IT Security and Forensics Project Management: I Ame Educated To Work-Academic Preparations Necessary
Leadership Meeting
Presence
One of the hazards for
the project manager (PM) of an information security project is the reliance on
the subject matter experts to keep the PM fully informed about the status of
the project.
Theresa is a PM for a
single sign-on project within an urban teaching hospital. The project appears
to be going along well until Theresa begins to hear rumblings of some technical
problems that may interface with the project delivery time line. She calls a
meeting with the technical team. The team assures her that things are fine and
that they will figure out whatever the problems are and will be ready as
planned.
·
How can Theresa ensure
that the technical team is being realistic in their assessment?
·
What strategies might
Theresa use to better understand the potential technical issues and the
potential impacts of those issues?
·
Would you recommend
that Theresa inform the project sponsors of the potential for a delay or should
she accept the position of the technical team?
11-28-2017
Unit 8 Discussion Post
1
From: Miss. Bayo
Elizabeth Cary, AA, BA, MLIS
Reply
to the following questions:
In the past, some IT and other
businesses, have traditionally relied on, computer software, to collect
information, and to manage, a final project. Computer software, can be
utilized, to aggregate, and to share information, like the group assignments in
class, through:
·
Wiki pages;
·
Discussion Boards;
·
Research Collection and
Collaboration Databases;
·
Online Information Lecture
and Exchange Virtual Meeting Environments;
·
Project and Company
Blogg Shares, etc.
However, although,
software, can assist, with information management, and organization-it will not
create, a final project, in-of-itself. The overall management, of an IT
security, and forensics project-due to, the detailed information, that must be
formally verified, by a certified specialist, has to be completed, and
finalized, by an actual manager, and-in person (Vandersluis, 1999, p. 20).
While, it is interesting, to add time frames together, and to enter numerical
data, as a means, to project, when a final date, of completed information-may
be available-software programs, cannot not be applied, in lieu, of: hands-on
management-to complete, any IT security, and forensics, assessment and
implementation (Vandersluis, 1999, p. 20). The human element, when it comes to
the completion, of a high quality, IT project-is, the very most important
factor.
·
How can Theresa ensure that the technical team
is being realistic in their assessment?
When you have a difficult job, and you
are responsible for the final completed project-by a deadline, then-do it
yourself. People, will show you who they are. If, you have to follow-up, behind
people, then-you should just, do the job, yourself. I think, that hiring other
people, can be a real waste of money. Many people, who are employed in the US,
stole the academic documents, that they submit, with their employment
applications, and can barely write, a: “5 paragraph essay.” Employment
standards in the US, are: “Politically-based,” and, at an all-time-low. The fact,
that any-given person, has obtained work, in any US office, in no way,
ever-reflects an ability, to actually-complete any work assignments.
·
What strategies might Theresa use to better
understand the potential technical issues and the potential impacts of those
issues?
Technical issues, related to: IT security
and forensics, must be researched. To be, a competent team leader, on any IT
project, one would presume, that there is a strong, and complete educational
base. IT technical issues, are always complicated, and, always require research.
I think, it would be naïve, for an IT research team to presume, that the final,
and completed project-will not take, a significant amount of time, and effort.
Information, is available online. There are IT specialist. For the latest
information, in the research field, I have found, that deferring, to IT resources,
available, through a University-can be, the most helpful, as opposed to, an
individual, who is only working, in the field.
·
Would you recommend that Theresa inform the
project sponsors of the potential for a delay or should she accept the position
of the technical team?
If you have a deadline, and there
are any potential delays, then-the parties of interest, must be informed.
Delays happen. It is unfortunate, when: time, costs, and personnel, must be
increased, to complete an IT project. Increased amounts of: time, personnel,
and other aspects involved, in a final product, related to IT: security and
forensics-will increase, the costs. It is important, to secure a favorable
reputation, by remaining on budget, and focusing on the end goals, to complete IT
project assignments, within the confines, of: time, personnel, and finances,
established, and agreed upon-within, the original contract.
References
Vandersluis, Chris. (1999). Software Limits Make Planning
a Human Craft. Computing Canada: Enterprise Computing. Vol. 25, Iss. 27. p. 19-20.
Retrieved from www.plesmen.com
Comments
Post a Comment