SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
RISK
A risk is an uncertain event that has
the potential to either positively or
negatively impact the project
objectives.
there is always a level of uncertainty
associated with risks, it is
impossible to predict with complete
accuracy whether they will occur.
RISK MANAGEMENT.
It is a critical component of an
organizational culture that
values prudent risk-taking.
It is involved as a systematic
process of identifying,
assessing responding to risks,
and communicating the
outcomes of these processes to
relevant parties on time.
PROBABILITY
probability refers to the likelihood of
an event occurring. it can be very
low, low, medium, high, very high. it
is interesting to note that each
company has its own concept of
what the terms low, medium, and
high mean in this context. this
likelihood may be minimal for one
organization while it may be high for
another with identical objectives.
IMPACT
Risk impact refers to the potential
consequences or effects of a risk
event occurring. it is important
aspect of risk management as it
helps project managers to prioritize
risks and allocate resources
accordingly. One million is an
extremely high-risk number for
some organizations either positive
or negative, for large enterprises
one million is nothing. thus, the
organization management plan
defines what is high, medium, or low
i.e. impact of risk. in high medium or
low it means the impact of the risk
RISK-AVERSE
Risk-averse refers to a preference for
avoiding, minimizing, or transferring
over risk acceptance or exploitation.
An organization’s life and budget
influence how it will approach a
certain risk like government agencies,
it will become more risk averse as it
attempts to avoid risk.
RISK SEEKER
Risk seekers refer to a preference for
taking risks and pursuing
opportunities even if they involve
potential losses. Risk risk-seeking
approach involves prioritizing risk
acceptance or exploitation over risk
avoidance, minimization, or transfer.
When a company or individual is
young, they are more risk takers and
desire to take danger on hand.
RISK NEUTRAL
A risk-neutral approach involves
evaluating risks based on their
expected values and choosing the
highest expected value.
RISK APPETITE
Refers to the degree of uncertainty an
organization is willing to accept in
exchange for potential returns.
RISK THRESHOLD
Tolerance of Organization
Risk threshold or tolerance of
the organization refers to the
measure or upper bound of
acceptance. Variation around
an objective that reflects the
risk appetite of the
organization.
It is a key element of risk
strategy and is established and
monitored at enterprise,
portfolio, program, and project
levels.
RISK EXPOSURE
the overall risk of the company or the
risk that is willing to accept.
IDENTIFYING RISK
Identifying risks to generate a
comprehensive list of all
relevant risks that might have
an impact on the project. it is
important to distinguish
between the origin of the risk
and its objective and its effect.
TOOLS
1. Sponsor
2. Key stakeholders
3. Subject matter expert
4. Business Document
5. Business Management Plan
6. Project Charter
7. Assumptions & Constraints
8. OPA
9. EEF
10.Focus group.
Gathers qualitative data and
diverse perspectives from
participants who have relevant
experience in risk being
examined.
11.Facilitated workshop.
This technique uses focused
sessions to bring cross-
functional stakeholders
together to identify risks
associated with the project.
Documentations.
The process of identifying risk
is iterative. Risk can arise at
any time even after the project
has been completed.
Therefore, documents shall be
reviewed continuously.
PRIORITIZING RISK
Prioritizing risk is the process of
evaluating and ranking risks based
on their potential impact and
likelihood of occurrence.
The purpose of risk prioritizing is to
allocate resources and attention to
the most critical risks that could
have a significant negative impact
on objectives or outcomes.
By prioritizing risks, organizations
can focus their efforts on managing
and mitigating the most important
and urgent risks while potentially
accepting or monitoring lower
poverty risks.
Risk=Probability x Impact
Qualitative risk assessment
this method is used to evaluate and
prioritize risks based on their
characteristics rather than assigning
specific numeric values.
In this method, risks are typically
categorized into various levels or
scales such as L, M, and H, or using
a scale like 1-5.
It is particularly useful when there is
limited data or when risks cannot be
easily quantified.
Probability
Impact
1 2 3 4 5
1
2
3
4
5
1 2 3 4 5 Very Low
Low
Medium
High
Very High
2 4 6 8 10
3 6 9 12 15
4 8 12 16 20
5 10 15 20 25
QUANTITATIVE RISK
ANALYSIS
It is a systematic process
used to evaluate and quantify
risks associated with a
particular activity project or
system. It involves the
mathematical and statistical
techniques to assign
numerical values to values
risk factors such as likelihood
and impact.
Quantitative risk assessment
assigns the numerical value
to risk that allows better
comparison and prioritization
of risk.
It is an iterative process that
should be revisited through
our project.
TECHNIQUES
QUANTITATIVE ANALYSIS
1-Influence Diagram is a powerful
tool for quantitative risk analysis that
helps project managers identify and
manage risk effectively.
It provides a clear way of graphically
representing a relationship between
risk and cost and can be evaluated
using simulation techniques to
determine each element’s influence
on key outcomes.
A
B C
