SlideShare a Scribd company logo
1 of 19
Download to read offline
Risk Analysis & Risk Management
How to Properly Evaluate & Manage Business Risks
LEARN HOW YOU CAN CONDUCT AN ACCURATE RISK
ANALYSIS TO PROPERLY IDENTIFY AND MANAGE THE RISKS THAT
YOUR ORGANIZATION MAY POSSIBLY FACE.
Whatever role you have in your company or organization, you will
very likely need to make certain decisions along the way
that carry an element of risk.
There are two aspects of risk:
The probability that something will go wrong
The adverse consequences in the event something goes wrong
Risks are hard to foresee, let
alone get prepared for and
somehow manage.
If you get hit with the
consequences you never
planned for, in time, money
and reputation, quite a bit
could be at stake.
It helps you pinpoint and
understand the kind of risks
that could affect you in your
role.
It also helps you
determine how to
manage these
potential risks, and
hopefully minimize
their impact on what
you have planned
for the future.
This is what makes good Risk
Analysis a vital tool when the
type of work you do is risky.
Risk Analysis is the
process by which you
identify and manage
any potential
problems that might
undermine your key
business projects and
plans.
To reasonably
undertake a Risk
Analysis, all possible things
that could threaten your
business must be identified,
and an estimate must be
made as to the likelihood that
these situations would
actually occur.
Doing a
proper Risk
Analysis is not easy, it
can be very complex since
you’ll need to have detailed
knowledge about security
protocols, project plans, marketing
forecasts, a lot of financial
data and other things of
relevance.
Once carried
out, it serves as an essential
tool in planning and when
used properly, something
that will save you a lot of
time, money and your good
name and
reputation.
What Does Risk Analysis Encompass?
When Risk Analysis Should be Used?
Risk analysis is very useful in many different situations:
When making the
decision to either move
forward or not with a
particular project.
When preparing for things like
a natural disaster, technology
or equipment failures, theft or
the sickness and absence of
key staff members.
In the planning stages of projects,
which helps you foresee and avoid or
neutralize any potential problems.
When preparing for things like a natural
disaster, technology or equipment
failures, theft or the sickness and
absence of key staff members.
During safety improvements involving
potential workplace risks.
How to Effectively Use Risk Analysis
Steps for conducting a Risk Analysis:
Identify Specific Threats1
The first thing that must be done in a
proper
Risk Analysis is to identify any existing and
potential threats you might be facing.
The sources of these threats can be any number of things:
Any type of situation that could harm staff,
technology or products, such as toxic chemicals,
falling boxes, and/or poor lighting, etc.
Technical
Structural
Reputational
Political
Project
Advances or changes in technology and/
or technical failure
Loss of employee or customer loyalty and/or
confidence, damage to reputation.
Changes in governmental policy, public opinion,
tax laws, or foreign influence.
Taking longer than planned on key tasks,
going over budget, problems with the product or
quality of service.
Financial
Human
Natural
Operational
Procedural
A failure in business, fluctuations in the stock price,
changes in interest rates or non-availability of
credit and/or other sources of funding.
The illness, injury, death or loss by another cause of
a key part of the team.
A serious disease, severe weather event, or
natural disaster.
An interruption in operations, disruption of supplies,
losing access to vital assets, and/or failures in
distribution network.
Embezzlement and or/fraud caused by failures in
accountability, controls and/or internal systems
A variety of approaches can be used to carry out
a thorough and complete analysis:
Review the list above to determine if any of these
possible threats pertain to your business.
Run through the various processes, systems and/or structures used in your business and
evaluate the potential risks of any aspect of these. Do you see any
vulnerability?
Speak to others who may have a different perspective. If you lead the team, get input
from team members, and consult with others who work in the organization, or with
people who have managed similar projects.
Use available tools like a Failure Mode & Effects Analysis,
a SWOT Analysis that can help you in uncovering possible
threats. A Scenario Analysis can help you explore
potential future threats.
Estimate Your Level of Risk
2 Once you’ve pinpointed and identified any threats you
may be facing, you must evaluate both the chances of
these threats actually happening and the possible
impact they would have on your business.
One way to do this is to make a best estimate in terms
of probability of this particular event happening, and
then multiply this probability by the amount of money
it could cost you to make things right in the event it
actually occurred. The result is a value attached to
this particular risk:
Probability of Event X Cost to Repair = Risk Value
For example, perhaps you’ve identified a risk and it has to do with the possibility your rent
may be substantially increased. Your thought is that there may be an 80% of this actually
happening in the next year. You’ve determined this because you know your landlord has
increased the rests for other businesses in the complex. If this does come about, it would cost
an additional $500,000 over the course of the next year.
The Risk Value of having a rent increase would be:
Probability of Event of 0.80 X Cost of Event of $500.000 = Risk Value of $400,000
