IT Security and Forensics Project Management: I Ame Educated To Work-Academic Preparations Necessary


Leadership Meeting Presence

One of the hazards for the project manager (PM) of an information security project is the reliance on the subject matter experts to keep the PM fully informed about the status of the project.

Theresa is a PM for a single sign-on project within an urban teaching hospital. The project appears to be going along well until Theresa begins to hear rumblings of some technical problems that may interface with the project delivery time line. She calls a meeting with the technical team. The team assures her that things are fine and that they will figure out whatever the problems are and will be ready as planned.


·         How can Theresa ensure that the technical team is being realistic in their assessment?

·         What strategies might Theresa use to better understand the potential technical issues and the potential impacts of those issues?

·         Would you recommend that Theresa inform the project sponsors of the potential for a delay or should she accept the position of the technical team?







11-28-2017





Unit 8 Discussion Post 1

From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS





Reply to the following questions: 



       

           In the past, some IT and other businesses, have traditionally relied on, computer software, to collect information, and to manage, a final project. Computer software, can be utilized, to aggregate, and to share information, like the group assignments in class, through:





·         Wiki pages;

·         Discussion Boards;

·         Research Collection and Collaboration Databases;

·         Online Information Lecture and Exchange Virtual Meeting Environments;

·         Project and Company Blogg Shares, etc.





However, although, software, can assist, with information management, and organization-it will not create, a final project, in-of-itself. The overall management, of an IT security, and forensics project-due to, the detailed information, that must be formally verified, by a certified specialist, has to be completed, and finalized, by an actual manager, and-in person (Vandersluis, 1999, p. 20).


       While, it is interesting, to add time frames together, and to enter numerical data, as a means, to project, when a final date, of completed information-may be available-software programs, cannot not be applied, in lieu, of: hands-on management-to complete, any IT security, and forensics, assessment and implementation (Vandersluis, 1999, p. 20). The human element, when it comes to the completion, of a high quality, IT project-is, the very most important factor.





·         How can Theresa ensure that the technical team is being realistic in their assessment?





      When you have a difficult job, and you are responsible for the final completed project-by a deadline, then-do it yourself. People, will show you who they are. If, you have to follow-up, behind people, then-you should just, do the job, yourself. I think, that hiring other people, can be a real waste of money. Many people, who are employed in the US, stole the academic documents, that they submit, with their employment applications, and can barely write, a: “5 paragraph essay.” Employment standards in the US, are: “Politically-based,” and, at an all-time-low. The fact, that any-given person, has obtained work, in any US office, in no way, ever-reflects an ability, to actually-complete any work assignments.





·         What strategies might Theresa use to better understand the potential technical issues and the potential impacts of those issues?





        Technical issues, related to: IT security and forensics, must be researched. To be, a competent team leader, on any IT project, one would presume, that there is a strong, and complete educational base. IT technical issues, are always complicated, and, always require research. I think, it would be naïve, for an IT research team to presume, that the final, and completed project-will not take, a significant amount of time, and effort. Information, is available online. There are IT specialist. For the latest information, in the research field, I have found, that deferring, to IT resources, available, through a University-can be, the most helpful, as opposed to, an individual, who is only working, in the field.





·         Would you recommend that Theresa inform the project sponsors of the potential for a delay or should she accept the position of the technical team?





            If you have a deadline, and there are any potential delays, then-the parties of interest, must be informed. Delays happen. It is unfortunate, when: time, costs, and personnel, must be increased, to complete an IT project. Increased amounts of: time, personnel, and other aspects involved, in a final product, related to IT: security and forensics-will increase, the costs. It is important, to secure a favorable reputation, by remaining on budget, and focusing on the end goals, to complete IT project assignments, within the confines, of: time, personnel, and finances, established, and agreed upon-within, the original contract.







References





Vandersluis, Chris. (1999). Software Limits Make Planning a Human Craft. Computing Canada: Enterprise Computing. Vol. 25, Iss. 27. p. 19-20. Retrieved from www.plesmen.com


Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2