdf
3 Política de Reindustrialización (2).pdf
 
2 Plan Nacional de Desarrollo (2).pdf
2 Plan Nacional de Desarrollo (2).pdf2 Plan Nacional de Desarrollo (2).pdf
2 Plan Nacional de Desarrollo (2).pdf
 
2 Plan Nacional de Desarrollo (2).pdf
2 Plan Nacional de Desarrollo (2).pdf2 Plan Nacional de Desarrollo (2).pdf
2 Plan Nacional de Desarrollo (2).pdf
 
boletin_de_actualidad_de_procolombia_en_materia_de_inversion_para_todas_las_r...
boletin_de_actualidad_de_procolombia_en_materia_de_inversion_para_todas_las_r...boletin_de_actualidad_de_procolombia_en_materia_de_inversion_para_todas_las_r...
boletin_de_actualidad_de_procolombia_en_materia_de_inversion_para_todas_las_r...
 
Bodas Multiculturales y la oportunidad para Colombia.pdf
Bodas Multiculturales y la oportunidad para Colombia.pdfBodas Multiculturales y la oportunidad para Colombia.pdf
Bodas Multiculturales y la oportunidad para Colombia.pdf
 
perfilcannabis2023australia-230602005622-b48a4aaa.pdf
perfilcannabis2023australia-230602005622-b48a4aaa.pdfperfilcannabis2023australia-230602005622-b48a4aaa.pdf
perfilcannabis2023australia-230602005622-b48a4aaa.pdf
 
perfilcannabis2023australia-230602005622-b48a4aaa.pdf
perfilcannabis2023australia-230602005622-b48a4aaa.pdfperfilcannabis2023australia-230602005622-b48a4aaa.pdf
perfilcannabis2023australia-230602005622-b48a4aaa.pdf
 
LACADE~1.PDF
LACADE~1.PDFLACADE~1.PDF
LACADE~1.PDF
 
El negocio de las bodas destino .pdf
El negocio de las bodas destino .pdfEl negocio de las bodas destino .pdf
El negocio de las bodas destino .pdf
 
Congreso de Bodas LAT 2023.pdf
Congreso de Bodas LAT 2023.pdfCongreso de Bodas LAT 2023.pdf
Congreso de Bodas LAT 2023.pdf
 
DEQUMA~1.PDF
DEQUMA~1.PDFDEQUMA~1.PDF
DEQUMA~1.PDF
 
Congreso de Bodas LAT 2023.pdf
Congreso de Bodas LAT 2023.pdfCongreso de Bodas LAT 2023.pdf
Congreso de Bodas LAT 2023.pdf
 
Bodas Multiculturales y la oportunidad para Colombia.pdf
Bodas Multiculturales y la oportunidad para Colombia.pdfBodas Multiculturales y la oportunidad para Colombia.pdf
Bodas Multiculturales y la oportunidad para Colombia.pdf
 
La cadena de valor de las bodas de destino y el impacto social en las comunid...
La cadena de valor de las bodas de destino y el impacto social en las comunid...La cadena de valor de las bodas de destino y el impacto social en las comunid...
La cadena de valor de las bodas de destino y el impacto social en las comunid...
 
Diseño de la experiencia en una boda destino.pdf
Diseño de la experiencia en una boda destino.pdfDiseño de la experiencia en una boda destino.pdf
Diseño de la experiencia en una boda destino.pdf
 

Planificación del proyecto análisis de riesgo

  • 1. 06-Feb-2012 Session 3 Risk management RISK is What is risk management? • Risk Assessment an uncertain event or condition that, if – Identification – Analysis occurs, has an effect on at least one – Prioritisation project objective • Risk Control – Risk management planning – Resolution – Monitoring 1
  • 2. 06-Feb-2012 STEP 1: Risk identification Common projects risks Group work: • Cause the project to be delayed and/or over budget • Where do they come from The project: marketing and selling your IT outsourcing – Planning assumptions services in the EU. – Estimation errors – Process uncertainties – Other eventualities Objectives: – in 2011 to have at least 3 projects and 2 new clients in the EU – Planned export revenue from the EU – EUR 100.000,- Create a list of RISKS in offshore IT outsourcing Planning assumptions Estimation errors • Why do we have to make assumptions? • Estimation is difficult – Because there are many uncertainties at the beginning of the – Lack of experience with similar tasks project – Lack of historical data • A common assumption: – Nature of the task – “Everything will go smoothly” 2
  • 3. 06-Feb-2012 Common risk factors in software development Common risk factors in software development Group Work: A. The application itself B. Staff Create a list of key risks in software development C. Project specific risks D. Hardware and software E. Changeover F. Supplier G. Environment H. Health and safety A. Application B. Staff • Nature of the application • Experience and skills – A data processing application or a life-critical system (e.g. X-ray • Staff satisfaction emission system) • Staff turn-over rates • Expected size of the application • Offshore IT outsourcing: lack of proper HRM practices – The larger is the size, the higher is the chance of errors, communication and management problems 3
  • 4. 06-Feb-2012 C. The project itself D. Hardware and software • Project objectives: • New hardware & software – Not well defined – Stability, availability – Unclear to team members and stakeholders • Cross platform development • Project plan and organisation: – Development platform is not the operation platform – Not well specified – Does the language used support cross platform development? – Unstructured E. Changeover F. Suppliers • ‘All-in-one’ changeover • OFFSHORE OUTSOURCING RISKS – The new system is put into operation in one single step – Buyers: “Why not IT outsourcing” list • Incremental or staged changeover – Suppliers: risks embedded in the ITO process – Adding new components to the system by phases • Parallel changeover • Late delivery – Both the existing system and the new system are used in parallel • Instability of software • Difficult integration of components 4
  • 5. 06-Feb-2012 G: Environment H. Health and safety • Changes in government policies • Health and safety of staff and environment • Changes in business rules – Staff sickness, death, pregnancy etc. – Any tragic accident to staff • Restructuring of organizations • Changes in environment such as sw. and/or hw. platforms. • Economic or industry crisis STEP 2: Risk estimation Probability of 3 x Impact of 5 = Risk of 15 • Risk estimation is to assess the likelihood and impact of each risk element (hazard) Risk exposure = risk probability × risk impact • Risk exposure (risk rating): it is the importance of the risk • Risk probability (rank 1-10): The probability that a hazard is going to occur • Risk impact (rank 1-10): The effect of the problem caused by the hazard 5
  • 6. 06-Feb-2012 STEP 3: Risk evaluation Risk reduction strategies 1. Review and prioritize risks • Prevention 2. Determining the corresponding risk reduction strategies • Likelihood reduction • Risk avoidance • Risk transfer Example: late/slow communication by the European • Contingency planning partner Priority: High Risk reduction strategy: ? 6