Risk Management Plan Due Week 4 Worth Essay

PAGES
5
WORDS
1511
Cite
Related Topics:

¶ … Risk Management Plan Due Week 4 worth 240 points Note: The assignments a series papers-based case, located Student Center shell. The assignments dependent . In assignment, create a risk management plan. Scope and objectives of risk process

The project consists of fixing of the firm's data security weakness and brand restoration. Brand restoration would ensure that the company is able to demonstrate to its customers that it is able to move past the data breach event. Brand restoration would also allow the company to continue competing without losing its customers. Fixing the weaknesses in its data security gives the company the opportunity to improve on its security measures. The company would also use this aim in strengthening its systems and implementing strict guidelines in regards to data security. The scope of the project would require the company to communicate to its customers about the data breach Rosenbaum & Culshaw, 2003.

The company does not have to admit any liability initially. This will ensure that there will not be any legal suits filed against the company. Communicating first would be aimed at restoring the company's brand to its customers. Demonstrating to the customers that the company is genuinely concerned about the data breach, gives the customers an opportunity to trust the company.

The goals of the risk management plan would be to secure the customer data by increasing the security of the company's data systems. This would ensure that no data would be lost due to the same faults in the system. Increasing security would be beneficial to the company as it would now be PCI compliant and no firewall would be shut down like was the case previously. Ensuring that all firewalls are up will protect the company's systems and ensure there will not be any data loss. The scope of the project is to analyze the current systems, and determine if they should be upgraded. Analyzing the systems would also provide the company with information regarding the systems that are working and the systems that are faulty. Conducting an analysis would also be beneficial as it would determine the systems that are compatible with each other and the systems that have bugs Rainer, Snyder, & Houston, 1991()

For the project to be successful the objectives that need to be completed are deciding when to communicate to the customers in regards to the data breach, communicating the steps that the company has take to ensure that the data breach does not occur again, fully complying with the PCI implementation, and offering discounts to the customers. These objectives are vital for restoring the company's brand and ensuring that the company's data systems are secure. With these objectives in mind, the company will demonstrate to the customers that it is determined to fix the error, and it is responsive to the developments.

The project size

Based on the project sizing tool by Hillson and Simon (2012)

the project size has been determined to be a medium project. This is because it has an overall value of 60. This value was arrived at based on the facts that have been presented in the case study. The strategic importance of the project is critical to the success of the company. This is because the company would be unable to continue operating if it does not handle the project properly. Since this project would involve handling of systems that the company already has in place its commercial complexity has been determined to be novel. Reason been that the PCI compliance was already in progress, and only few people were unaware of its progress. The project would face some external constraints as it would be required to adhere to the PCI standards. The standards are not developed by the company, and they involve external parties. This is why there would be some external influence on the project. The customers would also influence the project as they are key to the success of the company and the project. The project has been...

...

These objectives have been agreed upon by all the stakeholders and they all understand the impact the project would have on the business. The CIO would be required to provide enhancements on the existing systems to ensure that they are all compliant with the PCI standards.
As the company is handling sensitive customer information it would have to conform to the regulations of the market sector. The regulations are quite challenging as the company needs to ensure that it maintains its brand reputation. While maintaining its brand reputation the company would also be required to ensure that customer data is stored securely at all times. This is a requirement imposed by banks and federal law. The project has an estimated budget of $100,000, and the project duration has been specified to be six (6) months. In order to complete the project the company would be required to involve a medium in-house team. This team would be charged with analyzing and fixing the data security as well as brand restoration. The post project liabilities have been identified that they might provide the company with significant exposure. This is because the company would stand to gain if it can demonstrate to its customers that it has taken the matter seriously.

Risk tools and techniques

In support of the risk management process the following tools and techniques will be used for the project namely initiation, identification, assessment, response planning, reporting, implementation, review and post project review Stephenson, 2001.

Initiation will involve the development of a risk management plan that would be issued to the project team at the start of the project. The project manager would be responsible for reviewing this document regularly as the project progresses. Identification is the process of identifying the risks. This involves analysis of all project constraints, brainstorming with team members, and analyzing the current systems within the company. Assessment will come after identification, and it includes the impact of each risk to the company, the probability that the risk would occur, the impact that the data breach would have on the company's reputation and brand as this would form a basis on how the company would progress with the project. Response planning would demand that for each of the risks identified an appropriate response strategy be selected. The response strategy would put into consideration the various aspects of the risk. The response would also identify the responsibility of each project member.