A Risk Impact/Probability Chart can be used to assess your risk. This
helps to identify exactly which risks you should be focusing on. Take
your time and do not rush through this step. Collect as much
information as possible so that you are accurately estimating the
probability of a particular event actually happening as well as the
costs associated with setting things right and repairing the damage
.Past data can be used to guide you if you have no other way to
accurately forecast things.
low risk
Minimum
risk
Moderate
risk
low risk
low risk
low risk
High
risk
low risk
low risk
Minimum
risk
Minimum
risk
Minimum
risk
Minimum
risk
Moderate
risk
Moderate
risk
Moderate
risk
Moderate
risk
High
risk
High
risk
Extreme
risk
Extreme
risk
Extreme
risk
Negligibile Minor Moderate Significant Severe
High
risk
High
risk
High
risk
How to Best Manage the Risk
Once you've estimated the value of the potential risks you face, you
can begin considering ways to manage these.
It only makes sense to find approaches that are cost-effective. You
do not want to spend more to eliminate a possible risk than it
would cost you if the event actually occurred.
It might make more sense to live with the risk than to go to great
lengths, spending way too much to eliminate it.
However, you do not want to compromise where personal safety or
ethics are concerned. These risks do need to be addressed.
Avoid the Potential Risk
• In some instances, it makes more sense to avoid the potential risk. This may mean not being involved in a new business venture,
turning a project down, and/or just skipping a risky activity.
• These are viable and good options when there is no advantage in assuming the risk, or when the potential costs of dealing with the
effects are simply too much.
• However you need to understand that in avoiding a possible risk, there is a chance of missing out on a good opportunity.
• You may want to do a What If Analysis, exploring your options while making the decision.
Share Your Risk with Others
Another option is to share the risk, as well as any potential gain, with others.
These could be individuals, teams, another company or
organization or even third parties.
For example, you already share the risk when you buy insurance
for your office building and inventory with an insurance company
(a third party), or when you take on a partner in a joint initiative to
develop a product.
Decide to Accept the Risk
You always reserve the option to accept this risk. This may be all you can do
when you cannot mitigate or prevent the risk, when any possible loss turns out to
be less than it would cost to insure against the risk, or when any possible gain is
worth taking the risk.
• For example, you might decide to accept the risk of launching a
project late as long as the possible sales will cover the costs.
• Prior to deciding to accept a risk, do an Impact Analysis to look at
all the possible consequences of accepting the risk.
• There may be nothing you can do about the risk, but it may be
smart to decide on a contingency plan to deal with any
consequences.
Controlling a Particular Risk
If you decide to accept a particular risk, there are several ways that you can diminish its impact.
Conducting Business Experiments can be a good way to evaluate and reduce a risk. You would roll out whatever high-risk
activity you are contemplating, but on a very small scale and in a manner that you can control. Experiments can be used to see where problems happen,
discovering ways to detect and prevent risks prior to introducing this activity on a substantially larger scale.
• Detecting risks involves pinpointing the stages in a process when something could take a wrong turn, and putting specific steps in place to promptly
rectify the problems should they happen. Detecting includes double-checking all financial reports, doing safety testing before the release of a product,
and/or installing some type of sensors to find defects in products.
• Preventing risks means striving to prevent a particular high-risk circumstance from occurring. This involves conducting training on health and safety,
protecting corporate servers with firewalls, and totally cross-training team members.
• Plan Do Check Act can be utilized to control the impact a risky situation has on the company or organization.
It is similar to conducting a Business Experiment since it has to do with testing the various ways you can diminish a risk.
This particular tool provides four phases that guide you through a complete analysis of the whole situation, the creation of and testing of a certain possible
solution, seeing how well it worked, and if successful, incorporating the solution.
Main Points
• Risk Analysis has been proven to be effective in identifying and assessing things that could potentially have an adverse
effect on the success of a project or business.
• It helps you examine the real or potential risks that you or your company or organization are faced with. It helps you determine whether to move
forward on something or not.
• You conduct a Risk Analysis to identify potential threats and estimate the possibility of them happening.
• Once you’ve determined the value of your potential risks, you can begin to look at ways to effectively manage them.
• You may decide to avoid the risk altogether, share it with others, or accept the risk and take steps to reduce the impact it could have.
• It is critically important that you are thorough when conducting your Risk Analysis, and look at all the potential impacts they could have if the risks
actually happened.
• You must be mindful of the costs involved, all the ethical considerations and everyone’s personal safety.

