SlideShare a Scribd company logo
1 of 30
Project Risk Management
Project Risk Management
Knowledge
Area
Process
Initiating Planning Executing Monitoring & Contol Closing
Risk
Plan Risk Management
Identify Risk
Perform Qualitative Risk Analysis
Perform Quantitative Risk Analysis
Plan Risk Response
Monitor and Control Risks
Enter phase/
Start project
Exit phase/
End project
Initiating
Processes
Closing
Processes
Planning
Processes
Executing
Processes
Monitoring &
Controlling Processes
Perform Quantitative Risk Analysis
• The process of numerically analyzing the effect of identified
risks on overall project objectives.
Inputs
1. Risk register
2. Risk management plan
3. Cost management plan
4. Project scope statement
5. Organizational process
assets
Tools &
Techniques
1. Data gathering and
representation
techniques
2. Quantitative risk
analysis and modeling
techniques
3. Expert judgment
Outputs
1. Risk register updates
If not necessary, this process may
be skipped.
Quantitative Risk Analysis
• Is a numerical evaluation (more objective)
• This process may be skipped.
• Purpose of this process
– Determine which risk events warrant a response.
– Determine overall project risk (risk exposure).
– Determine the quantified probability of meeting project
objectives.
– Determine cost and schedule reserves.
– Identify risks requiring the most attention.
– Create realistic and achievable cost, schedule, or scope
targets.
• Data Gathering and Representation Techniques
• • Interviewing. quantify the probability and
impact of risks on project objectives. For
instance, information would be gathered on the
optimistic (low), pessimistic (high), and most
likely scenarios for some commonly used
distributions.
Probability distributions.
Continuous probability distributions, used in modeling
and simulation represent the uncertainty in values such as
durations of schedule activities and costs of project
components.
Quantitative Risk Analysis and Modeling Techniques
Commonly used techniques include both event-oriented and project-oriented
analysis
Sensitivity Analysis
• To determine which risks have the most potential impact to the project
• Changing one or more elements/variables and set other elements to
its baseline then see the impact.
• One typical display of sensitivity analysis is the tornado diagram
Decision Tree and EMV
• EMV used with Decision Tree to choose between
many alternative which take into account the future
events
• Example:
(Impact)ty)(ProbabiliEVM
Expected monetary value
P=0.2
P=0.8
P=0.2
P=0.1
P=0.7
outcome
300.000$
- 40.000$
- 50.000$
- 20.000$
60.000$
EMV
300.000x0.2 =60.000
-40.000x0.8 =-32.000
-50.000x0.2 =-10.000
-20.000x0.1=-2.000
60.000x0.7 =42.000
=28.000$
=30.000$
• Modeling and simulation.(Monte Carlo technique)
• A project simulation uses a model that
translates the specified detailed uncertainties
of the project into their potential impact on
project objectives.
• Iterative simulations are typically performed
using the Monte Carlo technique.
Risk Register Updates
• Update/add additional information to previous output i.e. Risk
Register, which include:
– Prioritize list of quantified risks
– Amount of contingency time and cost reserve needed
– Possible realistic and achievable completion dates,
project cost, with confidence level
– The quantified probability of meeting project objectives
– Trends
Plan Risk Response
• The process of developing option and action to enhance
opportunities and to reduce threats to project objectives.
Inputs
1. Risk register
2. Risk management plan
3. Cost management plan
4. Project scope statement
5. Organizational process
assets
Tools &
Techniques
1. Strategies for negative
risks or threats
2. Strategies for positive
risks or opportunities
3. Contingent response
strategies
4. Expert judgment
Outputs
1. Risk register updates
2. Risk-related contract
decisions
3. Project management
plan updates
4. Project document
updates
Plan Risk Responses
• Do something to eliminate threats before they happens
• Do something to make sure the opportunities happens
• Decrease the probability and/or impact of threats
• Increase the probability and/or impact of opportunities
