SlideShare a Scribd company logo
© 2011 IBM Corporation
Project Risk Management
Sasha Lazarevic, PMP, PMI-RMP
September 2, 2011
© 2011 IBM Corporation2
Introduction
 Success in business is determined by just two things: winning new business
and managing risk
 But statistics are almost tragic:
– 60% ERP projects were late and 70% over budget (US market report 2010)
– 34% of IT projects will finish on time and budget (Standish CHAOS Report 2010)
– 50% of IT projects will cost 189% more than original estimates
– 20% of IT projects will bring full statisfaction
 “Lightning never strikes twice in the same place”
– But lightning strikes the same spot hundreds of times, always the highest place with the best
electrical connection to the ground. The same with projects: Problems tend to recur in project
after project, unless the root cause is understood and something differently is done to avoid
the problem.
 « There is not enough time for risk planning »
- But is there enough time for rework, firefighting, and recovering troubled projects ?
© 2011 IBM Corporation3
Beware of: Humans
 Salesmen
- Strategy “price to win the business”. In this case, it might be even impossible to deliver the
project.
 Project sponsors
– They are ambitious and much more risk tolerant than most project leaders and teams.
 Line managers
– Escalations to them usually don’t work.
 Engineers
- Most engineers are analytical, and like to be precise, accurate, and thorough. If there is time
available to try to make something perfect, most engineers will try.
 Ourselves (as Project Leaders)
- People tend to estimate desirable outcomes as more probable than it is realistic (“This lottery
ticket is sure to win”). The result are over-optimistic estimates.
© 2011 IBM Corporation4
Beware of: Project Design
 Project Size
- Very large projects are rarely successful. As project is bigger, as more risks it carries
- Project that is only 20% larger than previous one has significant risk
 Lack of details
- When describing details of the work to be done or the technical solution to the lowest level is
difficult, it is sign of risk. What is not clear in the beginning tends to keep unclear until the end. And
then it causes delays.
 Non-assigned activities
- Any activity where owner is not named during planning phase is a risk. What is not assigned in
the beginning, tends to remain unassigned until the end. And then it causes delays.
 Invisible correlation among project risks
- Most risks become much more likely after other risks have occurred. Project activities are linked
through common resources and methodologies. Whenever there is a problem, all of the project
leader’s attention (and much of the project team’s) will be on recovery. Much less focus will remain
on other project activities, and the troubles start to appear everywhere.
© 2011 IBM Corporation5
And what about this ?
 Mandatory use of new technology
 Unfamiliar tools, methods or solutions
 Incomplete or poorly defined acceptance tests or criteria
 Technical complexity
 Conflicting or inconsistent specifications
 Dependency on external companies for a key subcomponent
– 75% of all deliverables from external suppliers are late or unsatisfactory
 Influences from other orgnizational units to favor friends, to align with
“strategic” partners, or to use a global (or a local) supplier
– If the suppliers are not selected by the project team, this represents significant, and
sometimes disastrous, project risk
© 2011 IBM Corporation6
How to manage all these risks ?
 Schedule risky activities earlier, so the problems can be uncovered as soon as
possible
 Be ready to abandon the project
 Make two schedules: target schedule and committed schedule
– target schedule for a risky project might be twelve months, but the committed schedule,
reflecting potential problems, may be set at fourteen months. Completion within (or before) this
range defines a successful project.
 Identify if risks are controllable or out of control
– For those controllable, establish early warning system
– For those out of control, experiment with shifting the time, changing responsible owner,
infrastructure, or other parameters
 Avoid unproven technologies whenever possible
– If avoiding is not possible, develop plan B based on already proven methods
 Test with users, early and often
 Publish « top ten » risks to the project team and internal project sponsors
 Watch for risks
