SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
CPEXPO2013
COMMUNITY PROTECTION
Security Projects & Projects Safety
(Giuseppe Pugliese – Certification Board Member IPMA )

30 October 2013 – Fiera di Genova
Technology

Security Projects
&
Projects Safety
Project Management
We are IPMA 2

®
Security Projects & Projects Safety

Highlighting the following
relationship:
security experts realize systems "to
secure" people and things
experts in project management
develop systems "to secure“ projects.
We are IPMA 3

®
IPMA (International Project Management Association)
Overview

History

Worldwide

Services

We are IPMA 4

• Founded 1965 as a Non-Profit-Organisation
• Legally registered in Switzerland (Legislation)
• INTERNET until 1994

• 56 member associations
• Promotor for International Project Management
• IPMA World Congress

• Quality standard for certifications
• ICB – IPMA Competence Baseline
• IPMA Young Crew / Expert Seminars / Advanced Courses /
Research /Events / Journals

®
ISO 21500 Definition – Project
A project is a unique and temporary set of activities that uses
resources to create outputs.
A project has specific requirements and multiple constraints such as
time, cost and resources.
Although many projects may be similar, the outputs provided by the
project, the stakeholders influencing the project, the resources used
and the way processes are adapted to create these outputs may
differ. Therefore, each project is unique.
Temporary means that every project is time limited with a definite
beginning and end. The end is reached when the project’s
objectives have been achieved, or the project is terminated.
Temporary does not necessarily mean short in duration.

We are IPMA 5

®
Security Projects
High Complexity Context (Technical and Managerial)

Grade of Innovation
Multidisciplinarity
Multicultural
Integration of specialized and wide spectrum
of technologies
Organizational Contexts
Regulatory and Laws Domain
Risk Management
We are IPMA 6

®
To make a (complex)
security project
succesfully we need
project management
Any other options?!?!
We are IPMA 7

®
THE PROJECT MANAGEMENT TRIANGLE
QUALITY

COST

TIME

Author: Martin Barnes (IPMA UK) 1972 IPMA Stockholm Congress
We are IPMA 8

8
®
We are IPMA 9

®
ISO 21500 Guidance on Project Management
3.11 Project constraints
……………….
There are many different constraints that may be imposed on a project. Some
constraints could be:
• duration or target date for the project.
• budget of the project including all economic and financial means for
acquisition.
• availability of project resources such as people, facilities, time, equipment,
materials, tools and others required to carry out the project activities relating to
the requirements of the project.

The question here is:
Do Security Projects
costraints?.
We are IPMA 10

have

the

same
®
No, they don’t.

Thanks, bye bye
We are IPMA 11

®
Yes, they have……

We are IPMA 12

®
IPMA Standards

Moving PM competence
forward
®
The Competence Standard
The ICB3 standard proves its
value to PM practitioners and
our stakeholders.
It highlights PM knowledge,
and the key competences
expected from managers of:
– Projects
– Programmes
– Portfolios

We are IPMA 14

®
Why a Competence Difference?
You may want more than Knowledge ...
You board a flight piloted by two “Air
Academy” graduates who have never
taken off or landed a plane.
Your defense lawyer just passed the
bar, knows all the case law, but has
never practiced before a jury.
Your heart surgeon memorized the
manual, but has never used a scalpel.

Q: What is missing? Competence!
We are IPMA 15

®
Project Manager Competence Profile - IPMA ICB 3.0

We are IPMA 16

®
Benefits in applying
Project Management
Tangible benefits
Cost savings
Revenue increases
Customer retention
Increased customer share
Greater market share
Reduced write-offs and rework

We are IPMA 18

®
Intangible Benefits
Improvements in the decision making
Enhanced collaboration and communication
Improvements in effective work cultures
Alignment of approaches, terminology and
values within the organization
Overall effectiveness of the organization and its
management approach
Improved transparency, clarity of structures,
roles and accountability.

We are IPMA 19

®
Strategic Project Management
Strategic Planning provides ideas
Project Management achieves results
Projects drive strategic changes
Feedback loop for continuous change

We are IPMA 20

®
IPMA – 4LC Project Manager Certification

21
The PM in Security Projects
Some Issues:
Recognize and Engange the Project Sponsors
Apply the “right” level of Project Management
Process
Take care of all Interested Parties expectations
Even if expert of “smt” do not fight against your
specialist in the team
Be neutral in order to be “reliable” in managing
conflict&crisis
We are IPMA 22

®
IPMA Result Orientation
Competence (2.08 ICB 3.0)
The project manager is not paid because he works
hard, nor for the plans or reports or for the fact that
everybody work hard.

