Before I start on Part 3, till now we have seen:
Sr | Phase | Steps |
1 | Pre POC |
|
2 | During POC |
|
This is my last blog on this series of “The Art of Effective POC”. The focus of this blog is on POST-POC activities.
Many IT professional believes, Once Simulation (activity at During-POC) is completed, POC is completed. Answer is NO, a very BIG NO.
Before you conclude on completion of POC, make sure you have answer of below questions:
- Are you confident that Product is meeting your BUSINESS REQUIREMENT?
- What would be the BUSINESS IMPACT, if we go ahead with product?
- What would be the BUSINESS IMPACT, if we do not go ahead with product?
- Does this product going to meet / support my future BUSINESS GOALS?
- If we are going ahead with product, what RISK are we carrying? Is these RISKS acceptable to organization?
Q: How do I get an answer of these questions?
A: Follow Phase 3 (Post POC)
Sr | Phase | Steps |
3 | Post POC |
|
Evaluate weightage score
Let’s recall our Pre-POC phase where we had documented BUSINESS REQUIREMENT along with weightage and category. Now it’s time for qualitative analysis. Based on your “Test Scenario Simulation and analysis” in Phase 2, apply simple mathematical analysis to calculate weightage. Calculate Weighate for each BUSINESS REQUIREMENT and arrive at final score for each product.
Though this method is quite subjective but if followed effectively, could be helpful for CISO to take quick decision. The reason or objective behind weightage is to help management to take quick decision.
Walk through to CISO
This is extremely important. At least Project Owner should take CISO walk through for BUSINESS CRITICAL requirements. Reasons are:
- CISO would be able to take decision with firm confidence.
- To take feedback / input
- CISO can relate product features from future BUSINESS GOALS perspective
- Identify risks
Risk Communication
Companies where Information Security is discussed at Board level, this becomes mandatory requirement.
Q: What is Risk Communication?
A: Process of acknowledging that RISKS have been understood and accepted.
There might be gaps between “what are our expectations” Vs “What product is offering OR what we are procuring”. These gaps could be non compliance against business requirement or information security policy. In simple terms, these gaps are RISKS
These RISKS must be assessed by company’s TOP MANAGEMENT to conclude whether RISKS are acceptable OR not acceptable.
Decision
In give scenario, Decision is “Acknowledging whether product is meeting business requirements or not meeting business requirements”. Decision is taken considering many factors e.g. weightage, CISO’s feedback / input, Risks , future capability and could be many more depend upon size and type of organization.
With This I would like to END this series on “The Art of Effective POC” As promised, please download POC-Template Excel File.
Hope this would be useful..