{"id":2180,"date":"2021-02-02T01:00:00","date_gmt":"2021-02-02T01:00:00","guid":{"rendered":"http:\/\/inswwdev.azurewebsites.net\/au\/insights\/uncategorized\/providing-critical-care-through-project-and-change-management\/"},"modified":"2024-10-10T07:46:03","modified_gmt":"2024-10-10T07:46:03","slug":"providing-critical-care-through-project-and-change-management","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/professional-services\/providing-critical-care-through-project-and-change-management\/","title":{"rendered":"Providing Critical Care through Project and Change Management"},"content":{"rendered":"<p>I talk to plenty of people who view project governance as an overhead or even an unnecessary expense.\u00a0 I have heard some people refer to project management as insurance \u2013 but this is a terrible analogy.\u00a0 With insurance, you only get value from it after something bad has happened, and you must put the pieces back together.\u00a0 However, dealing with issues after they arise is only a small part of what project governance entails.\u00a0 Done well project governance is much more about identifying and managing risks to prevent issues occurring in the first place &#8211; where you can.\u00a0<\/p>\n<p>IT projects big and small have a degree of risk.\u00a0\u00a0 A much better analogy for project governance is to think of it like the critical care team, which guides a patient through surgery.\u00a0 Just like our IT projects, all surgical procedures carry a degree of risk.\u00a0 But the critical care team do all they can to identify and quantify risks upfront and plan out mitigation strategies.\u00a0 The team constantly monitors vital statistics in the theatre, so should anything unexpected happen they spot it early and react.\u00a0<\/p>\n<p>Should a complication arise, the team works through a process to identify if this is a risk they have planned for.\u00a0 If it is then the mitigation strategy can be put in place quickly, or there is a procedure to stabilise and diagnose the issue.<\/p>\n<p>The care does not end when they wheel the patient out of the operating room.\u00a0 Post-op activities will include follow up to ensure there are no unexpected side effects and perhaps education on actions to take to prevent a relapse or speed-up recovery.<\/p>\n<p>All of these activities have parallels with what project governance should be providing for an IT project.\u00a0 Let\u2019s explore this a little further.<\/p>\n<p><strong>Prepare, Prepare, Prepare<\/strong><\/p>\n<p>Before the surgeon barks \u201cScalpel!\u201d and has the implement slapped (handle first of course) into his gloved palm the team has done a lot of work thinking what could go wrong and what to do about it if it does.\u00a0 The projects that we undertake are no different in that we begin our risk assessment during the presales phase.\u00a0 First, we have to identify risks, then we have to classify them, and then we need a plan to mitigate them.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">Identifying risks\u200b<\/h3>\n<p>There are two main areas we need to consider when identifying likely risks.\u00a0 Firstly, we need to consider what types of risks are inherent in the projects we are undertaking.\u00a0 Risks exist in a mail migration which would not exist in a desktop refresh.\u00a0 Harking back to our analogy; open-heart surgery has very different risks to putting a plate into a broken bone.<\/p>\n<p>The second area we need to consider is risks specific to the organisation we are working with.\u00a0 For example, there will be additional risks if we are undertaking work on an environment that includes lots of legacy operating systems or a highly locked-down environment.\u00a0 These are some of the areas we assess \u2013 just as a medical team assesses risk factors in their patients such as age, family history, or whether they smoke or exercise.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">Identity<\/h3>\n<p>Identity is the core construct which underpins these types of migrations. Mappings of permissions, products, business processes, and toolsets in addition to the critical data governance portion, all start with identifying who and how. During the MAD process, we have found identity needs a lot of attention to ensure the correct transition and end-state. Changes to identity are disruptive and complex, so our user experience inputs are critical here to defining what identity will mean to the business. Here are some of the areas we make sure we cover with customers:<\/p>\n<ul>\n<li><strong>Overarching identity strategy<\/strong> \u2013 This speaks for itself but needs to be discussed., Are we changing domains, what should the branding look like, are there any legal requirements in this process, and much more<\/li>\n<li><strong>Governance<\/strong> \u2013 This can mean many things, here we are looking at how identity, access, and data are governed<\/li>\n<li><strong>Security<\/strong> \u2013 What is the current security posture and what is the desired end-state for this? As identity is the core of security, this is the perfect place to delve into the security requirements of the project<\/li>\n<li><strong>Policies and procedures<\/strong> \u2013 What are we moving from and too from a policy and procedure perspective? This can mean technological changes as well as fundamental process changes<\/li>\n<\/ul>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">Classifying risks<\/h3>\n<p>Having a comprehensive list of risks is excellent \u2013 but we need to make sure we give them the appropriate attention level.