<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TransAccel Group &#187; risk</title>
	<atom:link href="http://transaccelgroup.com/tag/risk/feed/" rel="self" type="application/rss+xml" />
	<link>http://transaccelgroup.com</link>
	<description>Improving IT Processes &#38; Services</description>
	<lastBuildDate>Tue, 03 Jul 2018 13:13:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>ASSESSING YOUR ORGANIZATION’S CYBER SECURITY: THINK YOU’RE UP TO IT?</title>
		<link>http://transaccelgroup.com/2015/03/11/assessing-your-organizations-cyber-security-think-youre-up-to-it/</link>
		<comments>http://transaccelgroup.com/2015/03/11/assessing-your-organizations-cyber-security-think-youre-up-to-it/#comments</comments>
		<pubDate>Wed, 11 Mar 2015 16:58:56 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security Assessment]]></category>
		<category><![CDATA[Security Compliance]]></category>
		<category><![CDATA[Security Training]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5969</guid>
		<description><![CDATA[The Enron debacle will forevermore be a parable about delusional self-auditing. In much the same way, Cyber Security should never be assessed using internal staff and mechanisms, the ramifications of missing something are simply too great. According to Cenzic ‘s Application Vulnerability Trends Report: 2014, “While the majority of corporations have the important security building blocks, such as firewalls and intrusion protection systems needed for their security infrastructure, not enough organizations have comprehensive tools and practices in place for securing applications.” Faced with a worldwide shortage of Cyber Security professionals (Cyber Security has only recently become a discipline one may major in!), and companies unable to afford the overhead necessary for the requisite training, this situation is not surprising. Bad news for you. Good news for hackers. Still think you can go it alone? Do you really understand the sheer magnitude of possible vulnerabilities? Here’s a sobering thought: Everything on the network is hackable. Everything—from your corporate computers to a 3rd party vendor to your employees’ Smartphones. Add to this the risky behaviors employees can engage in—sharing passwords, inappropriate web browsing, copying sensitive data onto mobile devices—and you’ve got exposure. Lots of it. An objective Cyber Security assessment can assist with evaluation and establishment of controls to: Implement an information risk management program Ensure network security is adequate, including boundary and internal Guide user education and awareness Verify malware protection and prevention Deal with secure configuration and patch management for devices (network, servers, PCs) Manage user access and privileges Handle incident management Assist with home and mobile working If you feel you aren’t ready to tackle all the items above, you should at least undertake a basic evaluation to consider only the most foundational building [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The Enron debacle will forevermore be a parable about delusional self-auditing. In much the same way, Cyber Security should never be assessed using internal staff and mechanisms, the ramifications of missing something are simply too great.</p>
<p>According to Cenzic ‘s Application Vulnerability Trends Report: 2014, “While the majority of corporations have the important security building blocks, such as firewalls and intrusion protection systems needed for their security infrastructure, not enough organizations have comprehensive tools and practices in place for securing applications.” Faced with a worldwide shortage of Cyber Security professionals (Cyber Security has only recently become a discipline one may major in!), and companies unable to afford the overhead necessary for the requisite training, this situation is not surprising. Bad news for you. Good news for hackers.</p>
<p>Still think you can go it alone? Do you really understand the sheer magnitude of possible vulnerabilities? Here’s a sobering thought: Everything on the network is hackable. Everything—from your corporate computers to a 3rd party vendor to your employees’ Smartphones. Add to this the risky behaviors employees can engage in—sharing passwords, inappropriate web browsing, copying sensitive data onto mobile devices—and you’ve got exposure. Lots of it.</p>
<p>An objective Cyber Security assessment can assist with evaluation and establishment of controls to:</p>
<ul>
<li>Implement an information risk management program</li>
<li>Ensure network security is adequate, including boundary and internal</li>
<li>Guide user education and awareness</li>
<li>Verify malware protection and prevention</li>
<li>Deal with secure configuration and patch management for devices (network, servers, PCs)</li>
<li>Manage user access and privileges</li>
<li>Handle incident management</li>
<li>Assist with home and mobile working</li>
</ul>
<p>If you feel you aren’t ready to tackle all the items above, you should at least undertake a basic evaluation to consider only the most foundational building blocks for cyber security.</p>
<p>In a survey of its 3,400 global members, Information Systems Audit and Control Association (ISACA) found that although 83% of the respondents recognized Cyber Attacks as among their “top three threats,” only 38% felt prepared to endure one. Make sure you are part of that 38%. If you do nothing else, purchase cyber insurance. If you are ready to take additional steps, we can help.</p>
