Download presentation
Presentation is loading. Please wait.
Published byEllen Craig Modified over 9 years ago
1
Project Management Methodology Project Closing
2
Project closing stage Must be performed for all projects, successfully completed or shut off by management Activity at project closing stage – case of success: Evaluate a project success Complete project management documentation Complete technical documentation Prepare implementation plan Learned lessons review
3
Evaluate a project success Review your Project Definition and Project Charter documents Discuss with the team: Are all project goals achieved? Are all tasks been completed? Are you on (above/below) budget? Do you meet the deadline? The answers will bring you understanding of how much of success you can claim
4
Evaluate a project success Consider the quality of your project separately Testing results Requirements met (in details) Residual risks statement shows positive or no changes of security level Be specific with tasks implementation to prevent new security risks.
5
Complete project management documentation Have finalized (up to date) and approved: Project charter Project plan Project monitoring reports Close your logs Issues log Decisions log Risks occurrence log
6
Complete technical documentation Make sure that all technical documents are written and sent to the librarian Suggested or implemented revisions to standard operating procedures Suggested or implemented revisions of company and users policy and procedures Documentation for users training
7
Prepare implementation plan Discuss move to production with IT department manager Configuration manager Information security manager Discover grey areas and gaps Decide how to deal with them Prepare initial operational plan (see below)
8
Learned lessons Handle a separate meeting with your team to discuss what was going right and wrong during the project implementation Summarize the suggestions Prepare the reports where you should indicate major issues, how you addressed them, and was that successful or not. What can be done better for this kind of projects?
9
Learned lessons (cont.) Think in terms of project management areas: Scope, Requirements – were they well defined? Resources – were they assigned sufficiently? People – was the team professional skill acceptable for the project? Organizational model – was it complete and suitable? Communication – was it planned and implemented sufficiently? Training – was it good enough?
10
Operational plan for security projects Plan must contain processes and procedures for: How a new technology starts within existing operational environment What security events should be expected What to do in the case of security events occurrences Plan must contain resources assignment: Who will handle a new technology (by names) Configuration Maintenance When the transition takes place How much it costs
11
Operational plan items example VPN solution project Processes and procedures: Communicate the start date to users Communicate the rules of operating with VPN To whom users should communicate their problems, e.g. the legitimate user was sacked, or the connection cannot be established
12
Operational plan items example (cont.) VPN solution project Processes and procedures: How the supporting personnel must address the issues What to do with error messages during the transition stage (may be different from the fully operational stage) You may notice that there is a lot about communication
13
Operational plan exercise Internet filtering project Processes and procedures to cover: Provide Contact If needed resource is blocked. Warn Violating Users of new policies. Responsible contact live-updates whitelists. Revise whitelist with department heads to address special needs.
14
Operational plan exercise Internet filtering project Processes and procedures to cover: Data Leaks (access to restricted sites?) by malicious users Notify responsible person (sys admin) in case of data-leak
15
Operational plan exercise Internet filtering project Processes, procedures and operational solutions: System administrator will control white list Cost will be 5,000 CAN will be spent for salary and training
16
Operational plan exercise Internet filtering project Processes and Procedures for: Project will go live on Monday the 26 th Communicate the rules of surfing the internet to the users Users should speak to the help desk if they have any problems Help desk will try to solve issues, if they cannot, next step will be to transfer problem to Web Operations manager of support department Any errors that occur during transition stages will be directed to technical leader of IT department
17
Operational plan exercise Internet filtering project Resource assignment BlackList software (the technology component?) will be handled by technical support department Hardware maintenance will be handled by outsources IBM tech support Costs will be, cumulatively, $10,000 for matainence+software+outcorces support Transfer of final project will take place on Saturday the 24 th and Sunday the 25 th
18
Closing security project checklist You are ready to close a security project when All tasks are 100% completed Paper work completed Security state reviewed and approved Transition to production is prepared Initial operational plan is prepared Required training completed
19
Closing stage – project failure Finalize the paper work Project charter at its latest stage Work completed by the time of closing Resources consumed Work efforts Cost
20
Closing stage – project failure (cont.) Close the logs: Issues log Decisions log Risks occurrence log Do not forget to record the decision re the project closing Finalize project monitoring reports If requested, write the report – overview of the project implementation
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.