Security Project Management Training

63
Project Management Methodology in Security Projects Deter - Detect - Delay - Deny 1 John N. Motlagh, MBA

description

 

Transcript of Security Project Management Training

Page 1: Security Project Management Training

Deter - Detect - Delay - Deny 1

Project Management Methodology in Security Projects

John N. Motlagh, MBA

Page 2: Security Project Management Training

Deter - Detect - Delay - Deny 2

Project management history

Project management defined

Team dynamics Project

management mechanics

Project manager qualities

Project estimating Contracting Risk assessment Financials

Agenda

Page 3: Security Project Management Training

Deter - Detect - Delay - Deny 3

“A project is a temporary endeavor undertaken to create a unique product or service” PMBOK 2001

“Any undertaking that has a definite, final objective representing specified values to be used to satisfy some need or desire”. Cleland

Project Defined

Page 4: Security Project Management Training

Deter - Detect - Delay - Deny 4

Project Management is the application of knowledge, skills, tools and techniques to

meet project objectives. PMBOK 2001

Project Management Defined

Page 5: Security Project Management Training

Deter - Detect - Delay - Deny 5

Kerzner believes successful project management will yield the following:◦ Projects completed within the allotted time and

budget ◦ Systems having the desired performance level ◦ Assigned resources are used effectively and

efficiently ◦ Customer acceptance

Project Management Defined

Page 6: Security Project Management Training

Deter - Detect - Delay - Deny 6

“A program is a group of projects managed in a coordinated way to obtain benefits not available from managing them separately.” PMBOK 2001

“Operations are ongoing work, similar to programs, with a reduced sense of benefit.” Kerzner

Programs and Operation

Page 7: Security Project Management Training

Deter - Detect - Delay - Deny 7

What is the PMBOK?

Page 8: Security Project Management Training

Deter - Detect - Delay - Deny 8

Integration Scope Time Cost Quality

Procurement Communication

Risk Human Resources

PMBOK Knowledge Areas

Page 9: Security Project Management Training

Deter - Detect - Delay - Deny 9

Initiation Planning Execution Control Close

PMBOK Process Groups

Page 10: Security Project Management Training

Deter - Detect - Delay - Deny 10

How do Knowledge Areas and Process Groups map?

Page 11: Security Project Management Training

Deter - Detect - Delay - Deny 11

Definitions History Dashboard

Project management fundamentals

Page 12: Security Project Management Training

Deter - Detect - Delay - Deny 12

Temporary Limited time frame Definite beginning and

end End is when the

objectives are met or, It is clear that the

objectives cannot be met

Unique Something that has

not been done before May be unique even if

the category it belongs to is large

Project management definitions

Page 13: Security Project Management Training

Deter - Detect - Delay - Deny 13

Developing a new fighter jet Bringing a new drug to market Installing a security system Programming a DVR

Project definitions

Page 14: Security Project Management Training

Deter - Detect - Delay - Deny 14

Time◦ Processes required to

ensure timely completion of the project

Cost◦ Processes required to

ensure the project is completed within budget

Quality◦ Includes all the process

required to ensure the project will satisfy the needs for which it was undertaken

Project definitions

Page 15: Security Project Management Training

Deter - Detect - Delay - Deny 15

Activity definition Activity sequencing Activity duration

estimating Schedule

development Schedule control

Time

Page 16: Security Project Management Training

Deter - Detect - Delay - Deny 16

Resource planning Cost estimating Cost budgeting Cost control

Cost

Page 17: Security Project Management Training

Deter - Detect - Delay - Deny 17

Quality planning Quality assurance Quality control

Quality

Page 18: Security Project Management Training

Deter - Detect - Delay - Deny 18

Project manager Management team Subcontractors

Sales team Consultants Customers

Stakeholders

Page 19: Security Project Management Training

Deter - Detect - Delay - Deny 19

An MS Project gantt chart is not a WBS Base line planning document If it is not in the WBS it is not in scope

Work breakdown structure

Page 20: Security Project Management Training

Deter - Detect - Delay - Deny 20

Time oriented display of activity

Activity along the left Calendar along the top Duration represented by

bars

Gantt or Bar chart

Page 21: Security Project Management Training

Deter - Detect - Delay - Deny 21

Critical path method (CPM)

Used to predict project duration

Analyze the activities with the least amount of scheduling flexibility

Late start Early finish

Network diagram

Page 22: Security Project Management Training

Deter - Detect - Delay - Deny 22

PERT Statistical estimating

Optimistic Most likely Pessimistic

Optimistic Most likely Pessimistic PERT

Initiation 10 12 25 14

Planning 15 17 36 20

Execution 30 35 45 36

Control 5 22 25 20

Close 2 6 7 6

62 92 138 95

6

))_4((_

cpessimistilikelymostoptimisticdurationactvity

Page 23: Security Project Management Training

Deter - Detect - Delay - Deny 23

No shortage of literature on team dynamics The Joiner Team Handbook is the best there

out there

Managing the project team

Page 24: Security Project Management Training

Deter - Detect - Delay - Deny 24

Team building stages Forming

◦ Feelings◦ Behaviors

Storming Norming Performing

Recipe for a successful team

Clear goals Continuous improvement Clear roles Clear communication Beneficial team behaviors Well defined decision

process Established ground rules Awareness of group

process Use scientific approach

Highlights from the Team Handbook

Page 25: Security Project Management Training

Deter - Detect - Delay - Deny 25

Break?

