SlideShare a Scribd company logo
1 of 33
www.onesourceafrica.co.za
Eddie de Vries
Owner at One Source Africa
Eddie de Vries is a PECB ISO 31000 certified Risk Manager and
Trainer with 20 years’ experience in Quality Management and more
than 12 years’ experience in Enterprise Risk Management.
Contact Information
087 808 0922
eddie.devries@onesourceafrica.co.za www.onesourceafrica.co.za
za.linkedin.com/in/eddie-de-vries-644ba815
Risk Assessment – Techniques are critical for success
1. Most commonly utilised tools and why their success is limited.
2. Tools to be utilised for successful analysis
a. ISO 31010
i. Risk Identification Techniques
ii. Risk Assessment Techniques (Probability and Consequence)
iii. Level of Risk
ERM Process?
4
Risk Assessment
5
Risk assessment attempts to answer the following
fundamental questions:
• what can happen and why (by risk identification)?
• what are the consequences?
• what is the probability of their future occurrence?
• are there any factors that mitigate the consequence
of the risk or that reduce the probability of the risk?
• How do I monitor the risk?
Risk Assessment
6
In particular, those carrying out risk assessments
should be clear about
• the context and objectives of the organization,
• the extent and type of risks that are tolerable, and
how unacceptable risks are to be treated,
• how risk assessment integrates into organizational
processes,
• methods and techniques to be used for risk
assessment, and their contribution to the risk
management process,
• accountability, responsibility and authority for
performing risk assessment,
• resources available to carry out risk assessment,
• how the risk assessment will be reported and
reviewed.
Risk Assessment
7
Risk assessment is the overall process of risk
identification, risk analysis and risk evaluation.
Risks can be assessed at an organizational level, at a
departmental level, for projects, individual activities
or specific risks.
Risk assessment provides an understanding of risks,
their causes, consequences and their probabilities.
Risk Assessment
8
Risk assessment provides input to decisions about:
• whether an activity should be undertaken;
• how to maximize opportunities;
• whether risks need to be treated;
• choosing between options with different risks;
• prioritizing risk treatment options;
• the most appropriate selection of risk treatment
strategies that will bring adverse risks to a tolerable
level.
Risk Assessment
9
Risk identification is the process of finding,
recognizing and recording risks.
Risk analysis is about developing an
understanding of the risk.
Risk evaluation involves comparing
estimated levels of risk with risk criteria
defined when the context was established,
in order to determine the significance of
the level and type of risk.
Risk Identification
10
The risk identification process includes identifying
the causes and source of the risk (hazard in the
context of physical harm), events, situations or
circumstances which could have a material impact
upon objectives and the nature of that impact
Risk identification methods can include:
• evidence based methods, examples of which are
check-lists and reviews of historical data;
• systematic team approaches where a team of
experts follow a systematic process to identify
risks by means of a structured set of prompts or
questions;
• inductive reasoning techniques such as HAZOP.
Risk Identification Process
11
Objective
Causes of risk
Events
Situations
Circumstances
Risk Analysis
12
Qualitative assessment
Defines consequence, probability and level of risk by significance
levels such as “high”, “medium” and “low”, may combine
consequence and probability.
Semi-quantitative
Methods use numerical rating scales for consequence and
probability and combine them to produce a level of risk using a
formula. Formulae used can vary.
Quantitative analysis
Estimates practical values for consequences and their
probabilities, and produces values of the level of risk in specific
units defined when developing the context. Full quantitative
analysis may not always be possible or desirable.
Risk Analysis (Consequences)
13
Qualitative assessment
Defines consequence, probability and level of risk by significance
levels such as “high”, “medium” and “low”, may combine
consequence and probability.
Semi-quantitative
Methods use numerical rating scales for consequence and
probability and combine them to produce a level of risk using a
formula. Formulae used can vary.
Quantitative analysis
Estimates practical values for consequences and their
probabilities, and produces values of the level of risk in specific
units defined when developing the context. Full quantitative
analysis may not always be possible or desirable.
Risk Analysis (Probability)
14
Three general approaches are commonly employed to
estimate probability; they may be used individually or
jointly:
• The use of relevant historical data to identify events
or situations which have occurred in the past and
hence be able to extrapolate the probability of their
occurrence in the future.