• For the remaining (residual) threats that cannot be
eliminated:
– Do something if the risk happens (contingency plan).
– Do something if contingency plan not effective (fallback plan)
– The risks result in applying risk response strategy is called
(secondary risk)
– The risk trigger is events that trigger the contingency response
– Workaround is unplanned risks
Strategies for Threats
1- Avoid
– Eliminate the threat entirely
– Example: remove dangerous test or
person or material from project
Strategies for Threats
• 2-Transfer (Deflect, Allocate)
– Shift some or all the negative impact
of a threat to a third party
Example : insurance or outsource the
work
Strategies for Threats
• 3-Mitigate
– Implies a reduction in the probability
and/or impact of an adverse risk
event to be within acceptable
threshold limits
• Example : provide training for team
members, Wear a helmet head
Strategies for Threats
• 4- Accept
– Deal with the risks
– Project management plan is
not changed
• Example : Increasing material
prices (contingency)
Strategies for Opportunities
• Exploit
– Seek to ensure the
opportunities definitely happen
– Example: allocate experience
manpower in critical path to
complete project early
Strategies for Opportunities
• Share
– Allocate some or all of the
ownership of the opportunity to
a third party who is best able to
capture the opportunity for the
project benefit.
– Example: buy machine
Strategies for Opportunities
• Enhance
– Increase the probability and/or
the positive impacts of an
opportunity.
– Example: negotiation for the
equipment earlier to secure
lower price
Strategies for Opportunities
• Accept
– Not actively pursuing an
opportunity
– Example: decrease material
price
Monitor & Control Risk
• The process of ..
– implementing risk response plans,
– tracking identified risks,
– monitoring residual risks,
– identifying new risks, and
– evaluating risk process effectiveness throughout the project.
Inputs
1. Risk register
2. Project management
plan
3. Work performance
information
4. Performance report
Tools &
Techniques
1. Risk reassessment
2. Risk audits
3. Variance and trend
analysis
4. Technical performance
measurement
5. Reserve analysis
6. Status meetings
Outputs
1. Risk register updates
2. Organizational process
assets updates
3. Change requests
4. Project management
plan updates
5. Project document
updates
• Risk Reassessment
• Monitor and Control Risks often results in
identification of new risks, reassessment of
current risks , and the closing of risks that are
outdated.
• Project risk reassessments should be regularly
scheduled.
.
• Risk Audits
• Risk audits examine and document the
effectiveness of risk responses in dealing with
identified risks and their root causes, as well
as the effectiveness of the risk management
process
QUESTIONS?
1- Heba is a Project Manager for software migration at a
bank. A major risk that has been identified is attrition
of resources. As a strategy to respond to this risk,
Heba, with support from Senior Management, provides
good increments to his team members. What type of
risk response is heba following?
A-Accept
B-Avoid
C-Transfer
D-Mitigate
2-Which of these is not a valid response to
positive risks?
A-Exploit
B-Mitigate
C-Enhance
D-Share
3-After conducting a SWOT Analysis, you have
determined that a business deal is worth pursuing. You
are required to use Agile development practices. In
your company, there is no expertise in Agile
development. Hence, you partner with another
organization that specializes in Agile development. This
is an example of:
a) Sharing a Positive Risk
b) Mitigating a Negative Risk
c) Exploiting a Positive Risk
d) Accepting a Negative risk
4-During which stage of Risk planning are modeling
techniques used to determine overall effects of
risks on project objectives for high probability,
high impact risks?
A-Risk identification
B-Risk response planning
C-Qualitative risk analysis
D-Quantitative risk analysis
• 5-if the team cannot identify a suitable
response to an identified risk . Which risk
response would they apply?
A- avoidance
B-acceptance
3- mitigation
4-transference
Thank you