<p>P.S. On our C4C blog we recently wrote about the fallacy of thinking you are too small to garner a hacker’s attention. I can’t stress the following enough: While big companies more often make the news by getting breached for millions of records, they also have the financial resources to dig out of that hole. Small companies aren’t as lucky. A data breach at a small company can mean closing the doors, for good. Don’t let that happen.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2015/03/11/assessing-your-organizations-cyber-security-think-youre-up-to-it/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers Aren’t Waiting. Why Are You?</title>
		<link>http://transaccelgroup.com/2015/02/11/hackers-arent-waiting-why-are-you/</link>
		<comments>http://transaccelgroup.com/2015/02/11/hackers-arent-waiting-why-are-you/#comments</comments>
		<pubDate>Wed, 11 Feb 2015 17:43:24 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Risk Assessment]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5975</guid>
		<description><![CDATA[Hackers Aren’t Waiting. Why Are You? Why is Cyber/Computer Security so far down on your to-do list? If your reasons are any of the following, you might want to reconsider your priorities. Let’s address each of these points in turn. They can’t find you.  On a recent episode of 60 Minutes, Dave DeWalt, CEO of cyber security company FireEye, asserted that 97% of all companies are being breached. Ninety-Seven percent. So, unless you truly live off the grid, you have likely had a breach already. The real question is how bad is the damage? They can’t find your valuables.  These criminals are very sophisticated and have the knowledge, tools and patience to find your sensitive data and exploit it.  Hacking has evolved from the lone geek making mischief to an actual profession and, as Lance Cottrell, Chief Scientist at Ntrepid and expert on security and privacy writes, “In most breaches, it turns out the hacker has been inside the network for months.” Your valuables aren’t worth it.  Wrong again. They aren’t always interested in your data; often they are interested in your financial partner, investor, supplier and customer. Anything sensitive they can sell or make profit from. You have other priorities.  You will always have other priorities. But believe me, if the hackers come—and they will—you will have to deal with the fallout and that will become your new priority.  With several methodologies at hackers’ disposal such as viruses, malware, botnets and ransomware, cleaning up the damage will be more involved than you think. You don’t know where to start. Improving your security begins with having a prioritized list of actions based on risks to your company.  A risk assessment will accomplish that and, at [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Hackers Aren’t Waiting. Why Are You?</p>
<p>Why is Cyber/Computer Security so far down on your to-do list? If your reasons are any of the following, you might want to reconsider your priorities.</p>
<style type='text/css'>
  #checklist-1 li:before{color:#757575 !important; content:'\f111' }
	</style>
<ul id="checklist-1" class="list-icon circle-no list-icon-fa-circle">
<li>Because you live under a mushroom or live off the grid.</li>
<li>Because your environment is in such disarray that if someone <em>did</em> breach it, the chances of him or her finding anything of value would be remote.</li>
<li>Because you believe that you are only a little fish in a big pond and hackers have much bigger companies to go after.</li>
<li>Because no one has requested it and you have more than enough other problems to handle right now.</li>
<li>Because you don’t know where to start.</li>
</ul>

<p>Let’s address each of these points in turn.</p>
<p>They can’t find you.  On a recent episode of <em>60 Minutes</em>, Dave DeWalt, CEO of cyber security company FireEye, asserted that 97% of all companies are being breached. <em>Ninety-Seven</em> percent. So, unless you truly live off the grid, you have likely had a breach already. The real question is how bad is the damage?</p>
<p>They can’t find your valuables.  These criminals are very sophisticated and have the knowledge, tools and patience to find your sensitive data and exploit it.  Hacking has evolved from the lone geek making mischief to an actual profession and, as Lance Cottrell, Chief Scientist at Ntrepid and expert on security and privacy writes, “In most breaches, it turns out the hacker has been inside the network for months.”</p>
<p>Your valuables aren’t worth it.  Wrong again. They aren’t always interested in your data; often they are interested in your financial partner, investor, supplier and customer. Anything sensitive they can sell or make profit from.</p>
<p>You have other priorities.  You will always have other priorities. But believe me, if the hackers come—and they will—you will have to deal with the fallout and <em>that</em> will become your new priority.  With several methodologies at hackers’ disposal such as viruses, malware, botnets and ransomware, cleaning up the damage will be more involved than you think.</p>
<p>You don’t know where to start. Improving your security begins with having a prioritized list of actions based on risks to your company.  A risk assessment will accomplish that and, at the same time, help you raise awareness and understanding with your executives of possible threats and the cost of inaction. It will also demonstrate confidence that you and your team are pro-actively dealing with the today’s cyber security reality: it’s not a question of if, but when.</p>
