<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Project Management Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/project-management-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/project-management-2/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 03 Jul 2019 01:56:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Project Management Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/project-management-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Flooding: Are You Prepared?</title>
		<link>https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 25 Aug 2017 12:03:08 +0000</pubDate>
				<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Project Management]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4346</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/">Flooding: Are You Prepared?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="alignleft wp-image-4355 " style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/man-sitting-on-roof-in-flood-cartoon.jpg?resize=198%2C174&#038;ssl=1" alt="" width="198" height="174" /><span style="font-size: 12px;"></span></p>
<p><span style="font-size: 12px;">Here in Texas, the Gulf Coast is about to take a direct hit from a hurricane that is expected to dump up to 30 inches of rain in some locations and up to 10 inches across large areas. That kind of rain will definitely cause serious flooding.  It&#8217;s a little late for the Texas coastal bend area and the large inland areas that will be hit the hardest to take planning steps for disaster recovery. They&#8217;re in emergency evacuation mode already, protecting life and reducing property damage. What we can learn from these tremendous forces of nature is that disaster recovery needs to be part of all businesses&#8217; Standard Operating Procedures &#8211; including our own.  What does this mean?</span></p>
<ol>
<li>Make sure the backups of your critical data are current &#8211; <em>and can be restored</em>.</li>
<li>Make sure your important equipment &#8211; servers, workstations, laptops, medical equipment, etc. needed to perform regular work &#8211; is protected or stored above flood level.</li>
<li>Have a plan for communicating with co-workers and employees, including a list of phone numbers or a text group set up on your phone in advance.</li>
<li>Have a plan and the phone numbers for communicating with authorities &#8211; e.g. 911, police, fire department, EMS.</li>
<li>Have a plan outlining how to recover the core equipment and personnel necessary to bring your business and services back online.</li>
</ol>
<p><strong>The preferred approach is to create a Disaster Recovery (DR) plan.</strong> These can easily be 50 page documents, so it will take a lot of time and knowledge to create the plan. I would not suggest buying a template &#8211; these are typically instructions for creating a plan, not an actual plan.</p>
<p>To help you get started, here&#8217;s an outline from our own Disaster Recovery Plan.</p>
<p>We include a DR plan with our HIPAA compliance package.  It&#8217;s required by the Federal government, so we help our clients by providing a ready to use DR plan.  You still have to fill in your business&#8217; specific information, but it will reduce your initial creation time by about 70%.</p>
<p>Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/">Flooding: Are You Prepared?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4346</post-id>	</item>
		<item>
		<title>Focus on Security: It&#8217;s going to take more resources</title>
		<link>https://thirdrock.com/blog/2016/07/19/focus-on-security-its-going-to-take-more-resources/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 19 Jul 2016 14:46:15 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Project Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[resource allocation]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1867</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/07/19/focus-on-security-its-going-to-take-more-resources/">Focus on Security: It&#8217;s going to take more resources</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1879" style="margin-right: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/multi-colored-pie-chart-with-figures.jpg?resize=216%2C162&#038;ssl=1" alt="multi colored pie chart with figures" width="216" height="162" />No one wants to spend money for something they don&#8217;t want or need.  Many companies, including the healthcare industry, try to squeeze IT when it comes to the budget.  But what most CFO&#8217;s and executives that control the IT budget need to understand is, they have become a digital business, at least in the back office. Everything is now done on the computer.  Therefore, there must be an increase in resources to keep the computers up-to-date, secure and operating at acceptable levels.</p>
<p>With cyber criminals focused on stealing Protected Health Information, cyber security is now very important and a top requirement of every healthcare covered entity and business associate.  The problem is, all the demand to defend against cyber-threats has created a massive shortage of cyber security expertise.  In the small to medium sized business, there is an estimated 68% shortage of cyber security expertise.</p>
<p>What to do?  Make sure you train staff on protecting ePHI.  Talk to your IT staff or vendor to create a plan to improve and maintain the security of your computers.  AND increase your budget to make the necessary improvements to <strong>protect your patients, protect your practice, and protect yourself.</strong></p>