The proposed solutions will be implemented based on the risks identified. Implementation should be monitored to determine its effectiveness. Review is vital as it assists the project team to review what they have done to determine that the risks have been mitigated. Reviewing the system to ensure that no one can hack in order to steal the data is critical for the success of the project. Finally, after the project has been finalized the members should meet with other stakeholders to review the lessons learnt. The meeting would also provide the opportunity for all to discuss what can be done to ensure it does not happen again and the correct plan in case it happens.

Risk reviews and reporting

Risk review for the project would be conducted on a weekly basis for the six months duration of the project. This will allow the company managers and team members to keep track of the project progress. During the risk reviews identification of new risks would take place, the risks that the company is currently facing will be assessed and reviewed, team members will provide the stakeholders with updates on the agreed actions, and new responsibilities and actions would be assigned to the team members. Risk review will provide the opportunity for determining if the project is effective. This way changes can be made early enough, techniques and tools required can be provided. Reporting would be…

Sources Used in Documents:

References

Hillson, D., & Simon, P. (2012). Practical Project Risk Management: The ATOM Methodology, Second Edition. Vienna, VA: Management Concepts Incorporated.

Rainer, R.K., Jr., Snyder, C.A., & Houston, H.C. (1991). Risk Analysis for Information Technology. Journal of Management Information Systems, 8(1), 129-147. doi: 10.2307/40397977

Rosenbaum, M.S., & Culshaw, M.G. (2003). Communicating the Risks Arising from Geohazards. Journal of the Royal Statistical Society. Series A (Statistics in Society), 166(2), 261-270. doi: 10.2307/3559666

Stephenson, G. (2001). Risk Management Plan: Bechtel Nevada Corporation (U.S.).


Cite this Document:

"Risk Management Plan Due Week 4 Worth" (2013, October 31) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/risk-management-plan-due-week-4-worth-126065

"Risk Management Plan Due Week 4 Worth" 31 October 2013. Web.24 April. 2024. <
https://www.paperdue.com/essay/risk-management-plan-due-week-4-worth-126065>

"Risk Management Plan Due Week 4 Worth", 31 October 2013, Accessed.24 April. 2024,
https://www.paperdue.com/essay/risk-management-plan-due-week-4-worth-126065

Related Documents

Risk Management on a Satellite Development Project Enrolling a project requires risk assessment and management at various levels of implanting a project. This is based on the knowledge that quality of risk management determines the performance and outcome of the project. In any case, the Project Management Office (PMO) is mandated to spearhead a risk assessment and management plan. Risk management blueprints will later be implanted to each department. This analysis

Sidpers Program Risk Management Plan Project description and Objectives Project Scope Project sizing Stakeholder analysis Project Manager (PM) Risk Manager Risk Analyst The identified Sources of Risk in the SIDPERS Project Risk Register Summary Risk Report Risk Breakdown Structure Double P-I matrix Hillson, D and Simon, P (2007).Practical Project Risk Management: The Atom Methodology. Management Concepts. This document contains details of the Risk Management Plan for the SIDPERS Project and defines the risk management process to be used in the risk management process that

Progress Due Week 9 worth 200 points Note: The assignments a series papers-based case, located Student Center shell. The assignments dependent . During project life cycle, project risk reviews reports required previously identified risk Impact of events on the project The top two threats that had been identified as destruction of company reputation and loss of customers have occurred. These threats had been established as having a high impact on the

Project management is a systematic methodology of attaining aims and objectives in a given criteria for instance time and budget spread on number of years. Project management has been behind every major project for instance man landing on the moon to polio campaigns throughout a country (Gray CR and Larson, 2008). The subject of project management has grown and blossomed over a number of years. It dates back to cavemen. The

PR basically means doing a good thing and speaking about it. In other words, no matter how great the new coffee shop will be, unless it is very well advertised, it will not be worth a dime. The new coffee shop will be advertised on: business cards, T-shirts, travel mugs, coasters, glassware, sport bottles, ceramic cups, and others. Also, the coffee shop could be advertised on radio for greater

management, in particular the management of mega events. It also delves deeply into the positives and negatives of the London Olympic Games and the 2006 World Cup events in Germany. Those who manage mega events have an enormous task and an almost impossible responsibility to the public, to those participating in the events, and to the countries where mega events take place. Those issues and more are covered in