Page 26: Security Project Management Training

Deter - Detect - Delay - Deny 26

Late 1800’s◦ Faced with large projects◦ Unprecedented amounts of raw materials◦ Managing 1000’s of laborers◦ Transcontinental railroad

Project management history

Page 27: Security Project Management Training

Deter - Detect - Delay - Deny 27

Early 1900’s◦ Demand for harder

and longer hours from workers force science of efficiency

◦ WWI, New deal projects

◦ Gantt chart developed around 1900

◦ PM unchanged for almost 100 years

Project management history

Page 28: Security Project Management Training

Deter - Detect - Delay - Deny 28

Late 1900’s◦ WWII◦ Shrinking war time labor◦ New organization ◦ Pert chart◦ Critical Path Methodology (CPM)◦ Highly complex projects for military, industrial,

construction

Project management history

Page 29: Security Project Management Training

Deter - Detect - Delay - Deny 29

Today◦ Internet based systems◦ Global resources working in real time

Project management history

Page 30: Security Project Management Training

Deter - Detect - Delay - Deny 30

Pre-sales Defining phase Planning phase Implementation phase Closing phase

Phase breakdown

Page 31: Security Project Management Training

Deter - Detect - Delay - Deny 31

Divided into unique phases, starts after sales cycle is complete

Security specific project management

Closing

Defining

Implementing

Planning

Page 32: Security Project Management Training

Deter - Detect - Delay - Deny 32

Defining Get organized Review the

contract Interview

sales and customer

Prepare a riser diagram

Update the BOM

Assume control of cash flow and cost

Hold kick off meeting

Project dashboard checklist

Planning• Preliminary

schedule• Work

breakdown schedule

• Cost Re-Estimate

• Critical path• Project

schedule

Implementation

• Controlling• Documentatio

n tools• Procurement• Manage the

field work

Closing• Customer

training• As built

drawing• Final security

testing• Final

acceptance• Warranty• Service

turnover• Project audit

Page 33: Security Project Management Training

Deter - Detect - Delay - Deny 33

Defining Site survey

report Estimating

worksheet checklist

Pre-bid review Sales to ops

turnover form Validate

scope Hold kick off

meeting

Project dashboard activities

Planning• Project plan• Kick off

meeting action items

Implementation• Weekly meetings• Daily onsite project

controls• Weekly onsite

documentation

Closing• Punch list• Project

closeout• Ops to service

turnover

Page 34: Security Project Management Training

Deter - Detect - Delay - Deny 34

Align project with company objectives Increase profit Reduce risk Generate additional revenue Face to the customer Create competitive advantage

Role of the Project Manager

Page 35: Security Project Management Training

Deter - Detect - Delay - Deny 35

Manage design process

Manage costs Balance activities Ensure customer

satisfaction

Project scope Project costs Project schedule Not price

Responsibilities

Page 36: Security Project Management Training

Deter - Detect - Delay - Deny 36

Understand and interpret the scope of work to the project team

Continually validate scope with customers Continually search for ways to reduce costs Plan project phases and tasks Manage cash flow Coordinate sub-contractors Communicate to the stakeholders

Tactical tasks

Page 37: Security Project Management Training

Deter - Detect - Delay - Deny 37

Project leader Administrator Coordinator Politician Advocate

◦ for the firm ◦ and the customer

?

Qualities of a Project Manager

Page 38: Security Project Management Training

Deter - Detect - Delay - Deny 38

The project manager is responsible for ◦ Project definition◦ Project planning◦ Project implementation◦ Project closing

The PM must make sure the project is ◦ On time◦ Within budget◦ Within scope, and ◦ Meets customer expectations

Project manager summary

Page 39: Security Project Management Training

Deter - Detect - Delay - Deny 39

Security equipment specifications Tools and techniques Risks associated with estimating Inputs to an accurate estimate

Estimate security projects

Page 40: Security Project Management Training

Deter - Detect - Delay - Deny 40

Removed from electric subsystem

Now they are considered under Division 28

Specifications

Page 41: Security Project Management Training

Deter - Detect - Delay - Deny 41

Order of magnitude◦ Expert judgment◦ -25% to +75%

Parametric modeling◦ Cost /sq ft,

budgetary◦ -10% to +25%

Bottom up◦ Cost of individual

items◦ -5% to +10%

Unit price◦ -5% to +5%

Cost estimating techniques

Page 42: Security Project Management Training

Deter - Detect - Delay - Deny 42

Scope◦ Loosely defined

scope◦ No specs◦ Poor requirements

Time◦ Rushed timeline◦ Unanticipated

overtime

Quality◦ Customer asks for

work beyond scope without change order

Other◦ Legislative

requirements◦ Might change during

project

What can affect your estimates?

