BSBPMG517A Presentation 9

15
BSBPMG517A MANAGE PROJECT RISK PRESENTATION 9

Transcript of BSBPMG517A Presentation 9

Page 1: BSBPMG517A Presentation 9

BSBPMG517A MANAGE PROJECT RISK PRESENTATION 9

Page 2: BSBPMG517A Presentation 9

PRESENTATION OBJECTIVES

At the end of this presentation you will know about:

• Reviewing project outcomes to determine effectiveness of risk-

management processes and procedures

• Identifying and documenting risk-management issues and

recommended improvements for application to future projects

Page 3: BSBPMG517A Presentation 9

PROJECT OUTCOMES

Post-implementation reviews (PIR)

• Completing a project is not the same thing as

ending the project management process. You

need to ensure that the lessons learned during

the project are not forgotten. You can more

effectively design and execute further projects

when you take advantage of lessons learned

through experience of previous projects.

Page 4: BSBPMG517A Presentation 9

POST-IMPLEMENTATION REVIEW (PIR)

• A good time to start thinking about the PIR is

when members of the project team remember the

most - shortly after project has been delivered.

• However, depending on the nature of the project

to adequately assess the quality of the

implementation and complete this process you

may need to wait long enough for the changes

caused by the project to truly take effect.

Page 5: BSBPMG517A Presentation 9

WHAT TO REVIEW:

1. Conduct a gap analysis:

• Review the risk management plan and evaluate

how closely the plan was implemented?

• Review the expected risk management outcomes,

were these achieved?

• Identify any gaps.

Page 6: BSBPMG517A Presentation 9

2. Determine whether the risk objectives were

achieved:

• Was the outcome of the risk management strategy as per

projections?

• Did the risk management plan function well?

• Were project team members adequately trained?

• Were the risk controls followed and are they working

properly?

• What routine activities are needed to support the risk

management plan?

• Were these carried out effectively?

Page 7: BSBPMG517A Presentation 9

3. Determine the satisfaction of stakeholders:

• Were the end user’s needs met?

• Is the project sponsor satisfied?

• What are the effects on the client or end user?

• If key individuals aren’t satisfied, how should this

be addressed?

Page 8: BSBPMG517A Presentation 9

4. Determine risk management costs and benefits:

• What were the final costs?

• What did it cost to implement the treatment plans?

• Was there a cost to support the plans?

• How do the costs compare to the benefits?

• If the return on investment with the risk strategy was not as

expected, how could this have been improved?

Page 9: BSBPMG517A Presentation 9

5. Identify areas for further development:

• Have all the expected benefits from the risk

management strategies been achieved?

• If not, why not?

• Are there opportunities for further training and

coaching that will maximise results?

Page 10: BSBPMG517A Presentation 9

6. Identify lessons learned:

• How well were the project risks identified?

• What additional risks were discovered during the project?

• What changes created these additional risks?

• What impacted on the risk rating for the identified risks?

• What went wrong, why did these things go wrong, and how

could these problems be avoided next time?

• What went well, and needs to be learned from?

Page 11: BSBPMG517A Presentation 9

7. Report findings and recommendations:

• What have you learnt from this review?

• What lessons have you learned that need to be

carried forward to your future projects?

Page 12: BSBPMG517A Presentation 9

VULNERABILITY ASSESSMENT

Vulnerability assessment is the process of identifying, quantifying

and prioritising the vulnerabilities in a system. Vulnerability

analysis focuses both on consequences for the project and on

primary and secondary consequence for the organisation. It

concerns itself with possibilities of reducing project consequences

and of improving the capacity to manage future projects.

Risk and vulnerability analyses provide important knowledge of

how we prevent, prepare for, and manage crises.

In summary, the purpose of risk and vulnerability analyses is to

provide a basis for decisions to decision makers and those in

charge of risk management operations.

 

Page 13: BSBPMG517A Presentation 9

DOCUMENTATION OF POST PROJECT RISK MANAGEMENT OUTCOMES AND IMPROVEMENTS

The documentation that would be updated post

project, and as a result of your post implementation

review (PIR) may include:

• Risk Register

• Risk Management Plan

• Project Completion Report

Page 14: BSBPMG517A Presentation 9

PROJECT COMPLETION REPORTThis report will outline what happened in the project, what was learned, what

went well and didn’t go well, measurements of the process and the product

for the benefit of future projects. Components of the project completion

report include: 

• Assessment of overall project performance against plan

• Customer assessment of project conduct and results

• Participatory team assessment of project

• Description of project successes

• Lessons learned

• Further actions to be taken

The outcome of post implementation review for managing project risk will be

included in the completion report and recommendations made for future

projects.

Page 15: BSBPMG517A Presentation 9

PRESENTATION SUMMARY

Now that you have completed this presentation you know about:

• Reviewing project outcomes to determine effectiveness of risk-

management processes and procedures

• Identifying and documenting risk-management issues and

recommended improvements for application to future projects