Feeds

Risk managers baulk at ID cards risk management post

Ooh, too risky...

Top three mobile application threats

Experienced risk management professionals seem reluctant, for some strange reason, to sign up with the Identity & Passport Service for a job risk-managing the ID cards programme. Too risky? Well, if that's what they reckon, they're the people you'd expect to know.

According to Register sources IPS has been hawking the role of "UKPS/IPS Sen Risk Manager" around the market, for a three month contract at £550 a day. This is viewed as not at all bad for that class of job, but strangely uncompelling for this particular job. According to the job spec which has just kind of fallen into our hands, the Senior Risks & Issues Manager will be accountable for "Risk assessment & management for Procurement risks, liaising with embedded Risk Managers throughout the Programme" and will be part of a new team (but only, apparently, for three months) taking "this exciting change programme forward, using some of the hottest and most sophisticated technology around."

Well yes, and wouldn't you be washing your hair that night too? And if that wasn't exciting enough: "This creates exciting job opportunities to accelerate work already underway in fighting fraud, forgery and illegal immigration."

The Register's informant expresses himself puzzled by IPS seeking risk management expertise at this juncture, suggesting that this would surely have been part of the role of PA Consulting, which was appointed in 2004 to work on the "design, feasibility testing, business case and procurement", and which netted somewhere in the region of £20 million, averaging out at over £1,000 a day per consultant. But that, if we read the situation right, is what good risk management is all about. By working on scheme development PA shrewdly ruled itself out of bidding for work (and the associated blame) as part of the actual scheme. More money, less risk, tiptoe away now, lads and leave somebody else to figure it out.

Applications should be in by close of play on 24th November, which we calculate as being within minutes of this story's posting time, but experienced risk management professionals might be right in guessing they'd be willing to accept late, possibly any, applicants. ®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.