Reference no: EM132228507
For the essay questions (1-3), use the case scenarios provided in each of the questions to develop your answers. The answers that you provide for each of the questions must; (1) offer a unique (your own) solution to the problem addressed in the scenario provided, and (2) you must integrate the concepts covered in class into the solutions that you provide. You must appropriately apply the concepts learned in class in the development of your solutions in order to receive full credit. If you only include the concepts from class without integrating the scenario context your solution the maximum grade you can receive is a 50%. Likewise, if you provide a solution to the scenarios that is not supported with the material from class the maximum that you will receive is a 50%. You don’t have to agree with the concepts presented in class, you can dispute them and offer an alternative approach, but you must acknowledge the concepts covered in class and justify why you are opting for an alternative approach.
You are an experienced project manager that has just been hired by a large oil company that recently experienced a major cyberattack. The company controls a quarter of the world’s oil production, it is headquartered in Saudi Arabia, with global operations in Europe, the US, and Africa. The attack resulted in the partial or total destruction of 35,000 of the company’s computer hard drives. Employees noticed that files were disappearing and computers were beginning to fail on August 12th. The IT staff immediately began to disconnect all of the systems and the data centers to stop the damage. Oil production processes were not impacted by the attack; however, all other aspects of the organization were affected which effectively brought all operations to an immediate stop. Much of the data the company was lost in the attack (i.e., contracts, accounting information, payroll, etc.) and with all computer systems disconnected they had to resort to using “old school” process on paper. Historically, the company had not focused on IT security and certainly never anticipated an attack of this magnitude. Because of this, the company did not have the IT staff with the skills to diagnose the attack. They immediately hired a team of IT security experts to diagnose the source of the attack, fix the situation, and get the company’s systems back online. This new team of IT security experts got to work immediately; however, they found that their efforts were not as efficient and effective as they would like. The new manager of the company’s new IT Security Department (an IT security expert) identified the need for a project manager to help the team organize their efforts, and they hired you!
When you arrived the systems were still not operational (it would take months to get everything back online). Many of the IT security experts that made up your project team felt that the new processes that you were implementing were an unnecessary inconvenience and were not as cooperative as you needed them to be. You spoke to the new IT Security Department manager about the troubles that you were having with the team. She said that IT Security experts, some of them recruited directly from the hacking community, were not an easy group to manage. She suggested that you put together a clear and concise document that described the project management processes that you would be implementing.
In your document you should include a brief description the need and benefit of the processes, the specific project tools that you will be using (think project templates from your class project) and a brief description of the relationships and impacts of the documents on the project itself. Her thinking was that if you could provide a clear and concise document that provided an outline/rationale of your activities, the team would have a greater understanding of the benefit that project management can provide to the team as they work toward accomplishing their goals.
Provide answers for the following:
Provide a concise but detailed outline of the project processes, tools, relationships, and benefits for the team that addresses the issues suggested by the IT Security Department Manager.