SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Downloaden Sie, um offline zu lesen
Agile and the
Nature of Decision Making
        Risk Management
    for Agile in the Enterprise
Dennis Stevens

dennis@leadingagile.com
Enterprise Agile Coach
www.leadingagile.com

twitter.com/dennisstevens
Linkedin.com/in/dennisstevens
What we’re going to talk about
Why we need to figure out risk management in large
agile projects

Practice a proven approach
• Define Risk Drivers
• Agile Risk Assessment
• Integrate Risk Management
Decisions are made throughout a project
Decision making is impacted by many factors


• Available information
• Awareness of alternatives
• When the decision is made and how much time we
  have to make the decision
• Uncertainty about consequences
• Ambiguity about the desired outcomes
• Conflicting concerns among stakeholders
Decisions are interdependent




A decision in one area may reveal or create other problems in other areas.
Risk Management
Risk
The likelihood of suffering a loss or missing an opportunity

Risk Management
How decisions are made under uncertainty during the
project to:

• avoid losses on the project that are avoidable, and

• benefit from opportunities that arise during the project
Risk Management in Agile
Agile has risk management implicitly built in

• Feedback cycles (Product, Progress, Process, and
  Capability) are built in throughout the agile cadence
• Co-located teams (individuals and interactions )
  facilitate shared understanding
• Agile teams may explore alternatives through spikes
  and dialog
• Continuous delivery of working-tested software
Agile Implicit Risk Management
                    Uncertainty

            Ambiguity




Agile is designed
for higher
uncertainty



             Certainty
Agile Implicit Risk Management
                   Uncertainty

             Ambiguity




Agile is suitable for
higher certainty
efforts



              Certainty


      When practiced by mature agile practitioners in a co-located environment on
      relatively small projects –implicit risk management may be appropriate
Limits of Agile Risk Management
• Can miss important aspects of the program
  outcomes that are outside the teams line of sight
• Makes is difficult to measure the risk impact
• Can encourage pushing risky things off so we can
  maintain an optimistic burn-up
• Often is tactical in nature – focusing on a local effect
  without a clear connection to the outcomes
“Traditional” Risk Management
Risk Management in Many Organizations

• Tactical in nature
• Focuses on threats and the direct consequences of
  the threat
• Driven by bottom up analysis
• Often identified, assessed and managed
  independently of the teams executing the work
Tactical approach to risk management
                    Uncertainty

              Ambiguity




Tactical Risk management
is designed for few
interconnections in
relatively certain
environments




               Certainty
                                                      Entities
                            1, 2   Many     Dynamic
Limits of Traditional Risk Management
• Creates bureaucratic overhead
• Managing point solutions mean that the risk impact
  may not be closely connected to objectives
• Significant gaps in ability to handle ambiguity and
  emergence
• Ineffective integration of risk-management
• Often ignores opportunities
Insufficient approaches to risk management
        Uncertainty

  Ambiguity



                        The problems we are
                        solving today operate in
                        high uncertainty and
                        dynamic, interconnected
                        systems.




   Certainty
                                                        Entities
                1, 2   Many                   Dynamic
What is needed
To handle scale
• Explicit risk management
• Systemic view of risk

To handle ambiguity
• Continuous risk management
• Integrated with the work and the team
• Exploits opportunity as well as avoids threats
What I’ve drawn on for this approach
Significant Experience with Agile in the Enterprise

SEI-CMM research into Systemic Risk Management
(MOSIAC)

Lean-Startup, particularly validated learning, scientific
experimentation, and iterative product releases
Risk Management for Agile in the Enterprise
• Identify Risk Drivers
   • Identify objectives
   • Determine risk drivers
• Agile Risk Assessment
   • Assess against risk drivers (Threats and Opportunities)
   • Risk profile / burn-down
• Integrate Risk Management
   • Plan responses
   • Risk board
   • Acceptance criteria
IDENTIFY RISK DRIVERS
Define the Objectives
Product
• Functional, Performance, Operations, Usage,
  Maintainability, Deployment, Transition

Business
• Financial, Market, Adoption, Satisfaction

Constraints
• Cost Constraint, Schedule Constraint
Risk Drivers
• A driver is a factor that has a strong influence on the
  eventual outcome or result
• Drivers enable a continuous systemic approach to
  risk management
• Effects of conditions and potential events can be
  aggregated across a program
Risk Drivers
Risk drivers are stated from a success state and a failure state.