<p><strong>What is your reason for not having an information security and risk assessment performed ASAP?</strong></p>
<p><strong>If the real reason is you don’t know how, that is where we can help.</strong></p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2015/02/11/hackers-arent-waiting-why-are-you/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Change And The Big Bang Theory</title>
		<link>http://transaccelgroup.com/2014/11/06/change-and-the-big-bang-theory/</link>
		<comments>http://transaccelgroup.com/2014/11/06/change-and-the-big-bang-theory/#comments</comments>
		<pubDate>Thu, 06 Nov 2014 18:23:06 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[Change]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Planning]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[strategy]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5989</guid>
		<description><![CDATA[It’s a hectic world out there with technological advances, competitive challenges, and government regulations (just to name a few variables) coming at organizations at breakneck speed. In response, leaders and managers are becoming more worried about failing than they are about learning and improving their organizations’ capabilities. As such, we are finding that even the most forward-thinking organizations are increasingly choosing to hunker down and solidify their positions, as if they can stave off trouble by maintaining the status quo. The truth is change is coming to a theater near you and soon, but how it comes is entirely up to you. That is the measure of control you do possess. Change can come incrementally or manifest itself as the Big Bang!, and the latter will be much more disruptive than the former, we promise you. Very often in our line of work we’ll hear someone in IT / IS or Corporate services say, Thank goodness that project is finally finished, as if one particularly pesky piece of business is behind them and it’s smooth sailing ahead. Well, no. If you don’t want to go through the Big Bang! experience (otherwise known as when the wheels fall off), this is not the mindset you should cultivate. Each and every day we at TAG spend considerable energy helping organizations become comfortable with the concept of incremental or continuous improvement. Why? Because if you’re constantly improving, you rarely suddenly arrive at the Big Bang! crossroad. You can either be the Changer or the Changed, but it is better to be the actor than the acted upon. Change will not be denied. If you choose internal stasis through passivity or inertia, external agents will force you to change [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It’s a hectic world out there with technological advances, competitive challenges, and government regulations (just to name a few variables) coming at organizations at breakneck speed. In response, leaders and managers are becoming more worried about failing than they are about learning and improving their organizations’ capabilities. As such, we are finding that even the most forward-thinking organizations are increasingly choosing to hunker down and solidify their positions, as if they can stave off trouble by maintaining the status quo.</p>
<p>The truth is change is coming to a theater near you and soon, but <em>how</em> it comes is entirely up to you. That is the measure of control you <em>do</em> possess. Change can come incrementally or manifest itself as the <strong>Big Bang!</strong>, and the latter will be much more disruptive than the former, we promise you.</p>
<p>Very often in our line of work we’ll hear someone in IT / IS or Corporate services say, <em>Thank goodness that project is finally finished,</em> as if one particularly pesky piece of business is behind them and it’s smooth sailing ahead. Well, no. If you don’t want to go through the <strong>Big Bang!</strong> experience (otherwise known as <em>when the wheels fall off</em>), this is not the mindset you should cultivate. Each and every day we at TAG spend considerable energy helping organizations become comfortable with the concept of incremental or continuous improvement. Why? Because if you’re constantly improving, you rarely suddenly arrive at the <strong>Big Bang!</strong> crossroad.</p>
<p>You can either be the Changer or the Changed, but it is better to be the actor than the acted upon. Change will not be denied. If you choose internal stasis through passivity or inertia, external agents <em>will</em> force you to change because the competition and market won’t take your everlasting comfort into consideration. . .and then what? Right. You’ve got the <strong>Big Bang! </strong>to survive, because staying where you were allowed the competition and the world to pass you by.</p>
<p>We know change is difficult, so we won’t belabor the point. Nevertheless, if you put the following conditions in place, it won’t be quite so arduous:</p>
<style type='text/css'>
  #checklist-2 li:before{color:&#8221;&#8221; !important; content:'' }
	</style>
<p>Mary Shelley, author of <em>Frankenstein</em> said, “Nothing is so painful to the human mind as a great and sudden change.”  Since change is (ironically) a permanent state of being, leading an adaptable organization focused on steady, incremental improvement is vital. If change is anticipated and implemented without fanfare on an ongoing basis, the hysteria of the <strong>Big Bang!</strong> will be kept in check.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2014/11/06/change-and-the-big-bang-theory/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cutting Your Project Portfolio Down to Size</title>
