#28 – TRANSFORM NOW … OR STRUGGLE TO SURVIVE!!! – DANIEL BURRUS

BurrusDan_040We are no longer in a period of rapid change!  We have now entered a unique period of time, unlike anything any of us have ever seen, that can best be described as transformation.

Three digital accelerators have been driving the transition from change to transformation for many years, but due to their predictable exponential rate, they have now reached an inflection point — a point where processes, products, services, and careers no longer change; rather, they transform.  The three digital accelerators are:

  1. Processing power.
  2. Digital storage.
  3. Digital bandwidth.

The impact of these three accelerators—the enormous gains in power, miniaturization, product intelligence, interconnectivity, cloud services, mobility and a raft of other technological dimensions—will be felt in every industry, every corner of the globe, and every nook and cranny of society. Continue reading

#28 – FINDING SUBCONTRACTOR HIDDEN RISKS – JOHN AYERS

John Ayers pixIn today’s business environment, many companies outsource a majority of a program’s work to stay competitive.  Far too often, hidden subcontractor’s risks cause unplanned significant cost and schedule growth resulting in serious negative program impact.

Sound familiar?  Learn how to mitigate these risks: Continue reading

#28 – ISO 31K SOFTWARE AND IT RISK MANAGEMENT – GARY GACK

GG-photo-20100224When applying Enterprise Risk Management (ERM), as in much else in life, the devil is in the details.  The details are especially critical when attempting to apply standards such as ISO 31000 to software and IT intensive systems.  ISO 31000 describes principles, a framework, and a high level process for ERM.  ISO 31000 clause 5 identifies process steps – in this article I will focus on risk assessment and risk treatment as it applies to software and IT intensive contexts.

  • 5.2 Communication and consultation
  • 5.3 Establishing the Context
  • 5.4 Risk assessment
    • 5.4.2 Risk Identification
    • 5.4.3 Risk Analysis
    • 5.4.4 Risk Evaluation
    • 5.5 Risk Treatment Continue reading

#28 – OBAMACARE VERSUS GOVERNMENT DISRUPTIONS – A RISK ANALYSIS – CAPERS JONES

Capers Jones pixINTRODUCTION
For almost two weeks the country (the United States) and the press have been mesmerized by the partial shut down of the Federal government and by the threat that the U.S. will default on its financial obligations due to failure to raise the debt limit.

These problems are due to conflicts between the Republicans and the Democrats on spending versus taxes, and more recently on the pros and cons of the Affordable Health Care act commonly known as ‘Obamacare.’

Both Obamacare and the government shut down have risks associated with them.  From the external viewpoint of an independent voter whose work involves risk analysis, neither side appears to have done a careful examination of any of the risks from either Obamacare itself or from the shutdown of the government. Continue reading

#28 – ERM SYSTEMS THAT AREN’T! – (C) GREG CARROLL

GregCarrollFollowing is excerpted from Mastering 21st Century Enterprise Risk Management (forthcoming October 2013):

THE NATURE OF RISK
Most systems masquerading as enterprise risk management are re-jigged workplace health-and-safety risk platforms that attempt to apply a predefined standardized methodology.  A one-size-fits-all assessment program cannot be imposed on everyone and achieve any useful results.  Risk-assessment must be relevant to their field if people are to take it seriously.  It must provide meaningful value to them.  It also must go through continual review as the nature of risk changes and evolves. Continue reading