Page 43: Security Project Management Training

Deter - Detect - Delay - Deny 43

“Make it up on the next job”

Poor scope interpretation

Inaccurate WBS

Rework Optimistic

schedule ?

Estimating risks

Page 44: Security Project Management Training

Deter - Detect - Delay - Deny 44

Work breakdown structure Resource requirements Resource rates Activity durations Historical information

Estimating inputs

Page 45: Security Project Management Training

Deter - Detect - Delay - Deny 45

List resources required for each WBS item◦ Need resource quantity◦ Need resource cost

Resource types◦ Equipment◦ Labor◦ Subs◦ Special tools

Resource requirements

Page 46: Security Project Management Training

Deter - Detect - Delay - Deny 46

Unit price for each resource Consider using burdened labor rate

Resource rates

Page 47: Security Project Management Training

Deter - Detect - Delay - Deny 47

Use standard labor for installation◦ NECA manual

Man hours◦ 16 man hours = 2 techs for 1 day

Activity duration

Page 48: Security Project Management Training

Deter - Detect - Delay - Deny 48

How much did this cost in the past? Use it as a check rather than lead

estimating tool

Historical information

Page 49: Security Project Management Training

Deter - Detect - Delay - Deny 49

General conditions Bid bond Performance bond Insurance Workman’s comp Permits Performance

Contract types RFP Fixed price Cost re-

imbursement Time and materials

Contracting

Page 50: Security Project Management Training

Deter - Detect - Delay - Deny 50

First step to manage security risks Evaluate the likelihood that a threat will be

successful, and then considers The potential severity of if the event

comes to pass The objective is to identify

◦ Hazards◦ Threats and ◦ vulnerabilities

Security vulnerability assessment

Page 51: Security Project Management Training

Deter - Detect - Delay - Deny 51

Evaluate countermeasures to provide protection to the◦ Public◦ Employees◦ National interests◦ Environment

Countermeasures come in the form of ◦ CCTV◦ Intrusion detection◦ Access control◦ Barrier technology◦ Lighting◦ Policy

What does a firm do with the results?

Page 52: Security Project Management Training

Deter - Detect - Delay - Deny 52

Risk

SVA Concepts

Page 53: Security Project Management Training

Deter - Detect - Delay - Deny 53

Risk variables

SVA Concepts

Page 54: Security Project Management Training

Deter - Detect - Delay - Deny 54

SVA Process

Page 55: Security Project Management Training

Deter - Detect - Delay - Deny 55

Risk assessment steps

Asset characterization

ThreatAssessment

Risk Assessment

CountermeasuresAnalysis

VulnerabilityAnalysis

Page 56: Security Project Management Training

Deter - Detect - Delay - Deny 56

NFPA 101 (National Fire Protection Association)

Highlights◦ AHJ◦ Fire exit hardware (exit doors should get your full

and undivided attention)◦ Means of egress (NFPA chapter 7, IBC ch. 10)◦ Area of refuge

Life safety codes

Page 57: Security Project Management Training

Deter - Detect - Delay - Deny 57

NFPA – 70 National electric code NFPA – 72 National fire alarm code NFPA – Standard for emergency and safety

power systems NFPA – 730 Premise security UL924 – Standard for safety emergency

lighting and power UL325 – Gate operators ASTM F-1184 and F-2200 – posts and

gates

Other governing codes

Page 58: Security Project Management Training

Deter - Detect - Delay - Deny 58

Markup vs. margin Earned value Change order

Project financial management

Page 59: Security Project Management Training

Deter - Detect - Delay - Deny 59

Markup vs. Margin

Markup is cost plus a %

Don’t use it Margin is preferred

%)arg1(cos inmt

Page 60: Security Project Management Training

Deter - Detect - Delay - Deny 60

Comparison of ◦ Budgeted value of work (Planned value, PV)◦ Earned value, function of

Percentage complete and Planned value

◦ Actual cost

Earned value measurement

Page 61: Security Project Management Training

Deter - Detect - Delay - Deny 61

Cost variance◦ Measurement according to budgeted amount in

terms of Dollar amount over/under % of budget over/under

Schedule variance◦ Measurement according to scheduled activity in

terms of Time over/under schedule % of time over under

Earned value measurement

Page 62: Security Project Management Training

Deter - Detect - Delay - Deny 62

Cost performance index◦ Less than 1 means over budget◦ Greater than or equal to 1 is on budget

Schedule performance index◦ Less than 1 means behind schedule◦ Greater than or equal to 1 is on schedule

Earned value measurement

Page 63: Security Project Management Training

Deter - Detect - Delay - Deny 63

Had enough?