Top Influencers

Network:29



Network:8




Network:953




Network:101




Network:164




Network:0




Network:27




Network:19




Network:99




Network:212




See all Risk Management Influencers


Upcoming Webinars

The How and Why of Documentation In Projects

Aug 14, 2015 3:00 PM EDT (UTC-4)
PREMIUM webinar

Documentation is an essential, yet often misunderstood, project management tool. In some organizations, documentation is at the discretion of the project manager. In other cases, there are endless check lists and paperwork requirements to manage. In this webinar, we will cover the basics of documentation, the risk management benefits of documentation, and how documentation is a demonstration of professionalism. You will also learn how to use documentation to manage contracts and financial requirements.

On-demand Webinars

Establishing Risk-based Schedule and Cost Contingency

PREMIUM on-demand webinar
by Wesley Gillette

Establishing and managing schedule and cost contingency are integral to project risk management. Yet many organizations still struggle to define and adopt best practices that provide the organization confidence in their contingency setting processes.

Risk Process Effectiveness

PREMIUM on-demand webinar
by Charles Weis

Risk management has a variety of metrics, almost all dealing with how well the process is being maintained. What is needed are metrics that determine whether the process is working. In particular, risk management is a fundamentally a two step process: identify the risks, and mitigate the risks. Both can and should be measured to know whether your risk management process is effective. This presentation describes the first in a two part series on how to measure the effectiveness of risk management on projects and programs. The first metric will show how to measure how well your project is identifying the risks. Coupled with a later discussion on mitigation measures, the effectiveness of the R&O process can be determined.

See all Risk Management On-demand webinars

Save Time With Tools + Templates

PMO Monthly Report

deliverable
by Miha Lenic

This set of Excel worksheets include a general progress list for tasks, a milestone report, a risk register and sections to keep track of assumptions, issues and dependencies. Use in conjunction with the PMO Monthly Status Report.

Project Status Report (Monthly)

deliverable
by Dan Roman

This Project Status Report is a monthly document presented to the Project Control Group (Steering Committee). This report is used to monitor the progress of the project, discuss and support tactical decisions that need to be taken to keep or put the project on track, mitigate risks and issues escalated by the project team and/or the Project Working Group, and recommend/approve changes in scope, budget or schedule.

Assumptions & Constraints Log

PREMIUM deliverable
by Dirk Withake

Assumptions and constraints need to be tracked on your project to minimize risk and keep you on track. Use this sample log to help with the process.

Cause and Effect Analysis

PREMIUM presentation

Defining a solution to a problem without conducting a cause/effect analysis is like shooting an arrow without aiming. By utilizing this presentation, you are ensuring that the solution you define will hit the mark by getting to the root cause of problems and understanding their impacts.

Learn From Others

The Implementation of Risk Management

by Rodrigo Santamarina, PMP

Risk management allows a company to strike a balance where growth and related risks are in line with the strategy and objectives of the company. In order for these processes to function efficiently and effectively, there must be enterprise-wide commitment and involvement in day-to-day risk management activities. Properly implemented, risk management can immediately add value to your company.

New Problems, Old Project

by Kenneth Darter, PMP

It never fails--at the end of the project, a whole lot of problems start cropping up. Tracking these problems in the flurry of activities occurring at the end of a project can be difficult. How can you handle these appropriately?

Impossible Filmmaking (Part 1)

by Kevin Richardson

Nothing in his impressive experience could have prepared a time-crunched filmmaker for his hectic project in China...except one thing: earning his PMP certification. Read how this international project management consultant got an animated film off the ground in no time flat.

Project Documentation Done Right

by Kenneth Darter, PMP

A project will live or die by its documentation. So how can a project manager stay on top of all the moving pieces and emails flying about in the midst of the high-pressure environment of a project?

Navigating Life's Passages Using Project Management

by Michelle LaBrosse, CCPM, PMP, PMI-ACP

While learning how to navigate the Inside Passage to Alaska on a rebuilt wooden boat, this project management professional picked up five points to keep in mind when navigating important projects through their own passages.

Risk Identification, Speed Dating Style

by Dan Furlong, PMP, PMI-ACP, MBA, CSM

Risk identification only works if everyone is truly engaged--not just participating, but engaged fully as if an owner of the activity. Read how one healthcare expert managed to bring together a wide range of diverse, talented groups to quickly achieve a potentially complicated end goal.

Decompressing Issues

by Kenneth Darter, PMP

In the midst of a project, you do what you need to do in order to get things done and meet the requirements and deadlines of the project. After the fact, though, you may need to decompress the issues that occurred.

Topic Teasers Vol. 59: Plugging People Risks

by Barbee Davis, MA, PHR, PMP, PMI-ACP

Question: We recently had a data breach in my department that caused a serious problem with our public image, not to mention financial losses. Obviously, we want to be sure we are carefully protected going forward. This appears to me to be an IT issue, but I have been asked for my input about additional safeguards. What can I do at the project manager level to help insure that this sort of event is squarely in our past?
A. Do not allow employees to work on mobile devices or in a BYOD (Bring Your Own Device) scenario. The only reason most people want to work on their own technological equipment is so that they can take company resources and access codes with them when they leave.
B. Outsource your data to a third-party contractor. As part of the contract, make sure that they will take responsibility and pay reparations should a future infiltration happen. Transferring risk is one of the four suggested strategies for dealing with negative risk.
C. Set up an internal audit of employees and their usage of organizational systems, especially in times of personal stress. Insider risk is an often overlooked factor in data breaches.
D. Sweep the organization for anyone in the breached department who was involved in the creation of the software that was hacked. Fire them as a warning to anyone else who might write code that is vulnerable to outside attack.
Pick your answer then Test Your Knowledge!

Moving Past Risk Analysis

by Kenneth Darter, PMP

Risk analysis is a wonderful tool for project managers. But in order for risk management to be useful to a project or a program, the management team will need to move past risk analysis and into taking actions based on the analysis.


Ask a Question

Discussion Rules

Recent Questions

Topic Originator Last Post New Total
Various Kinds of Risks  Gowri Shanker Balasa  Jun 25, '15 12:14 AM 
Risk Management Articles  Jack Black  May 17, '15 12:41 PM 
Risk webinars from PMI Risk COP  David Hillson  Mar 18, '15 4:47 PM  11  11 
  Mark All Read
See All Questions
ADVERTISEMENTS

"O, it is excellent To have a giant's strength! But it is tyrannous To use it like a giant."

- William Shakespeare

ADVERTISEMENT

Sponsors