• b) Probability forecasts using predictive techniques
such as fault tree analysis and event tree analysis.
When historical data are unavailable or inadequate.
• Expert opinion can be used in a systematic and
structured process to estimate probability.
Risk Analysis (Probability)
15
Three general approaches are commonly employed to
estimate probability; they may be used individually or
jointly:
• The use of relevant historical data to identify events
or situations which have occurred in the past and
hence be able to extrapolate the probability of their
occurrence in the future.
• b) Probability forecasts using predictive techniques
such as fault tree analysis and event tree analysis.
When historical data are unavailable or inadequate.
• Expert opinion can be used in a systematic and
structured process to estimate probability.
Risk Analysis (Probability)
16
Three general approaches are commonly employed to
estimate probability; they may be used individually or
jointly:
• The use of relevant historical data to identify events
or situations which have occurred in the past and
hence be able to extrapolate the probability of their
occurrence in the future.
• b) Probability forecasts using predictive techniques
such as fault tree analysis and event tree analysis.
When historical data are unavailable or inadequate.
• Expert opinion can be used in a systematic and
structured process to estimate probability.
Selection of risk assessment
technique
Risk Identification
Risk Analysis -
Consequence
Risk Analysis –
Probability
Risk Analysis –
Control
assessment
Risk Analysis –
Level of risk
Selection of risk
assessment technique
Risk Identification
Risk Analysis -
Consequence
Risk Analysis –
Probability
Risk Analysis –
Control
assessment
Risk Analysis –
Level of risk
Selection of risk
assessment techniques
There are different types of techniques and should
be applied depending on the stage and objective of
the assessment. These are:
• risk identification;
• risk analysis – consequence analysis;
• risk analysis – qualitative, semi-quantitative or
quantitative probability estimation;
• risk analysis – assessing the effectiveness of any
existing controls;
• risk analysis – estimation the level of risk;
• risk evaluation.
Risk Identification–Select the technique
 Brainstorming
 Structured or semi-structured interviews
 Delphi
 Check-lists
 Primary hazard analysis
 Hazard and operability studies (HAZOP)
 Hazard Analysis and Critical Control Points
(HACCP)
 Environmental risk assessment
 Structure « What if? » (SWIFT)
 Scenario analysis
 Failure mode effect analysis
 Cause-and-effect analysis
 Human reliability analysis
 Reliability centred maintenance
 Consequence/probability matrix
Risk Identification-Strengths
CONSEQUENCE/IMPACT
ANALISYS
22
Risk Consequence – Select
the technique
 Hazard and operability studies (HAZOP)
 Hazard Analysis and Critical Control Points
(HACCP)
 Environmental risk assessment
 Structure « What if? » (SWIFT)
 Scenario analysis
 Business impact analysis
 Root cause analysis
 Failure mode effect analysis
 Event tree analysis
Risk Consequence – Select
the technique
 Cause and consequence analysis
 Cause-and-effect analysis
 Layer protection analysis (LOPA)
 Decision tree
 Human reliability analysis
 Reliability centred maintenance
 Markov analysis
 Bayesian statistics and Bayes Nets
 FN curves
 Risk indices
 Consequence/probability matrix
 Cost/benefit analysis
 Multi-criteria decision analysis (MCDA)
Selection of risk
assessment technique
Risk Identification
Risk Analysis -
Consequence
Risk Analysis –
Probability
Risk Analysis –
Control
assessment
Risk Analysis –
Level of risk
Risk probability – Select
the technique
 Environmental risk assessment
 Structure « What if? » (SWIFT)
 Root cause analysis
 Failure mode effect analysis
 Fault tree analysis
 Cause and consequence analysis
 Decision tree
 Human reliability analysis
 Bow tie analysis
 Reliability centred maintenance
 FN curves
 Risk indices
 Consequence/probability matrix
Selection of risk
assessment technique
Risk Identification
Risk Analysis -
Consequence
Risk Analysis –
Probability
Risk Analysis –
Control
assessment
Risk Analysis – Level
of risk
Control - Adequacy
1 = Adequate
2 = Adequate but over controlled
3 = Partially Adequate
4 = Inadequate
Control 1
Control 2
Control 3
Control 4
Control - Effectiveness
Control 1
Control 2
Control 3
Control 4
1 = Effective
2 = Partially Effective
3 = Ineffective
1 = Effective
2 = Partially Effective
3 = Ineffective
1 = Effective
2 = Partially Effective
3 = Ineffective
1 = Effective
2 = Partially Effective
3 = Ineffective
Selection of risk
assessment technique
Risk Identification
Risk Analysis -
Consequence
Risk Analysis –
Probability
Risk Analysis –
Control
assessment
Risk Analysis – Level
of risk
Final Risk Analysis
ISO 31000 Training Courses
Exam and certification fees are included in the training price.
www.pecb.com/iso-31000-training-courses| | www.pecb.com/events
THANK YOU
?
087 808 0922
eddie.devries@onesourceafrica.co.za www.onesourceafrica.co.za
za.linkedin.com/in/eddie-de-vries-644ba815