More Related Content

What's hot

Project risk management
Project risk managementProject risk management
Project risk managementDewang Agrawal
 
Risk management plan
Risk management planRisk management plan
Risk management planKashif Mastan
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk ManagementGunjan Patel
 
12. Project Risk Management
12. Project Risk Management12. Project Risk Management
12. Project Risk ManagementBhuWan Khadka
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementSaket Bansal
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshopBestoutcome
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-managementzeeshanwrch
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisAlin Veronika
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementTorsten Koerting
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register simplesteps
 
Risk management
Risk managementRisk management
Risk managementMECandPMV
 
Decision and risk analysis
Decision and risk analysisDecision and risk analysis
Decision and risk analysisIndra Biswakarma
 
Framework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projectsFramework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projectsAdili Zella
 
PMP - Risk Management plan & template
PMP - Risk Management plan & templatePMP - Risk Management plan & template
PMP - Risk Management plan & templateAllie Gentry
 
Chapter 7 managing risk
Chapter 7   managing riskChapter 7   managing risk
Chapter 7 managing riskHammad Hashmi
 
Quantitative Project Risk Analysis
Quantitative Project Risk AnalysisQuantitative Project Risk Analysis
Quantitative Project Risk AnalysisIntaver Insititute
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk managementPMC Mentor
 

What's hot (20)

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk management plan
Risk management planRisk management plan
Risk management plan
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
12. Project Risk Management
12. Project Risk Management12. Project Risk Management
12. Project Risk Management
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk Management
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshop
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative Analysis
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register
 
Risk management
Risk managementRisk management
Risk management
 
Decision and risk analysis
Decision and risk analysisDecision and risk analysis
Decision and risk analysis
 
Framework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projectsFramework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projects
 
PMP - Risk Management plan & template
PMP - Risk Management plan & templatePMP - Risk Management plan & template
PMP - Risk Management plan & template
 
Chapter 7 managing risk
Chapter 7   managing riskChapter 7   managing risk
Chapter 7 managing risk
 
Quantitative Project Risk Analysis
Quantitative Project Risk AnalysisQuantitative Project Risk Analysis
Quantitative Project Risk Analysis
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk management
 

Similar to Session 18 -2 PMP 4th edition

PROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfPROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfMUST
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptxSaranSaravanan22
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Templates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docx
Templates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docxTemplates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docx
Templates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docxmattinsonjanel
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxRanjitKdk
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 
Project risk management
Project risk managementProject risk management
Project risk managementBarnatuCoffee
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best PracticesPMILebanonChapter
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.pptKareemRasmy1
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk ManagementProjectCon
 
Risk management overview
Risk management overviewRisk management overview
Risk management overviewHossam Maghrabi
 
Project Management C7 -risk_management
Project Management C7  -risk_managementProject Management C7  -risk_management
Project Management C7 -risk_managementIzah Asmadi
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementMarkos Mulat G
 

Similar to Session 18 -2 PMP 4th edition (20)

PROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfPROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdf
 
Risk management
Risk managementRisk management
Risk management
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptx
 
Session 18 4th edition PMP
Session 18 4th edition PMPSession 18 4th edition PMP
Session 18 4th edition PMP
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Templates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docx
Templates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docxTemplates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docx
Templates and ExamplesTEMPLATE RISK MANAGEMENT PLAN FOR .docx
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk management
Risk management Risk management
Risk management
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best Practices
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.ppt
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk Management
 
Risk management overview
Risk management overviewRisk management overview
Risk management overview
 
Project Management C7 -risk_management
Project Management C7  -risk_managementProject Management C7  -risk_management
Project Management C7 -risk_management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 

More from محمد عصمت عبد الرازق (16)

Session 21 4th edition PMP
Session 21 4th edition PMPSession 21 4th edition PMP
Session 21 4th edition PMP
 
Session 20 4th edition PMP
Session 20 4th edition PMPSession 20 4th edition PMP
Session 20 4th edition PMP
 
Session 19 4th edition PMP
Session  19 4th edition PMPSession  19 4th edition PMP
Session 19 4th edition PMP
 
Session 15 4th edition PMP
Session 15 4th edition PMPSession 15 4th edition PMP
Session 15 4th edition PMP
 
Session 14 4th edition PMP
Session  14 4th edition PMPSession  14 4th edition PMP
Session 14 4th edition PMP
 
Session 13 4th edition PMP
Session 13 4th edition PMPSession 13 4th edition PMP
Session 13 4th edition PMP
 
Session 12 4th edition PMP
Session  12 4th edition PMPSession  12 4th edition PMP
Session 12 4th edition PMP
 
Session 10 4th edition PMP
Session   10 4th edition PMPSession   10 4th edition PMP
Session 10 4th edition PMP
 
