SlideShare a Scribd company logo
CPEXPO2013
COMMUNITY PROTECTION
Security Projects & Projects Safety
(Giuseppe Pugliese – Certification Board Member IPMA )

30 October 2013 – Fiera di Genova
Technology

Security Projects
&
Projects Safety
Project Management
We are IPMA 2

®
Security Projects & Projects Safety

Highlighting the following
relationship:
security experts realize systems "to
secure" people and things
experts in project management
develop systems "to secure“ projects.
We are IPMA 3

®
IPMA (International Project Management Association)
Overview

History

Worldwide

Services

We are IPMA 4

• Founded 1965 as a Non-Profit-Organisation
• Legally registered in Switzerland (Legislation)
• INTERNET until 1994

• 56 member associations
• Promotor for International Project Management
• IPMA World Congress

• Quality standard for certifications
• ICB – IPMA Competence Baseline
• IPMA Young Crew / Expert Seminars / Advanced Courses /
Research /Events / Journals

®
ISO 21500 Definition – Project
A project is a unique and temporary set of activities that uses
resources to create outputs.
A project has specific requirements and multiple constraints such as
time, cost and resources.
Although many projects may be similar, the outputs provided by the
project, the stakeholders influencing the project, the resources used
and the way processes are adapted to create these outputs may
differ. Therefore, each project is unique.
Temporary means that every project is time limited with a definite
beginning and end. The end is reached when the project’s
objectives have been achieved, or the project is terminated.
Temporary does not necessarily mean short in duration.

We are IPMA 5

®
Security Projects
High Complexity Context (Technical and Managerial)

Grade of Innovation
Multidisciplinarity
Multicultural
Integration of specialized and wide spectrum
of technologies
Organizational Contexts
Regulatory and Laws Domain
Risk Management
We are IPMA 6

®
To make a (complex)
security project
succesfully we need
project management
Any other options?!?!
We are IPMA 7

®
THE PROJECT MANAGEMENT TRIANGLE
QUALITY

COST

TIME

Author: Martin Barnes (IPMA UK) 1972 IPMA Stockholm Congress
We are IPMA 8

8
®
We are IPMA 9

®
ISO 21500 Guidance on Project Management
3.11 Project constraints
……………….
There are many different constraints that may be imposed on a project. Some
constraints could be:
• duration or target date for the project.
• budget of the project including all economic and financial means for
acquisition.
• availability of project resources such as people, facilities, time, equipment,
materials, tools and others required to carry out the project activities relating to
the requirements of the project.

The question here is:
Do Security Projects
costraints?.
We are IPMA 10

have

the

same
®
No, they don’t.

Thanks, bye bye
We are IPMA 11

®
Yes, they have……

We are IPMA 12

®
IPMA Standards

Moving PM competence
forward
®
The Competence Standard
The ICB3 standard proves its
value to PM practitioners and
our stakeholders.
It highlights PM knowledge,
and the key competences
expected from managers of:
– Projects
– Programmes
– Portfolios

We are IPMA 14

®
Why a Competence Difference?
You may want more than Knowledge ...
You board a flight piloted by two “Air
Academy” graduates who have never
taken off or landed a plane.
Your defense lawyer just passed the
bar, knows all the case law, but has
never practiced before a jury.
Your heart surgeon memorized the
manual, but has never used a scalpel.

Q: What is missing? Competence!
We are IPMA 15

®
Project Manager Competence Profile - IPMA ICB 3.0

We are IPMA 16

®
Benefits in applying
Project Management
Tangible benefits
Cost savings
Revenue increases
Customer retention
Increased customer share
Greater market share
Reduced write-offs and rework

We are IPMA 18

®
Intangible Benefits
Improvements in the decision making
Enhanced collaboration and communication
Improvements in effective work cultures
Alignment of approaches, terminology and
values within the organization
Overall effectiveness of the organization and its
management approach
Improved transparency, clarity of structures,
roles and accountability.