More Related Content

What's hot

Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidentsEdinburgh Napier University
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
Emergency Preparedness
Emergency PreparednessEmergency Preparedness
Emergency PreparednessRudi Nieuwoudt
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 
Sistema de comando de incidentes
Sistema de comando de incidentes   Sistema de comando de incidentes
Sistema de comando de incidentes Jessica Rusinque
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment trainingBrian Larkin
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesSlideTeam
 
Emergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSAEmergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSAAtlantic Training, LLC.
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides SlideTeam
 
Effective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesEffective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesSlideTeam
 
A Realistic Look at the Active Shooter Situation
A Realistic Look at the Active Shooter SituationA Realistic Look at the Active Shooter Situation
A Realistic Look at the Active Shooter SituationLowers & Associates
 
5 steps risk assessment
5 steps risk assessment5 steps risk assessment
5 steps risk assessmentwirethehouse
 
Risk Management Process
Risk Management ProcessRisk Management Process
Risk Management Processno suhaila
 

What's hot (20)

Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidents
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
Emergency Preparedness
Emergency PreparednessEmergency Preparedness
Emergency Preparedness
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
Sistema de comando de incidentes
Sistema de comando de incidentes   Sistema de comando de incidentes
Sistema de comando de incidentes
 
Chapter 2 (crisis management)
Chapter 2 (crisis management)Chapter 2 (crisis management)
Chapter 2 (crisis management)
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment training
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
 
Emergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSAEmergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSA
 
Emergency response plan
Emergency response planEmergency response plan
Emergency response plan
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
Effective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesEffective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation Slides
 
The principles of conflict management
The principles of conflict managementThe principles of conflict management
The principles of conflict management
 
A Realistic Look at the Active Shooter Situation
A Realistic Look at the Active Shooter SituationA Realistic Look at the Active Shooter Situation
A Realistic Look at the Active Shooter Situation
 
5 steps risk assessment
5 steps risk assessment5 steps risk assessment
5 steps risk assessment
 
Risk Management Process
Risk Management ProcessRisk Management Process
Risk Management Process
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Crisis management
Crisis managementCrisis management
Crisis management
 
Natural Hazards - Flood Response Planning
Natural Hazards -  Flood Response PlanningNatural Hazards -  Flood Response Planning
Natural Hazards - Flood Response Planning
 

Viewers also liked

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementMarkos Mulat G
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Credit Risk Management Presentation
Credit Risk Management PresentationCredit Risk Management Presentation
Credit Risk Management PresentationSumant Palwankar
 
Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...NetZealous LLC
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
What is Advanced Project Risk Management?
What is Advanced Project Risk Management?What is Advanced Project Risk Management?
What is Advanced Project Risk Management?Beyond Execution
 
Using Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project ManagementUsing Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project ManagementMike Tulkoff
 