He is paid to realise the
project results.
We are IPMA 23

®
We are IPMA 24

®
IPMA ITALY
CONTACTS
Via E. Tazzoli, 6
20154 Milano
Tel. +39 0267100740
Fax +39 0267071785
Giuseppe Pugliese – Director of the Italian Certification Body
E-mail: giuseppe.pugliese@animp.it
Irina Bolognesi – Segreteria IPMA Italy
E-mail: ipmaitaly@animp.it
Web Site Italy
http:/www.ipma.it/
Web Site International
http://www.ipma.ch
25

Weitere ähnliche Inhalte

Ähnlich wie Security Projects & Projects Safety

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!International Institute for Learning
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!International Institute for Learning
 
Return of the security champions ep1 (1)
Return of the security champions ep1 (1)Return of the security champions ep1 (1)
Return of the security champions ep1 (1)Marcos Valle
 
Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...Association for Project Management
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
The new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for itThe new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for itPMIUKChapter
 
Pmbok framework helping material
Pmbok framework helping  materialPmbok framework helping  material
Pmbok framework helping materialRamiz Arshad
 
M6 Toll Road Construction
M6 Toll Road ConstructionM6 Toll Road Construction
M6 Toll Road ConstructionHeidi Owens
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Manolis Nikiforakis
 
PMP Training Course - Project Management Framework
PMP Training Course - Project Management FrameworkPMP Training Course - Project Management Framework
PMP Training Course - Project Management FrameworkSkillogic Solutions
 
Module 2 - IDP.pptx
Module 2 - IDP.pptxModule 2 - IDP.pptx
Module 2 - IDP.pptxRAJESH S
 
ChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project managementChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project managementDerbewBirhanu2
 
20160512 predictive and adaptive approach
20160512   predictive and adaptive approach20160512   predictive and adaptive approach
20160512 predictive and adaptive approachSilvia Fragola
 
North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"Association for Project Management
 

Ähnlich wie Security Projects & Projects Safety (20)

Project management skills
Project management skillsProject management skills
Project management skills
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Making Project Assurance Work presentation.pdf
Making Project Assurance Work presentation.pdfMaking Project Assurance Work presentation.pdf
Making Project Assurance Work presentation.pdf
 
Return of the security champions ep1 (1)
Return of the security champions ep1 (1)Return of the security champions ep1 (1)
Return of the security champions ep1 (1)
 
Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...Equipping Programme Managers for Global Success - The evolution of programme ...
Equipping Programme Managers for Global Success - The evolution of programme ...
 
Implementing security
Implementing securityImplementing security
Implementing security
 
The new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for itThe new PMP, what it is and how to get prepared for it
The new PMP, what it is and how to get prepared for it
 
Leading Enterprise Wide Projects
Leading Enterprise Wide ProjectsLeading Enterprise Wide Projects
Leading Enterprise Wide Projects
 
Pmbok framework helping material
Pmbok framework helping  materialPmbok framework helping  material
Pmbok framework helping material
 
M6 Toll Road Construction
M6 Toll Road ConstructionM6 Toll Road Construction
M6 Toll Road Construction
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
PMP Training Course - Project Management Framework
PMP Training Course - Project Management FrameworkPMP Training Course - Project Management Framework
PMP Training Course - Project Management Framework
 
03_AgilePM.pptx
03_AgilePM.pptx03_AgilePM.pptx
03_AgilePM.pptx
 
Module 2 - IDP.pptx
Module 2 - IDP.pptxModule 2 - IDP.pptx
Module 2 - IDP.pptx
 
PMExpo2017slide Eureka Service - Oracle Prime
PMExpo2017slide Eureka Service - Oracle PrimePMExpo2017slide Eureka Service - Oracle Prime
PMExpo2017slide Eureka Service - Oracle Prime
 
ChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project managementChapterPM_1.pptx for the course project management
ChapterPM_1.pptx for the course project management
 
20160512 predictive and adaptive approach
20160512   predictive and adaptive approach20160512   predictive and adaptive approach
20160512 predictive and adaptive approach
 
North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"North West branch Annual General Meeting & "Lessons on Governance"
North West branch Annual General Meeting & "Lessons on Governance"
 
Outsourcing presentation
Outsourcing presentation Outsourcing presentation
Outsourcing presentation
 

Mehr von Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

Mehr von Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Security Projects & Projects Safety