We are IPMA 19

®
Strategic Project Management
Strategic Planning provides ideas
Project Management achieves results
Projects drive strategic changes
Feedback loop for continuous change

We are IPMA 20

®
IPMA – 4LC Project Manager Certification

21
The PM in Security Projects
Some Issues:
Recognize and Engange the Project Sponsors
Apply the “right” level of Project Management
Process
Take care of all Interested Parties expectations
Even if expert of “smt” do not fight against your
specialist in the team
Be neutral in order to be “reliable” in managing
conflict&crisis
We are IPMA 22

®
IPMA Result Orientation
Competence (2.08 ICB 3.0)
The project manager is not paid because he works
hard, nor for the plans or reports or for the fact that
everybody work hard.

He is paid to realise the
project results.
We are IPMA 23

®
We are IPMA 24

®
IPMA ITALY
CONTACTS
Via E. Tazzoli, 6
20154 Milano
Tel. +39 0267100740
Fax +39 0267071785
Giuseppe Pugliese – Director of the Italian Certification Body
E-mail: giuseppe.pugliese@animp.it
Irina Bolognesi – Segreteria IPMA Italy
E-mail: ipmaitaly@animp.it
Web Site Italy
http:/www.ipma.it/
Web Site International
http://www.ipma.ch
25

More Related Content

What's hot

Wildlife protection act, 1972
Wildlife protection act, 1972Wildlife protection act, 1972
Wildlife protection act, 1972
Chandni Bhojwani
 
WILDLIFE PROTECTION ACT 1972
WILDLIFE PROTECTION ACT 1972WILDLIFE PROTECTION ACT 1972
WILDLIFE PROTECTION ACT 1972
Ammaar Solkar
 
Wildlife protection act
Wildlife protection actWildlife protection act
Wildlife protection act
Kevin Teny Roy
 
What is Eco Terrorism
What is Eco TerrorismWhat is Eco Terrorism
What is Eco Terrorism
paul young cpa, cga
 
laws of environmental protection - India
 laws of environmental protection - India laws of environmental protection - India
laws of environmental protection - India
Prashant Katti
 
Governmental institution for environmental management
Governmental institution for environmental managementGovernmental institution for environmental management
Governmental institution for environmental management
Ulsah T N
 
Environment Protection Act
Environment Protection ActEnvironment Protection Act
Environment Protection Act
sairamya20
 
COMMERCIAL LAW U-4.pptx
COMMERCIAL LAW U-4.pptxCOMMERCIAL LAW U-4.pptx
COMMERCIAL LAW U-4.pptx
R Karthikeyan
 
Environment Laws
Environment LawsEnvironment Laws
Environment Laws
Sameer003
 
Wildlife protection act, 1972
Wildlife protection act, 1972Wildlife protection act, 1972
Wildlife protection act, 1972
Tripura university
 
Environment protection act and rules
Environment protection act and rulesEnvironment protection act and rules
Environment protection act and rules
ritu sheoran
 
National parks & sanctuaries in india,several exsitu biodiversity conservatio...
National parks & sanctuaries in india,several exsitu biodiversity conservatio...National parks & sanctuaries in india,several exsitu biodiversity conservatio...
National parks & sanctuaries in india,several exsitu biodiversity conservatio...
Anand P P
 
INDIAN WILDLIFE PROTECTION ACT 1972
INDIAN WILDLIFE PROTECTION ACT 1972INDIAN WILDLIFE PROTECTION ACT 1972
INDIAN WILDLIFE PROTECTION ACT 1972
VINOD KUMAR RAMKUMAR
 
national green tribunal
national green tribunal national green tribunal
national green tribunal
Ritika Gupta
 
Wildlife protection
Wildlife protectionWildlife protection
Wildlife protection
Naresh Kollipara
 
Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02
Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02
Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02
Prateek Gupta
 
Environmental legislation
Environmental legislationEnvironmental legislation
Environmental legislation
Vijay Hemmadi
 
Global Environmental Conventions
Global Environmental ConventionsGlobal Environmental Conventions
Global Environmental Conventions
Vijai Krishnan V
 
Biodiversity act 2002
Biodiversity act 2002Biodiversity act 2002
Biodiversity act 2002
Mohan Krishna
 

What's hot (20)