D
E
F
2-Sensitive Analysis (tornado diagram) It
rates the impact of risk on various
objectives of the project both positive
and negative effects and can be
attributed to it.
It helps to determine which risks have
the most potential impact on project
outcomes.
Tornado Diagram
3-Expected Monetary Value, it is a
concept used in risk management to
assess the potential financial impact
of an uncertain event or risk. It is a
way to quantify the potential losses or
gains associated with different risks.
It is used to calculate the contingency
reserves.
All reasonable alternatives are
identified, and their probability and
values are estimated.
𝐸𝑀𝑉 = 𝑃 × 𝐼 = 100 × 40% = 40
4-Decision Tree Analysis
It is a visual representation of
outcomes and their associated
probabilities used for decision-
making. It is a supervised algorithm
that uses a tree-like structure to
model decisions and the potential
consequences. It is extension of EMV.
Which
Contractor
Low
Bidder
High
Bidder
On
Time
3-Month
Late
1-Month
Late
On Time
-143
-110
-140
-200
-110
-170
-140 5-
Monte Carlo Analysis
It is a computational technique used
to simulate and analyze complex
systems or processes that involve
randomness or uncertainty.
It involves using random sampling
and probability distributions to model
uncertain variables and their potential
impact on desired outcomes.
By running multiple iterations of
simulations, it generates a range of
outcomes and their associated
probabilities.
TYPES OF RISK
Positive Risk or Opportunities
Positive risk refers to an
opportunity to improve your
project. Should be sized and built
upon.
Offen gives positive results.
To ensure positive risk must occur,
we attempt to make both
probability and impact 100 % by
following responses.
Escalate, involves identifying and
reporting risks to a higher level of
management for resolution when
an approach for opportunity is
outside of the project scope.
Exploit, this approach aims to
secure the benefits of a specific
opportunity by ensuring its
occurrence with 100 % probability.
Thereby maximizing the chances of
success.
chosen for important
opportunities.
Enhance, this strategy aims to raise
the likelihood and or significance of
an opportunity. Taking early action
to enhance the opportunity is
usually more effective than
attempting to improve its benefits
after it has arisen.
Sharing involves transferring
ownership of an opportunity to a
3rd party.
So, 3rd party shares some of the
benefits if the opportunity happens.
Accept. Accepting an opportunity
acknowledges its existence but no
proactive action
Negative Risk or Threat
It is a threat to project success and
results in a negative outcome or even
failure of the project. It should be
avoided, minimized, or eliminated.
Escalate Escalation is appropriate when
the threat is outside the project scope or
the proposed response exceeds the given
manager’s authority.
Avoid It involves eliminating our threat or
project activity from risk impact by
changing plan or approach.
It may be appropriate high priority threats
with a high probability of occurrence.
Mitigate Risk mitigation involves
implementing measures to decrease the
likelihood of a threat occurring and or
minimize its potential impacts.
Transfer Transfers refer to shifting of
liability to 3rd party through legislation or
insurance.
Accepting Negative Risk It entails waiting
for risk to happen.
We will take action if risk occurs.
There are two types of negative
acceptance.
Active Acceptance It happens when we
plan out activities around the risk.
Contingency Plan refers to a risk
response strategy developed in advance
before things go wrong. It is used when
identified risk becomes reality.
Fall Back Plan refers to alternative set of
actions and tasks available, if primary
plan needs to be abandoned.
Pensive acceptance occurs when identify
the risk and do not do nothing about it.
Management reserves are used when
this risk occurs.
Approval of
Risk Response Plan
Change control board and
sponsor review and approve the
risk register, risk response plan,
and risk mitigation strategy.
Upon approval, it becomes part
of the project management
plans, and a risk register is
established.
RISK REPORT
Weekly risk meetings are held
during which risk reports are
presented.
A risk report is a document that
utilizes information from the
risk register to provide a
forecast of potential risks for a
period of one or two weeks.
It is worth noting that every risk
has a trigger and each trigger is
monitored by the assigned risk
owner.
Other Risks
After implementing the risk
response strategy, there is a
possibility of other new risks
arising.
Residual Risk is the risk that
remains after implementing all
controls. it is the risk that
remains after all efforts have
been made to mitigate the
inherent risk.
Secondary Risk is a new risk
that emerges because of
actions taken to mitigate the
original risk
RISK AUDIT
A risk audit is the examination
and documentation of the
effectiveness of risk responses
in dealing with identified risk
and their root causes.
We continue to watch out for
potential risks throughout the
project. If a risk is identified
before it is materialized. it is
recorded in a risk transistor and
organized operations are
continued as planned.
However, if risk necessitates
modification to the project Plan,
a change request must be
submitted, and contingency
reserves may be used for the
potential Risk.
Issue
When risk is triggered without
being identified, it is called an
issue.
Always be negative.
Documented in the issue log
and response is called a
workaround.

