Finding the Few Critical Process Steps That Are Essential for Success Bill Schoening

Slides:



Advertisements
Similar presentations
(314) How Planning for Success Can Open the Door to Failure Bill Schoening Aug 31, 2005 – St. Louis, MO.
Advertisements

DRAFT GUIDANCE NOTE FOR MEMBER STATES ON FRAUD RISK ASSESSMENT
Accident and Incident Investigation
OSHA’s Voluntary Protection Program (VPP) Job Hazard Analysis Mishap reporting 1 This class is only intended to familiarize you with the programs in place.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Dd. This learning session will help the auditor: Design audit objectives understand why audit criteria are used in performance audits; learn how to develop.
▪ ▪ CLARITY ▪ ASSURANCE ▪ RESULTS MIDWEST RELIABILITY ORGANIZATION Improving RELIABILITY and mitigating RISKS to the Bulk Power System Thomas P. Tierney.
Energy Supporting Energy 1 1 DROPS Forum 12 th April 2011 Ron Martin Corporate HSE Advisor.
Institute of Municipal Finance Officers & Related Professions
What is Program Management?
Computer Security: Principles and Practice
Project Workshops Results and Evaluation. General The Results section presents the results to demonstrate the performance of the proposed solution. It.
Project Risk Management Risk Mitigation. Risk Management  The prime objective of risk management is to minimize the impact and probability of the occurrence.
Using Situational awareness and decision making
Development of an Effective Ethics Program
Control environment and control activities. Day II Session III and IV.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Internal Auditing and Outsourcing
WHERE WE ARE 22 member associations in 20 countries Over 4300 individual members who are responsible for risk management and/or insurance in their organisations.
COMPGZ07 Project Management Presentations Graham Collins, UCL
Central Piedmont Community College Internal Audit.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Cohort 5 Middle/Jr. High School Data Review and Action Planning: Schoolwide Reading Spring,
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Hazards Identification and Risk Assessment
The Implementation of BPR Pertemuan 10 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
Workshop October 2015 The world today is a very competitive place. You have people competing for the best education, lifestyle and jobs they can get and.
QUALITY ASSURANCE MANAGEMENT CONTROLS Chapter 9. Quality Assurance (QA) Management is concerned with ensuring: 1) The information system produced by the.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
Computing and SE II Chapter 15: Software Process Management Er-Yu Ding Software Institute, NJU.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Human Error and Biases. Human Error - Definition  An inappropriate or undesirable human decision or behavior that reduces, or has the potential for reducing,
Frontline Enterprise Security
Measuring Results of Improvement Actions Márcio Rodrigues, Tallin, 13/01/2015.
MDIC 1 George Serafin Deloitte & Touche LLP MDIC Open Forum Quality System Maturity Model Update.
Information Technology Project Management Managing IT Project Risk.
Kathy Corbiere Service Delivery and Performance Commission
Group Problem Solving Techniques
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Disaster Recovery Management By: Chris Rozic COSC 481.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Introduction to Enterprise Risk Management (“ERM”)
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
1 Evaluating GIS for Disaster Management Bruce Kinner GEOG 596B.
CMMI for Services, Version 1.3 Speaker: Business Excellence Date:
Software Engineering — Software Life Cycle Processes — Maintenance
Build an IT Strategy for the Small Enterprise
Safety and Security Management Fundamental Concepts
INTERNAL AUDIT REPORTS
12/05/2018 Industry expectations about European Aviation Safety plan (EASp) and Certification activities G.Garrouste ASD AirWorthiness Committee chairman.
Landpower Project Zero Harm Learning Series Module:. #7a Module Title:
HPI Leadership and Challenges
HUMAN RESOURCE GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE
Landpower Project Zero Harm Learning Series Module:. #7a Module Title:
Overview – Guide to Developing Safety Improvement Plan
Vision Facilitation Template
Overview – Guide to Developing Safety Improvement Plan
Troubleshooting a Task
Adding Value Across the Board
Where Safety Strategy Meets Execution
Presentation transcript:

Finding the Few Critical Process Steps That Are Essential for Success Bill Schoening

Claims, Expectations & Questions Fashionable to claim Fashionable to claim Organization is process basedOrganization is process based Assessed at Maturity Level 5 for CMMIAssessed at Maturity Level 5 for CMMI (Flawed) Expectations (Flawed) Expectations High assessment scores lead to successHigh assessment scores lead to success Highly rated processes & their implementation are sufficientHighly rated processes & their implementation are sufficient Questions for a business seeking success Questions for a business seeking success Are the processes contributing to success?Are the processes contributing to success? Do the assessments measure what contributes to success?Do the assessments measure what contributes to success? Should there be more to our processes?Should there be more to our processes? Should we be measuring something else?Should we be measuring something else?

Unmet Expectations & Unintended Consequences ML 5 organizations failing to execute SDD efforts adequately ML 5 organizations failing to execute SDD efforts adequately Processes viewed as cumbersome and without value Processes viewed as cumbersome and without value Loss of faith in systems engineering and its processes Loss of faith in systems engineering and its processes Critical steps bypassed, further speeding the decent into chaos Critical steps bypassed, further speeding the decent into chaos

Root Causes Processes assessment mentality has skewed how we measure success Assessments rely on audits of processes compliance Compliance easily observable for objective evidence Objective evidence most easily created for administrative activities Intellectual content is difficult to characterize and evaluate as objective evidence

CMMI Risk Management Specific Practices Define Risk Parameters Establish a Risk Management Strategy Identify Risks Evaluate, Categorize, and Prioritize Risks Develop Risk Mitigation Plans Implement Risk Mitigation Plans Seldom ask: Does the strategy make sense? Are the risks relevant? Do the mitigation plans actually mitigate the risks? Are we executing the plans effectively?

Solving the Right Problem Identify the critical steps that should be in processes Focus energy on ensuring critical steps are carried out effectively

What Risk Management Must Accomplish 1. Identify significant risks 2. Develop effective handling plans 3. Effectively implement mitigation plans Other activities are secondary Tough to audit compliance

What Requirements Development Must Prevent 1. Requirements are not viable 2. Requirements fail to represent (or maybe even misrepresent) user needs 3. Requirements fail to reflect significant changes in user needs during development 4. Requirements developed without adequate regard for the scenarios in which the product or service is to be used, including relevant business processes and rules Other activities are secondary Tough to audit compliance

What Trade Studies Must Accomplish 1. Well informed recommendation with adequate discovery in support of a quality decision 2. Visibility into all supporting materials 3. Well prepared to revisit decisions when additional information is received 4. Avoid corporate memory associated with completed trade studies walking out the door as the result of personnel turnover Other activities are secondary Tough to audit compliance

What Is the Cause? CMMI is not the cause CMMI is not the cause Our processes are not the cause Our processes are not the cause Taking the easy way out is Taking the easy way out is Performing admin tasks is not doing the workPerforming admin tasks is not doing the work Measuring admin tasks and not intellectual content addresses the wrong problemMeasuring admin tasks and not intellectual content addresses the wrong problem

What Do We Do? Focus attention on the critical steps Focus attention on the critical steps Reduce emphasis on administrivia Reduce emphasis on administrivia Train PMs, SEs and engineers about what is happening and what needs to change Train PMs, SEs and engineers about what is happening and what needs to change