 Use project portfolio risk management to eliminate particularly risky projects
and focus on best available project opportunities
 Do smaller projects, decompose large initiatives into smal pieces
© 2011 IBM Corporation7
Overall Risk Management Process
 1. Preliminary Risk Assessment
 2. Risk Management Planning
 3. Risk Identification
 4. Risk Analysis
 5. Risk Response Planning
 6. Risk Monitoring and Control
© 2011 IBM Corporation8
Process Flowchart
© 2011 IBM Corporation9
Step 1: Preliminary Risk Assessment
Objective: Identify major and visible risks
Risk Categories :
 Risks to win business
 Risks to win profit
 Risks for the customer satisfaction
Balanced approach to minimize overall risk
Determine potential financial loss that the project can incur
Setup the requirements and resources for the future risk management
© 2011 IBM Corporation10
Risk Template
© 2011 IBM Corporation11
Step 2: Risk Management Planning
Objective: Create Risk Management Plan
 Inputs : contract, statement of work
 Output: Risk Management Plan. Components :
- Methodology,
- Roles and Responsibilites,
- Budgeting,
- Definition of risk categories,
- Definition of probability and impacts,
- Stakeholder risk tolerance,
- Reporting and tracking requirements
© 2011 IBM Corporation12
Exhibit: Risk Impact Matrix
Other risks
Personal consequences Bad performance appraisal, loss of reputation, no prospect for promotion,
health problems
Team consequences Loss of productivity, team disputes
Organizational consequences Delayed concurrent projects, resignations, loss of trust
Risk level Impact description
Very High Project « showstopper » that can result in the project cancellation, or make overall long-
term business impact
High Risk that threatens one or more of the project objectives like company’s satisfaction
(read: profit), customer satisfaction (read: delays and quality)
Moderate Risk that results in significant project replanning and would lead to a noticeable effect for
the organization
Low Any impact that can be handled within the project team
Very Low Any impact that is not visible outside the project team
© 2011 IBM Corporation13
Step 3: Risk Identification
Objective: create Risk Register
Inputs: historical records, lessons learnt from previous projects, Risk Management
Plan, Project Scope Statement, WBS, Project Schedule, activity estimates,
stakeholder register
Techniques: Organize Risk Identification Workshop, Brainstorming, Root-cause
Analysis, Interviewing, Delphi technique, Documentation Review, use already
available checklists, develop process flowcharts, use iterative process
Outputs: List of identified risks, their potential impacts and potential responses
© 2011 IBM Corporation14
Exhibit: Risk Register
© 2011 IBM Corporation15
Step 4: Risk Analysis
Objective: separate big from small, urgent from less urgent risks
Inputs: Risk register, Risk Management Plan, Project Scope Statement
Techniques: Organize Risk Analysis Workshop, risk probability and impact
assessment, risk categorization, risk urgency assessment, risk sensitivity analysis,
decision tree analysis, use iterative process
Outputs: Update the Risk Register (priority list of risks, near-term response risks),
Watch-list, new risks can be added
© 2011 IBM Corporation16
Step 5: Risk Response Planning
Objective: determine the best possible responses to identified risks
Inputs: Risk register, Risk Management Plan
Techniques: Avoid, Transfer, Reduce, Acceptance (active and passive)
- Active acceptance means putting contingency reserves aside should the risks
occur (money or time buffers)
- Organize Risk Response Planning Workshop
Outputs:
- Update the Risk Register (risk owners, risk triggers, risk action plans, fallback
plans in case primary plans don’t work, list of residual risks after actions have been
performed, list of secondary risks caused by the actions),
- Update all project related plans (schedules, cost, procurement etc)
© 2011 IBM Corporation17
Step 6: Risk Monitoring and Control
Objective: track risks, activate risk response plans, identify new risks,
implement workarounds
Inputs: Risk register, Individual work reports,
Techniques: Risk reassessment, Audits, Quality assurance reviews, Status meetings,
Trend analysis, Reserve analysis (of the contingency reserves)
Outputs: Update the Risk Register (closed risks, new risks) , Change Requests,
updates to the relevant project plans, Lessons Learnt