Wildlife protection act, 1972
Wildlife protection act, 1972Wildlife protection act, 1972
Wildlife protection act, 1972
 
WILDLIFE PROTECTION ACT 1972
WILDLIFE PROTECTION ACT 1972WILDLIFE PROTECTION ACT 1972
WILDLIFE PROTECTION ACT 1972
 
Wildlife protection act
Wildlife protection actWildlife protection act
Wildlife protection act
 
What is Eco Terrorism
What is Eco TerrorismWhat is Eco Terrorism
What is Eco Terrorism
 
laws of environmental protection - India
 laws of environmental protection - India laws of environmental protection - India
laws of environmental protection - India
 
Governmental institution for environmental management
Governmental institution for environmental managementGovernmental institution for environmental management
Governmental institution for environmental management
 
Environment Protection Act
Environment Protection ActEnvironment Protection Act
Environment Protection Act
 
COMMERCIAL LAW U-4.pptx
COMMERCIAL LAW U-4.pptxCOMMERCIAL LAW U-4.pptx
COMMERCIAL LAW U-4.pptx
 
Environment Laws
Environment LawsEnvironment Laws
Environment Laws
 
Wildlife protection act, 1972
Wildlife protection act, 1972Wildlife protection act, 1972
Wildlife protection act, 1972
 
Environment protection act and rules
Environment protection act and rulesEnvironment protection act and rules
Environment protection act and rules
 
National parks & sanctuaries in india,several exsitu biodiversity conservatio...
National parks & sanctuaries in india,several exsitu biodiversity conservatio...National parks & sanctuaries in india,several exsitu biodiversity conservatio...
National parks & sanctuaries in india,several exsitu biodiversity conservatio...
 
Benefits Of Wildlife
Benefits Of WildlifeBenefits Of Wildlife
Benefits Of Wildlife
 
INDIAN WILDLIFE PROTECTION ACT 1972
INDIAN WILDLIFE PROTECTION ACT 1972INDIAN WILDLIFE PROTECTION ACT 1972
INDIAN WILDLIFE PROTECTION ACT 1972
 
national green tribunal
national green tribunal national green tribunal
national green tribunal
 
Wildlife protection
Wildlife protectionWildlife protection
Wildlife protection
 
Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02
Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02
Wildlifeconservationsuryanshsinghppt 140714000450-phpapp02
 
Environmental legislation
Environmental legislationEnvironmental legislation
Environmental legislation
 
Global Environmental Conventions
Global Environmental ConventionsGlobal Environmental Conventions
Global Environmental Conventions
 
Biodiversity act 2002
Biodiversity act 2002Biodiversity act 2002
Biodiversity act 2002
 

Similar to Security Projects & Projects Safety

Project management skills
Project management skillsProject management skills
Project management skills
ProjectManager247
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
International Institute for Learning
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
International Institute for Learning
 
Making Project Assurance Work presentation.pdf
Making Project Assurance Work presentation.pdfMaking Project Assurance Work presentation.pdf
Making Project Assurance Work presentation.pdf
Association for Project Management
 
Return of the security champions ep1 (1)
Return of the security champions ep1 (1)Return of the security champions ep1 (1)
Return of the security champions ep1 (1)
Marcos Valle
 
Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...
Association for Project Management
 
Implementing security
Implementing securityImplementing security
Implementing security
Dhani Ahmad
 
The new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for itThe new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for it
PMIUKChapter
 
Leading Enterprise Wide Projects
Leading Enterprise Wide ProjectsLeading Enterprise Wide Projects
Leading Enterprise Wide Projects
Kaali Dass PMP, PhD.
 