More Related Content

What's hot

Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk AssessmentSteve Bishop
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment trainingBrian Larkin
 
Risk Management Process
Risk Management ProcessRisk Management Process
Risk Management Processno suhaila
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationUsama Saeed
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideSlideTeam
 
Qualitative risk analysis
Qualitative risk analysisQualitative risk analysis
Qualitative risk analysissonali talkar
 
5 steps risk assessment
5 steps risk assessment5 steps risk assessment
5 steps risk assessmentwirethehouse
 
Risk assessment
Risk assessmentRisk assessment
Risk assessmentdoogstone
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-trainingIshah Khaliq
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersVictoria Finch
 
operations risk management power point presentation.
operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.Miyelani Shibambo
 

What's hot (20)

Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 
risk assessment
 risk assessment risk assessment
risk assessment
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Risk management
Risk managementRisk management
Risk management
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment training
 
Risk Management Process
Risk Management ProcessRisk Management Process
Risk Management Process
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
Risk assessment tools and techniques
Risk assessment tools and techniquesRisk assessment tools and techniques
Risk assessment tools and techniques
 
Risk Management Training
Risk Management TrainingRisk Management Training
Risk Management Training
 
Qualitative risk analysis
Qualitative risk analysisQualitative risk analysis
Qualitative risk analysis
 
5 steps risk assessment
5 steps risk assessment5 steps risk assessment
5 steps risk assessment
 
Risk management
Risk managementRisk management
Risk management
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Risk assessment
Risk assessment Risk assessment
Risk assessment
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-training
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for Managers
 
operations risk management power point presentation.
operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.
 

Viewers also liked

How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMSPECB
 
Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301PECB
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety SystemPECB
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsPECB
 
The influence of Deming's 14 points to ISO 9001:2015
The influence of Deming's 14 points to ISO 9001:2015The influence of Deming's 14 points to ISO 9001:2015
The influence of Deming's 14 points to ISO 9001:2015PECB
 
Soluciones para la administración de Riesgos
Soluciones para la administración de RiesgosSoluciones para la administración de Riesgos
Soluciones para la administración de RiesgosPECB
 
6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk ManagementPECB
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Could iso 31000 Risk Management Guidelines have saved the Titanic
Could iso 31000 Risk Management Guidelines have saved the TitanicCould iso 31000 Risk Management Guidelines have saved the Titanic
Could iso 31000 Risk Management Guidelines have saved the TitanicDavid Patrishkoff
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsPECB
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?PECB
 
