Project Risk Management


Book Description

Based on sound conceptual foundations yet developed to meet practical concerns, Project Risk Management has become recognized as a standard work on its subject. It sets out the key issues and concepts involved in effective risk and uncertainty management in a clear and accessible way, providing a comprehensive discussion of risk management processes set firmly in the context of the project management task as a whole and focused on improving performance.




Risk Management for Project Driven Organizations


Book Description

Organizations invest a lot of time, money, and energy into developing and utilizing risk management practices as part of their project management disciplines. Yet, when you move beyond the project to the program, portfolio, PMO and even organizational level, that same level of risk command and control rarely exists. With this in mind, well-known subject matter expert and author Andy Jordan starts where most leave off. He explores risk management in detail at the portfolio, program, and PMO levels. Using an engaging and easy-to-read writing style, Mr. Jordan takes readers from concepts to a process model, and then to the application of that customizable model in the user’s unique environment, helping dramatically improve their risk command and control at the organizational level. He also provides a detailed discussion of some of the challenges involved in this process. Risk Management for Project Driven Organizations is designed to aid strategic C-level decision makers and those involved in the project, program, portfolio, and PMO levels of an organization. J. Ross Publishing offers an add-on for a nominal fee -- Downloadable tools and templates for easy customization and implementation.




Management of Risk


Book Description

This guide is intended to help organisations put in place effective frameworks for taking informed decisions about risk. It brings together recommended approaches, checklists and pointers to more detailed information on tools and techniques. The topics covered include: the principles of risk management; how risks are managed; managing risks at the strategic, programme, project and operational level; techniques and examples of the benefits of risk management. The publication draws on the experience of experts from both the private and public sector.




Security Risk Management


Book Description

Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs. - Named a 2011 Best Governance and ISMS Book by InfoSec Reviews - Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment - Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk - Presents a roadmap for designing and implementing a security risk management program




A Short Guide to Facilitating Risk Management


Book Description

A Short Guide to Facilitating Risk Management is for all those who need to make sound decisions in important but risky situations; people who work with groups to identify, prioritize and respond to risks, and who wish to deliver value. The authors provide readable and practical advice in terms of avoiding pitfalls, understanding risk management and the role of facilitator. They include guidance for running workshops, and working with small groups and individuals.




Enterprise Risk Management


Book Description

A fully revised second edition focused on the best practices of enterprise risk management Since the first edition of Enterprise Risk Management: From Incentives to Controls was published a decade ago, much has changed in the worlds of business and finance. That's why James Lam has returned with a new edition of this essential guide. Written to reflect today's dynamic market conditions, the Second Edition of Enterprise Risk Management: From Incentives to Controls clearly puts this discipline in perspective. Engaging and informative, it skillfully examines both the art as well as the science of effective enterprise risk management practices. Along the way, it addresses the key concepts, processes, and tools underlying risk management, and lays out clear strategies to manage what is often a highly complex issue. Offers in-depth insights, practical advice, and real-world case studies that explore the various aspects of ERM Based on risk management expert James Lam's thirty years of experience in this field Discusses how a company should strive for balance between risk and return Failure to properly manage risk continues to plague corporations around the world. Don't let it hurt your organization. Pick up the Second Edition of Enterprise Risk Management: From Incentives to Controls and learn how to meet the enterprise-wide risk management challenge head on, and succeed.




