Lisagor: Developing risk managers

Workshop teaches federal managers how to cope with five major IT program risks

In my experience, too many information technology projects promise the sky, but instead they exceed their budgets and schedules and disappoint users. Although there are many reasons for those failures, the lessons to be learned from them are rarely taught in classrooms, especially in the context of specific agency cultures and histories.

Training from the Program Management Institute (PMI) provides an essential foundation for government program managers (PMs), but it doesn’t necessarily prepare them to deal with many of the everyday problems that arise on most projects, especially as those challenges relate to their own organizational and contractual relationships.

Experienced PMs are too busy fighting their own forest fires to concentrate on transferring knowledge to newer managers. As experienced managers retire, lack of knowledge management will become even more pronounced and the effect potentially more devastating.

Do any of these everyday problems look familiar?

  • Vague program objectives.
  • Unrealistic or missed schedules.
  • Lack of automated support tools.
  • Poor requirements baseline and traceability.
  • Ineffective document review processes.
  • Lack of understanding of performance-based contracting.
  • Insufficient data for budget control.
  • Poorly defined roles and responsibilities.
  • Inadequate risk identification and/or risk monitoring and control.
  • Inaccurate schedule and cost status information.
  • Lessons learned not passed on to newer program managers.

  • For several years, I’ve been exploring various ways to provide cost-effective, reality-based training to help PMs and contracting officers correct such everyday challenges. Together with the General Services Administration’s Federal Systems Integration and Management Center, I developed a one-day Reality-Based Risk Management assessment and customized training program to impart valuable lessons using a combination of role-playing scenarios, case studies and group exercises.

    The idea was to offer a one-day workshop to help program managers mitigate future risks and increase the probability of project success.

    The workshop teaches managers about these following five major IT program-risk activities using real-life examples drawn from their own organizations’ experiences:

  • Risk planning.
  • Risk identification.
  • Risk analysis.
  • Risk mitigation.
  • Risk monitoring, control and assessment.

  • The first two workshops were well-received. I hope that more managers will have the opportunity to deal with real-life challenges in a safe setting.

    We must prevent the continued failure of so many IT programs and give auditors at the Government Accountability Office less to write about.

    Lisagor offers his training on Celerity Works’ GSA MOBIS Schedule GS-10F-0380S at or He is also the author of “The Enlightened Manager,” available as a free download at Reach Lisagor at

    The Fed 100

    Read the profiles of all this year's winners.


    • Shutterstock image (by wk1003mike): cloud system fracture.

      Does the IRS have a cloud strategy?

      Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

    • Shutterstock image: illuminated connections between devices.

      Who won what in EIS

      The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

    • Wikimedia Image: U.S. Cyber Command logo.

      Trump elevates CyberCom to combatant command status

      The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

    • Photo credit: John Roman Images /

      Verizon plans FirstNet rival

      Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

    • AI concept art

      Can AI tools replace feds?

      The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

    • DOD Common Access Cards

      DOD pushes toward CAC replacement

      Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

    Reader comments

    Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

    Please type the letters/numbers you see above

    More from 1105 Public Sector Media Group