ISO 50001 – Why EnMS is important for organizations?
ISO 50001 – Why EnMS is important for organizations?ISO 50001 – Why EnMS is important for organizations?
ISO 50001 – Why EnMS is important for organizations?PECB
 
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...PECB
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellencePECB
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 ImplementationPECB
 

Viewers also liked (17)

How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMS
 
Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety System
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systems
 
The influence of Deming's 14 points to ISO 9001:2015
The influence of Deming's 14 points to ISO 9001:2015The influence of Deming's 14 points to ISO 9001:2015
The influence of Deming's 14 points to ISO 9001:2015
 
Soluciones para la administración de Riesgos
Soluciones para la administración de RiesgosSoluciones para la administración de Riesgos
Soluciones para la administración de Riesgos
 
6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Could iso 31000 Risk Management Guidelines have saved the Titanic
Could iso 31000 Risk Management Guidelines have saved the TitanicCould iso 31000 Risk Management Guidelines have saved the Titanic
Could iso 31000 Risk Management Guidelines have saved the Titanic
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and Rewards
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
 
ISO 50001 – Why EnMS is important for organizations?
ISO 50001 – Why EnMS is important for organizations?ISO 50001 – Why EnMS is important for organizations?
ISO 50001 – Why EnMS is important for organizations?
 
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
Integración entre la ISO 27001 y la certificación en continuidad de negocio I...
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety Excellence
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 

Similar to Risk assessment techniques a critical success factor

Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment KateKazhan
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)saimsoleja
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessMuizz Anibire
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 
QRM in drug analysis group Assignment.pptx
QRM in drug analysis group Assignment.pptxQRM in drug analysis group Assignment.pptx
QRM in drug analysis group Assignment.pptxMichaelMohammed10
 
Quality risk management
Quality risk managementQuality risk management
Quality risk managementKarunaMane1
 
Session 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk EvaluationSession 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk EvaluationMuizz Anibire
 
Quality risk management
Quality risk managementQuality risk management
Quality risk managementimran bakshi
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...samahhamed3
 
ICH Guideline Q9 - Quality Risk Management
ICH Guideline Q9 - Quality Risk ManagementICH Guideline Q9 - Quality Risk Management
ICH Guideline Q9 - Quality Risk Managementmuna_ali
 
Everything you need to know about Risk Management
Everything you need to know about Risk ManagementEverything you need to know about Risk Management
Everything you need to know about Risk ManagementITM Platform
 
Quality Management System.pptx
Quality Management System.pptxQuality Management System.pptx
Quality Management System.pptxDipansiTembharne
 
Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"
Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"
Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"Eng. A.karam Al Malkawi
 

Similar to Risk assessment techniques a critical success factor (20)

Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 
ICH Q9 Quality Risk Management
ICH Q9 Quality Risk ManagementICH Q9 Quality Risk Management
ICH Q9 Quality Risk Management
 
QRM in drug analysis group Assignment.pptx
QRM in drug analysis group Assignment.pptxQRM in drug analysis group Assignment.pptx
QRM in drug analysis group Assignment.pptx
 
ICH Q9.pptx
ICH Q9.pptxICH Q9.pptx
ICH Q9.pptx
 
Quality risk management
Quality risk managementQuality risk management
Quality risk management
 
Presentation on QRM_NS
Presentation on QRM_NSPresentation on QRM_NS
Presentation on QRM_NS
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk Management
 
ICH Q9 Guidelines
ICH Q9 GuidelinesICH Q9 Guidelines
ICH Q9 Guidelines
 
Session 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk EvaluationSession 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk Evaluation
 
Quality risk management
Quality risk managementQuality risk management
Quality risk management
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...
 