Mba 1 me u 4 profit management & risk analysis
Mba 1 me u 4  profit management & risk analysisMba 1 me u 4  profit management & risk analysis
Mba 1 me u 4 profit management & risk analysisRai University
 
Risk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongRisk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongBCM Institute
 
Risk Analysis and Management
Risk Analysis and ManagementRisk Analysis and Management
Risk Analysis and ManagementGenie
 
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Pedram Danesh-Mand
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Marco Morana
 
Risk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster ManagementRisk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster ManagementClaudio Ferreira
 
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT petroEDGE
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementSaket Bansal
 

Viewers also liked (20)

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Credit Risk Management Presentation
Credit Risk Management PresentationCredit Risk Management Presentation
Credit Risk Management Presentation
 
Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
What is Advanced Project Risk Management?
What is Advanced Project Risk Management?What is Advanced Project Risk Management?
What is Advanced Project Risk Management?
 
Using Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project ManagementUsing Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project Management
 
Mba 1 me u 4 profit management & risk analysis
Mba 1 me u 4  profit management & risk analysisMba 1 me u 4  profit management & risk analysis
Mba 1 me u 4 profit management & risk analysis
 
Risk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongRisk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy Wong
 
Risk Analysis and Management
Risk Analysis and ManagementRisk Analysis and Management
Risk Analysis and Management
 
Risk management
Risk managementRisk management
Risk management
 
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
 
Pert master risk analysis tool
Pert master   risk analysis toolPert master   risk analysis tool
Pert master risk analysis tool
 
Risk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster ManagementRisk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster Management
 
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk Management
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Pmp risk management
Pmp risk managementPmp risk management
Pmp risk management
 

Similar to Risk Analysis & Risk Management

اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222nashaat algrara
 
Financial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptxFinancial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptxfatin877173
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxBhavnaGoyat2
 
Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxHilsonyusuf
 
Project management for engineering plan a
Project management for engineering plan aProject management for engineering plan a
Project management for engineering plan aRehanKhan63473
 
Managing Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxManaging Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxTope Osanyintuyi
 
5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessmentDrMohammedFarid
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxssuser107f14
 
SAD13 - Risk Analysis
SAD13 - Risk AnalysisSAD13 - Risk Analysis
SAD13 - Risk AnalysisMichael Heron
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptxwaleed50405
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.pptbillugamma06
 
Indg163five steps to risk assessment
Indg163five steps to risk assessmentIndg163five steps to risk assessment
Indg163five steps to risk assessmentwirethehouse
 
Five steps to risk assessment
Five steps to risk assessmentFive steps to risk assessment
Five steps to risk assessmentLodi Mulyadiski
 
Business continuity in general
Business continuity in generalBusiness continuity in general
Business continuity in generalJohn Johari
 

Similar to Risk Analysis & Risk Management (20)

اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
 
Business risk
Business riskBusiness risk
Business risk
 
Financial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptxFinancial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptx
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptx
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptx
 
Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptx
 
Project management for engineering plan a
Project management for engineering plan aProject management for engineering plan a
Project management for engineering plan a
 
Managing Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptxManaging Risk and Uncertainty in Business.pptx
Managing Risk and Uncertainty in Business.pptx
 
5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessment
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptx
 
SAD13 - Risk Analysis
SAD13 - Risk AnalysisSAD13 - Risk Analysis
SAD13 - Risk Analysis
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Indg163five steps to risk assessment
Indg163five steps to risk assessmentIndg163five steps to risk assessment
Indg163five steps to risk assessment
 
Five steps to risk assessment
Five steps to risk assessmentFive steps to risk assessment
Five steps to risk assessment
 
Project Management 08
Project Management 08Project Management 08
Project Management 08
 
Business continuity in general
Business continuity in generalBusiness continuity in general
Business continuity in general
 
Risk management
Risk managementRisk management
Risk management
 

More from Grafic.guru

More from Grafic.guru (20)

Drone presentation
Drone presentationDrone presentation
Drone presentation
 
All inclusive social
All inclusive socialAll inclusive social
All inclusive social
 
