risk management | TechWell

risk management

A Physical Metaphor for Quick Fixes and Root Cause Analysis

If you deal with legacy code you’ve likely found yourself struggling to debug and fix a mysterious, intermittent problem. Along the way you may have discovered some code that didn’t quite make sense.

Steve Berczuk's picture
Steve Berczuk
Risk Project Management Schedule Risk Analysis

Building schedules for complex projects is challenging. While the results are never perfect, credible schedules are a useful communication and coordination device. Incredible schedules are a dangerous waste of time and energy that damage a project manager’s credibility and cost an enterprise a fortune.

Payson Hall's picture
Payson Hall
Software engineer looking at her computer monitors and integrating code Code Integration: When Moving Slowly Actually Has More Risk

Many decisions about code branching models are made in the name of managing risk, and teams sometimes pick models that make integration harder in the name of safety. Moving slowly and placing barriers to change can seem safer, but agile teams work best when they acknowledge that there is also risk in deferring change.

Steve Berczuk's picture
Steve Berczuk
Mouse trap with cheese An Evolutionary Approach to Risk Management

Risk management is identifying, analyzing, mitigating, and monitoring risks to a project. Humans do this all the time with life experiences, so there are parts of risk management that come naturally to us. What needs to be learned is recognizing our biases and limits to our visualization. Ask these questions to help.

Payson Hall's picture
Payson Hall
A tester going over software code 8 Questions to Ask before Fixing a Defect

Some defects require a fix, without a doubt. But not all defects are created equal, so careful thought should be applied before a defect is fixed. The goal isn’t to fix every reported defect; it’s to return value to the customer and profit to the company. These eight questions can help in the decision-making process.

Richard Estra's picture
Richard Estra
Chainlink fence Continuous Risk Management in Cybersecurity

Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk.

Max Emelianov's picture
Max Emelianov
Spare tire on an off-roading vehicle Making (and Keeping) Project Risk Visible

Project managers recommend how much should be invested to address various risks based on their understanding of project context, but the final decision about what to do and when those efforts are sufficient belongs to the sponsor. Risk management requires executive input, so sponsors need to see all risk data you have.

Payson Hall's picture
Payson Hall
SecOps team member touching a security icon on a screen 5 SecOps Challenges and How to Overcome Them

SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful.

Gilad David Maayan's picture
Gilad David Maayan