ICH Guideline Q9 - Quality Risk Management
ICH Guideline Q9 - Quality Risk ManagementICH Guideline Q9 - Quality Risk Management
ICH Guideline Q9 - Quality Risk Management
 
Everything you need to know about Risk Management
Everything you need to know about Risk ManagementEverything you need to know about Risk Management
Everything you need to know about Risk Management
 
Presentation on QRM
Presentation on QRMPresentation on QRM
Presentation on QRM
 
Quality Management System.pptx
Quality Management System.pptxQuality Management System.pptx
Quality Management System.pptx
 
Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"
Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"
Risk Based Thinking - RMSP "RISK MANAGEMENT SYSTEM PROCESS"
 

More from PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

More from PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Risk assessment techniques a critical success factor

  • 2. Eddie de Vries Owner at One Source Africa Eddie de Vries is a PECB ISO 31000 certified Risk Manager and Trainer with 20 years’ experience in Quality Management and more than 12 years’ experience in Enterprise Risk Management. Contact Information 087 808 0922 eddie.devries@onesourceafrica.co.za www.onesourceafrica.co.za za.linkedin.com/in/eddie-de-vries-644ba815
  • 3. Risk Assessment – Techniques are critical for success 1. Most commonly utilised tools and why their success is limited. 2. Tools to be utilised for successful analysis a. ISO 31010 i. Risk Identification Techniques ii. Risk Assessment Techniques (Probability and Consequence) iii. Level of Risk
  • 5. Risk Assessment 5 Risk assessment attempts to answer the following fundamental questions: • what can happen and why (by risk identification)? • what are the consequences? • what is the probability of their future occurrence? • are there any factors that mitigate the consequence of the risk or that reduce the probability of the risk? • How do I monitor the risk?
  • 6. Risk Assessment 6 In particular, those carrying out risk assessments should be clear about • the context and objectives of the organization, • the extent and type of risks that are tolerable, and how unacceptable risks are to be treated, • how risk assessment integrates into organizational processes, • methods and techniques to be used for risk assessment, and their contribution to the risk management process, • accountability, responsibility and authority for performing risk assessment, • resources available to carry out risk assessment, • how the risk assessment will be reported and reviewed.
  • 7. Risk Assessment 7 Risk assessment is the overall process of risk identification, risk analysis and risk evaluation. Risks can be assessed at an organizational level, at a departmental level, for projects, individual activities or specific risks. Risk assessment provides an understanding of risks, their causes, consequences and their probabilities.
  • 8. Risk Assessment 8 Risk assessment provides input to decisions about: • whether an activity should be undertaken; • how to maximize opportunities; • whether risks need to be treated; • choosing between options with different risks; • prioritizing risk treatment options; • the most appropriate selection of risk treatment strategies that will bring adverse risks to a tolerable level.
  • 9. Risk Assessment 9 Risk identification is the process of finding, recognizing and recording risks. Risk analysis is about developing an understanding of the risk. Risk evaluation involves comparing estimated levels of risk with risk criteria defined when the context was established, in order to determine the significance of the level and type of risk.
  • 10. Risk Identification 10 The risk identification process includes identifying the causes and source of the risk (hazard in the context of physical harm), events, situations or circumstances which could have a material impact upon objectives and the nature of that impact Risk identification methods can include: • evidence based methods, examples of which are check-lists and reviews of historical data; • systematic team approaches where a team of experts follow a systematic process to identify risks by means of a structured set of prompts or questions; • inductive reasoning techniques such as HAZOP.
  • 11. Risk Identification Process 11 Objective Causes of risk Events Situations Circumstances
  • 12. Risk Analysis 12 Qualitative assessment Defines consequence, probability and level of risk by significance levels such as “high”, “medium” and “low”, may combine consequence and probability. Semi-quantitative Methods use numerical rating scales for consequence and probability and combine them to produce a level of risk using a formula. Formulae used can vary. Quantitative analysis Estimates practical values for consequences and their probabilities, and produces values of the level of risk in specific units defined when developing the context. Full quantitative analysis may not always be possible or desirable.
