Feeds

Risk managers baulk at ID cards risk management post

Ooh, too risky...

Boost IT visibility and business value

Experienced risk management professionals seem reluctant, for some strange reason, to sign up with the Identity & Passport Service for a job risk-managing the ID cards programme. Too risky? Well, if that's what they reckon, they're the people you'd expect to know.

According to Register sources IPS has been hawking the role of "UKPS/IPS Sen Risk Manager" around the market, for a three month contract at £550 a day. This is viewed as not at all bad for that class of job, but strangely uncompelling for this particular job. According to the job spec which has just kind of fallen into our hands, the Senior Risks & Issues Manager will be accountable for "Risk assessment & management for Procurement risks, liaising with embedded Risk Managers throughout the Programme" and will be part of a new team (but only, apparently, for three months) taking "this exciting change programme forward, using some of the hottest and most sophisticated technology around."

Well yes, and wouldn't you be washing your hair that night too? And if that wasn't exciting enough: "This creates exciting job opportunities to accelerate work already underway in fighting fraud, forgery and illegal immigration."

The Register's informant expresses himself puzzled by IPS seeking risk management expertise at this juncture, suggesting that this would surely have been part of the role of PA Consulting, which was appointed in 2004 to work on the "design, feasibility testing, business case and procurement", and which netted somewhere in the region of £20 million, averaging out at over £1,000 a day per consultant. But that, if we read the situation right, is what good risk management is all about. By working on scheme development PA shrewdly ruled itself out of bidding for work (and the associated blame) as part of the actual scheme. More money, less risk, tiptoe away now, lads and leave somebody else to figure it out.

Applications should be in by close of play on 24th November, which we calculate as being within minutes of this story's posting time, but experienced risk management professionals might be right in guessing they'd be willing to accept late, possibly any, applicants. ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.