SlideShare a Scribd company logo
1 of 13
Risk Management in Software Industry



                            Presented by –
                             Rehan Akhtar
Introduction
The purpose of Risk Management is to identify
potential problems before they occur so that
risk-handling activities can be planned and
invoked as needed across the life of the product
or project to mitigate adverse impacts on
achieving objectives.
Importance
Capability Maturity Model Integrated (CMMi)
Importance cont…

ISO    20000 (Service Management)
   ◦The ultimate goal of ISO 20000 is to:
   ◦Reduce operational exposure to risk

   ◦Meet contractual requirements
   ◦Demonstrate service quality


TL    9000 for Telecom Industry
   ◦   Similar to ISO 9000
ITIL
    V3 (Best Practices for IT Service
Management)
   ◦   Risk Management and Analysis
Risk Management Process
Riskmanagement can be divided into three
processes:
  ◦Defining a risk management strategy;
  ◦Identifying and analysing risks; and

  ◦Handling identified risks, including the

  implementation of risk mitigation plans when
  needed.
  ◦
Activities Performed

Determine   Risk Sources and Categories
  ◦Risk Source
  ◦Uncertain requirements

  ◦Unprecedented efforts—estimates unavailable

  ◦Infeasible design

  ◦Unavailable technology

  ◦Unrealistic schedule estimates or allocation

  ◦Inadequate staffing and skills

  ◦Cost or funding issues

  ◦Uncertain or inadequate subcontractor capability

  ◦Uncertain or inadequate vendor capability

  ◦Inadequate communication with actual or potential

  customers or with their representatives
  ◦Disruptions to continuity of operations



  Risk Categories
  ◦
Activities Performed cont…

Define   Risk Parameters
  Parameters for evaluating, categorizing, and
  ◦

  prioritizing risks include the following:
  ◦Risk likelihood (i.e., probability of risk occurrence)
  ◦Risk consequence (i.e., impact and severity of risk

  occurrence)
  ◦Thresholds to trigger management activities

  ◦
Activities Performed cont…

Establish   a Risk Management Strategy
  ◦The scope of the risk management effort
  ◦Methods and tools to be used for risk identification,

  risk analysis, risk mitigation, risk monitoring, and
  communication
  ◦Project-specific sources of risks

  ◦How these risks are to be organized, categorized,

  compared, and consolidated
  ◦Parameters, including likelihood, consequence, and

  thresholds, for taking action on identified risks
  ◦Risk mitigation techniques to be used, such as

  prototyping, piloting, simulation, alternative designs,
  or evolutionary development
  ◦Definition of risk measures to monitor the status of

  the risks
Activities Performed cont…

Identify   Risks
  ◦Examine each element of the project work
  breakdown structure to uncover risks.
  ◦Conduct a risk assessment using a risk taxonomy.

  ◦Interview subject matter experts.

  ◦Review risk management efforts from similar

  products.
  ◦Examine lessons-learned documents or databases.

  ◦Examine design specifications and agreement

  requirements.
Activities Performed cont…

Evaluate,   Categorize, and Prioritize Risks
  ◦Each risk is evaluated and assigned values in
  accordance with the defined risk parameters, which
  may include likelihood, consequence (severity, or
  impact), and thresholds.
  ◦Likelihood - remote, unlikely, likely, highly likely, or a
  near certainty
  ◦Consequences –

  Low, Medium, High, Negligible, Marginal, Significant, Criti
  cal, Catastrophic

  Risks are categorized into the defined risk
  ◦

  categories, providing a means to look at risks
  according to their source, taxonomy, or project
  component
Activities Performed cont…

Develop   Risk Mitigation Plans
  ◦Risk avoidance: Changing or lowering requirements
  while still meeting the user’s needs
  ◦Risk control: Taking active steps to minimize risks

  ◦Risk transfer: Reallocating requirements to lower the

  risks
  ◦Risk monitoring: Watching and periodically re-

  evaluating the risk for changes to the assigned risk
  parameters
  ◦Risk acceptance: Acknowledgment of risk but not

  taking any action
Activities Performed cont…

Implement   Risk Mitigation Plans
  ◦Monitor the status of each risk periodically and
  implement the risk mitigation plan as appropriate.
Documents