More Related Content

What's hot

“Construction Risk Management”
“Construction Risk Management”“Construction Risk Management”
“Construction Risk Management”Ary Jamil
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk ManagementGlen Alleman
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
Exploration of risks and risk management in construction project delivery
Exploration of risks and risk management in construction project deliveryExploration of risks and risk management in construction project delivery
Exploration of risks and risk management in construction project deliveryMECandPMV
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementMarkos Mulat G
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)Serdar Temiz
 
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...Liana Underwood
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)Nesma
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks ReviewDavid Tennant
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register simplesteps
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshopBestoutcome
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementSaket Bansal
 

What's hot (20)

“Construction Risk Management”
“Construction Risk Management”“Construction Risk Management”
“Construction Risk Management”
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk Management
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
Exploration of risks and risk management in construction project delivery
Exploration of risks and risk management in construction project deliveryExploration of risks and risk management in construction project delivery
Exploration of risks and risk management in construction project delivery
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)
 
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks Review
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register
 
Risk management
Risk managementRisk management
Risk management
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshop
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk Management
 

Similar to Project Risk Management - Introduction 2011

project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptBetshaTizazu2
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptAyidAlmgati
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptDorraLamouchi1
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptavisha23
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Managementcgautam
 
Risk Managementa
Risk ManagementaRisk Managementa
Risk ManagementaKumar
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptxKamranKhan353531
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementNimat Khattak
 
Challenging Aspects of Modern Project Management
Challenging Aspects of Modern Project ManagementChallenging Aspects of Modern Project Management
Challenging Aspects of Modern Project ManagementYamanta Raj Niroula, PMP
 
Women in Innovation - Risk Register: What Could Possibly Go Wrong
Women in Innovation - Risk Register: What Could Possibly Go WrongWomen in Innovation - Risk Register: What Could Possibly Go Wrong
Women in Innovation - Risk Register: What Could Possibly Go WrongKTN
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddShepherdChidambaeh
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)ShudipPal
 
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskPMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskMuzette Charles, PMP
 
Risk Management ProcessTraining Session Victor Allen.docx
Risk Management ProcessTraining Session Victor Allen.docxRisk Management ProcessTraining Session Victor Allen.docx
Risk Management ProcessTraining Session Victor Allen.docxSUBHI7
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)Jed Concepcion
 

Similar to Project Risk Management - Introduction 2011 (20)

project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
A Framework for Managing Project Risk
A Framework for Managing Project RiskA Framework for Managing Project Risk
A Framework for Managing Project Risk
 
Risk Managementa
Risk ManagementaRisk Managementa
Risk Managementa
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Challenging Aspects of Modern Project Management
Challenging Aspects of Modern Project ManagementChallenging Aspects of Modern Project Management
Challenging Aspects of Modern Project Management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Women in Innovation - Risk Register: What Could Possibly Go Wrong
Women in Innovation - Risk Register: What Could Possibly Go WrongWomen in Innovation - Risk Register: What Could Possibly Go Wrong
Women in Innovation - Risk Register: What Could Possibly Go Wrong
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_RiskPMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
PMP Muzette Charles_Sp2019_Week5_Chapter11_Risk
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management ProcessTraining Session Victor Allen.docx
Risk Management ProcessTraining Session Victor Allen.docxRisk Management ProcessTraining Session Victor Allen.docx
Risk Management ProcessTraining Session Victor Allen.docx
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)
 

More from Sasha Lazarevic

Quantum Machine Learning for IBM AI
Quantum Machine Learning for IBM AIQuantum Machine Learning for IBM AI
Quantum Machine Learning for IBM AISasha Lazarevic
 
BMDSE v1 - Data Scientist Deck
BMDSE v1 - Data Scientist DeckBMDSE v1 - Data Scientist Deck
BMDSE v1 - Data Scientist DeckSasha Lazarevic
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantSasha Lazarevic
 
Cognitive Urban Transport
Cognitive Urban TransportCognitive Urban Transport
Cognitive Urban TransportSasha Lazarevic
 
DataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the DataDataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the DataSasha Lazarevic
 
Deep Learning and Watson Studio
Deep Learning and Watson StudioDeep Learning and Watson Studio
Deep Learning and Watson StudioSasha Lazarevic
 
Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016
Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016
Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016Sasha Lazarevic
 
What is OpenStack and the added value of IBM solutions
What is OpenStack and the added value of IBM solutionsWhat is OpenStack and the added value of IBM solutions
What is OpenStack and the added value of IBM solutionsSasha Lazarevic
 

More from Sasha Lazarevic (11)

Quantum Machine Learning for IBM AI
Quantum Machine Learning for IBM AIQuantum Machine Learning for IBM AI
Quantum Machine Learning for IBM AI
 
BMDSE v1 - Data Scientist Deck
BMDSE v1 - Data Scientist DeckBMDSE v1 - Data Scientist Deck
BMDSE v1 - Data Scientist Deck
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 
AI and Blockchain
AI and BlockchainAI and Blockchain
AI and Blockchain
 
Lean IT Transformation
Lean IT TransformationLean IT Transformation
Lean IT Transformation
 
Cognitive Urban Transport
Cognitive Urban TransportCognitive Urban Transport
Cognitive Urban Transport
 
DataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the DataDataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the Data
 
