Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

‘Juggling School’ for Project Management

By Rudolf Melik
January 1, 2008
In the author’s book, he contends that, under a poorly managed project, security managers have no way to know what percentage of their projects are high-risk, resulting in money spent simply to keep things going rather than completing value-creating projects.

There are many reasons to overhaul your project management system in support of security acquisitions.

If you can’t prioritize the projects you already have, and make good decisions on selecting new ones, your organization will be in serious trouble. Let me explain how to transform your project management “three ring circus” into a sane, smart, successful system.

If you work in a project-based environment, you probably feel like one of those juggling clowns at the circus: trying to keep your ball, your baton, and your flaming torch in the air at the same time, all while maneuvering your unicycle around the ring. Focus too much on one object and you risk dropping one of the others -- or even taking a tumble. Project management can be a lot like this. Neglect to give one project the attention or funding it needs and the consequences of doing so can be much more serious than a dropped ball, especially when your higher-ups find out money has been wasted on an unimportant or failed project.

Great news: It’s time to send out the clowns. Organizations don’t have to manage their projects in such a circus-like manner. And, in fact, following solid advice can save valuable time and money and result in consistent success for your company.



UNMET BUSINESS GOALS

A dearth of facts and unbiased analysis lead executives to make poor decisions when selecting new projects or assigning resources to existing ones. The result? Unmet business goals and lost opportunities. Bad project management decisions not only cause the misuse of valuable funds, they create an environment where strategic projects take a backseat while certain “pet” projects are given higher priority.

In a new book, I point out that, under a poorly managed project, security managers have no way to know what percentage of their projects are high-risk, resulting in money spent simply to keep things going rather than completing value-creating projects. Successful executives have to make the right decisions not only at the project level but also at the business level, where there can be tens, and possibly hundreds, of projects to evaluate at any given time. It’s a tall order, especially when you consider that all of these projects rely on the same enterprise resource pool and obtain funding from the same global budget.

Project prioritization and selection -- part of project workforce management -- is the clear solution. By using this methodology, you can organize and manage projects as a group, or a portfolio at a business or departmental level. Project prioritization and selection requires involvement at all levels of the organization, including executives, the project management office, project managers, and other stakeholders. The information is collected, shared, and presented for analysis in a systematic and easy-to-use manner.



WORK THE FIVE STEPS

Project prioritization and selection involves a five-step process:

  1. Step One involves selecting project ranking criteria. For example, in this step you’ll consider whether a project aimed at cost reduction or one aimed at staff retention is more important at a given moment.
     
  2. Step Two allows you to rank the projects. The top 20 percent of projects will deliver 80 percent of the value to a business. This step helps you figure out what that top 20 percent is. You’ll use your criteria to weight your projects and then rank them accordingly.
     
  3. Step Three balances your portfolio, providing you with the right mix of projects. This helps to increase the priority of those projects that offer high reward for low risk.
     
  4. Step Four balances capacity/resources, helps you ensure that there is adequate resource availability, and assesses the organization’s capacity to deliver a given project.
     
  5. Finally, Step Five helps you prioritize your overall portfolio by marking lower-ranked projects or those that cannot be funded immediately as inactive.

Your efforts to prioritize and carefully select your projects will pay off tremendously. Here are just a few advantages to implementing this system in your security organization:

It allows you to organize your company’s best interests. Think of it as a Google Calendar or an iTunes playlist for your projects. The project portfolio that you create when you prioritize your projects helps you put all of the projects that are the most valuable to your organization right there in one place. Much like your Google Calendar organizes your meetings or your playlist allows you to put your favorite (think “most valuable” in business speak) songs in an easily-accessible list, the project portfolio organizes projects that share a combination of common objectives, cost centers, resources, risks, or other associations, and allows management to make funding decisions, and to report on and analyze a collection of projects in one entity.



“Project prioritization and selection is just one more step in providing you and your employees with what will be the backbone of success in project execution—timely and accurate information,” contended Rudolf Melik.

CHECK YOUR PROJECT PORTFOLIO

You can simply look at your portfolio and decide which projects are strategic, which require additional funding and which ones are not reaching the expected end results. It consolidates your project information.