                                                         Our processes are
                                                         sufficient for
                                     Success State       delivering this
                                                         product



Drivers


                                                         Our processes are
                                                         inadequate to
                                     Failure State       deliver this
                                                         product
Risk Driver Starter
• Mosaic defines 20 drivers in 6 categories
   • Seems like a lot from an Agile standpoint
• I have used two – internal to team external to team
   • Has proven to be too light
• I am currently using five
   •   Business
   •   Technical
   •   Feedback
   •   Organizational
   •   Dependency
Identify Risk Drivers
• Do this with the same group who is doing Release
  and/or Program Planning
• Tailor the drivers to your effort
   • Remove extraneous drivers, add missing drivers to the list,
     combine or decompose drivers so they make sense to the
     team
   • Write a success condition statement and a failure
     condition statement
   • Adjust the wording in each driver to be consistent with the
     programs language
Business Risk Drivers
Consider
• Clear Objectives
• Customer / End-User Understanding
• Appropriate Requirements
• Plan and Constraints
• Adoption Barriers
• Trimming the Tail
• Pivoting
• Operational Preparedness
Business Driver
Customer Understanding

Success State:
The product is appealing to consumers and increases
customers using automated systems for bank deposits

Failure State:
The product is viewed as threatening or unreliable to
customers and more customers use the bank and drive
through for deposits
Technical
Consider
• Development Tools and Technologies
• Technical Execution Ability
• Design and Architecture
• Delivery Process (Design, Develop, and Deploy)
Technical Driver
Development Tools and Technologies

Success State:
The tools and technologies are sufficient to support the
delivery of the solution

Failure State:
The tools and technologies hinder the delivery of the
solution
Feedback
Consider
• Technical Performance
• Fit to Need
• Compliance Testing
• System Capability
• System Integration
• Operational Support
• Certification and Accreditation
Feedback Driver
Technical Performance

Success State:
Our test environments, test data management, and test
deployment are suitable to gathering rapid feedback to
ensure technical excellence is delivered

Failure State:
Test environments, test data management, and test
deployment contribute to delays that cause the
program to fail.
Organization and Environment
Consider
• Staffing and Team Stability
• Coordination
• Project Management
• Facilities and Equipment
• Organizational Conditions
• Political Concerns
Organization and Environment Driver
Staffing and Team Stability

Success State:
Our teams are fully staffed with analysts, testers, and
engineers so they become high performing teams

Failure State:
Testers are pulled onto many projects and there is
significant churn on the project from holding
completed code that can’t be tested when completed
Dependency
•   Suppliers, Partners or Collaborators
•   Applications
•   Software
•   Systems or Sub-systems
•   Hardware
•   Legal, Compliance, etc
Dependency Driver
Hardware

Success State
The scanners in the ATM machines consistently
produce a high quality of input

Failure State
Scanners in ATM machines are not calibrated
sufficiently to balance between fraudulent deposits and
satisfactory scans
Workshop #1
• Review the case study
• For each Risk Driver discuss with the team and write
  a success statement and a failure statement
• Focus on creating a future vision and a shared
  understanding of the opportunities and threats
Workshop #1 Discussion
• Would effort be useful on your projects?
• What would make this effort difficult?
• Do you think the risk drivers would become stable
  over time – or do they shift from effort to effort?
ASSESS RISKS
Identify Events for each Category
• Working with the whole team – identify events that
  could influence the success state or the failure state

• This can look like story mapping

    Hardware

    Failed Implementation: We invest in the product and we can’t implement it
    in the field because the scanners are bad.

    Reduce Time: We may be able to reuse the Image Interpretation software
    from SOG to overcome deficiencies in the scanners.
Risk Management in Release Planning
Evaluate Risk Events
                                              Impact
                                  Small-1     Medium-3         Big-5
       Likelihood

                    Low-1           1             3             5
                    Medium-3        3             9             15
                    High-5          5             15            25

Risk                                              Likelihood     Impact   Risk
                                                                          Score
Failed Implementation: We invest in the product    3             5        15
and we can’t implement it in the field because the
scanners are bad.
Reduce Time: We may be able to reuse the Image    3              3        9
Interpretation software from SOG to overcome
deficiencies in the scanners.
Risk Burn-Down




The risk burn-down measures the rate we are reducing the total risk score for a
project.
You probably want to burn down risk faster than your features are burning up
Assessing the Risk Profile
• Driver State
   •   Driver is almost certainly in its success state
   •   The driver is most likely in its success state
   •   The driver is equally likely in its success and failure state
   •   The driver is most likely in its failure state
   •   The driver is almost certainly in its failure state
Risk Profile

                       X

    X    X

               X

                   X
Risk Assessment


Use the Risk Burn-down or Risk Profile to encourage early risk reduction.