Deep Learning and Watson Studio
Deep Learning and Watson StudioDeep Learning and Watson Studio
Deep Learning and Watson Studio
 
AI in HR -
AI in HR - AI in HR -
AI in HR -
 
Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016
Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016
Cognitive Computing and IBM Watson Solutions in FinTech Industry - 2016
 
What is OpenStack and the added value of IBM solutions
What is OpenStack and the added value of IBM solutionsWhat is OpenStack and the added value of IBM solutions
What is OpenStack and the added value of IBM solutions
 

Recently uploaded

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanasabutalha2013
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBen Wann
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumzyqmx62fgm
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiaFalcon Invoice Discounting
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content MarketingChuck Aikens
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdftjcomstrang
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.smalmahmud11
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback AnalysisSafe PaaS
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfSam H
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfJos Voskuil
 
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdfMaximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdfPaulBryant58
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.FelixPerez547899
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseirhcs
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementBojamma2
 

Recently uploaded (20)

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdfMaximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
Maximizing Efficiency Migrating AccountEdge Data to QuickBooks.pdf
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings release
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 

Project Risk Management - Introduction 2011

  • 1. © 2011 IBM Corporation Project Risk Management Sasha Lazarevic, PMP, PMI-RMP September 2, 2011
  • 2. © 2011 IBM Corporation2 Introduction  Success in business is determined by just two things: winning new business and managing risk  But statistics are almost tragic: – 60% ERP projects were late and 70% over budget (US market report 2010) – 34% of IT projects will finish on time and budget (Standish CHAOS Report 2010) – 50% of IT projects will cost 189% more than original estimates – 20% of IT projects will bring full statisfaction  “Lightning never strikes twice in the same place” – But lightning strikes the same spot hundreds of times, always the highest place with the best electrical connection to the ground. The same with projects: Problems tend to recur in project after project, unless the root cause is understood and something differently is done to avoid the problem.  « There is not enough time for risk planning » - But is there enough time for rework, firefighting, and recovering troubled projects ?
  • 3. © 2011 IBM Corporation3 Beware of: Humans  Salesmen - Strategy “price to win the business”. In this case, it might be even impossible to deliver the project.  Project sponsors – They are ambitious and much more risk tolerant than most project leaders and teams.  Line managers – Escalations to them usually don’t work.  Engineers - Most engineers are analytical, and like to be precise, accurate, and thorough. If there is time available to try to make something perfect, most engineers will try.  Ourselves (as Project Leaders) - People tend to estimate desirable outcomes as more probable than it is realistic (“This lottery ticket is sure to win”). The result are over-optimistic estimates.
  • 4. © 2011 IBM Corporation4 Beware of: Project Design  Project Size - Very large projects are rarely successful. As project is bigger, as more risks it carries - Project that is only 20% larger than previous one has significant risk  Lack of details - When describing details of the work to be done or the technical solution to the lowest level is difficult, it is sign of risk. What is not clear in the beginning tends to keep unclear until the end. And then it causes delays.  Non-assigned activities - Any activity where owner is not named during planning phase is a risk. What is not assigned in the beginning, tends to remain unassigned until the end. And then it causes delays.  Invisible correlation among project risks - Most risks become much more likely after other risks have occurred. Project activities are linked through common resources and methodologies. Whenever there is a problem, all of the project leader’s attention (and much of the project team’s) will be on recovery. Much less focus will remain on other project activities, and the troubles start to appear everywhere.
  • 5. © 2011 IBM Corporation5 And what about this ?  Mandatory use of new technology  Unfamiliar tools, methods or solutions  Incomplete or poorly defined acceptance tests or criteria  Technical complexity  Conflicting or inconsistent specifications  Dependency on external companies for a key subcomponent – 75% of all deliverables from external suppliers are late or unsatisfactory  Influences from other orgnizational units to favor friends, to align with “strategic” partners, or to use a global (or a local) supplier – If the suppliers are not selected by the project team, this represents significant, and sometimes disastrous, project risk
