SlideShare a Scribd company logo
1 of 13
Risk Management in Software Industry



                            Presented by –
                             Rehan Akhtar
Introduction
The purpose of Risk Management is to identify
potential problems before they occur so that
risk-handling activities can be planned and
invoked as needed across the life of the product
or project to mitigate adverse impacts on
achieving objectives.
Importance
Capability Maturity Model Integrated (CMMi)
Importance cont…

ISO    20000 (Service Management)
   ◦The ultimate goal of ISO 20000 is to:
   ◦Reduce operational exposure to risk

   ◦Meet contractual requirements
   ◦Demonstrate service quality


TL    9000 for Telecom Industry
   ◦   Similar to ISO 9000
ITIL
    V3 (Best Practices for IT Service
Management)
   ◦   Risk Management and Analysis
Risk Management Process
Riskmanagement can be divided into three
processes:
  ◦Defining a risk management strategy;
  ◦Identifying and analysing risks; and

  ◦Handling identified risks, including the

  implementation of risk mitigation plans when
  needed.
  ◦
Activities Performed

Determine   Risk Sources and Categories
  ◦Risk Source
  ◦Uncertain requirements

  ◦Unprecedented efforts—estimates unavailable

  ◦Infeasible design

  ◦Unavailable technology

  ◦Unrealistic schedule estimates or allocation

  ◦Inadequate staffing and skills

  ◦Cost or funding issues

  ◦Uncertain or inadequate subcontractor capability

  ◦Uncertain or inadequate vendor capability

  ◦Inadequate communication with actual or potential

  customers or with their representatives
  ◦Disruptions to continuity of operations



  Risk Categories
  ◦
Activities Performed cont…

Define   Risk Parameters
  Parameters for evaluating, categorizing, and
  ◦

  prioritizing risks include the following:
  ◦Risk likelihood (i.e., probability of risk occurrence)
  ◦Risk consequence (i.e., impact and severity of risk

  occurrence)
  ◦Thresholds to trigger management activities

  ◦
Activities Performed cont…

Establish   a Risk Management Strategy
  ◦The scope of the risk management effort
  ◦Methods and tools to be used for risk identification,

  risk analysis, risk mitigation, risk monitoring, and
  communication
  ◦Project-specific sources of risks

  ◦How these risks are to be organized, categorized,

  compared, and consolidated
  ◦Parameters, including likelihood, consequence, and

  thresholds, for taking action on identified risks
  ◦Risk mitigation techniques to be used, such as

  prototyping, piloting, simulation, alternative designs,
  or evolutionary development
  ◦Definition of risk measures to monitor the status of

  the risks
Activities Performed cont…

Identify   Risks
  ◦Examine each element of the project work
  breakdown structure to uncover risks.
  ◦Conduct a risk assessment using a risk taxonomy.

  ◦Interview subject matter experts.

  ◦Review risk management efforts from similar

  products.
  ◦Examine lessons-learned documents or databases.

  ◦Examine design specifications and agreement

  requirements.
Activities Performed cont…

Evaluate,   Categorize, and Prioritize Risks
  ◦Each risk is evaluated and assigned values in
  accordance with the defined risk parameters, which
  may include likelihood, consequence (severity, or
  impact), and thresholds.
  ◦Likelihood - remote, unlikely, likely, highly likely, or a
  near certainty
  ◦Consequences –

  Low, Medium, High, Negligible, Marginal, Significant, Criti
  cal, Catastrophic

  Risks are categorized into the defined risk
  ◦

  categories, providing a means to look at risks
  according to their source, taxonomy, or project
  component
Activities Performed cont…

Develop   Risk Mitigation Plans
  ◦Risk avoidance: Changing or lowering requirements
  while still meeting the user’s needs
  ◦Risk control: Taking active steps to minimize risks

  ◦Risk transfer: Reallocating requirements to lower the

  risks
  ◦Risk monitoring: Watching and periodically re-

  evaluating the risk for changes to the assigned risk
  parameters
  ◦Risk acceptance: Acknowledgment of risk but not

  taking any action
Activities Performed cont…

Implement   Risk Mitigation Plans
  ◦Monitor the status of each risk periodically and
  implement the risk mitigation plan as appropriate.
Documents