 Risk First                                Then Value
Agile and Compliance Gates


Phase Gate 0
Candidate Project                        Phase Gate 2                                         Phase Gate 4
                                         Validated Plan and Architecture                      Acceptance and Closure




           Phase Gate 1
                                                                           Phase Gate 3
           Clear and Stable Objectives
                                                                           Deployment Ready
Agile and Compliance Gates


Phase Gate 0
Candidate Project                        Phase Gate 2                                         Phase Gate 4
                                         Validated Plan and Architecture                      Acceptance and Closure




           Phase Gate 1
                                                                           Phase Gate 3
           Clear and Stable Objectives
                                                                           Deployment Ready
              Following Agile
            Release Planning
                 including
             identification of
           drivers and first cut
                  of risks
Agile and Compliance Gates
                                           All 15 and 25 risks
                                              are reduced,
                                                retired, or
                                                 accepted
Phase Gate 0
Candidate Project                        Phase Gate 2                                         Phase Gate 4
                                         Validated Plan and Architecture                      Acceptance and Closure




           Phase Gate 1
                                                                           Phase Gate 3
           Clear and Stable Objectives
                                                                           Deployment Ready
Workshop #2
• For each Risk Driver identify one or two events that
  would influence the driver
• Evaluate those events on the Likelihood-Impact Scale
  – use a planning poker approach to determine the
  total score
• Fill in the two charts (Risk Profile, Risk Burn-down)

• Discuss how the Risk Profile combined with a release
  burn-down might influence more productive
  behavior in the project
Workshop #2 discussion
• What is the difference between a risk event and a
  risk driver?
Workshop #2 discussion
Based on the Feature Burn-up, which project is in better shape?
    Feature Burn-up
Workshop #2 discussion
With the Risk information incorporated, which project is in better shape?
    Feature Burn-up                              Risk Burn-down
INTEGRATED RISK MANAGEMENT
Integrated Risk Management
Agile Teams

• Product Owner Teams: Responsible for getting the
  work ready for the team and paving the way for
  successful delivery.

• Delivery Teams: Responsible for delivering working
  tested software in a stable velocity at a sustainable
  pace
Agile Cadence




   Story writing
Integrated Risk Management
Identify, Assess, Create Response, Apply Response, Risk
Retired, and Monitor
• Risk Stories Integrated into Backlog
• Risk Management Board
• Track Items to Monitor
• Integrate Review of Risk Drivers into Ceremonies
• Acceptance Criteria
Risk Board

Ready   Doing               Done                     Retired


                          Mitigation
        Mitigation                                     Risk
          Mitigation                                      Risk
 Risk        Mitigation                                      Risk
                                                                Risk
                                   Mitigation




                          Mitigation
                                                     Monitor
 Risk   Mitigation
          Mitigation
             Mitigation                         Capacity Compromised
                                                 Requirements Churn
                                   Mitigation   Late Delivery from SOG
Workshop #3
• Review the Agile Cadence and discuss the questions
  on the Workshop #3 Worksheet
Workshop #3 discussion
• What are some ways that we can integrate explicit
  risk management into Agile?
• How can we improve decision making on projects by
  making risk management explicit?
• How can we avoid creating overhead in incorporating
  risk management?
• Do you think this approach could be suitable for
  external audit and governance compliance without
  creating a risk management for risk management’s
  sake approach?
Questions and Discussion
Risk Management for Agile Projects
• Identify Risk Drivers
   • Identify objectives
   • Determine risk drivers
• Agile Risk Assessment
   • Assess against risk drivers (Threats and Opportunities)
   • Risk profile / burn-down
• Integrate Risk Management
   • Plan responses
   • Risk board
   • Acceptance criteria
Thank You




For additional questions or information contact me at
              dennis@leadingagile.com

Weitere ähnliche Inhalte

Was ist angesagt?

Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
SlideTeam
 

Was ist angesagt? (20)

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky Business
 
Decision Making and Risk Taking
Decision Making and Risk TakingDecision Making and Risk Taking
Decision Making and Risk Taking
 
Risk management for the Agile world
Risk management for the Agile worldRisk management for the Agile world
Risk management for the Agile world
 
Spm lecture-7
Spm lecture-7Spm lecture-7
Spm lecture-7
 
Construction Risk Summit "benefit and pits of Construction Risk Management"
Construction Risk Summit   "benefit and pits of Construction Risk Management"Construction Risk Summit   "benefit and pits of Construction Risk Management"
Construction Risk Summit "benefit and pits of Construction Risk Management"
 
Tool Box Talk - Developing Equipment Criticality
Tool Box Talk - Developing Equipment CriticalityTool Box Talk - Developing Equipment Criticality
Tool Box Talk - Developing Equipment Criticality
 
How to turn an incident into an opportunity for your business through effect...
 How to turn an incident into an opportunity for your business through effect... How to turn an incident into an opportunity for your business through effect...
How to turn an incident into an opportunity for your business through effect...
 
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides
 
GENEVA CONSTRUCTION AND RISK (GCR)
GENEVA CONSTRUCTION AND RISK (GCR)GENEVA CONSTRUCTION AND RISK (GCR)
GENEVA CONSTRUCTION AND RISK (GCR)
 
Change management btz
Change management btzChange management btz
Change management btz
 
Risky Business: Super Charging Strategic Plans with New Risk Management Tools
Risky Business:  Super Charging Strategic Plans with New Risk Management ToolsRisky Business:  Super Charging Strategic Plans with New Risk Management Tools
Risky Business: Super Charging Strategic Plans with New Risk Management Tools
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Risk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation SlidesRisk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation Slides
 
Notional cam interview questions (update)
Notional cam interview questions (update)Notional cam interview questions (update)
Notional cam interview questions (update)
 
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
 
Risk Management Presentation to Doyle Property Club
Risk Management Presentation to Doyle Property ClubRisk Management Presentation to Doyle Property Club
Risk Management Presentation to Doyle Property Club
 
Agile project management and normative
Agile project management and normativeAgile project management and normative
Agile project management and normative
 

Andere mochten auch

豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验
drewz lin
 
15 ma cs and signatures
15   ma cs and signatures15   ma cs and signatures
15 ma cs and signatures
drewz lin
 
Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807
drewz lin
 
4 exercises for part 1
4   exercises for part 14   exercises for part 1
4 exercises for part 1
drewz lin
 
敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1
drewz lin
 
Hands onagile2012shared
Hands onagile2012sharedHands onagile2012shared
Hands onagile2012shared
drewz lin
 
Simple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvementSimple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvement
drewz lin
 
Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设 Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设
drewz lin
 
Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙
drewz lin
 

Andere mochten auch (9)

豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验
 
15 ma cs and signatures
15   ma cs and signatures15   ma cs and signatures
15 ma cs and signatures
 
Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807
 
4 exercises for part 1
4   exercises for part 14   exercises for part 1
4 exercises for part 1
 
敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1
 
Hands onagile2012shared
Hands onagile2012sharedHands onagile2012shared
Hands onagile2012shared
 
Simple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvementSimple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvement
 
Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设 Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设
 
Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙
 

Ähnlich wie Agile and the nature of decision making

Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.ppt
umairshams6
 
Enterprise risk-mgmt[1]
Enterprise risk-mgmt[1]Enterprise risk-mgmt[1]
Enterprise risk-mgmt[1]
artipradhan
 
Charting the right course for your projects
Charting the right course for your projectsCharting the right course for your projects
Charting the right course for your projects
Raymond Stadnik
 
RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silvermanRAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
Accendo Reliability
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
Najmul Hussain
 
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
PMI-Montréal
 

Ähnlich wie Agile and the nature of decision making (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_en
 
risk managment and quality
risk managment and qualityrisk managment and quality
risk managment and quality
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.ppt
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Enterprise risk-mgmt[1]
Enterprise risk-mgmt[1]Enterprise risk-mgmt[1]
Enterprise risk-mgmt[1]
 
Charting the right course for your projects
Charting the right course for your projectsCharting the right course for your projects
Charting the right course for your projects
 
RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silvermanRAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
 
It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
 
RiskCoordination 20110718
RiskCoordination 20110718RiskCoordination 20110718
RiskCoordination 20110718
 
Presentation qrm shc
Presentation qrm shcPresentation qrm shc
Presentation qrm shc
 