		<link>http://transaccelgroup.com/2014/07/10/cutting-your-project-portfolio-down-to-size/</link>
		<comments>http://transaccelgroup.com/2014/07/10/cutting-your-project-portfolio-down-to-size/#comments</comments>
		<pubDate>Thu, 10 Jul 2014 19:33:59 +0000</pubDate>
		<dc:creator><![CDATA[Greg Scott]]></dc:creator>
				<category><![CDATA[Planning]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[business case]]></category>
		<category><![CDATA[capacity]]></category>
		<category><![CDATA[keep the lights on]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=6008</guid>
		<description><![CDATA[That big project portfolio of yours is your biggest headache. It’s true. If you are like most companies, your portfolio has grown to an unwieldy size, which means you have way too many projects competing for the same resources. Here’s what to do. First, inventory ALL projects and activities that require any kind of IT resources, making sure to include non-obvious ones like SMEs and user training time. According to Gartner, 60% of IT’s budget is spent on operational, “keep the light on” activities, so it is important that these are included to ensure correct allocation of project resources. Projects that pull resources from core operations can create business risk. Second, decide who will comprise a governance committee, i.e., who will make decisions concerning the portfolio. This should be a mix of IT and business leaders with the authority to make decisions for the organization. The governance committee will determine which projects should continue, which should be delayed, and which should be terminated. These decisions will be made based on determining which projects have the potential to create the most value for the company. Each project in the portfolio should align with business goals and be ranked on the strength of its business case outlining benefits, costs and risk. Keep this simple, but also be on the lookout for project interdependencies. You certainly don’t want a critical project bungled because it relied on deliverables from another project that was killed or delayed. The importance of strong governance in the portfolio process cannot be overstated. Projects that are nice but not essential drain away resources that could be used more productively. Focus on cutting unnecessary demand and don’t start new projects until you know for certain [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>That big project portfolio of yours is your biggest headache. It’s true. If you are like most companies, your portfolio has grown to an unwieldy size, which means you have way too many projects competing for the same resources. Here’s what to do.</p>
<p>First, inventory ALL projects and activities that require any kind of IT resources, making sure to include non-obvious ones like SMEs and user training time. According to Gartner, 60% of IT’s budget is spent on operational, “keep the light on” activities, so it is important that these are included to ensure correct allocation of project resources. Projects that pull resources from core operations can create business risk.</p>
<p>Second, decide who will comprise a governance committee, i.e., who will make decisions concerning the portfolio. This should be a mix of IT and business leaders with the authority to make decisions for the organization. The governance committee will determine which projects should continue, which should be delayed, and which should be terminated. These decisions will be made based on determining which projects have the potential to create the most value for the company.  Each project in the portfolio should align with business goals and be ranked on the strength of its business case outlining benefits, costs and risk. Keep this simple, but also be on the lookout for project interdependencies. You certainly don’t want a critical project bungled because it relied on deliverables from another project that was killed or delayed.</p>
<p>The importance of strong governance in the portfolio process cannot be overstated. Projects that are nice but not essential drain away resources that could be used more productively. Focus on cutting unnecessary demand and don’t start new projects until you know for certain that existing projects can be completed and meet expected deliverables. This won’t be easy. Every project is “owned” by someone who thinks it is the most important project in the portfolio, so it is essential to let the business case data drive the decision, and not emotions or politics. We can all relate. This time of year I can see myself riding around on a John Deere with 4-wheel steering, a zero turn radius, and a 48-inch mowing deck. Grass cutting would be so much easier (okay, and a little fun). But, with financial resources being what they are, I can’t make the case for its purchase because it will not really provide any material benefit. It’s just a “nice to have.” So, back to my 21” push mower.  Sorry, John Deere dealer.</p>
<p>Half the year is gone.  As you look at how you will finish out the year and also prepare for next year’s portfolio of projects, the summer months are a great time to review your project portfolio and get the pruning shears out. Since 80% of the benefit usually comes from 20% of the projects, in portfolio management, less is always more.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2014/07/10/cutting-your-project-portfolio-down-to-size/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Terminate the time guzzler: Inefficient meetings</title>
		<link>http://transaccelgroup.com/2011/11/15/terminate-the-time-guzzler-inefficient-meetings/</link>