Startup series module10 - v02
Startup series   module10 - v02Startup series   module10 - v02
Startup series module10 - v02
 
Drone presentation (1)
Drone presentation (1)Drone presentation (1)
Drone presentation (1)
 
Sqeeqee
SqeeqeeSqeeqee
Sqeeqee
 
W gym
W gymW gym
W gym
 
Vorlage
VorlageVorlage
Vorlage
 
Virtual
VirtualVirtual
Virtual
 
Urban promise
Urban promiseUrban promise
Urban promise
 
Title
TitleTitle
Title
 
Tinyhr
TinyhrTinyhr
Tinyhr
 
The three chain links
The three chain linksThe three chain links
The three chain links
 
The advanced
The advancedThe advanced
The advanced
 
Students
StudentsStudents
Students
 
Sqeeqee
SqeeqeeSqeeqee
Sqeeqee
 
Sku
SkuSku
Sku
 
Security digital
Security digitalSecurity digital
Security digital
 
Santa monica community day
Santa monica community daySanta monica community day
Santa monica community day
 
Sacred Oak Medical center
Sacred Oak Medical centerSacred Oak Medical center
Sacred Oak Medical center
 
S3M business overview
S3M business overviewS3M business overview
S3M business overview
 

Recently uploaded

From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentCIToolkit
 
Exploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram AnalysisExploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram AnalysisCIToolkit
 
Management 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing TeamsManagement 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing Teamsshakkardaddy
 
Management 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational DesignManagement 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational Designshakkardaddy
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsHannah Smith
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project ManagementCIToolkit
 
Management 11th Edition - Chapter 9 - Strategic Management
Management 11th Edition - Chapter 9 - Strategic ManagementManagement 11th Edition - Chapter 9 - Strategic Management
Management 11th Edition - Chapter 9 - Strategic Managementshakkardaddy
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
The Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data SetsThe Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data SetsCIToolkit
 
Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...
Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...
Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...dsnow9802
 
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...Conny Dethloff
 
How Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human ResourcesHow Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human ResourcesMassimo Canducci
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...CIToolkit
 
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsMind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsCIToolkit
 
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBusiness of Software Conference
 
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...Nagarjuna Reddy Aturi
 
The Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data InsightsThe Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data InsightsCIToolkit
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingGiuseppe De Simone
 
Adapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-MakingAdapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-MakingCIToolkit
 

Recently uploaded (20)

From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
 
Exploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram AnalysisExploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram Analysis
 
Management 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing TeamsManagement 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing Teams
 
Management 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational DesignManagement 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational Design
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project Management
 
Management 11th Edition - Chapter 9 - Strategic Management
Management 11th Edition - Chapter 9 - Strategic ManagementManagement 11th Edition - Chapter 9 - Strategic Management
Management 11th Edition - Chapter 9 - Strategic Management
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
The Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data SetsThe Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data Sets
 
Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...
Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...
Hajra Karrim: Transformative Leadership Driving Innovation and Efficiency in ...
 
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
 
How Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human ResourcesHow Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human Resources
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
 
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsMind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
 
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
 
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
 
The Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data InsightsThe Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data Insights
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful Thinking
 
Adapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-MakingAdapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-Making
 