Weitere ähnliche Inhalte

Ähnlich wie RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf

Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
Qrm presentation
Qrm presentationQrm presentation
Qrm presentationGeetha Svcp
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docxalinainglis
 
Risk Management
Risk ManagementRisk Management
Risk Managementrajuinstru
 
Managing Risk as Opportunity
Managing Risk as OpportunityManaging Risk as Opportunity
Managing Risk as OpportunityGlen Alleman
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Lecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxLecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxMehediHasan636262
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as OpportunityGlen Alleman
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk managementejlp12
 
Risk-Management-ppt.pptx
Risk-Management-ppt.pptxRisk-Management-ppt.pptx
Risk-Management-ppt.pptxYashuShukla2
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdfNmnKmr2
 
Beyond PMP: Risk Management
Beyond PMP: Risk ManagementBeyond PMP: Risk Management
Beyond PMP: Risk Managementabhinayverma
 
Project Management by Mostafa Ewees
Project Management  by Mostafa EweesProject Management  by Mostafa Ewees
Project Management by Mostafa EweesMostafa Ewees
 
How to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysisHow to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysisiZenBridge Consultancy Pvt. Ltd.
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation StrategiesErnst Dettbarn
 

Ähnlich wie RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf (20)

Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Qrm presentation
Qrm presentationQrm presentation
Qrm presentation
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Managing Risk as Opportunity
Managing Risk as OpportunityManaging Risk as Opportunity
Managing Risk as Opportunity
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Lecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxLecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptx
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as Opportunity
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk-Management-ppt.pptx
Risk-Management-ppt.pptxRisk-Management-ppt.pptx
Risk-Management-ppt.pptx
 
11 risk management
11 risk management11 risk management
11 risk management
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
 
Beyond PMP: Risk Management
Beyond PMP: Risk ManagementBeyond PMP: Risk Management
Beyond PMP: Risk Management
 
Project Management by Mostafa Ewees
Project Management  by Mostafa EweesProject Management  by Mostafa Ewees
Project Management by Mostafa Ewees
 
Reliability
ReliabilityReliability
Reliability
 
How to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysisHow to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysis
 
Dimensions in Risk Measurement
Dimensions in Risk MeasurementDimensions in Risk Measurement
Dimensions in Risk Measurement
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
 

Kürzlich hochgeladen

Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...Roi Lipman
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfmahaffeycheryld
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoninghotman30312
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxalijaker017
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdfKamal Acharya
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineJulioCesarSalazarHer1
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsKineticEngineeringCo
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoAbhimanyu Sangale
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Nitin Sonavane
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...ShivamTiwari995432
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Lovely Professional University
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdfKamal Acharya
 

Kürzlich hochgeladen (20)

Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and Applications
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdf
 