Risk  source lists (external and internal)
Risk categories list
Risk evaluation, categorization, and
prioritization criteria
Risk management requirements (e.g., control
and approval levels, and reassessment intervals)
Project risk management
List of identified risks, including the
context, conditions, and consequences of risk
occurrence
List of risks, with a priority assigned to each
risk
Documented handling options for each

More Related Content

What's hot

Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Navjyotsinh Jadeja
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product DevelopmentAmandeep Midha
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk ManagementAchmad Solichin
 
Risk-management
 Risk-management Risk-management
Risk-managementUmesh Gupta
 
Risk evaluation presentation power point
Risk evaluation presentation power pointRisk evaluation presentation power point
Risk evaluation presentation power pointAlberto Mico
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk managementPractiTest
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk ManagementGunjan Patel
 
Software Engineering Risk Management Software Application
Software Engineering Risk Management   Software ApplicationSoftware Engineering Risk Management   Software Application
Software Engineering Risk Management Software Applicationguestfea9c55
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and managementgnitu
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementGirija Sankar Dash
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Shashi Kumar
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-managementzeeshanwrch
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)Nesma
 

What's hot (20)

Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
Risk management
Risk managementRisk management
Risk management
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Risk evaluation presentation power point
Risk evaluation presentation power pointRisk evaluation presentation power point
Risk evaluation presentation power point
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk management
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Software Engineering Risk Management Software Application
Software Engineering Risk Management   Software ApplicationSoftware Engineering Risk Management   Software Application
Software Engineering Risk Management Software Application
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 

Viewers also liked

The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
Special Project Announcement!
Special Project Announcement!Special Project Announcement!
Special Project Announcement!llfan4eva
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
Software Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management SystemSoftware Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management SystemNasiruddin Juel
 
Risk Management
Risk ManagementRisk Management
Risk ManagementJacobe2008
 
the importance of risk management
the importance of risk management the importance of risk management
the importance of risk management cesmy
 
Software Project Management lecture 7
Software Project Management lecture 7Software Project Management lecture 7
Software Project Management lecture 7Syed Muhammad Hammad
 
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo
 
Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0cgautam
 

Viewers also liked (16)

The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
The Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk ManagementThe Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk Management
 
Special Project Announcement!
Special Project Announcement!Special Project Announcement!
Special Project Announcement!
 
Project Risk
Project RiskProject Risk
Project Risk
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Software Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management SystemSoftware Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management System
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
the importance of risk management
the importance of risk management the importance of risk management
the importance of risk management
 
8 Project Plan
8 Project Plan8 Project Plan
8 Project Plan
 
Software Development Plan
Software Development PlanSoftware Development Plan
Software Development Plan
 
RiskyProject Software
RiskyProject SoftwareRiskyProject Software
RiskyProject Software
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-training
 
Risk Management as an enabler for project success
Risk Management as an enabler for project successRisk Management as an enabler for project success
Risk Management as an enabler for project success
 
Software Project Management lecture 7
Software Project Management lecture 7Software Project Management lecture 7
Software Project Management lecture 7
 
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
 
Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0
 

Similar to Risk management in Software Industry

Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enVyacheslav Guzovsky
 
Risk Assessments Demonstation Powerpoint
Risk Assessments Demonstation PowerpointRisk Assessments Demonstation Powerpoint
Risk Assessments Demonstation Powerpointacademy29
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk managementInfosys
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Online PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge AreaOnline PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge AreaGlobalSkillup
 
Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.akalpm
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Project risk management
Project risk managementProject risk management
Project risk managementBarnatuCoffee
 
Aligning Risk Management with ITIL
Aligning Risk Management with ITILAligning Risk Management with ITIL
Aligning Risk Management with ITILAustin Songer
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 

Similar to Risk management in Software Industry (20)

Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_en
 
Risk Assessments Demonstation Powerpoint
Risk Assessments Demonstation PowerpointRisk Assessments Demonstation Powerpoint
Risk Assessments Demonstation Powerpoint
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Presentation qrm shc
Presentation qrm shcPresentation qrm shc
Presentation qrm shc
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Online PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge AreaOnline PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge Area
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk Management Assignment
Risk Management AssignmentRisk Management Assignment
Risk Management Assignment
 
Aligning Risk Management with ITIL
Aligning Risk Management with ITILAligning Risk Management with ITIL
Aligning Risk Management with ITIL
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 

More from Rehan Akhtar

Employee retention issues and analysis
Employee retention issues and analysisEmployee retention issues and analysis
Employee retention issues and analysisRehan Akhtar
 
Portuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing CampaignPortuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing CampaignRehan Akhtar
 
Global Warming - Myth or Reality
Global Warming - Myth or RealityGlobal Warming - Myth or Reality
Global Warming - Myth or RealityRehan Akhtar
 
Corruption Perception Index - 2012
Corruption Perception Index - 2012Corruption Perception Index - 2012
Corruption Perception Index - 2012Rehan Akhtar
 
Business Functions Interactions
Business Functions InteractionsBusiness Functions Interactions
Business Functions InteractionsRehan Akhtar
 
International mutual fund
International mutual fundInternational mutual fund
International mutual fundRehan Akhtar
 
Fifa world cup insurance plan
Fifa world cup insurance planFifa world cup insurance plan
Fifa world cup insurance planRehan Akhtar
 
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air DeccanJet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air DeccanRehan Akhtar
 
Report on Forex Exposure
Report on Forex ExposureReport on Forex Exposure
Report on Forex ExposureRehan Akhtar
 
Forex exposure for Tech M & Oracle
Forex exposure for Tech M & OracleForex exposure for Tech M & Oracle
Forex exposure for Tech M & OracleRehan Akhtar
 
Report on Suzlon Energy Ltd
Report on Suzlon Energy LtdReport on Suzlon Energy Ltd
Report on Suzlon Energy LtdRehan Akhtar
 
Comparative Study Of 2 Business Leader
Comparative Study Of 2 Business LeaderComparative Study Of 2 Business Leader
Comparative Study Of 2 Business LeaderRehan Akhtar
 

More from Rehan Akhtar (17)

Employee retention issues and analysis
Employee retention issues and analysisEmployee retention issues and analysis
Employee retention issues and analysis
 
Portuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing CampaignPortuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing Campaign
 
Global Warming - Myth or Reality
Global Warming - Myth or RealityGlobal Warming - Myth or Reality
Global Warming - Myth or Reality
 
Corruption Perception Index - 2012
Corruption Perception Index - 2012Corruption Perception Index - 2012
Corruption Perception Index - 2012
 
Oakland athletics
Oakland athleticsOakland athletics
Oakland athletics
 
Project portfolio
Project portfolioProject portfolio
Project portfolio
 
Business Functions Interactions
Business Functions InteractionsBusiness Functions Interactions
Business Functions Interactions
 
Merchant banking
Merchant bankingMerchant banking
Merchant banking
 
International mutual fund
International mutual fundInternational mutual fund
International mutual fund
 
Fifa world cup insurance plan
Fifa world cup insurance planFifa world cup insurance plan
Fifa world cup insurance plan
 
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air DeccanJet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
 
Report on Forex Exposure
Report on Forex ExposureReport on Forex Exposure
Report on Forex Exposure
 
Forex exposure for Tech M & Oracle
Forex exposure for Tech M & OracleForex exposure for Tech M & Oracle
Forex exposure for Tech M & Oracle
 
Report on Suzlon Energy Ltd
Report on Suzlon Energy LtdReport on Suzlon Energy Ltd
Report on Suzlon Energy Ltd
 
Carbon credit
Carbon creditCarbon credit
Carbon credit
 
Comparative Study Of 2 Business Leader
Comparative Study Of 2 Business LeaderComparative Study Of 2 Business Leader
Comparative Study Of 2 Business Leader
 
Demand Curve
Demand CurveDemand Curve
Demand Curve
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Risk management in Software Industry