\u00a0 To do this we have to be able to answer two key questions.<\/p>\n<ul>\n<li>How likely is this risk to occur?<\/li>\n<li>What is the impact on the client if it does?<\/li>\n<\/ul>\n<p>Putting a client lens on question two is critical. How a surgical team might prioritise if they are operating on a professional athlete than they would if they were operating on a knowledge worker.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">Risk mitigation planning<\/h3>\n<p>Once we have identified risks and understand each of them\u2019s relative importance, we can develop a mitigation strategy for them. This includes both understanding what steps can be taken to prevent the risk from occurring and what actions will need to be undertaken should the risk occur.<\/p>\n<p><strong>Monitoring the vitals<\/strong><\/p>\n<p>When the patient is on the table, there&#8217;s a lot of care and attention. A number of critical metrics are monitored which allow the surgical team to identify where problems might be occurring before they are overtly visible.<\/p>\n<p>During an IT project, we monitor a range of metrics to ensure the health of the project.\u00a0 These would include your standard project management staples such as tracking against a schedule and budget and include some metrics specific to the risks related to this technology or this client. For example, if one of the risks is that data migration could be slower than expected, causing a significant impact to the schedule, we would be monitoring the throughput of the migration very carefully.<\/p>\n<p><strong>Complications<\/strong><\/p>\n<p>Regardless of how thoroughly you plan, the unexpected can and sometimes will occur. Having a communications plan with clear escalation paths is vitalas it allows you to quickly communicate issues to quantify the new risk and develop a plan.\u00a0 Depending on the risk, the response could be as simple as capturing it on the project risk register and continuing to track it.\u00a0 In more significant cases, the project may need to pivot, increase or decrease the scope or possibly even terminate \u2013 all of which can be managed through project change management.<\/p>\n<p><strong>Postoperative Care<\/strong><\/p>\n<p>\u00a0A project does not end with the implementation.\u00a0 Firstly, we enter a period of care where we and the client pay close attention to make sure we are aware of any issues and can quickly respond to and resolve them.\u00a0 Once the environment is stabilised, we begin the transition process and hand over to the client\u2019s IT team, their managed services provider or our own Enhanced Support Services \u2013 depending on who will take care of the future environment.\u00a0 Regardless of who we are handing over to, we need to make sure they have the right skills and understand the patients ongoing care plan.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">In Closing<\/h3>\n<p>Sorry \u2013 I could not avoid that pun!\u00a0 Hopefully, this has helped you to look at project governance in a new light.\u00a0 If you would like to hear more, make sure you catch our upcoming webinar to explore some real-world experiences further.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I talk to plenty of people who view project governance as an overhead or even an unnecessary expense.\u00a0 I have heard some people refer to project management as insurance \u2013 but this is a terrible analogy.\u00a0 With insurance, you only get value from it after something bad has happened, and you must put the pieces&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/professional-services\/providing-critical-care-through-project-and-change-management\/\">Continue reading <span class=\"screen-reader-text\">Providing Critical Care through Project and Change Management<\/span><\/a><\/p>\n","protected":false},"author":63,"featured_media":2181,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[25],"tags":[],"class_list":["post-2180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-professional-services","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/2180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/comments?post=2180"}],"version-history":[{"count":1,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/2180\/revisions"}],"predecessor-version":[{"id":22921,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/2180\/revisions\/22921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media\/2181"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media?parent=2180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/categories?post=2180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/tags?post=2180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}