Question

In: Operations Management

One of the hazards for the project manager (PM) of an information security project is the...

One of the hazards for the project manager (PM) of an information security project is the reliance on the subject matter experts to keep the PM fully informed about the status of the project.

Theresa is a PM for a single sign-on project within an urban teaching hospital. The project appears to be going along well until Theresa begins to hear rumblings of some technical problems that may interface with the project delivery time line. She calls a meeting with the technical team. The team assures her that things are fine and that they will figure out whatever the problems are and will be ready as planned.

Reply to the following questions:

How can Theresa ensure that the technical team is being realistic in their assessment?

What strategies might Theresa use to better understand the potential technical issues and the potential impacts of those issues?

Would you recommend that Theresa inform the project sponsors of the potential for a delay or should she accept the position of the technical team?

Solutions

Expert Solution

1. Theresa needs to check the project milestones that have been achieved and are secure and the project milestones, which need to be achieved. She can keep a track of the issue log as well to anticipate the project and workflow timeline adherence. This way, she can estimated whether the technical team is being realistic in their problem assessment.

2. Theresa must keep a track of the WBS chart as well as the issue log. The technical team needs to maintain this issue log in which the following information is updated on regular basis:

  • Issue Type
  • Identifier and time of detection
  • Brief description of issue
  • Priority rating to issue
  • Issue Ownership
  • Target Resolution Date
  • Current Status
  • Resolution description

From this issue log, Theresa will be able to analyze and have an understanding of the technical issues and their impact.

Theresa can also maintain a risk management matrix, which maps the potential issues that may crop up in the system and their potential impact.

3. Theresa needs to be ethical and tell the project sponsors about the probability of a potential delay in project delivery. The sponsors need to be kept on the same page as the status of the project. She can also assure them that the team is working their best, to address the problem and release the project asap.


Related Solutions

An information security manager is assisting in the development of the request for proposal (RFP) for...
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining: A. security metrics B. service level agreements (SLAs) C. risk-reporting methodologies D. security requirements for the process being outsourced Correct Answer: ????????????? ____________________ ■ Answer A (security metrics) is believed to be the correct one (but often they are...
PM concepts, principles and process in project planning?
PM concepts, principles and process in project planning?
Project communication is one of the most important factors in project management. A project manager will...
Project communication is one of the most important factors in project management. A project manager will spend most of his/her time on communications. Discuss who the project stakeholders on the District 4 Move project are. Discuss various types of communications you will need to use on the project, what stakeholder(s) each type would address, and the frequency of each communication type. You may choose to use a table for this information. Justify your responses.
To be an effective manager, it is important to understand that information is one of an...
To be an effective manager, it is important to understand that information is one of an organisation’s most valuable and important resources. For a Higher Education institution, how might we differentiate between data, information and knowledge? Explain with relevant examples.
create a project charter GENERAL PROJECT INFORMATION Project Name: Project Sponsor: Project Manager: Email Address: Phone...
create a project charter GENERAL PROJECT INFORMATION Project Name: Project Sponsor: Project Manager: Email Address: Phone Number: Organizational Unit: Process Impacted: Expected Start Date: Expected Completion Date: Expected Savings: Estimated Costs: PROBLEM, ISSUE, GOALS, OBJECTIVES, DELIVERABLES Problem or Issue: Purpose of Project: Business Case: Goals/Metrics: Expected Deliverables: PROJECT SCOPE & SCHEDULE Within Scope Outside of Scope PROJECT RESOURCES & COSTS Project Team Support Resources Special Needs PROJECT BENEFITS & CUSTOMERS Process Owner Key Stakeholders Final Customers Expected Benefits PROJECT RISKS,...
Determine the project costs and Budget (Marks-20) You are a project manager of one of the...
Determine the project costs and Budget (Marks-20) You are a project manager of one of the major construction companies of the region. You got a project of “Toronto Airport” construction. Its quite challenging to complete this huge project on time, so try to devise a strategy to manage this project. Complete the following tasks in this context.
Working on a project for a PM class and trying to come up with some numbers...
Working on a project for a PM class and trying to come up with some numbers to include in my project for math/budgeting. Is it possible to find ROI on a simple birthday party ? If the overall budget for the party per the client is 9000$, what sorts of numbers can be generated ? Planning is in a 6 week time frame and this is being planned by an ' event company ' that is fictional, so any additional...
Managing IT security and risks Information security is critical in the development and implementation of information...
Managing IT security and risks Information security is critical in the development and implementation of information systems in organizations. Assume that you are developing a customer relationship management system for Morita Loan, list five methods that you can use to protect the data in such a system and discuss how you can implement these five means for information security.
A project manager is preparing two documents for risk management. One contains sources of overall project...
A project manager is preparing two documents for risk management. One contains sources of overall project risk and also summary information on individual risks. The second describes individual risks identified. What name should the project manager give to the first document?
As a software project manager, list all the software project management control areas and describe one...
As a software project manager, list all the software project management control areas and describe one in detail.                                                                               
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT