security project management training
DESCRIPTION
TRANSCRIPT
![Page 1: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/1.jpg)
Deter - Detect - Delay - Deny 1
Project Management Methodology in Security Projects
John N. Motlagh, MBA
![Page 2: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/2.jpg)
Deter - Detect - Delay - Deny 2
Project management history
Project management defined
Team dynamics Project
management mechanics
Project manager qualities
Project estimating Contracting Risk assessment Financials
Agenda
![Page 3: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/3.jpg)
Deter - Detect - Delay - Deny 3
“A project is a temporary endeavor undertaken to create a unique product or service” PMBOK 2001
“Any undertaking that has a definite, final objective representing specified values to be used to satisfy some need or desire”. Cleland
Project Defined
![Page 4: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/4.jpg)
Deter - Detect - Delay - Deny 4
Project Management is the application of knowledge, skills, tools and techniques to
meet project objectives. PMBOK 2001
Project Management Defined
![Page 5: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/5.jpg)
Deter - Detect - Delay - Deny 5
Kerzner believes successful project management will yield the following:◦ Projects completed within the allotted time and
budget ◦ Systems having the desired performance level ◦ Assigned resources are used effectively and
efficiently ◦ Customer acceptance
Project Management Defined
![Page 6: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/6.jpg)
Deter - Detect - Delay - Deny 6
“A program is a group of projects managed in a coordinated way to obtain benefits not available from managing them separately.” PMBOK 2001
“Operations are ongoing work, similar to programs, with a reduced sense of benefit.” Kerzner
Programs and Operation
![Page 7: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/7.jpg)
Deter - Detect - Delay - Deny 7
What is the PMBOK?
![Page 8: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/8.jpg)
Deter - Detect - Delay - Deny 8
Integration Scope Time Cost Quality
Procurement Communication
Risk Human Resources
PMBOK Knowledge Areas
![Page 9: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/9.jpg)
Deter - Detect - Delay - Deny 9
Initiation Planning Execution Control Close
PMBOK Process Groups
![Page 10: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/10.jpg)
Deter - Detect - Delay - Deny 10
How do Knowledge Areas and Process Groups map?
![Page 11: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/11.jpg)
Deter - Detect - Delay - Deny 11
Definitions History Dashboard
Project management fundamentals
![Page 12: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/12.jpg)
Deter - Detect - Delay - Deny 12
Temporary Limited time frame Definite beginning and
end End is when the
objectives are met or, It is clear that the
objectives cannot be met
Unique Something that has
not been done before May be unique even if
the category it belongs to is large
Project management definitions
![Page 13: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/13.jpg)
Deter - Detect - Delay - Deny 13
Developing a new fighter jet Bringing a new drug to market Installing a security system Programming a DVR
Project definitions
![Page 14: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/14.jpg)
Deter - Detect - Delay - Deny 14
Time◦ Processes required to
ensure timely completion of the project
Cost◦ Processes required to
ensure the project is completed within budget
Quality◦ Includes all the process
required to ensure the project will satisfy the needs for which it was undertaken
Project definitions
![Page 15: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/15.jpg)
Deter - Detect - Delay - Deny 15
Activity definition Activity sequencing Activity duration
estimating Schedule
development Schedule control
Time
![Page 16: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/16.jpg)
Deter - Detect - Delay - Deny 16
Resource planning Cost estimating Cost budgeting Cost control
Cost
![Page 17: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/17.jpg)
Deter - Detect - Delay - Deny 17
Quality planning Quality assurance Quality control
Quality
![Page 18: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/18.jpg)
Deter - Detect - Delay - Deny 18
Project manager Management team Subcontractors
Sales team Consultants Customers
Stakeholders
![Page 19: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/19.jpg)
Deter - Detect - Delay - Deny 19
An MS Project gantt chart is not a WBS Base line planning document If it is not in the WBS it is not in scope
Work breakdown structure
![Page 20: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/20.jpg)
Deter - Detect - Delay - Deny 20
Time oriented display of activity
Activity along the left Calendar along the top Duration represented by
bars
Gantt or Bar chart
![Page 21: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/21.jpg)
Deter - Detect - Delay - Deny 21
Critical path method (CPM)
Used to predict project duration
Analyze the activities with the least amount of scheduling flexibility
Late start Early finish
Network diagram
![Page 22: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/22.jpg)
Deter - Detect - Delay - Deny 22
PERT Statistical estimating
Optimistic Most likely Pessimistic
Optimistic Most likely Pessimistic PERT
Initiation 10 12 25 14
Planning 15 17 36 20
Execution 30 35 45 36
Control 5 22 25 20
Close 2 6 7 6
62 92 138 95
6
))_4((_
cpessimistilikelymostoptimisticdurationactvity
![Page 23: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/23.jpg)
Deter - Detect - Delay - Deny 23
No shortage of literature on team dynamics The Joiner Team Handbook is the best there
out there
Managing the project team
![Page 24: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/24.jpg)
Deter - Detect - Delay - Deny 24
Team building stages Forming
◦ Feelings◦ Behaviors
Storming Norming Performing
Recipe for a successful team
Clear goals Continuous improvement Clear roles Clear communication Beneficial team behaviors Well defined decision
process Established ground rules Awareness of group
process Use scientific approach
Highlights from the Team Handbook
![Page 25: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/25.jpg)
Deter - Detect - Delay - Deny 25
Break?