Session 9 4th edition PMP
Session 9 4th edition PMPSession 9 4th edition PMP
Session 9 4th edition PMP
 
Session 8 4th edition PMP
Session 8 4th edition PMPSession 8 4th edition PMP
Session 8 4th edition PMP
 
Session 7 4th edition PMP
Session 7 4th edition PMPSession 7 4th edition PMP
Session 7 4th edition PMP
 
Session 5 4th edition PMP
Session 5 4th edition PMPSession 5 4th edition PMP
Session 5 4th edition PMP
 
Session 4 4th edition PMP
Session   4 4th edition PMPSession   4 4th edition PMP
Session 4 4th edition PMP
 
Session 3 4th edition
Session   3 4th editionSession   3 4th edition
Session 3 4th edition
 
Session 2 PMP 4TH edition
Session 2 PMP 4TH editionSession 2 PMP 4TH edition
Session 2 PMP 4TH edition
 
Session 1 PMP 4th edition
Session 1 PMP 4th editionSession 1 PMP 4th edition
Session 1 PMP 4th edition
 

Recently uploaded

Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Hedda Bird
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxSaqib Mansoor Ahmed
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 

Session 18 -2 PMP 4th edition

  • 2. Project Risk Management Knowledge Area Process Initiating Planning Executing Monitoring & Contol Closing Risk Plan Risk Management Identify Risk Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Plan Risk Response Monitor and Control Risks Enter phase/ Start project Exit phase/ End project Initiating Processes Closing Processes Planning Processes Executing Processes Monitoring & Controlling Processes
  • 3. Perform Quantitative Risk Analysis • The process of numerically analyzing the effect of identified risks on overall project objectives. Inputs 1. Risk register 2. Risk management plan 3. Cost management plan 4. Project scope statement 5. Organizational process assets Tools & Techniques 1. Data gathering and representation techniques 2. Quantitative risk analysis and modeling techniques 3. Expert judgment Outputs 1. Risk register updates If not necessary, this process may be skipped.
  • 4. Quantitative Risk Analysis • Is a numerical evaluation (more objective) • This process may be skipped. • Purpose of this process – Determine which risk events warrant a response. – Determine overall project risk (risk exposure). – Determine the quantified probability of meeting project objectives. – Determine cost and schedule reserves. – Identify risks requiring the most attention. – Create realistic and achievable cost, schedule, or scope targets.
  • 5. • Data Gathering and Representation Techniques • • Interviewing. quantify the probability and impact of risks on project objectives. For instance, information would be gathered on the optimistic (low), pessimistic (high), and most likely scenarios for some commonly used distributions.
  • 6. Probability distributions. Continuous probability distributions, used in modeling and simulation represent the uncertainty in values such as durations of schedule activities and costs of project components.
  • 7. Quantitative Risk Analysis and Modeling Techniques Commonly used techniques include both event-oriented and project-oriented analysis Sensitivity Analysis • To determine which risks have the most potential impact to the project • Changing one or more elements/variables and set other elements to its baseline then see the impact. • One typical display of sensitivity analysis is the tornado diagram
  • 8. Decision Tree and EMV • EMV used with Decision Tree to choose between many alternative which take into account the future events • Example: (Impact)ty)(ProbabiliEVM Expected monetary value P=0.2 P=0.8 P=0.2 P=0.1 P=0.7 outcome 300.000$ - 40.000$ - 50.000$ - 20.000$ 60.000$ EMV 300.000x0.2 =60.000 -40.000x0.8 =-32.000 -50.000x0.2 =-10.000 -20.000x0.1=-2.000 60.000x0.7 =42.000 =28.000$ =30.000$
  • 9. • Modeling and simulation.(Monte Carlo technique) • A project simulation uses a model that translates the specified detailed uncertainties of the project into their potential impact on project objectives. • Iterative simulations are typically performed using the Monte Carlo technique.
  • 10. Risk Register Updates • Update/add additional information to previous output i.e. Risk Register, which include: – Prioritize list of quantified risks – Amount of contingency time and cost reserve needed – Possible realistic and achievable completion dates, project cost, with confidence level – The quantified probability of meeting project objectives – Trends