It takes the guesswork out of project management. Sometimes, security managers might want to see certain projects take priority simply because the results will benefit their department or act as an easy win. And other times well-intentioned managers may mistakenly assign more resources to what seems like an important project, when in reality another project should get the attention. Implementing project prioritization and selection processes elevates decision-making to a more strategic viewpoint.

Managers can decide which projects are the most important based on hard information. They no longer have to guess at what project deserves the most money and attention. It ensures that your company is always working toward the goals that will create the most valuable results for the organization.

It provides guidance for new projects. In a perfect world, only new projects that create value for the business and its customers would be implemented at an organization. Unfortunately, we live in the imperfect real world. Once they’re up and running, new projects aren’t always given the attention needed to be successful. Or, conversely, they are given too much attention and their success isn’t helpful for the company.



AVOID MISALLOCATION

Project prioritization and selection helps you add new projects to your queue without misallocating more important resources to them. At the same time, it helps you allocate enough time and manpower to ensure quality results. It’s a balancing act. Project prioritization and selection provides a framework to evaluate new project requests or opportunities in a systematic matter. Each opportunity is considered against the current priorities and resource availability. If it’s determined that the new project isn’t a priority, it can be rejected or archived for future consideration.

Risks are assessed from a global perspective on their overall impact. Ask your colleague managers; it’s likely that avoiding unnecessary risks is at the top of their concerns. But if they’re focused only on avoiding risks with respect to the projects already in the pipeline, then their risk assessments won’t do the company much good. With project prioritization and selection, new risks can be assessed more thoroughly and with respect to how they will affect the company as a whole. The steps you’ll use to organize your project portfolio, specifically in Step Three when you balance your portfolio, will help you weed out those projects that contain too much risk to pursue.

Naturally, if projects are prioritized and selected properly, risk is greatly reduced and the business operates at an optimal capacity with a higher number of successful projects.

It helps you know when you have the resources and when you don’t. In project planning, resource availability is key. It is also equally important to understand the organization’s capacity to deliver and its ability to develop internal capabilities. Resources are allocated to high-priority projects, and this process is repeated until the resources are exhausted. Once all resources are allocated or reassigned, the remaining projects are put on hold or additional resources are added to the pool. Your project portfolio will help you see if you are over-allocated or close to capacity and in which months resources will be available for projects.



ALMOST RUNS ITSELF

It is less time-consuming than juggling projects. When you hear about project prioritization and selection, you may think Oh, great! Something else to take up my time. The reality is that once you have the system in place, you’ll spend less time trying to figure out what happened to all of those failed projects or spent resources and more time actually managing the projects that matter most.

The great thing about this system is that it doesn’t need to be constantly poked and prodded. In fact, it is important not to upset the portfolio too frequently by constant prioritization and resource balancing. I recommend you have a minor review each month and a major portfolio review once every quarter.

It makes people more accountable. Without a clear report of how and why projects are approved or rejected, no one can be held accountable when a project fails or is not funded when it should have been. The project prioritization and selection system fosters accountability. Resources are allocated based on specific criteria, so if a project doesn’t receive the funding or manpower it needs to be successful or if it fails for some other reason, leaders will know what went wrong where and can address those issues with the appropriate employees. As a result, managers can analyze past decisions with respect to project prioritization and selection and use this knowledge to improve their decision-making and forecasting abilities. But remember: you should establish a framework for continued process improvement so that lessons learned and metrics obtained may be used to improve future project selection, estimation, and ranking decisions.

Project prioritization and selection is just one more step in providing your employees with what will be the backbone of their success in project execution—timely and accurate information. This critical ingredient allows them to make fact-based decisions regarding project priorities and new project selection that align projects and resource utilization with the company’s goals. Ultimately, having the right information at the right time will improve your company’s odds of creating tremendous value.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rudolf Melik, currently serving as CEO, is a founder of Tenrox. The Rise of the Project Workforce: Managing People and Projects in a Flat World (Wiley, 2007, ISBN: 978-0-470-12430-7, $34.95) is available at bookstores nationwide, major online booksellers, or direct from the publisher by calling 800-225-5945. In Canada, call 800-567-4797. For more information, please visit projectworkforcebook.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!