RISK TEMPLATE FORMATE GOOD-ALIU OLAB.pdf

  • 1. RISK A risk is an uncertain event that has the potential to either positively or negatively impact the project objectives. there is always a level of uncertainty associated with risks, it is impossible to predict with complete accuracy whether they will occur. RISK MANAGEMENT. It is a critical component of an organizational culture that values prudent risk-taking. It is involved as a systematic process of identifying, assessing responding to risks, and communicating the outcomes of these processes to relevant parties on time. PROBABILITY probability refers to the likelihood of an event occurring. it can be very low, low, medium, high, very high. it is interesting to note that each company has its own concept of what the terms low, medium, and high mean in this context. this likelihood may be minimal for one organization while it may be high for another with identical objectives. IMPACT Risk impact refers to the potential consequences or effects of a risk event occurring. it is important aspect of risk management as it helps project managers to prioritize risks and allocate resources accordingly. One million is an extremely high-risk number for some organizations either positive or negative, for large enterprises one million is nothing. thus, the organization management plan defines what is high, medium, or low i.e. impact of risk. in high medium or low it means the impact of the risk RISK-AVERSE Risk-averse refers to a preference for avoiding, minimizing, or transferring over risk acceptance or exploitation. An organization’s life and budget influence how it will approach a certain risk like government agencies, it will become more risk averse as it attempts to avoid risk. RISK SEEKER Risk seekers refer to a preference for taking risks and pursuing opportunities even if they involve potential losses. Risk risk-seeking approach involves prioritizing risk acceptance or exploitation over risk avoidance, minimization, or transfer. When a company or individual is young, they are more risk takers and desire to take danger on hand. RISK NEUTRAL A risk-neutral approach involves evaluating risks based on their expected values and choosing the highest expected value. RISK APPETITE Refers to the degree of uncertainty an organization is willing to accept in exchange for potential returns. RISK THRESHOLD Tolerance of Organization Risk threshold or tolerance of the organization refers to the measure or upper bound of acceptance. Variation around an objective that reflects the risk appetite of the organization. It is a key element of risk strategy and is established and monitored at enterprise, portfolio, program, and project levels. RISK EXPOSURE the overall risk of the company or the risk that is willing to accept. IDENTIFYING RISK Identifying risks to generate a comprehensive list of all relevant risks that might have an impact on the project. it is important to distinguish between the origin of the risk and its objective and its effect. TOOLS 1. Sponsor 2. Key stakeholders 3. Subject matter expert 4. Business Document 5. Business Management Plan 6. Project Charter 7. Assumptions & Constraints 8. OPA 9. EEF 10.Focus group. Gathers qualitative data and diverse perspectives from participants who have relevant experience in risk being examined. 11.Facilitated workshop. This technique uses focused sessions to bring cross- functional stakeholders together to identify risks associated with the project. Documentations. The process of identifying risk is iterative. Risk can arise at any time even after the project has been completed. Therefore, documents shall be reviewed continuously.
  • 2. PRIORITIZING RISK Prioritizing risk is the process of evaluating and ranking risks based on their potential impact and likelihood of occurrence. The purpose of risk prioritizing is to allocate resources and attention to the most critical risks that could have a significant negative impact on objectives or outcomes. By prioritizing risks, organizations can focus their efforts on managing and mitigating the most important and urgent risks while potentially accepting or monitoring lower poverty risks. Risk=Probability x Impact Qualitative risk assessment this method is used to evaluate and prioritize risks based on their characteristics rather than assigning specific numeric values. In this method, risks are typically categorized into various levels or scales such as L, M, and H, or using a scale like 1-5. It is particularly useful when there is limited data or when risks cannot be easily quantified. Probability Impact 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 Very Low Low Medium High Very High 2 4 6 8 10 3 6 9 12 15 4 8 12 16 20 5 10 15 20 25 QUANTITATIVE RISK ANALYSIS It is a systematic process used to evaluate and quantify risks associated with a particular activity project or system. It involves the mathematical and statistical techniques to assign numerical values to values risk factors such as likelihood and impact. Quantitative risk assessment assigns the numerical value to risk that allows better comparison and prioritization of risk. It is an iterative process that should be revisited through our project. TECHNIQUES QUANTITATIVE ANALYSIS 1-Influence Diagram is a powerful tool for quantitative risk analysis that helps project managers identify and manage risk effectively. It provides a clear way of graphically representing a relationship between risk and cost and can be evaluated using simulation techniques to determine each element’s influence on key outcomes. A B C D E F 2-Sensitive Analysis (tornado diagram) It rates the impact of risk on various objectives of the project both positive and negative effects and can be attributed to it. It helps to determine which risks have the most potential impact on project outcomes. Tornado Diagram 3-Expected Monetary Value, it is a concept used in risk management to assess the potential financial impact of an uncertain event or risk. It is a way to quantify the potential losses or gains associated with different risks. It is used to calculate the contingency reserves. All reasonable alternatives are identified, and their probability and values are estimated. 