Risk  source lists (external and internal)
Risk categories list
Risk evaluation, categorization, and
prioritization criteria
Risk management requirements (e.g., control
and approval levels, and reassessment intervals)
Project risk management
List of identified risks, including the
context, conditions, and consequences of risk
occurrence
List of risks, with a priority assigned to each
risk
Documented handling options for each

More Related Content

What's hot

Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Navjyotsinh Jadeja
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product DevelopmentAmandeep Midha
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk ManagementAchmad Solichin
 
Risk-management
 Risk-management Risk-management
Risk-managementUmesh Gupta
 
Risk evaluation presentation power point
Risk evaluation presentation power pointRisk evaluation presentation power point
Risk evaluation presentation power pointAlberto Mico
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk managementPractiTest
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk ManagementGunjan Patel
 
Software Engineering Risk Management Software Application
Software Engineering Risk Management   Software ApplicationSoftware Engineering Risk Management   Software Application
Software Engineering Risk Management Software Applicationguestfea9c55
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and managementgnitu
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementGirija Sankar Dash
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Shashi Kumar
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-managementzeeshanwrch
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)Nesma
 

What's hot (20)

Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
Risk management
Risk managementRisk management
Risk management
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Risk evaluation presentation power point
Risk evaluation presentation power pointRisk evaluation presentation power point
Risk evaluation presentation power point
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk management
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Software Engineering Risk Management Software Application
Software Engineering Risk Management   Software ApplicationSoftware Engineering Risk Management   Software Application
Software Engineering Risk Management Software Application
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 

Viewers also liked

The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
Special Project Announcement!
Special Project Announcement!Special Project Announcement!
Special Project Announcement!llfan4eva
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
Software Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management SystemSoftware Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management SystemNasiruddin Juel
 
Risk Management
Risk ManagementRisk Management
Risk ManagementJacobe2008
 
the importance of risk management
the importance of risk management the importance of risk management
the importance of risk management cesmy
 
Software Project Management lecture 7
Software Project Management lecture 7Software Project Management lecture 7
Software Project Management lecture 7Syed Muhammad Hammad
 
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo
 
Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0cgautam
 

Viewers also liked (16)

The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
The Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk ManagementThe Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk Management
 
Special Project Announcement!
Special Project Announcement!Special Project Announcement!
Special Project Announcement!
 
Project Risk
Project RiskProject Risk
Project Risk
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Software Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management SystemSoftware Development Plan of Fixed Asset Management System
Software Development Plan of Fixed Asset Management System
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
the importance of risk management
the importance of risk management the importance of risk management
the importance of risk management
 
8 Project Plan
8 Project Plan8 Project Plan
8 Project Plan
 
Software Development Plan
Software Development PlanSoftware Development Plan
Software Development Plan
 
RiskyProject Software
RiskyProject SoftwareRiskyProject Software
RiskyProject Software
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-training
 
Risk Management as an enabler for project success
Risk Management as an enabler for project successRisk Management as an enabler for project success
Risk Management as an enabler for project success
 
Software Project Management lecture 7
Software Project Management lecture 7Software Project Management lecture 7
Software Project Management lecture 7
 
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
 
Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0Tools &Techniques for Effective Risk Management V3.0
Tools &Techniques for Effective Risk Management V3.0
 

Similar to Risk management in Software Industry

Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enVyacheslav Guzovsky
 
Risk Assessments Demonstation Powerpoint
Risk Assessments Demonstation PowerpointRisk Assessments Demonstation Powerpoint
Risk Assessments Demonstation Powerpointacademy29
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk managementInfosys
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Online PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge AreaOnline PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge AreaGlobalSkillup
 
Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.akalpm
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Project risk management
Project risk managementProject risk management
Project risk managementBarnatuCoffee
 
Aligning Risk Management with ITIL
Aligning Risk Management with ITILAligning Risk Management with ITIL
Aligning Risk Management with ITILAustin Songer
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 

Similar to Risk management in Software Industry (20)

Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_en
 
Risk Assessments Demonstation Powerpoint
Risk Assessments Demonstation PowerpointRisk Assessments Demonstation Powerpoint
Risk Assessments Demonstation Powerpoint
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Presentation qrm shc
Presentation qrm shcPresentation qrm shc
Presentation qrm shc
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Online PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge AreaOnline PMP Training Material for PMP Exam - Risk Management Knowledge Area
Online PMP Training Material for PMP Exam - Risk Management Knowledge Area
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.Risk and Crisis Management1 class notes.
Risk and Crisis Management1 class notes.
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk Management Assignment
Risk Management AssignmentRisk Management Assignment
Risk Management Assignment
 
Aligning Risk Management with ITIL
Aligning Risk Management with ITILAligning Risk Management with ITIL
Aligning Risk Management with ITIL
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 

More from Rehan Akhtar

Employee retention issues and analysis
Employee retention issues and analysisEmployee retention issues and analysis
Employee retention issues and analysisRehan Akhtar
 
Portuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing CampaignPortuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing CampaignRehan Akhtar
 
Global Warming - Myth or Reality
Global Warming - Myth or RealityGlobal Warming - Myth or Reality
Global Warming - Myth or RealityRehan Akhtar
 
Corruption Perception Index - 2012
Corruption Perception Index - 2012Corruption Perception Index - 2012
Corruption Perception Index - 2012Rehan Akhtar
 
Business Functions Interactions
Business Functions InteractionsBusiness Functions Interactions
Business Functions InteractionsRehan Akhtar
 
International mutual fund
International mutual fundInternational mutual fund
International mutual fundRehan Akhtar
 
Fifa world cup insurance plan
Fifa world cup insurance planFifa world cup insurance plan
Fifa world cup insurance planRehan Akhtar
 
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air DeccanJet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air DeccanRehan Akhtar
 
Report on Forex Exposure
Report on Forex ExposureReport on Forex Exposure
Report on Forex ExposureRehan Akhtar
 
Forex exposure for Tech M & Oracle
Forex exposure for Tech M & OracleForex exposure for Tech M & Oracle
Forex exposure for Tech M & OracleRehan Akhtar
 
Report on Suzlon Energy Ltd
Report on Suzlon Energy LtdReport on Suzlon Energy Ltd
Report on Suzlon Energy LtdRehan Akhtar
 
Comparative Study Of 2 Business Leader
Comparative Study Of 2 Business LeaderComparative Study Of 2 Business Leader
Comparative Study Of 2 Business LeaderRehan Akhtar
 

More from Rehan Akhtar (17)

Employee retention issues and analysis
Employee retention issues and analysisEmployee retention issues and analysis
Employee retention issues and analysis
 
Portuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing CampaignPortuguese Bank - Direct Marketing Campaign
Portuguese Bank - Direct Marketing Campaign
 
Global Warming - Myth or Reality
Global Warming - Myth or RealityGlobal Warming - Myth or Reality
Global Warming - Myth or Reality
 
Corruption Perception Index - 2012
Corruption Perception Index - 2012Corruption Perception Index - 2012
Corruption Perception Index - 2012
 
Oakland athletics
Oakland athleticsOakland athletics
Oakland athletics
 
Project portfolio
Project portfolioProject portfolio
Project portfolio
 
Business Functions Interactions
Business Functions InteractionsBusiness Functions Interactions
Business Functions Interactions
 
Merchant banking
Merchant bankingMerchant banking
Merchant banking
 
International mutual fund
International mutual fundInternational mutual fund
International mutual fund
 
Fifa world cup insurance plan
Fifa world cup insurance planFifa world cup insurance plan
Fifa world cup insurance plan
 
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air DeccanJet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
Jet Airways/Air Sahara merger & Kingfisher Airlines/Air Deccan
 
Report on Forex Exposure
Report on Forex ExposureReport on Forex Exposure
Report on Forex Exposure
 
Forex exposure for Tech M & Oracle
Forex exposure for Tech M & OracleForex exposure for Tech M & Oracle
Forex exposure for Tech M & Oracle
 
Report on Suzlon Energy Ltd
Report on Suzlon Energy LtdReport on Suzlon Energy Ltd
Report on Suzlon Energy Ltd
 
Carbon credit
Carbon creditCarbon credit
Carbon credit
 
Comparative Study Of 2 Business Leader
Comparative Study Of 2 Business LeaderComparative Study Of 2 Business Leader
Comparative Study Of 2 Business Leader
 