  • 11. Plan Risk Response • The process of developing option and action to enhance opportunities and to reduce threats to project objectives. Inputs 1. Risk register 2. Risk management plan 3. Cost management plan 4. Project scope statement 5. Organizational process assets Tools & Techniques 1. Strategies for negative risks or threats 2. Strategies for positive risks or opportunities 3. Contingent response strategies 4. Expert judgment Outputs 1. Risk register updates 2. Risk-related contract decisions 3. Project management plan updates 4. Project document updates
  • 12. Plan Risk Responses • Do something to eliminate threats before they happens • Do something to make sure the opportunities happens • Decrease the probability and/or impact of threats • Increase the probability and/or impact of opportunities • For the remaining (residual) threats that cannot be eliminated: – Do something if the risk happens (contingency plan). – Do something if contingency plan not effective (fallback plan) – The risks result in applying risk response strategy is called (secondary risk) – The risk trigger is events that trigger the contingency response – Workaround is unplanned risks
  • 13. Strategies for Threats 1- Avoid – Eliminate the threat entirely – Example: remove dangerous test or person or material from project
  • 14. Strategies for Threats • 2-Transfer (Deflect, Allocate) – Shift some or all the negative impact of a threat to a third party Example : insurance or outsource the work
  • 15. Strategies for Threats • 3-Mitigate – Implies a reduction in the probability and/or impact of an adverse risk event to be within acceptable threshold limits • Example : provide training for team members, Wear a helmet head
  • 16. Strategies for Threats • 4- Accept – Deal with the risks – Project management plan is not changed • Example : Increasing material prices (contingency)
  • 17. Strategies for Opportunities • Exploit – Seek to ensure the opportunities definitely happen – Example: allocate experience manpower in critical path to complete project early
  • 18. Strategies for Opportunities • Share – Allocate some or all of the ownership of the opportunity to a third party who is best able to capture the opportunity for the project benefit. – Example: buy machine
  • 19. Strategies for Opportunities • Enhance – Increase the probability and/or the positive impacts of an opportunity. – Example: negotiation for the equipment earlier to secure lower price
  • 20. Strategies for Opportunities • Accept – Not actively pursuing an opportunity – Example: decrease material price
  • 21. Monitor & Control Risk • The process of .. – implementing risk response plans, – tracking identified risks, – monitoring residual risks, – identifying new risks, and – evaluating risk process effectiveness throughout the project. Inputs 1. Risk register 2. Project management plan 3. Work performance information 4. Performance report Tools & Techniques 1. Risk reassessment 2. Risk audits 3. Variance and trend analysis 4. Technical performance measurement 5. Reserve analysis 6. Status meetings Outputs 1. Risk register updates 2. Organizational process assets updates 3. Change requests 4. Project management plan updates 5. Project document updates
  • 22. • Risk Reassessment • Monitor and Control Risks often results in identification of new risks, reassessment of current risks , and the closing of risks that are outdated. • Project risk reassessments should be regularly scheduled. .
  • 23. • Risk Audits • Risk audits examine and document the effectiveness of risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process
  • 25. 1- Heba is a Project Manager for software migration at a bank. A major risk that has been identified is attrition of resources. As a strategy to respond to this risk, Heba, with support from Senior Management, provides good increments to his team members. What type of risk response is heba following? A-Accept B-Avoid C-Transfer D-Mitigate
  • 26. 2-Which of these is not a valid response to positive risks? A-Exploit B-Mitigate C-Enhance D-Share
  • 27. 3-After conducting a SWOT Analysis, you have determined that a business deal is worth pursuing. You are required to use Agile development practices. In your company, there is no expertise in Agile development. Hence, you partner with another organization that specializes in Agile development. This is an example of: a) Sharing a Positive Risk b) Mitigating a Negative Risk c) Exploiting a Positive Risk d) Accepting a Negative risk
  • 28. 4-During which stage of Risk planning are modeling techniques used to determine overall effects of risks on project objectives for high probability, high impact risks? A-Risk identification B-Risk response planning C-Qualitative risk analysis D-Quantitative risk analysis
  • 29. • 5-if the team cannot identify a suitable response to an identified risk . Which risk response would they apply? A- avoidance B-acceptance 3- mitigation 4-transference