  • 1. CPEXPO2013 COMMUNITY PROTECTION Security Projects & Projects Safety (Giuseppe Pugliese – Certification Board Member IPMA ) 30 October 2013 – Fiera di Genova
  • 3. Security Projects & Projects Safety Highlighting the following relationship: security experts realize systems "to secure" people and things experts in project management develop systems "to secure“ projects. We are IPMA 3 ®
  • 4. IPMA (International Project Management Association) Overview History Worldwide Services We are IPMA 4 • Founded 1965 as a Non-Profit-Organisation • Legally registered in Switzerland (Legislation) • INTERNET until 1994 • 56 member associations • Promotor for International Project Management • IPMA World Congress • Quality standard for certifications • ICB – IPMA Competence Baseline • IPMA Young Crew / Expert Seminars / Advanced Courses / Research /Events / Journals ®
  • 5. ISO 21500 Definition – Project A project is a unique and temporary set of activities that uses resources to create outputs. A project has specific requirements and multiple constraints such as time, cost and resources. Although many projects may be similar, the outputs provided by the project, the stakeholders influencing the project, the resources used and the way processes are adapted to create these outputs may differ. Therefore, each project is unique. Temporary means that every project is time limited with a definite beginning and end. The end is reached when the project’s objectives have been achieved, or the project is terminated. Temporary does not necessarily mean short in duration. We are IPMA 5 ®
  • 6. Security Projects High Complexity Context (Technical and Managerial) Grade of Innovation Multidisciplinarity Multicultural Integration of specialized and wide spectrum of technologies Organizational Contexts Regulatory and Laws Domain Risk Management We are IPMA 6 ®
  • 7. To make a (complex) security project succesfully we need project management Any other options?!?! We are IPMA 7 ®
  • 8. THE PROJECT MANAGEMENT TRIANGLE QUALITY COST TIME Author: Martin Barnes (IPMA UK) 1972 IPMA Stockholm Congress We are IPMA 8 8 ®
  • 9. We are IPMA 9 ®
  • 10. ISO 21500 Guidance on Project Management 3.11 Project constraints ………………. There are many different constraints that may be imposed on a project. Some constraints could be: • duration or target date for the project. • budget of the project including all economic and financial means for acquisition. • availability of project resources such as people, facilities, time, equipment, materials, tools and others required to carry out the project activities relating to the requirements of the project. The question here is: Do Security Projects costraints?. We are IPMA 10 have the same ®
  • 11. No, they don’t. Thanks, bye bye We are IPMA 11 ®
  • 12. Yes, they have…… We are IPMA 12 ®
  • 13. IPMA Standards Moving PM competence forward ®
  • 14. The Competence Standard The ICB3 standard proves its value to PM practitioners and our stakeholders. It highlights PM knowledge, and the key competences expected from managers of: – Projects – Programmes – Portfolios We are IPMA 14 ®
  • 15. Why a Competence Difference? You may want more than Knowledge ... You board a flight piloted by two “Air Academy” graduates who have never taken off or landed a plane. Your defense lawyer just passed the bar, knows all the case law, but has never practiced before a jury. Your heart surgeon memorized the manual, but has never used a scalpel. Q: What is missing? Competence! We are IPMA 15 ®
  • 16. Project Manager Competence Profile - IPMA ICB 3.0 We are IPMA 16 ®
  • 18. Tangible benefits Cost savings Revenue increases Customer retention Increased customer share Greater market share Reduced write-offs and rework We are IPMA 18 ®
  • 19. Intangible Benefits Improvements in the decision making Enhanced collaboration and communication Improvements in effective work cultures Alignment of approaches, terminology and values within the organization Overall effectiveness of the organization and its management approach Improved transparency, clarity of structures, roles and accountability. We are IPMA 19 ®
  • 20. Strategic Project Management Strategic Planning provides ideas Project Management achieves results Projects drive strategic changes Feedback loop for continuous change We are IPMA 20 ®
  • 21. IPMA – 4LC Project Manager Certification 21
  • 22. The PM in Security Projects Some Issues: Recognize and Engange the Project Sponsors Apply the “right” level of Project Management Process Take care of all Interested Parties expectations Even if expert of “smt” do not fight against your specialist in the team Be neutral in order to be “reliable” in managing conflict&crisis We are IPMA 22 ®
  • 23. IPMA Result Orientation Competence (2.08 ICB 3.0) The project manager is not paid because he works hard, nor for the plans or reports or for the fact that everybody work hard. He is paid to realise the project results. We are IPMA 23 ®
  • 24. We are IPMA 24 ®
  • 25. IPMA ITALY CONTACTS Via E. Tazzoli, 6 20154 Milano Tel. +39 0267100740 Fax +39 0267071785 Giuseppe Pugliese – Director of the Italian Certification Body E-mail: giuseppe.pugliese@animp.it Irina Bolognesi – Segreteria IPMA Italy E-mail: ipmaitaly@animp.it Web Site Italy http:/www.ipma.it/ Web Site International http://www.ipma.ch 25