All About PMI - RMP Certification
All About PMI - RMP CertificationAll About PMI - RMP Certification
All About PMI - RMP Certification
 
Topic 1 - Risk Auditing 1-17.pdf
Topic 1 - Risk Auditing 1-17.pdfTopic 1 - Risk Auditing 1-17.pdf
Topic 1 - Risk Auditing 1-17.pdf
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 

Mehr von drewz lin

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013
drewz lin
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13
drewz lin
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
drewz lin
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
drewz lin
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
drewz lin
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
drewz lin
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equal
drewz lin
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
drewz lin
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansen
drewz lin
 
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaolaAppsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaola
drewz lin
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_edits
drewz lin
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
drewz lin
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
drewz lin
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowasp
drewz lin
 
Agile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usaAgile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usa
drewz lin
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013
drewz lin
 
基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架
drewz lin
 
新浪微博稳定性经验谈
新浪微博稳定性经验谈新浪微博稳定性经验谈
新浪微博稳定性经验谈
drewz lin
 

Mehr von drewz lin (20)

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equal
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansen
 
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaolaAppsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaola
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_edits
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowasp
 
Agile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usaAgile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usa
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013
 
基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架
 
新浪微博稳定性经验谈
新浪微博稳定性经验谈新浪微博稳定性经验谈
新浪微博稳定性经验谈
 

Agile and the nature of decision making

  • 1. Agile and the Nature of Decision Making Risk Management for Agile in the Enterprise
  • 2. Dennis Stevens dennis@leadingagile.com Enterprise Agile Coach www.leadingagile.com twitter.com/dennisstevens Linkedin.com/in/dennisstevens
  • 3. What we’re going to talk about Why we need to figure out risk management in large agile projects Practice a proven approach • Define Risk Drivers • Agile Risk Assessment • Integrate Risk Management
  • 4. Decisions are made throughout a project
  • 5. Decision making is impacted by many factors • Available information • Awareness of alternatives • When the decision is made and how much time we have to make the decision • Uncertainty about consequences • Ambiguity about the desired outcomes • Conflicting concerns among stakeholders
  • 6. Decisions are interdependent A decision in one area may reveal or create other problems in other areas.
  • 7. Risk Management Risk The likelihood of suffering a loss or missing an opportunity Risk Management How decisions are made under uncertainty during the project to: • avoid losses on the project that are avoidable, and • benefit from opportunities that arise during the project
  • 8. Risk Management in Agile Agile has risk management implicitly built in • Feedback cycles (Product, Progress, Process, and Capability) are built in throughout the agile cadence • Co-located teams (individuals and interactions ) facilitate shared understanding • Agile teams may explore alternatives through spikes and dialog • Continuous delivery of working-tested software
  • 9. Agile Implicit Risk Management Uncertainty Ambiguity Agile is designed for higher uncertainty Certainty
  • 10. Agile Implicit Risk Management Uncertainty Ambiguity Agile is suitable for higher certainty efforts Certainty When practiced by mature agile practitioners in a co-located environment on relatively small projects –implicit risk management may be appropriate
  • 11. Limits of Agile Risk Management • Can miss important aspects of the program outcomes that are outside the teams line of sight • Makes is difficult to measure the risk impact • Can encourage pushing risky things off so we can maintain an optimistic burn-up • Often is tactical in nature – focusing on a local effect without a clear connection to the outcomes
  • 12. “Traditional” Risk Management Risk Management in Many Organizations • Tactical in nature • Focuses on threats and the direct consequences of the threat • Driven by bottom up analysis • Often identified, assessed and managed independently of the teams executing the work
  • 13. Tactical approach to risk management Uncertainty Ambiguity Tactical Risk management is designed for few interconnections in relatively certain environments Certainty Entities 1, 2 Many Dynamic