![Page 26: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/26.jpg)
Deter - Detect - Delay - Deny 26
Late 1800’s◦ Faced with large projects◦ Unprecedented amounts of raw materials◦ Managing 1000’s of laborers◦ Transcontinental railroad
Project management history
![Page 27: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/27.jpg)
Deter - Detect - Delay - Deny 27
Early 1900’s◦ Demand for harder
and longer hours from workers force science of efficiency
◦ WWI, New deal projects
◦ Gantt chart developed around 1900
◦ PM unchanged for almost 100 years
Project management history
![Page 28: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/28.jpg)
Deter - Detect - Delay - Deny 28
Late 1900’s◦ WWII◦ Shrinking war time labor◦ New organization ◦ Pert chart◦ Critical Path Methodology (CPM)◦ Highly complex projects for military, industrial,
construction
Project management history
![Page 29: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/29.jpg)
Deter - Detect - Delay - Deny 29
Today◦ Internet based systems◦ Global resources working in real time
Project management history
![Page 30: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/30.jpg)
Deter - Detect - Delay - Deny 30
Pre-sales Defining phase Planning phase Implementation phase Closing phase
Phase breakdown
![Page 31: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/31.jpg)
Deter - Detect - Delay - Deny 31
Divided into unique phases, starts after sales cycle is complete
Security specific project management
Closing
Defining
Implementing
Planning
![Page 32: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/32.jpg)
Deter - Detect - Delay - Deny 32
Defining Get organized Review the
contract Interview
sales and customer
Prepare a riser diagram
Update the BOM
Assume control of cash flow and cost
Hold kick off meeting
Project dashboard checklist
Planning• Preliminary
schedule• Work
breakdown schedule
• Cost Re-Estimate
• Critical path• Project
schedule
Implementation
• Controlling• Documentatio
n tools• Procurement• Manage the
field work
Closing• Customer
training• As built
drawing• Final security
testing• Final
acceptance• Warranty• Service
turnover• Project audit
![Page 33: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/33.jpg)
Deter - Detect - Delay - Deny 33
Defining Site survey
report Estimating
worksheet checklist
Pre-bid review Sales to ops
turnover form Validate
scope Hold kick off
meeting
Project dashboard activities
Planning• Project plan• Kick off
meeting action items
Implementation• Weekly meetings• Daily onsite project
controls• Weekly onsite
documentation
Closing• Punch list• Project
closeout• Ops to service
turnover
![Page 34: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/34.jpg)
Deter - Detect - Delay - Deny 34
Align project with company objectives Increase profit Reduce risk Generate additional revenue Face to the customer Create competitive advantage
Role of the Project Manager
![Page 35: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/35.jpg)
Deter - Detect - Delay - Deny 35
Manage design process
Manage costs Balance activities Ensure customer
satisfaction
Project scope Project costs Project schedule Not price
Responsibilities
![Page 36: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/36.jpg)
Deter - Detect - Delay - Deny 36
Understand and interpret the scope of work to the project team
Continually validate scope with customers Continually search for ways to reduce costs Plan project phases and tasks Manage cash flow Coordinate sub-contractors Communicate to the stakeholders
Tactical tasks
![Page 37: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/37.jpg)
Deter - Detect - Delay - Deny 37
Project leader Administrator Coordinator Politician Advocate
◦ for the firm ◦ and the customer
?
Qualities of a Project Manager
![Page 38: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/38.jpg)
Deter - Detect - Delay - Deny 38
The project manager is responsible for ◦ Project definition◦ Project planning◦ Project implementation◦ Project closing
The PM must make sure the project is ◦ On time◦ Within budget◦ Within scope, and ◦ Meets customer expectations
Project manager summary
![Page 39: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/39.jpg)
Deter - Detect - Delay - Deny 39
Security equipment specifications Tools and techniques Risks associated with estimating Inputs to an accurate estimate
Estimate security projects
![Page 40: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/40.jpg)
Deter - Detect - Delay - Deny 40
Removed from electric subsystem
Now they are considered under Division 28
Specifications
![Page 41: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/41.jpg)
Deter - Detect - Delay - Deny 41
Order of magnitude◦ Expert judgment◦ -25% to +75%
Parametric modeling◦ Cost /sq ft,
budgetary◦ -10% to +25%
Bottom up◦ Cost of individual
items◦ -5% to +10%
Unit price◦ -5% to +5%
Cost estimating techniques
![Page 42: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/42.jpg)
Deter - Detect - Delay - Deny 42
Scope◦ Loosely defined
scope◦ No specs◦ Poor requirements
Time◦ Rushed timeline◦ Unanticipated
overtime
Quality◦ Customer asks for
work beyond scope without change order
Other◦ Legislative
requirements◦ Might change during
project
What can affect your estimates?