		<comments>http://transaccelgroup.com/2011/11/15/terminate-the-time-guzzler-inefficient-meetings/#comments</comments>
		<pubDate>Tue, 15 Nov 2011 19:22:38 +0000</pubDate>
		<dc:creator><![CDATA[Greg Scott]]></dc:creator>
				<category><![CDATA[time]]></category>
		<category><![CDATA[agenda]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[facilitation]]></category>
		<category><![CDATA[meetings]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=6064</guid>
		<description><![CDATA[Are you a big fan of impromptu meetings via Skype, Instant Messaging or other technology? These meetings seem to be laser focused because the meeting originator contacts you for a specific reason and has some targeted questions already at hand. Therefore, your ad hoc meeting has a clear-cut purpose, and resolution and closure is fast and painless. So, how do you take this paradigm and apply it to the biggest time guzzler in most people’s day—the inefficient meeting? Here’s how. Every meeting should have an agenda and specific objectives. This information should be communicated to participants well in advance so they arrive prepared. Your meeting should also be run by a facilitator who brings well-formed questions to the table; these are considered time-management “gold.” Every item on your agenda should have specific, corresponding questions that are used to elicit information and move you on to the next item. For example, if your project has the agenda item Risk Planning, some questions might include: An interesting thing occurs when the objectives and agenda are clear, the participants come prepared, and the facilitator keeps the discussion reined-in through the use of thoughtful questions: meeting objectives are met and meetings are adjourned on-time or early. Participants think, Wow! We finished everything on the agenda and I’ve even got some spare time to put back into my day…I love it. As the meeting owner or facilitator, you might even find participants actually look forward to your meetings as the most productive time of their workday. How cool is that? &#8211; See more at: http://www.transaccelgroup.com/blog/2011/11/15/terminate-the-time-guzzler-inefficient-meetings-2/#sthash.A0bkSWDv.dpuf]]></description>
				<content:encoded><![CDATA[<p>Are you a big fan of impromptu meetings via Skype, Instant Messaging or other technology? These meetings seem to be laser focused because the meeting originator contacts you for a specific reason and has some targeted questions already at hand. Therefore, your ad hoc meeting has a clear-cut purpose, and resolution and closure is fast and painless.</p>
<p>So, how do you take this paradigm and apply it to the biggest time guzzler in most people’s day—the inefficient meeting?</p>
<p>Here’s how. Every meeting should have an agenda and specific objectives. This information should be communicated to participants well in advance so they arrive prepared. Your meeting should also be run by a facilitator who brings well-formed questions to the table; these are considered time-management “gold.” Every item on your agenda should have specific, corresponding questions that are used to elicit information and move you on to the next item. For example, if your project has the agenda item <i>Risk Planning</i>, some questions might include:</p>
<style type='text/css'>
  #checklist-3 li:before{color:#757575 !important; content:'\f111' }
	</style>
<ul id="checklist-3" class="list-icon circle-no list-icon-fa-circle">
<li>What are the top risks having the greatest impact to the business? What is the likelihood of occurrence?</li>
<li>What are the mitigation strategies for each of these high risks? If mitigation is not viable, what is the contingency plan?</li>
<li>Has every potential risk area been identified (technology, business, project, resource, customer, operational)?</li>
</ul>

<p>An interesting thing occurs when the objectives and agenda are clear, the participants come prepared, and the facilitator keeps the discussion reined-in through the use of thoughtful questions: meeting objectives are met and meetings are adjourned on-time or <i>early</i>. Participants think, <i>Wow! We finished everything on the agenda and I’ve even got some spare time to put back into my day…I love it.</i> As the meeting owner or facilitator, you might even find participants actually look forward to your meetings as the most productive time of their workday. How cool is that?</p>
<p>&#8211; See more at: http://www.transaccelgroup.com/blog/2011/11/15/terminate-the-time-guzzler-inefficient-meetings-2/#sthash.A0bkSWDv.dpuf</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2011/11/15/terminate-the-time-guzzler-inefficient-meetings/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mark that project APPROVED…</title>
		<link>http://transaccelgroup.com/2011/10/17/mark-that-project-approved/</link>
		<comments>http://transaccelgroup.com/2011/10/17/mark-that-project-approved/#comments</comments>
		<pubDate>Mon, 17 Oct 2011 19:55:53 +0000</pubDate>
		<dc:creator><![CDATA[Greg Scott]]></dc:creator>
				<category><![CDATA[Planning]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[business case]]></category>
		<category><![CDATA[cost]]></category>
		<category><![CDATA[PMO]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[scope]]></category>
		<category><![CDATA[time]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=6073</guid>