<p style="line-height: 16.5pt; margin: 0in 0in 7.5pt 0in;"><span style="font-family: 'Helvetica',sans-serif; color: #222222;">For more details on the shortage of security resources check out the Wakefield Research <a href="http://www.webroot.com/shared/pdf/SMBThreatReport2015.pdf" target="_blank" rel="noopener noreferrer"><span style="color: #1155cc;">survey</span></a> of 700 IT decision makers at SMBs in the U.S., U.K. and Australia conducted on behalf of endpoint security firm Webroot.</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/07/19/focus-on-security-its-going-to-take-more-resources/">Focus on Security: It&#8217;s going to take more resources</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1867</post-id>	</item>
		<item>
		<title>PMP or Not &#8211; Two key observations</title>
		<link>https://thirdrock.com/blog/2014/02/20/pmp-or-not-two-key-observations/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 20 Feb 2014 12:30:22 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Project Management]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[certifications]]></category>
		<category><![CDATA[pmi]]></category>
		<category><![CDATA[pmp]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[schedule]]></category>
		<category><![CDATA[scope]]></category>
		<category><![CDATA[stakeholders]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=151</guid>

					<description><![CDATA[<p>I keep hearing people say you have to have a PMP or it&#8217;s required for the job.  I&#8217;ve been an &#8220;ad hoc&#8221; project manager for a few years, ok, more [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2014/02/20/pmp-or-not-two-key-observations/">PMP or Not &#8211; Two key observations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I keep hearing people say you have to have a PMP or it&#8217;s required for the job.  I&#8217;ve been an &#8220;ad hoc&#8221; project manager for a few years, ok, more than I&#8217;m going to admit to, let&#8217;s just say more than 25 years.</p>
<p>I&#8217;ve been credited with saving &#8220;lost&#8221; projects, turning around massively behind schedule and over budget projects and actually launching and completing &#8220;mission impossible&#8221; projects.  Most of them required some severe bleeding on my part, but working closely with people, being honest with the sponsors and stakeholders and forcing communications among all involved righted the ships and improved the sailing.  And I was able to do those things because I have been a programmer, developer, systems analyst, business analyst, system administrator, network administration/architect, application architect, solution architect, team lead, integration lead/officer, disaster recovery manager &amp; consultant, vCIO and held various other jobs.  I basically knew when a person wasn&#8217;t understanding the requirements or able to deliver the &#8220;goods&#8221;.  I was willing to force issues out on the table and have them resolved no matter how difficult the discussion.  More importantly, I was willing to tell the stake holders, customer and sponsors the project was not on schedule or within budget.  And often I told them changing the scope was the problem.</p>
<p>I&#8217;ve never been a big believer of certifications.  They are too heavily based on academic learning and not near enough on experiential knowledge.  Although, there is one certification I keep thinking I should pursue, the PMP.  I definitely agree with the benefits of standard terminology, processes and procedures to help a team function and perform better.  I have to assume the PMI is trying to remove some of the issues of projects such as the politics and lack of communications by creating a process that works in many cases.</p>
<p>However, I was in a meeting the other day with many project managers who were asking me questions and I was asking them questions.  After leaving the meeting it dawned on me the struggles they were having were not because of the management of the project itself, but the lack of management or handling of the politics driving the business through the projects.  The stakeholders were not willingly on board, they were being forced down the path by sponsors and external forces.  That has to be brought out and resolved are the project will struggle at best, but more likely fail.</p>
<p>I also realized, most of the project managers did not have experiential knowledge of the actual work they were managing.  That is, the project manager over the network enhancements and new build-out had never been a network architect, network engineer or network administrator.  He simply had no clue if the network staff was actually doing the right things in the right order with the right equipment.  How could he possibly know if the project was truly on track.</p>
<p>Of course, the reality is, the PMP is a great &#8220;tool&#8221; to have on your tool belt, but the best tool does not make a master carpenter.  I might add, it appears the PMP has become much more real world over the years making it an even better tool and learning experience for project managers.</p>
<p>For more information on the PMP visit the PMI web site at http://www.pmi.org/Certification/Project-Management-Professional-PMP.aspx</p>
<p>The post <a href="https://thirdrock.com/blog/2014/02/20/pmp-or-not-two-key-observations/">PMP or Not &#8211; Two key observations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151</post-id>	</item>
	</channel>
</rss>