![Page 43: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/43.jpg)
Deter - Detect - Delay - Deny 43
“Make it up on the next job”
Poor scope interpretation
Inaccurate WBS
Rework Optimistic
schedule ?
Estimating risks
![Page 44: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/44.jpg)
Deter - Detect - Delay - Deny 44
Work breakdown structure Resource requirements Resource rates Activity durations Historical information
Estimating inputs
![Page 45: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/45.jpg)
Deter - Detect - Delay - Deny 45
List resources required for each WBS item◦ Need resource quantity◦ Need resource cost
Resource types◦ Equipment◦ Labor◦ Subs◦ Special tools
Resource requirements
![Page 46: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/46.jpg)
Deter - Detect - Delay - Deny 46
Unit price for each resource Consider using burdened labor rate
Resource rates
![Page 47: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/47.jpg)
Deter - Detect - Delay - Deny 47
Use standard labor for installation◦ NECA manual
Man hours◦ 16 man hours = 2 techs for 1 day
Activity duration
![Page 48: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/48.jpg)
Deter - Detect - Delay - Deny 48
How much did this cost in the past? Use it as a check rather than lead
estimating tool
Historical information
![Page 49: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/49.jpg)
Deter - Detect - Delay - Deny 49
General conditions Bid bond Performance bond Insurance Workman’s comp Permits Performance
Contract types RFP Fixed price Cost re-
imbursement Time and materials
Contracting
![Page 50: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/50.jpg)
Deter - Detect - Delay - Deny 50
First step to manage security risks Evaluate the likelihood that a threat will be
successful, and then considers The potential severity of if the event
comes to pass The objective is to identify
◦ Hazards◦ Threats and ◦ vulnerabilities
Security vulnerability assessment
![Page 51: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/51.jpg)
Deter - Detect - Delay - Deny 51
Evaluate countermeasures to provide protection to the◦ Public◦ Employees◦ National interests◦ Environment
Countermeasures come in the form of ◦ CCTV◦ Intrusion detection◦ Access control◦ Barrier technology◦ Lighting◦ Policy
What does a firm do with the results?
![Page 52: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/52.jpg)
Deter - Detect - Delay - Deny 52
Risk
SVA Concepts
![Page 53: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/53.jpg)
Deter - Detect - Delay - Deny 53
Risk variables
SVA Concepts
![Page 54: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/54.jpg)
Deter - Detect - Delay - Deny 54
SVA Process
![Page 55: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/55.jpg)
Deter - Detect - Delay - Deny 55
Risk assessment steps
Asset characterization
ThreatAssessment
Risk Assessment
CountermeasuresAnalysis
VulnerabilityAnalysis
![Page 56: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/56.jpg)
Deter - Detect - Delay - Deny 56
NFPA 101 (National Fire Protection Association)
Highlights◦ AHJ◦ Fire exit hardware (exit doors should get your full
and undivided attention)◦ Means of egress (NFPA chapter 7, IBC ch. 10)◦ Area of refuge
Life safety codes
![Page 57: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/57.jpg)
Deter - Detect - Delay - Deny 57
NFPA – 70 National electric code NFPA – 72 National fire alarm code NFPA – Standard for emergency and safety
power systems NFPA – 730 Premise security UL924 – Standard for safety emergency
lighting and power UL325 – Gate operators ASTM F-1184 and F-2200 – posts and
gates
Other governing codes
![Page 58: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/58.jpg)
Deter - Detect - Delay - Deny 58
Markup vs. margin Earned value Change order
Project financial management
![Page 59: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/59.jpg)
Deter - Detect - Delay - Deny 59
Markup vs. Margin
Markup is cost plus a %
Don’t use it Margin is preferred
%)arg1(cos inmt
![Page 60: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/60.jpg)
Deter - Detect - Delay - Deny 60
Comparison of ◦ Budgeted value of work (Planned value, PV)◦ Earned value, function of
Percentage complete and Planned value
◦ Actual cost
Earned value measurement
![Page 61: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/61.jpg)
Deter - Detect - Delay - Deny 61
Cost variance◦ Measurement according to budgeted amount in
terms of Dollar amount over/under % of budget over/under
Schedule variance◦ Measurement according to scheduled activity in
terms of Time over/under schedule % of time over under
Earned value measurement
![Page 62: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/62.jpg)
Deter - Detect - Delay - Deny 62
Cost performance index◦ Less than 1 means over budget◦ Greater than or equal to 1 is on budget
Schedule performance index◦ Less than 1 means behind schedule◦ Greater than or equal to 1 is on schedule
Earned value measurement
![Page 63: Security Project Management Training](https://reader036.vdocuments.site/reader036/viewer/2022062613/54538569b1af9f90228b467c/html5/thumbnails/63.jpg)
Deter - Detect - Delay - Deny 63
Had enough?