		<description><![CDATA[Today, every company is pursuing more projects than it can successfully handle, and that puts your project at risk of not getting the approval it needs to move forward. So, what can you do to make sure that a governance committee review doesn’t leave you and your project on the outside looking-in? Follow these steps to give your project an advantage over other projects in the queue for review. &#160; Understand and communicate the business case for your project. This starts with understanding the business strategy and business drivers that prompted your project in the first place. If you don’t understand what the business is trying to accomplish, you have very little chance of your project hitting the mark.Once the business strategy and drivers are clear, identify very specifically—and quantitatively where possible—exactly how your project will provide benefit relative to the business drivers and business strategy. Work with key people in the business area to develop and review the business case to ensure that it is sound and strong. Creating a solid, strong business case is the most important factor in not only getting the project approved, but also in ensuring that the project team clearly understands what is to be accomplished, why, and how it will help the business. Identify resourcing needs by role. Resources, especially people, are always in high demand, and you need to be very clear about the resources that your project will require (people, facilities, equipment, etc.). Clearly identify your resource needs by being specific. Assuming that your request for two technical analysts you will get you what you actually need might be a mistake. Having the right skills, expertise and individuals detailed on a project can greatly improve the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Today, every company is pursuing more projects than it can successfully handle, and that puts your project at risk of not getting the approval it needs to move forward. So, what can you do to make sure that a governance committee review doesn’t leave you and your project on the outside looking-in? Follow these steps to give your project an advantage over other projects in the queue for review.</p>
<p>&nbsp;</p>
<ol>
<li><b>Understand and communicate the business case for your project.</b><br />
This starts with understanding the business strategy and business drivers that prompted your project in the first place. If you don’t understand what the business is trying to accomplish, you have very little chance of your project hitting the mark.Once the business strategy and drivers are clear, identify very specifically—and quantitatively where possible—exactly how your project will provide benefit relative to the business drivers and business strategy.</p>
<ul>
<li>Work with key people in the business area to develop and review the business case to ensure that it is sound and strong.</li>
</ul>
<p>Creating a solid, strong business case is the most important factor in not only getting the project approved, but also in ensuring that the project team clearly understands what is to be accomplished, why, and how it will help the business.</li>
<li><b>Identify resourcing needs by role.</b><br />
Resources, especially people, are always in high demand, and you need to be very clear about the resources that your project will require (people, facilities, equipment, etc.). Clearly identify your resource needs by being specific. Assuming that your request for two technical analysts you will get you what you actually need might be a mistake. Having the right skills, expertise and individuals detailed on a project can greatly improve the probability of project success.</li>
<li><b>Identify project interdependencies.</b><br />
As a good project manager, I expect that you will have identified dependencies within your project as part of your project schedule. With the complex business environment that exists today, you also need to identify dependencies that are outside of your project to make sure that external factors do not inhibit your project’s ability to succeed. For example, if your project requires customer master data to be available—and that is a key deliverable from a different project—you have to identify that interdependency and evaluate the risk to your project if that deliverable does not occur as planned. This allows both projects to understand the dependency and provides greater visibility and increased opportunity to manage and mitigate the risk. The Project Management Office (PMO) will know your project is likely to be well managed when they see the project interdependencies identified.</li>
</ol>
<p>Additionally, all projects will require identification of project costs, timetables, risks, etc., as is normally requested by governance committees. The above points are not extensive, but are meant to help you differentiate your project from other projects being evaluated.</p>
<p>If you go to the governance committee with these items ready for review, you will not only put yourself in the best position for project approval, but you may also become the model for how other projects should be packaged for governance review.</p>
<p>&#8211; See more at: http://www.transaccelgroup.com/blog/2011/10/17/mark-that-project-approved/#sthash.miOosk0N.dpuf</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2011/10/17/mark-that-project-approved/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>October: Conscious Planning</title>
		<link>http://transaccelgroup.com/2011/10/04/october-conscious-planning/</link>
		<comments>http://transaccelgroup.com/2011/10/04/october-conscious-planning/#comments</comments>