Pmbok framework helping material
Pmbok framework helping  materialPmbok framework helping  material
Pmbok framework helping materialRamiz Arshad
 
M6 Toll Road Construction
M6 Toll Road ConstructionM6 Toll Road Construction
M6 Toll Road Construction
Heidi Owens
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
Manolis Nikiforakis
 
PMP Training Course - Project Management Framework
PMP Training Course - Project Management FrameworkPMP Training Course - Project Management Framework
PMP Training Course - Project Management Framework
Skillogic Solutions
 
03_AgilePM.pptx
03_AgilePM.pptx03_AgilePM.pptx
03_AgilePM.pptx
MaheshPatil527151
 
Module 2 - IDP.pptx
Module 2 - IDP.pptxModule 2 - IDP.pptx
Module 2 - IDP.pptx
RAJESH S
 
PMExpo2017slide Eureka Service - Oracle Prime
PMExpo2017slide Eureka Service - Oracle PrimePMExpo2017slide Eureka Service - Oracle Prime
PMExpo2017slide Eureka Service - Oracle Prime
Massimo Martinati, PMP, RMP
 
ChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project managementChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project management
DerbewBirhanu2
 
20160512 predictive and adaptive approach
20160512   predictive and adaptive approach20160512   predictive and adaptive approach
20160512 predictive and adaptive approach
Silvia Fragola
 
North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"
Association for Project Management
 
Outsourcing presentation
Outsourcing presentation Outsourcing presentation

Similar to Security Projects & Projects Safety (20)

Project management skills
Project management skillsProject management skills
Project management skills
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Making Project Assurance Work presentation.pdf
Making Project Assurance Work presentation.pdfMaking Project Assurance Work presentation.pdf
Making Project Assurance Work presentation.pdf
 
Return of the security champions ep1 (1)
Return of the security champions ep1 (1)Return of the security champions ep1 (1)
Return of the security champions ep1 (1)
 
Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...
 
Implementing security
Implementing securityImplementing security
Implementing security
 
The new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for itThe new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for it
 
Leading Enterprise Wide Projects
Leading Enterprise Wide ProjectsLeading Enterprise Wide Projects
Leading Enterprise Wide Projects
 
Pmbok framework helping material
Pmbok framework helping  materialPmbok framework helping  material
Pmbok framework helping material
 
M6 Toll Road Construction
M6 Toll Road ConstructionM6 Toll Road Construction
M6 Toll Road Construction
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
PMP Training Course - Project Management Framework
PMP Training Course - Project Management FrameworkPMP Training Course - Project Management Framework
PMP Training Course - Project Management Framework
 
03_AgilePM.pptx
03_AgilePM.pptx03_AgilePM.pptx
03_AgilePM.pptx
 
Module 2 - IDP.pptx
Module 2 - IDP.pptxModule 2 - IDP.pptx
Module 2 - IDP.pptx
 
PMExpo2017slide Eureka Service - Oracle Prime
PMExpo2017slide Eureka Service - Oracle PrimePMExpo2017slide Eureka Service - Oracle Prime
PMExpo2017slide Eureka Service - Oracle Prime
 
ChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project managementChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project management
 
20160512 predictive and adaptive approach
20160512   predictive and adaptive approach20160512   predictive and adaptive approach
20160512 predictive and adaptive approach
 
North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"
 
Outsourcing presentation
Outsourcing presentation Outsourcing presentation
Outsourcing presentation
 

More from Community Protection Forum

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
Community Protection Forum
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
Community Protection Forum
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
Community Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Community Protection Forum
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
Community Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
Community Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Community Protection Forum
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
Community Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
Community Protection Forum
 

More from Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Security Projects & Projects Safety