Demand Curve
Demand CurveDemand Curve
Demand Curve
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Risk management in Software Industry

  • 1. Risk Management in Software Industry Presented by – Rehan Akhtar
  • 2. Introduction The purpose of Risk Management is to identify potential problems before they occur so that risk-handling activities can be planned and invoked as needed across the life of the product or project to mitigate adverse impacts on achieving objectives.
  • 4. Importance cont… ISO 20000 (Service Management) ◦The ultimate goal of ISO 20000 is to: ◦Reduce operational exposure to risk ◦Meet contractual requirements ◦Demonstrate service quality TL 9000 for Telecom Industry ◦ Similar to ISO 9000 ITIL V3 (Best Practices for IT Service Management) ◦ Risk Management and Analysis
  • 5. Risk Management Process Riskmanagement can be divided into three processes: ◦Defining a risk management strategy; ◦Identifying and analysing risks; and ◦Handling identified risks, including the implementation of risk mitigation plans when needed. ◦
  • 6. Activities Performed Determine Risk Sources and Categories ◦Risk Source ◦Uncertain requirements ◦Unprecedented efforts—estimates unavailable ◦Infeasible design ◦Unavailable technology ◦Unrealistic schedule estimates or allocation ◦Inadequate staffing and skills ◦Cost or funding issues ◦Uncertain or inadequate subcontractor capability ◦Uncertain or inadequate vendor capability ◦Inadequate communication with actual or potential customers or with their representatives ◦Disruptions to continuity of operations Risk Categories ◦
  • 7. Activities Performed cont… Define Risk Parameters Parameters for evaluating, categorizing, and ◦ prioritizing risks include the following: ◦Risk likelihood (i.e., probability of risk occurrence) ◦Risk consequence (i.e., impact and severity of risk occurrence) ◦Thresholds to trigger management activities ◦
  • 8. Activities Performed cont… Establish a Risk Management Strategy ◦The scope of the risk management effort ◦Methods and tools to be used for risk identification, risk analysis, risk mitigation, risk monitoring, and communication ◦Project-specific sources of risks ◦How these risks are to be organized, categorized, compared, and consolidated ◦Parameters, including likelihood, consequence, and thresholds, for taking action on identified risks ◦Risk mitigation techniques to be used, such as prototyping, piloting, simulation, alternative designs, or evolutionary development ◦Definition of risk measures to monitor the status of the risks
  • 9. Activities Performed cont… Identify Risks ◦Examine each element of the project work breakdown structure to uncover risks. ◦Conduct a risk assessment using a risk taxonomy. ◦Interview subject matter experts. ◦Review risk management efforts from similar products. ◦Examine lessons-learned documents or databases. ◦Examine design specifications and agreement requirements.
  • 10. Activities Performed cont… Evaluate, Categorize, and Prioritize Risks ◦Each risk is evaluated and assigned values in accordance with the defined risk parameters, which may include likelihood, consequence (severity, or impact), and thresholds. ◦Likelihood - remote, unlikely, likely, highly likely, or a near certainty ◦Consequences – Low, Medium, High, Negligible, Marginal, Significant, Criti cal, Catastrophic Risks are categorized into the defined risk ◦ categories, providing a means to look at risks according to their source, taxonomy, or project component
  • 11. Activities Performed cont… Develop Risk Mitigation Plans ◦Risk avoidance: Changing or lowering requirements while still meeting the user’s needs ◦Risk control: Taking active steps to minimize risks ◦Risk transfer: Reallocating requirements to lower the risks ◦Risk monitoring: Watching and periodically re- evaluating the risk for changes to the assigned risk parameters ◦Risk acceptance: Acknowledgment of risk but not taking any action
  • 12. Activities Performed cont… Implement Risk Mitigation Plans ◦Monitor the status of each risk periodically and implement the risk mitigation plan as appropriate.
  • 13. Documents Risk source lists (external and internal) Risk categories list Risk evaluation, categorization, and prioritization criteria Risk management requirements (e.g., control and approval levels, and reassessment intervals) Project risk management List of identified risks, including the context, conditions, and consequences of risk occurrence List of risks, with a priority assigned to each risk Documented handling options for each