7-1 Project Two Submission: Project Management
Project ManagementOverviewIn this course, you have already spent much of your time exploring vulnerabilities, and you have begun using project management tools to plan how to mitigate the risk from those vulnerabilities. Your work in this project will continue to build directly off of the scenario introduced in Project One, while allowing you the opportunity to look deeply at all aspects of this culminating experience. It is time to refine and finalize your project charter with the incorporation of a communication plan. This will help you draw more connections to your Gantt chart by seeing directly where the two align. There will also be time to revise your Gantt chart based on scope creep, something you will often need to contend with when working in the professional industry. Scope creep can arise from anything that increases the amount of work you have to complete during a project’s schedule. The communication plan included with a finalized project charter is essential for raising awareness and mobilizing a team to deal with the potential challenges associated with project management.The project incorporates two milestones, which will be submitted in Module Four and Module Five. The project will be submitted in Module Seven.In this assignment, you will demonstrate your mastery of the following competency:Demonstrate basic project management principles to effectively collaborate in cybersecurity-related activities, tasks, and projectsScenarioThe ACME Company administration is surprised by all the potential vulnerabilities and areas for improvement you were able to find in its network. They would like to immediately begin moving toward a multi-layered approach to security, which addresses the three risk domains of people, process, and technology, by building on the information you have already provided. Because of your knowledge of the network’s vulnerabilities and your prior experience as a project manager, the ACME Company hires you to create a comprehensive project management plan for addressing one vulnerability for each risk domain.You are told that stakeholders would like this project to be completed in the next six months. The following table details the list of teams and individuals you will have as resources when completing the work.PersonnelRoleStakeholders Provide funding for the project Project manager (You!) Responsible for coordinating the work between each different team, while also serving as the direct link to the stakeholders Hardware engineers team lead Prioritizes and coordinates the team’s work and operates as a member of the small development team as well Software engineers team lead Prioritizes and coordinates the team’s work and operates as a member of the small development team as well Contractor Possesses a specialized skill set hired from outside the organization, and is responsible for physical work and maintenance of the office space Two months into the project, at a meeting with the stakeholders, you are told that a document conversion function will be added to the scope of the project. The stakeholders believe it is important for the integrity of company data that it be made available as PDF files when reports are generated. While the stakeholders view this as a simple process, which you and your teams will be able to tackle along with the existing project work, you know there will be more to take into consideration. You will need to contract someone with a specialized skill set, who understands document conversion, to operate as a database administrator and to inform the installation of the new software. If this resource is acquired, the work could likely be completed in parallel with other tasks, but you understand there will be challenges in incorporating this into your existing budget.PromptUsing your work and instructor feedback from Project One, you will develop a comprehensive project management plan to address vulnerabilities in the organization’s network. Select one of the vulnerabilities you already identified in Project One for each of the three risk domains (people, process, and technology). The plan you create will focus on implementing changes that will mitigate each of these vulnerabilities.You have already completed two Project Two milestones earlier in this course. After revising your work, based on instructor feedback and the Project Two scenario, you will submit your updated work along with the two additional sections of this project (Communication Plan and Scope Creep). This will allow you to better understand both the individual components of project management and their interconnected nature.Your submission will include a written project charter with a completed communication plan, a completed Gantt chart, and a written explanation of your plans for scope creep. You will be using the Project Two Communication Plan Template, which has been linked in the assignment in Module Seven of your course.You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.Project CharterCreate a mission statement to explain the project goal and scope of intended delivery.Discuss business needs, including scalability, that are met by completing the project.Assess potential business impacts of the project.Communication PlanDetermine goals for three to five necessary communications in the project.Determine the necessary parameters for each communication, including an effective method, effective frequency, appropriate owner (responsible party), and appropriate audience.Explain how each component of your communication plan will contribute to providing frequent, open, and transparent communication for your phases, milestones, and tasks in the project.Gantt ChartDesign a plan that effectively balances a timeline to mitigate one vulnerability for each of the three risk domains, while adhering to the overall scope necessitated by stakeholders.Create phases, tasks, and milestones that effectively divide the work and align to the project goal.Explain the best use of resources for each task.Scope CreepDevelop a detailed plan, using your Gantt chart, to adjust for scope creep in the project.Justify why your plan will effectively address the scope creep in the project.Assess the potential impact of budget on your multi-level approach to enterprise security.Discuss how you will communicate your new plan to stakeholders, in order to effectively manage the conflict introduced by the scope creep.What to SubmitYour submission should be a total of 4 to 6 written pages in length and should also include a completed Gantt chart spreadsheet. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.Project Two RubricCriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)ValueProject Charter: Mission StatementMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerCreates a mission statement to explain the project goal and scope of intended deliveryAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Project Charter: Business NeedsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDiscusses business needs, including scalability, that are met by completing the projectAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Project Charter: Business ImpactsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerAssesses potential business impacts of the projectAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Communication Plan: GoalsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDetermines goals for three to five necessary communications in the projectAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Communication Plan: Necessary ParametersMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDetermines the necessary parameters for each communication, including an effective method, effective frequency, appropriate owner (responsible party), and appropriate audienceAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Communication Plan: Phases, Milestones, and TasksMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how each component of the communication plan will contribute to providing frequent, open, and transparent communication for the phases, milestones, and tasks in the projectAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Gantt Chart: Risk DomainsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDesigns a plan that effectively balances a timeline to mitigate one vulnerability for each of the three risk domains, while adhering to the overall scope necessitated by stakeholdersAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Gantt Chart: Phases, Tasks, and MilestonesMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerCreates phases, tasks, and milestones that effectively divide the work and align to the project goalAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Gantt Chart: ResourcesMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains the best use of resources for each taskAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant7Scope Creep: PlanMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDevelops a detailed plan, using Gantt chart, to adjust for scope creep in the projectAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant8Scope Creep: AddressMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerJustifies why the plan will effectively address the scope creep in the projectAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant8Scope Creep: BudgetMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerAssesses the potential impact of budget on this multi-level approach to enterprise securityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant8Scope Creep: CommunicateMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDiscusses how to communicate the plan to stakeholders, in order to effectively manage the conflict introduced by the scope creepAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant8Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas5Total:100%