Control Your ERP Destiny


Book Description

The history of implementing ERP systems has shown that leaving the fate of your Enterprise Resource Planning project in the hands of software consultants and vendors may only create a false sense of security. While the help of consultants is usually required, they are not all-knowing, have a limited ability to control the keys to project success, and are often the beneficiaries of cost overruns. When it comes to software vendors, their sales people will be long gone when it comes time to go-live with the new system. This book presents comprehensive strategies and techniques that enable organizations to take charge of their Enterprise Resource Planning projects to drive success. It is a guide to making informed decisions during each project phase. The author describes how to become less dependent on outside consultants, mitigate project risks, and significantly reduce implementation costs. Just as important are strategies and methods for the project team and stakeholders to identify business improvement opportunities within your organization and redesign processes to achieve the project benefits. The book also contains many tips to create internal project ownership, select ERP software, manage service providers, transfer software knowledge, develop the right implementation strategies, establish a realistic schedule and budget, and properly test the new system. It also addresses the various system deployment options, emerging technology trends, and the implications from a software selection, implementation and on-going support standpoint. The information is applicable to new implementations and system upgrades. This edition updated: November 2023 For those who prefer audiobooks, this version is also available on Google Play. Click "Switch To Audiobook" on this ebook homepage. Reviews "You owe it to your company and yourself to read this book. If you do so, you will sharply increase your odds for success and spend a lot less money. Steve has done the ERP industry a big service." - Thomas F. Wallace, early ERP pioneer, author, and Distinguished Fellow at The Ohio State University Center for Operational Excellence. "There really aren't many "must-read" ERP books in the 30 year (or so) history of ERP, but you can add this book to the must-read list. The book fits nicely into what I call the Center of Excellence movement - the push by ERP customers to gain more value out of their ERP investments and endure less headaches. The book is a combination of hard-won advice, cautionary tales, and a bit of a manifesto for not placing blind trust in third party consultancies." - Jon Reed, SAP/ERP Market Analyst. "I love this book." - R. Ray Wang. CEO and Principal Analyst at Constellation Research, a founding partner of the Altimeter Group and thought leader on enterprise digital transformation. "If the Project Management Institute (PMI) had a certification program in ERP Management, this would be the only textbook needed." - Andy Klee, President, Klee Associates, ERPtips.com (SAP), and JDEtips.com (Oracle Enterprise One).




The Complete Guide to Cybersecurity Risks and Controls


Book Description

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.




Strategic Risk Management


Book Description

This book presents a new approach to risk management that enables executives to think systematically and strategically about future risks and deal proactively with threats to their competitive advantages in an ever more volatile, uncertain, complex, and ambiguous world. Organizations typically manage risks through traditional tools such as insurance and risk mitigation; some employ enterprise risk management, which looks at risk holistically throughout the organization. But these tools tend to focus organizational attention on past actions and compliance. Executives need to tackle risk head-on as an integral part of their strategic planning process, not by looking in the rearview mirror. Strategic Risk Management (SRM) is a forward-looking approach that helps teams anticipate events or exposures that fundamentally threaten or enhance a firm's position. The authors, experts in both business strategy and risk management, define strategic risks and show how they differ from operational risks. They offer a road map that describes architectural elements of SRM (knowledge, principles, structures, and tools) to show how leaders can integrate them to effectively design and implement a future-facing SRM program. SRM gives organizations a competitive advantage over those stuck in outdated risk management practices. For the first time, it enables them to look squarely out the front windshield.




Implementing Enterprise Risk Management


Book Description

A practical, real-world guide for implementing enterprise risk management (ERM) programs into your organization Enterprise risk management (ERM) is a complex yet critical issue that all companies must deal with in the twenty-first century. Failure to properly manage risk continues to plague corporations around the world. ERM empowers risk professionals to balance risks with rewards and balance people with processes. But to master the numerous aspects of enterprise risk management, you must integrate it into the culture and operations of the business. No one knows this better than risk management expert James Lam, and now, with Implementing Enterprise Risk Management: From Methods to Applications, he distills more than thirty years' worth of experience in the field to give risk professionals a clear understanding of how to implement an enterprise risk management program for every business. Offers valuable insights on solving real-world business problems using ERM Effectively addresses how to develop specific ERM tools Contains a significant number of case studies to help with practical implementation of an ERM program While Enterprise Risk Management: From Incentives to Controls, Second Edition focuses on the "what" of ERM, Implementing Enterprise Risk Management: From Methods to Applications will help you focus on the "how." Together, these two resources can help you meet the enterprise-wide risk management challenge head on—and succeed.