		<pubDate>Tue, 04 Oct 2011 20:01:43 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[Planning]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[business case]]></category>
		<category><![CDATA[demand]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[IT maturity]]></category>
		<category><![CDATA[keep the lights on]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[service levels]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=6085</guid>
		<description><![CDATA[October is probably the most grueling month of the IT planning cycle, given the exorbitant amount of time expended in meetings. Each department—Sales, Marketing, R&#38;D and Manufacturing—will meet with its IT counterpart to plan next year’s projects. These meetings should be dialogue-driven events that result in a shared understanding of anticipated business drivers over the next 12-18 months, current market conditions, emerging trends, and specific strategies to capitalize on opportunities. In preparation for these meetings, it would also be helpful for IT to conduct a SWOT analysis (strengths/weaknesses/opportunities/threats) comparing your company to 3 or 4 competitors. Not only will this assessment point out technical strengths and weaknesses, but it is always wise to know what the competition is up to. Unfortunately, October is also a time of enormous pressure, as both IT and the Business push hard to achieve MBO deliverables before the end of the year. Too often, the competing time constraints of completing existing projects while planning new ones causes Business to default on the planning side, leaving IT to design new projects on its own. This lack of input from Business leads to “silo” thinking: “We know what they [the Business] really want or need.” Now, in a perfect world, Business would remain engaged with the IT Account Manager—the one who not only has the best vantage point from which to understand and articulate Business’s needs, but is also well-equipped to offer ideas and solutions to address those needs holistically (end-to-end) rather than piecemeal. But, if Business opts out and IT can’t get it back to the table, or IT believes it actually can do the planning on its own, the next step needs to be the creation of a business case, [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>October is probably the most grueling month of the IT planning cycle, given the exorbitant amount of time expended in meetings. Each department—Sales, Marketing, R&amp;D and Manufacturing—will meet with its IT counterpart to plan next year’s projects. These meetings should be dialogue-driven events that result in a shared understanding of anticipated business drivers over the next 12-18 months, current market conditions, emerging trends, and specific strategies to capitalize on opportunities. In preparation for these meetings, it would also be helpful for IT to conduct a SWOT analysis (strengths/weaknesses/opportunities/threats) comparing your company to 3 or 4 competitors. Not only will this assessment point out technical strengths and weaknesses, but it is always wise to know what the competition is up to.</p>
<p>Unfortunately, October is also a time of enormous pressure, as both IT and the Business push hard to achieve MBO deliverables before the end of the year. Too often, the competing time constraints of completing existing projects while planning new ones causes Business to default on the planning side, leaving IT to design new projects on its own. This lack of input from Business leads to “silo” thinking: <i>“We know what they [the Business] really want or need.”</i></p>
<p>Now, in a perfect world, Business would remain engaged with the IT Account Manager—the one who not only has the best vantage point from which to understand and articulate Business’s needs, but is also well-equipped to offer ideas and solutions to address those needs holistically (end-to-end) rather than piecemeal. But, if Business opts out and IT can’t get it back to the table, or IT believes it actually can do the planning on its own, the next step needs to be the creation of a business case, or multiple business cases, depending on the number of initiatives IT believes are necessary for the coming year. In this situation, the account management teams should lead the business case process.</p>
<p><b>What Your Business Case(s) Should Focus On:</b></p>
<style type='text/css'>
  #checklist-4 li:before{color:#757575 !important; content:'' }
	</style>
<ul id="checklist-4" class="list-icon circle-no list-icon-">
<li><b>Quantitative business benefits:</b> ROI that can be tracked, and the forecasted payback over the next 12 or 18 months</li>
<li><b>Risk assessment:</b> what is probability of success when the following variables are considered: processes needed, organizational and infrastructure requirements, bandwith capacity, timing, information and skills necessary, competing business initiatives or conflicts, etc.</li>
<li><b>Funding:</b> Project costs (both operating expenses and capital expenditures) for all phases of the project; these costs should also include transition and post go-live support.</li>
<li><b>Business alignment:</b> clear alignment with business drivers, strategies, and objectives, taking into consideration the impact of the timing of each implementation event.</li>
<li><b>Total cost of ownership (TCO):</b> over lifecycle of project (ideally, this includes ALL costs associated on both the IT and the Business sides).</li>
<li><b>Sponsorship:</b> The name of the person or organization with “skin in the game,” who will help obtain project funding or resources, advocate for the project, etc. In short, someone who has a vested interest in the successful outcome of the project.</li>