  • 1. Risk Management in Software Industry Presented by – Rehan Akhtar
  • 2. Introduction The purpose of Risk Management is to identify potential problems before they occur so that risk-handling activities can be planned and invoked as needed across the life of the product or project to mitigate adverse impacts on achieving objectives.
  • 4. Importance cont… ISO 20000 (Service Management) ◦The ultimate goal of ISO 20000 is to: ◦Reduce operational exposure to risk ◦Meet contractual requirements ◦Demonstrate service quality TL 9000 for Telecom Industry ◦ Similar to ISO 9000 ITIL V3 (Best Practices for IT Service Management) ◦ Risk Management and Analysis
  • 5. Risk Management Process Riskmanagement can be divided into three processes: ◦Defining a risk management strategy; ◦Identifying and analysing risks; and ◦Handling identified risks, including the implementation of risk mitigation plans when needed. ◦
  • 6. Activities Performed Determine Risk Sources and Categories ◦Risk Source ◦Uncertain requirements ◦Unprecedented efforts—estimates unavailable ◦Infeasible design ◦Unavailable technology ◦Unrealistic schedule estimates or allocation ◦Inadequate staffing and skills ◦Cost or funding issues ◦Uncertain or inadequate subcontractor capability ◦Uncertain or inadequate vendor capability ◦Inadequate communication with actual or potential customers or with their representatives ◦Disruptions to continuity of operations Risk Categories ◦
  • 7. Activities Performed cont… Define Risk Parameters Parameters for evaluating, categorizing, and ◦ prioritizing risks include the following: ◦Risk likelihood (i.e., probability of risk occurrence) ◦Risk consequence (i.e., impact and severity of risk occurrence) ◦Thresholds to trigger management activities ◦
  • 8. Activities Performed cont… Establish a Risk Management Strategy ◦The scope of the risk management effort ◦Methods and tools to be used for risk identification, risk analysis, risk mitigation, risk monitoring, and communication ◦Project-specific sources of risks ◦How these risks are to be organized, categorized, compared, and consolidated ◦Parameters, including likelihood, consequence, and thresholds, for taking action on identified risks ◦Risk mitigation techniques to be used, such as prototyping, piloting, simulation, alternative designs, or evolutionary development ◦Definition of risk measures to monitor the status of the risks
  • 9. Activities Performed cont… Identify Risks ◦Examine each element of the project work breakdown structure to uncover risks. ◦Conduct a risk assessment using a risk taxonomy. ◦Interview subject matter experts. ◦Review risk management efforts from similar products. ◦Examine lessons-learned documents or databases. ◦Examine design specifications and agreement requirements.
  • 10. Activities Performed cont… Evaluate, Categorize, and Prioritize Risks ◦Each risk is evaluated and assigned values in accordance with the defined risk parameters, which may include likelihood, consequence (severity, or impact), and thresholds. ◦Likelihood - remote, unlikely, likely, highly likely, or a near certainty ◦Consequences – Low, Medium, High, Negligible, Marginal, Significant, Criti cal, Catastrophic Risks are categorized into the defined risk ◦ categories, providing a means to look at risks according to their source, taxonomy, or project component
  • 11. Activities Performed cont… Develop Risk Mitigation Plans ◦Risk avoidance: Changing or lowering requirements while still meeting the user’s needs ◦Risk control: Taking active steps to minimize risks ◦Risk transfer: Reallocating requirements to lower the risks ◦Risk monitoring: Watching and periodically re- evaluating the risk for changes to the assigned risk parameters ◦Risk acceptance: Acknowledgment of risk but not taking any action
  • 12. Activities Performed cont… Implement Risk Mitigation Plans ◦Monitor the status of each risk periodically and implement the risk mitigation plan as appropriate.
  • 13. Documents Risk source lists (external and internal) Risk categories list Risk evaluation, categorization, and prioritization criteria Risk management requirements (e.g., control and approval levels, and reassessment intervals) Project risk management List of identified risks, including the context, conditions, and consequences of risk occurrence List of risks, with a priority assigned to each risk Documented handling options for each