𝐸𝑀𝑉 = 𝑃 × 𝐼 = 100 × 40% = 40 4-Decision Tree Analysis It is a visual representation of outcomes and their associated probabilities used for decision- making. It is a supervised algorithm that uses a tree-like structure to model decisions and the potential consequences. It is extension of EMV. Which Contractor Low Bidder High Bidder On Time 3-Month Late 1-Month Late On Time -143 -110 -140 -200 -110 -170 -140 5- Monte Carlo Analysis It is a computational technique used to simulate and analyze complex systems or processes that involve randomness or uncertainty. It involves using random sampling and probability distributions to model uncertain variables and their potential impact on desired outcomes. By running multiple iterations of simulations, it generates a range of outcomes and their associated probabilities.
  • 3. TYPES OF RISK Positive Risk or Opportunities Positive risk refers to an opportunity to improve your project. Should be sized and built upon. Offen gives positive results. To ensure positive risk must occur, we attempt to make both probability and impact 100 % by following responses. Escalate, involves identifying and reporting risks to a higher level of management for resolution when an approach for opportunity is outside of the project scope. Exploit, this approach aims to secure the benefits of a specific opportunity by ensuring its occurrence with 100 % probability. Thereby maximizing the chances of success. chosen for important opportunities. Enhance, this strategy aims to raise the likelihood and or significance of an opportunity. Taking early action to enhance the opportunity is usually more effective than attempting to improve its benefits after it has arisen. Sharing involves transferring ownership of an opportunity to a 3rd party. So, 3rd party shares some of the benefits if the opportunity happens. Accept. Accepting an opportunity acknowledges its existence but no proactive action Negative Risk or Threat It is a threat to project success and results in a negative outcome or even failure of the project. It should be avoided, minimized, or eliminated. Escalate Escalation is appropriate when the threat is outside the project scope or the proposed response exceeds the given manager’s authority. Avoid It involves eliminating our threat or project activity from risk impact by changing plan or approach. It may be appropriate high priority threats with a high probability of occurrence. Mitigate Risk mitigation involves implementing measures to decrease the likelihood of a threat occurring and or minimize its potential impacts. Transfer Transfers refer to shifting of liability to 3rd party through legislation or insurance. Accepting Negative Risk It entails waiting for risk to happen. We will take action if risk occurs. There are two types of negative acceptance. Active Acceptance It happens when we plan out activities around the risk. Contingency Plan refers to a risk response strategy developed in advance before things go wrong. It is used when identified risk becomes reality. Fall Back Plan refers to alternative set of actions and tasks available, if primary plan needs to be abandoned. Pensive acceptance occurs when identify the risk and do not do nothing about it. Management reserves are used when this risk occurs. Approval of Risk Response Plan Change control board and sponsor review and approve the risk register, risk response plan, and risk mitigation strategy. Upon approval, it becomes part of the project management plans, and a risk register is established. RISK REPORT Weekly risk meetings are held during which risk reports are presented. A risk report is a document that utilizes information from the risk register to provide a forecast of potential risks for a period of one or two weeks. It is worth noting that every risk has a trigger and each trigger is monitored by the assigned risk owner. Other Risks After implementing the risk response strategy, there is a possibility of other new risks arising. Residual Risk is the risk that remains after implementing all controls. it is the risk that remains after all efforts have been made to mitigate the inherent risk. Secondary Risk is a new risk that emerges because of actions taken to mitigate the original risk RISK AUDIT A risk audit is the examination and documentation of the effectiveness of risk responses in dealing with identified risk and their root causes. We continue to watch out for potential risks throughout the project. If a risk is identified before it is materialized. it is recorded in a risk transistor and organized operations are continued as planned. However, if risk necessitates modification to the project Plan, a change request must be submitted, and contingency reserves may be used for the potential Risk. Issue When risk is triggered without being identified, it is called an issue. Always be negative. Documented in the issue log and response is called a workaround.