</ul>

<p>Once you have thoroughly assessed the viability of the project, your business case is ready to be presented to the Business. If both IT and the Business are in agreement, the commitment then is to investing in the funding, people, and amount of time necessary to undertake the project.</p>
<p>During the business case assessment process, be sure someone on the account side works with the service delivery partners to develop an overall review of the current operations. This will help you understand what capacity is available (people, technology, funding), or conversely, what capacity is already committed and unavailable.</p>
<p>This capacity review really shines a light on the 60-80% of the “operational support” work that comprises the bottom segment of your typical IT Portfolio Pyramid—work some refer to as “keeping the lights on.” At most companies, operational support is a made up of three things:</p>
<ol>
<li><b>Service Level Agreements:</b> Services and capabilities are aligned to fulfillment of SLAs, i.e., mutually defined agreements between IT and Business. Costs associated with each transaction and response/resolution times are tracked and monitored. These agreements are critical for the IT Account Director or IT Relationship Manager to represent the total cost of service to their Business partner. In a chargeback world, fees for these services are crucial to those IT departments operating solely as cost centers, providing, as they do, the funding for new projects. <i>This is the only operational support activity in which you should invest.</i></li>
<li><b>Phase 2 &amp; 3 Hiding Place:</b> This is project work or “stuff” that didn’t really get done after the implementation of phase 1, can’t operate as a stand-alone, and thus is very hard to justify on its own merits. Ergo, it is categorized as operational support.</li>
<li><b>Unnecessary demand stuff:</b> This is the “stuff” that should have been decommissioned years ago, but no one has the resources (funding/man-hours) to invest in getting rid of it and tossing it out of the environment. (Picture that box of moldy college textbooks you’ve been lugging around for years.)This “waste” is what I refer to as the “slow death of IT,” and it is my number one place to begin to restore capacity. In ridding IT of this old baggage, you will create the capacity that IT desperately needs for delivering on current Business needs. I have studied this dilemma for years, and many companies have tried to address it by taxing new projects or building it into the (TCO), but, like “training,” getting rid of it never seems to be the necessity it is, and it always seems to get cut.</li>
</ol>
<p>Every dollar spent needs to be viewed as an investment. “Keeping the lights on” consumes a majority of IT’s budget, and yet, undergoes the least amount of scrutiny during planning. Why? Because:</p>
<ol>
<li>It’s hard. If you haven’t done a good job of writing cogent SLAs with your Business partners or been diligent about tracking costs, unraveling the mess will take time and effort.</li>
<li>No one gets a bonus or a promotion for cleaning up someone else’s mess.</li>
<li>IT leadership has not done a good job of educating their Business partners on TCO.</li>
<li>IT Account Managers would much rather be working on the new blockbuster than talking about maintenance on last year’s project.</li>
</ol>
<p>Many smarter than I thought that with Shared Services the CFOs would get more involved, and unnecessary demand costs would be reeled-in. Surprisingly, I have seen only a few CFOs willing to invest in “consolidation and rationalization,” even during these tough economic times.</p>
<p><b>Back to planning:</b><br />
By mid or end of October, you will need an aggregate view of your total next year’s plan that should include:</p>
<style type='text/css'>
  #checklist-5 li:before{color:#757575 !important; content:'' }
	</style>
<ul id="checklist-5" class="list-icon circle-no list-icon-">
<li>Innovation projects (short, 4-6 week sprints to learn and de-risk future larger projects</li>
<li>New projects (i.e., Business and IT)</li>
<li>Phase 2+ functionality improvement projects</li>
<li>Service investments (otherwise referred to as “Keep the lights on” investments)</li>
</ul>

<p>To ensure success, new projects need to have an estimated funding of +/- 20%; Phase 2 should come in at +/-10%; and service costs need to be aligned to the service agreements and appropriate funding model. All projects should have clear business cases.</p>
<p>November is all about prioritization based on guidance from Executive and Finance. The better you plan in October, the more successful you will be when the new guidance comes—and, yes, it will come.</p>
<p>Putting your investments into a portfolio tool is something we can help you with, and will allow you to manage your investments and make the right tradeoff decisions.</p>
<p>Most maturity level 1 and 2 companies still optimize by divisional silo, but there are new processes, tools and governances that can help you and your company to make cross functional tradeoffs and ensure you are returning the most value for your IT investment…surely something your CEO and CFO would want to know.</p>
<p>Enjoy October. The hard decisions are coming, and those of you who are prepared will enjoy Thanksgiving much better.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2011/10/04/october-conscious-planning/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