  • 14. Limits of Traditional Risk Management • Creates bureaucratic overhead • Managing point solutions mean that the risk impact may not be closely connected to objectives • Significant gaps in ability to handle ambiguity and emergence • Ineffective integration of risk-management • Often ignores opportunities
  • 15. Insufficient approaches to risk management Uncertainty Ambiguity The problems we are solving today operate in high uncertainty and dynamic, interconnected systems. Certainty Entities 1, 2 Many Dynamic
  • 16. What is needed To handle scale • Explicit risk management • Systemic view of risk To handle ambiguity • Continuous risk management • Integrated with the work and the team • Exploits opportunity as well as avoids threats
  • 17. What I’ve drawn on for this approach Significant Experience with Agile in the Enterprise SEI-CMM research into Systemic Risk Management (MOSIAC) Lean-Startup, particularly validated learning, scientific experimentation, and iterative product releases
  • 18. Risk Management for Agile in the Enterprise • Identify Risk Drivers • Identify objectives • Determine risk drivers • Agile Risk Assessment • Assess against risk drivers (Threats and Opportunities) • Risk profile / burn-down • Integrate Risk Management • Plan responses • Risk board • Acceptance criteria
  • 20. Define the Objectives Product • Functional, Performance, Operations, Usage, Maintainability, Deployment, Transition Business • Financial, Market, Adoption, Satisfaction Constraints • Cost Constraint, Schedule Constraint
  • 21. Risk Drivers • A driver is a factor that has a strong influence on the eventual outcome or result • Drivers enable a continuous systemic approach to risk management • Effects of conditions and potential events can be aggregated across a program
  • 22. Risk Drivers Risk drivers are stated from a success state and a failure state. Our processes are sufficient for Success State delivering this product Drivers Our processes are inadequate to Failure State deliver this product
  • 23. Risk Driver Starter • Mosaic defines 20 drivers in 6 categories • Seems like a lot from an Agile standpoint • I have used two – internal to team external to team • Has proven to be too light • I am currently using five • Business • Technical • Feedback • Organizational • Dependency
  • 24. Identify Risk Drivers • Do this with the same group who is doing Release and/or Program Planning • Tailor the drivers to your effort • Remove extraneous drivers, add missing drivers to the list, combine or decompose drivers so they make sense to the team • Write a success condition statement and a failure condition statement • Adjust the wording in each driver to be consistent with the programs language
  • 25. Business Risk Drivers Consider • Clear Objectives • Customer / End-User Understanding • Appropriate Requirements • Plan and Constraints • Adoption Barriers • Trimming the Tail • Pivoting • Operational Preparedness
  • 26. Business Driver Customer Understanding Success State: The product is appealing to consumers and increases customers using automated systems for bank deposits Failure State: The product is viewed as threatening or unreliable to customers and more customers use the bank and drive through for deposits
  • 27. Technical Consider • Development Tools and Technologies • Technical Execution Ability • Design and Architecture • Delivery Process (Design, Develop, and Deploy)
  • 28. Technical Driver Development Tools and Technologies Success State: The tools and technologies are sufficient to support the delivery of the solution Failure State: The tools and technologies hinder the delivery of the solution
  • 29. Feedback Consider • Technical Performance • Fit to Need • Compliance Testing • System Capability • System Integration • Operational Support • Certification and Accreditation
  • 30. Feedback Driver Technical Performance Success State: Our test environments, test data management, and test deployment are suitable to gathering rapid feedback to ensure technical excellence is delivered Failure State: Test environments, test data management, and test deployment contribute to delays that cause the program to fail.
  • 31. Organization and Environment Consider • Staffing and Team Stability • Coordination • Project Management • Facilities and Equipment • Organizational Conditions • Political Concerns
  • 32. Organization and Environment Driver Staffing and Team Stability Success State: Our teams are fully staffed with analysts, testers, and engineers so they become high performing teams Failure State: Testers are pulled onto many projects and there is significant churn on the project from holding completed code that can’t be tested when completed
  • 33. Dependency • Suppliers, Partners or Collaborators • Applications • Software • Systems or Sub-systems • Hardware • Legal, Compliance, etc
  • 34. Dependency Driver Hardware Success State The scanners in the ATM machines consistently produce a high quality of input Failure State Scanners in ATM machines are not calibrated sufficiently to balance between fraudulent deposits and satisfactory scans
  • 35. Workshop #1 • Review the case study • For each Risk Driver discuss with the team and write a success statement and a failure statement • Focus on creating a future vision and a shared understanding of the opportunities and threats