Risk Analysis & Risk Management

  • 1. Risk Analysis & Risk Management How to Properly Evaluate & Manage Business Risks
  • 2. LEARN HOW YOU CAN CONDUCT AN ACCURATE RISK ANALYSIS TO PROPERLY IDENTIFY AND MANAGE THE RISKS THAT YOUR ORGANIZATION MAY POSSIBLY FACE. Whatever role you have in your company or organization, you will very likely need to make certain decisions along the way that carry an element of risk. There are two aspects of risk: The probability that something will go wrong The adverse consequences in the event something goes wrong
  • 3. Risks are hard to foresee, let alone get prepared for and somehow manage. If you get hit with the consequences you never planned for, in time, money and reputation, quite a bit could be at stake. It helps you pinpoint and understand the kind of risks that could affect you in your role. It also helps you determine how to manage these potential risks, and hopefully minimize their impact on what you have planned for the future. This is what makes good Risk Analysis a vital tool when the type of work you do is risky.
  • 4. Risk Analysis is the process by which you identify and manage any potential problems that might undermine your key business projects and plans. To reasonably undertake a Risk Analysis, all possible things that could threaten your business must be identified, and an estimate must be made as to the likelihood that these situations would actually occur. Doing a proper Risk Analysis is not easy, it can be very complex since you’ll need to have detailed knowledge about security protocols, project plans, marketing forecasts, a lot of financial data and other things of relevance. Once carried out, it serves as an essential tool in planning and when used properly, something that will save you a lot of time, money and your good name and reputation. What Does Risk Analysis Encompass?
  • 5. When Risk Analysis Should be Used? Risk analysis is very useful in many different situations: When making the decision to either move forward or not with a particular project. When preparing for things like a natural disaster, technology or equipment failures, theft or the sickness and absence of key staff members. In the planning stages of projects, which helps you foresee and avoid or neutralize any potential problems. When preparing for things like a natural disaster, technology or equipment failures, theft or the sickness and absence of key staff members. During safety improvements involving potential workplace risks.
  • 6. How to Effectively Use Risk Analysis Steps for conducting a Risk Analysis:
  • 7. Identify Specific Threats1 The first thing that must be done in a proper Risk Analysis is to identify any existing and potential threats you might be facing.
  • 8. The sources of these threats can be any number of things: Any type of situation that could harm staff, technology or products, such as toxic chemicals, falling boxes, and/or poor lighting, etc. Technical Structural Reputational Political Project Advances or changes in technology and/ or technical failure Loss of employee or customer loyalty and/or confidence, damage to reputation. Changes in governmental policy, public opinion, tax laws, or foreign influence. Taking longer than planned on key tasks, going over budget, problems with the product or quality of service. Financial Human Natural Operational Procedural A failure in business, fluctuations in the stock price, changes in interest rates or non-availability of credit and/or other sources of funding. The illness, injury, death or loss by another cause of a key part of the team. A serious disease, severe weather event, or natural disaster. An interruption in operations, disruption of supplies, losing access to vital assets, and/or failures in distribution network. Embezzlement and or/fraud caused by failures in accountability, controls and/or internal systems
  • 9. A variety of approaches can be used to carry out a thorough and complete analysis: Review the list above to determine if any of these possible threats pertain to your business. Run through the various processes, systems and/or structures used in your business and evaluate the potential risks of any aspect of these. Do you see any vulnerability? Speak to others who may have a different perspective. If you lead the team, get input from team members, and consult with others who work in the organization, or with people who have managed similar projects.
  • 10. Use available tools like a Failure Mode & Effects Analysis, a SWOT Analysis that can help you in uncovering possible threats. A Scenario Analysis can help you explore potential future threats.
  • 11. Estimate Your Level of Risk 2 Once you’ve pinpointed and identified any threats you may be facing, you must evaluate both the chances of these threats actually happening and the possible impact they would have on your business. One way to do this is to make a best estimate in terms of probability of this particular event happening, and then multiply this probability by the amount of money it could cost you to make things right in the event it actually occurred. The result is a value attached to this particular risk: Probability of Event X Cost to Repair = Risk Value
  • 12. For example, perhaps you’ve identified a risk and it has to do with the possibility your rent may be substantially increased. Your thought is that there may be an 80% of this actually happening in the next year. You’ve determined this because you know your landlord has increased the rests for other businesses in the complex. If this does come about, it would cost an additional $500,000 over the course of the next year. The Risk Value of having a rent increase would be: Probability of Event of 0.80 X Cost of Event of $500.000 = Risk Value of $400,000