  • 6. © 2011 IBM Corporation6 How to manage all these risks ?  Schedule risky activities earlier, so the problems can be uncovered as soon as possible  Be ready to abandon the project  Make two schedules: target schedule and committed schedule – target schedule for a risky project might be twelve months, but the committed schedule, reflecting potential problems, may be set at fourteen months. Completion within (or before) this range defines a successful project.  Identify if risks are controllable or out of control – For those controllable, establish early warning system – For those out of control, experiment with shifting the time, changing responsible owner, infrastructure, or other parameters  Avoid unproven technologies whenever possible – If avoiding is not possible, develop plan B based on already proven methods  Test with users, early and often  Publish « top ten » risks to the project team and internal project sponsors  Watch for risks  Use project portfolio risk management to eliminate particularly risky projects and focus on best available project opportunities  Do smaller projects, decompose large initiatives into smal pieces
  • 7. © 2011 IBM Corporation7 Overall Risk Management Process  1. Preliminary Risk Assessment  2. Risk Management Planning  3. Risk Identification  4. Risk Analysis  5. Risk Response Planning  6. Risk Monitoring and Control
  • 8. © 2011 IBM Corporation8 Process Flowchart
  • 9. © 2011 IBM Corporation9 Step 1: Preliminary Risk Assessment Objective: Identify major and visible risks Risk Categories :  Risks to win business  Risks to win profit  Risks for the customer satisfaction Balanced approach to minimize overall risk Determine potential financial loss that the project can incur Setup the requirements and resources for the future risk management
  • 10. © 2011 IBM Corporation10 Risk Template
  • 11. © 2011 IBM Corporation11 Step 2: Risk Management Planning Objective: Create Risk Management Plan  Inputs : contract, statement of work  Output: Risk Management Plan. Components : - Methodology, - Roles and Responsibilites, - Budgeting, - Definition of risk categories, - Definition of probability and impacts, - Stakeholder risk tolerance, - Reporting and tracking requirements
  • 12. © 2011 IBM Corporation12 Exhibit: Risk Impact Matrix Other risks Personal consequences Bad performance appraisal, loss of reputation, no prospect for promotion, health problems Team consequences Loss of productivity, team disputes Organizational consequences Delayed concurrent projects, resignations, loss of trust Risk level Impact description Very High Project « showstopper » that can result in the project cancellation, or make overall long- term business impact High Risk that threatens one or more of the project objectives like company’s satisfaction (read: profit), customer satisfaction (read: delays and quality) Moderate Risk that results in significant project replanning and would lead to a noticeable effect for the organization Low Any impact that can be handled within the project team Very Low Any impact that is not visible outside the project team
  • 13. © 2011 IBM Corporation13 Step 3: Risk Identification Objective: create Risk Register Inputs: historical records, lessons learnt from previous projects, Risk Management Plan, Project Scope Statement, WBS, Project Schedule, activity estimates, stakeholder register Techniques: Organize Risk Identification Workshop, Brainstorming, Root-cause Analysis, Interviewing, Delphi technique, Documentation Review, use already available checklists, develop process flowcharts, use iterative process Outputs: List of identified risks, their potential impacts and potential responses
  • 14. © 2011 IBM Corporation14 Exhibit: Risk Register
  • 15. © 2011 IBM Corporation15 Step 4: Risk Analysis Objective: separate big from small, urgent from less urgent risks Inputs: Risk register, Risk Management Plan, Project Scope Statement Techniques: Organize Risk Analysis Workshop, risk probability and impact assessment, risk categorization, risk urgency assessment, risk sensitivity analysis, decision tree analysis, use iterative process Outputs: Update the Risk Register (priority list of risks, near-term response risks), Watch-list, new risks can be added
  • 16. © 2011 IBM Corporation16 Step 5: Risk Response Planning Objective: determine the best possible responses to identified risks Inputs: Risk register, Risk Management Plan Techniques: Avoid, Transfer, Reduce, Acceptance (active and passive) - Active acceptance means putting contingency reserves aside should the risks occur (money or time buffers) - Organize Risk Response Planning Workshop Outputs: - Update the Risk Register (risk owners, risk triggers, risk action plans, fallback plans in case primary plans don’t work, list of residual risks after actions have been performed, list of secondary risks caused by the actions), - Update all project related plans (schedules, cost, procurement etc)
  • 17. © 2011 IBM Corporation17 Step 6: Risk Monitoring and Control Objective: track risks, activate risk response plans, identify new risks, implement workarounds Inputs: Risk register, Individual work reports, Techniques: Risk reassessment, Audits, Quality assurance reviews, Status meetings, Trend analysis, Reserve analysis (of the contingency reserves) Outputs: Update the Risk Register (closed risks, new risks) , Change Requests, updates to the relevant project plans, Lessons Learnt