  • 1. CPEXPO2013 COMMUNITY PROTECTION Security Projects & Projects Safety (Giuseppe Pugliese – Certification Board Member IPMA ) 30 October 2013 – Fiera di Genova
  • 3. Security Projects & Projects Safety Highlighting the following relationship: security experts realize systems "to secure" people and things experts in project management develop systems "to secure“ projects. We are IPMA 3 ®
  • 4. IPMA (International Project Management Association) Overview History Worldwide Services We are IPMA 4 • Founded 1965 as a Non-Profit-Organisation • Legally registered in Switzerland (Legislation) • INTERNET until 1994 • 56 member associations • Promotor for International Project Management • IPMA World Congress • Quality standard for certifications • ICB – IPMA Competence Baseline • IPMA Young Crew / Expert Seminars / Advanced Courses / Research /Events / Journals ®
  • 5. ISO 21500 Definition – Project A project is a unique and temporary set of activities that uses resources to create outputs. A project has specific requirements and multiple constraints such as time, cost and resources. Although many projects may be similar, the outputs provided by the project, the stakeholders influencing the project, the resources used and the way processes are adapted to create these outputs may differ. Therefore, each project is unique. Temporary means that every project is time limited with a definite beginning and end. The end is reached when the project’s objectives have been achieved, or the project is terminated. Temporary does not necessarily mean short in duration. We are IPMA 5 ®
  • 6. Security Projects High Complexity Context (Technical and Managerial) Grade of Innovation Multidisciplinarity Multicultural Integration of specialized and wide spectrum of technologies Organizational Contexts Regulatory and Laws Domain Risk Management We are IPMA 6 ®
  • 7. To make a (complex) security project succesfully we need project management Any other options?!?! We are IPMA 7 ®
  • 8. THE PROJECT MANAGEMENT TRIANGLE QUALITY COST TIME Author: Martin Barnes (IPMA UK) 1972 IPMA Stockholm Congress We are IPMA 8 8 ®
  • 9. We are IPMA 9 ®
  • 10. ISO 21500 Guidance on Project Management 3.11 Project constraints ………………. There are many different constraints that may be imposed on a project. Some constraints could be: • duration or target date for the project. • budget of the project including all economic and financial means for acquisition. • availability of project resources such as people, facilities, time, equipment, materials, tools and others required to carry out the project activities relating to the requirements of the project. The question here is: Do Security Projects costraints?. We are IPMA 10 have the same ®
  • 11. No, they don’t. Thanks, bye bye We are IPMA 11 ®
  • 12. Yes, they have…… We are IPMA 12 ®
  • 13. IPMA Standards Moving PM competence forward ®
  • 14. The Competence Standard The ICB3 standard proves its value to PM practitioners and our stakeholders. It highlights PM knowledge, and the key competences expected from managers of: – Projects – Programmes – Portfolios We are IPMA 14 ®
  • 15. Why a Competence Difference? You may want more than Knowledge ... You board a flight piloted by two “Air Academy” graduates who have never taken off or landed a plane. Your defense lawyer just passed the bar, knows all the case law, but has never practiced before a jury. Your heart surgeon memorized the manual, but has never used a scalpel. Q: What is missing? Competence! We are IPMA 15 ®
  • 16. Project Manager Competence Profile - IPMA ICB 3.0 We are IPMA 16 ®
  • 18. Tangible benefits Cost savings Revenue increases Customer retention Increased customer share Greater market share Reduced write-offs and rework We are IPMA 18 ®
  • 19. Intangible Benefits Improvements in the decision making Enhanced collaboration and communication Improvements in effective work cultures Alignment of approaches, terminology and values within the organization Overall effectiveness of the organization and its management approach Improved transparency, clarity of structures, roles and accountability. We are IPMA 19 ®
  • 20. Strategic Project Management Strategic Planning provides ideas Project Management achieves results Projects drive strategic changes Feedback loop for continuous change We are IPMA 20 ®
  • 21. IPMA – 4LC Project Manager Certification 21
  • 22. The PM in Security Projects Some Issues: Recognize and Engange the Project Sponsors Apply the “right” level of Project Management Process Take care of all Interested Parties expectations Even if expert of “smt” do not fight against your specialist in the team Be neutral in order to be “reliable” in managing conflict&crisis We are IPMA 22 ®
  • 23. IPMA Result Orientation Competence (2.08 ICB 3.0) The project manager is not paid because he works hard, nor for the plans or reports or for the fact that everybody work hard. He is paid to realise the project results. We are IPMA 23 ®
  • 24. We are IPMA 24 ®
  • 25. IPMA ITALY CONTACTS Via E. Tazzoli, 6 20154 Milano Tel. +39 0267100740 Fax +39 0267071785 Giuseppe Pugliese – Director of the Italian Certification Body E-mail: giuseppe.pugliese@animp.it Irina Bolognesi – Segreteria IPMA Italy E-mail: ipmaitaly@animp.it Web Site Italy http:/www.ipma.it/ Web Site International http://www.ipma.ch 25