  • 36. Workshop #1 Discussion • Would effort be useful on your projects? • What would make this effort difficult? • Do you think the risk drivers would become stable over time – or do they shift from effort to effort?
  • 38. Identify Events for each Category • Working with the whole team – identify events that could influence the success state or the failure state • This can look like story mapping Hardware Failed Implementation: We invest in the product and we can’t implement it in the field because the scanners are bad. Reduce Time: We may be able to reuse the Image Interpretation software from SOG to overcome deficiencies in the scanners.
  • 39. Risk Management in Release Planning
  • 40. Evaluate Risk Events Impact Small-1 Medium-3 Big-5 Likelihood Low-1 1 3 5 Medium-3 3 9 15 High-5 5 15 25 Risk Likelihood Impact Risk Score Failed Implementation: We invest in the product 3 5 15 and we can’t implement it in the field because the scanners are bad. Reduce Time: We may be able to reuse the Image 3 3 9 Interpretation software from SOG to overcome deficiencies in the scanners.
  • 41. Risk Burn-Down The risk burn-down measures the rate we are reducing the total risk score for a project. You probably want to burn down risk faster than your features are burning up
  • 42. Assessing the Risk Profile • Driver State • Driver is almost certainly in its success state • The driver is most likely in its success state • The driver is equally likely in its success and failure state • The driver is most likely in its failure state • The driver is almost certainly in its failure state
  • 43. Risk Profile X X X X X
  • 44. Risk Assessment Use the Risk Burn-down or Risk Profile to encourage early risk reduction. Risk First Then Value
  • 45. Agile and Compliance Gates Phase Gate 0 Candidate Project Phase Gate 2 Phase Gate 4 Validated Plan and Architecture Acceptance and Closure Phase Gate 1 Phase Gate 3 Clear and Stable Objectives Deployment Ready
  • 46. Agile and Compliance Gates Phase Gate 0 Candidate Project Phase Gate 2 Phase Gate 4 Validated Plan and Architecture Acceptance and Closure Phase Gate 1 Phase Gate 3 Clear and Stable Objectives Deployment Ready Following Agile Release Planning including identification of drivers and first cut of risks
  • 47. Agile and Compliance Gates All 15 and 25 risks are reduced, retired, or accepted Phase Gate 0 Candidate Project Phase Gate 2 Phase Gate 4 Validated Plan and Architecture Acceptance and Closure Phase Gate 1 Phase Gate 3 Clear and Stable Objectives Deployment Ready
  • 48. Workshop #2 • For each Risk Driver identify one or two events that would influence the driver • Evaluate those events on the Likelihood-Impact Scale – use a planning poker approach to determine the total score • Fill in the two charts (Risk Profile, Risk Burn-down) • Discuss how the Risk Profile combined with a release burn-down might influence more productive behavior in the project
  • 49. Workshop #2 discussion • What is the difference between a risk event and a risk driver?
  • 50. Workshop #2 discussion Based on the Feature Burn-up, which project is in better shape? Feature Burn-up
  • 51. Workshop #2 discussion With the Risk information incorporated, which project is in better shape? Feature Burn-up Risk Burn-down
  • 53. Integrated Risk Management Agile Teams • Product Owner Teams: Responsible for getting the work ready for the team and paving the way for successful delivery. • Delivery Teams: Responsible for delivering working tested software in a stable velocity at a sustainable pace
  • 54. Agile Cadence Story writing
  • 55. Integrated Risk Management Identify, Assess, Create Response, Apply Response, Risk Retired, and Monitor • Risk Stories Integrated into Backlog • Risk Management Board • Track Items to Monitor • Integrate Review of Risk Drivers into Ceremonies • Acceptance Criteria
  • 56. Risk Board Ready Doing Done Retired Mitigation Mitigation Risk Mitigation Risk Risk Mitigation Risk Risk Mitigation Mitigation Monitor Risk Mitigation Mitigation Mitigation Capacity Compromised Requirements Churn Mitigation Late Delivery from SOG
  • 57. Workshop #3 • Review the Agile Cadence and discuss the questions on the Workshop #3 Worksheet
  • 58. Workshop #3 discussion • What are some ways that we can integrate explicit risk management into Agile? • How can we improve decision making on projects by making risk management explicit? • How can we avoid creating overhead in incorporating risk management? • Do you think this approach could be suitable for external audit and governance compliance without creating a risk management for risk management’s sake approach?
  • 59. Questions and Discussion Risk Management for Agile Projects • Identify Risk Drivers • Identify objectives • Determine risk drivers • Agile Risk Assessment • Assess against risk drivers (Threats and Opportunities) • Risk profile / burn-down • Integrate Risk Management • Plan responses • Risk board • Acceptance criteria
  • 60. Thank You For additional questions or information contact me at dennis@leadingagile.com