  • 13. A Risk Impact/Probability Chart can be used to assess your risk. This helps to identify exactly which risks you should be focusing on. Take your time and do not rush through this step. Collect as much information as possible so that you are accurately estimating the probability of a particular event actually happening as well as the costs associated with setting things right and repairing the damage .Past data can be used to guide you if you have no other way to accurately forecast things. low risk Minimum risk Moderate risk low risk low risk low risk High risk low risk low risk Minimum risk Minimum risk Minimum risk Minimum risk Moderate risk Moderate risk Moderate risk Moderate risk High risk High risk Extreme risk Extreme risk Extreme risk Negligibile Minor Moderate Significant Severe High risk High risk High risk
  • 14. How to Best Manage the Risk Once you've estimated the value of the potential risks you face, you can begin considering ways to manage these. It only makes sense to find approaches that are cost-effective. You do not want to spend more to eliminate a possible risk than it would cost you if the event actually occurred. It might make more sense to live with the risk than to go to great lengths, spending way too much to eliminate it. However, you do not want to compromise where personal safety or ethics are concerned. These risks do need to be addressed.
  • 15. Avoid the Potential Risk • In some instances, it makes more sense to avoid the potential risk. This may mean not being involved in a new business venture, turning a project down, and/or just skipping a risky activity. • These are viable and good options when there is no advantage in assuming the risk, or when the potential costs of dealing with the effects are simply too much. • However you need to understand that in avoiding a possible risk, there is a chance of missing out on a good opportunity. • You may want to do a What If Analysis, exploring your options while making the decision.
  • 16. Share Your Risk with Others Another option is to share the risk, as well as any potential gain, with others. These could be individuals, teams, another company or organization or even third parties. For example, you already share the risk when you buy insurance for your office building and inventory with an insurance company (a third party), or when you take on a partner in a joint initiative to develop a product.
  • 17. Decide to Accept the Risk You always reserve the option to accept this risk. This may be all you can do when you cannot mitigate or prevent the risk, when any possible loss turns out to be less than it would cost to insure against the risk, or when any possible gain is worth taking the risk. • For example, you might decide to accept the risk of launching a project late as long as the possible sales will cover the costs. • Prior to deciding to accept a risk, do an Impact Analysis to look at all the possible consequences of accepting the risk. • There may be nothing you can do about the risk, but it may be smart to decide on a contingency plan to deal with any consequences.
  • 18. Controlling a Particular Risk If you decide to accept a particular risk, there are several ways that you can diminish its impact. Conducting Business Experiments can be a good way to evaluate and reduce a risk. You would roll out whatever high-risk activity you are contemplating, but on a very small scale and in a manner that you can control. Experiments can be used to see where problems happen, discovering ways to detect and prevent risks prior to introducing this activity on a substantially larger scale. • Detecting risks involves pinpointing the stages in a process when something could take a wrong turn, and putting specific steps in place to promptly rectify the problems should they happen. Detecting includes double-checking all financial reports, doing safety testing before the release of a product, and/or installing some type of sensors to find defects in products. • Preventing risks means striving to prevent a particular high-risk circumstance from occurring. This involves conducting training on health and safety, protecting corporate servers with firewalls, and totally cross-training team members. • Plan Do Check Act can be utilized to control the impact a risky situation has on the company or organization. It is similar to conducting a Business Experiment since it has to do with testing the various ways you can diminish a risk. This particular tool provides four phases that guide you through a complete analysis of the whole situation, the creation of and testing of a certain possible solution, seeing how well it worked, and if successful, incorporating the solution.
  • 19. Main Points • Risk Analysis has been proven to be effective in identifying and assessing things that could potentially have an adverse effect on the success of a project or business. • It helps you examine the real or potential risks that you or your company or organization are faced with. It helps you determine whether to move forward on something or not. • You conduct a Risk Analysis to identify potential threats and estimate the possibility of them happening. • Once you’ve determined the value of your potential risks, you can begin to look at ways to effectively manage them. • You may decide to avoid the risk altogether, share it with others, or accept the risk and take steps to reduce the impact it could have. • It is critically important that you are thorough when conducting your Risk Analysis, and look at all the potential impacts they could have if the risks actually happened. • You must be mindful of the costs involved, all the ethical considerations and everyone’s personal safety.