  • 13. Risk Analysis (Consequences) 13 Qualitative assessment Defines consequence, probability and level of risk by significance levels such as “high”, “medium” and “low”, may combine consequence and probability. Semi-quantitative Methods use numerical rating scales for consequence and probability and combine them to produce a level of risk using a formula. Formulae used can vary. Quantitative analysis Estimates practical values for consequences and their probabilities, and produces values of the level of risk in specific units defined when developing the context. Full quantitative analysis may not always be possible or desirable.
  • 14. Risk Analysis (Probability) 14 Three general approaches are commonly employed to estimate probability; they may be used individually or jointly: • The use of relevant historical data to identify events or situations which have occurred in the past and hence be able to extrapolate the probability of their occurrence in the future. • b) Probability forecasts using predictive techniques such as fault tree analysis and event tree analysis. When historical data are unavailable or inadequate. • Expert opinion can be used in a systematic and structured process to estimate probability.
  • 15. Risk Analysis (Probability) 15 Three general approaches are commonly employed to estimate probability; they may be used individually or jointly: • The use of relevant historical data to identify events or situations which have occurred in the past and hence be able to extrapolate the probability of their occurrence in the future. • b) Probability forecasts using predictive techniques such as fault tree analysis and event tree analysis. When historical data are unavailable or inadequate. • Expert opinion can be used in a systematic and structured process to estimate probability.
  • 16. Risk Analysis (Probability) 16 Three general approaches are commonly employed to estimate probability; they may be used individually or jointly: • The use of relevant historical data to identify events or situations which have occurred in the past and hence be able to extrapolate the probability of their occurrence in the future. • b) Probability forecasts using predictive techniques such as fault tree analysis and event tree analysis. When historical data are unavailable or inadequate. • Expert opinion can be used in a systematic and structured process to estimate probability.
  • 17. Selection of risk assessment technique Risk Identification Risk Analysis - Consequence Risk Analysis – Probability Risk Analysis – Control assessment Risk Analysis – Level of risk
  • 18. Selection of risk assessment technique Risk Identification Risk Analysis - Consequence Risk Analysis – Probability Risk Analysis – Control assessment Risk Analysis – Level of risk
  • 19. Selection of risk assessment techniques There are different types of techniques and should be applied depending on the stage and objective of the assessment. These are: • risk identification; • risk analysis – consequence analysis; • risk analysis – qualitative, semi-quantitative or quantitative probability estimation; • risk analysis – assessing the effectiveness of any existing controls; • risk analysis – estimation the level of risk; • risk evaluation.
  • 20. Risk Identification–Select the technique  Brainstorming  Structured or semi-structured interviews  Delphi  Check-lists  Primary hazard analysis  Hazard and operability studies (HAZOP)  Hazard Analysis and Critical Control Points (HACCP)  Environmental risk assessment  Structure « What if? » (SWIFT)  Scenario analysis  Failure mode effect analysis  Cause-and-effect analysis  Human reliability analysis  Reliability centred maintenance  Consequence/probability matrix
  • 23. Risk Consequence – Select the technique  Hazard and operability studies (HAZOP)  Hazard Analysis and Critical Control Points (HACCP)  Environmental risk assessment  Structure « What if? » (SWIFT)  Scenario analysis  Business impact analysis  Root cause analysis  Failure mode effect analysis  Event tree analysis
  • 24. Risk Consequence – Select the technique  Cause and consequence analysis  Cause-and-effect analysis  Layer protection analysis (LOPA)  Decision tree  Human reliability analysis  Reliability centred maintenance  Markov analysis  Bayesian statistics and Bayes Nets  FN curves  Risk indices  Consequence/probability matrix  Cost/benefit analysis  Multi-criteria decision analysis (MCDA)
  • 25. Selection of risk assessment technique Risk Identification Risk Analysis - Consequence Risk Analysis – Probability Risk Analysis – Control assessment Risk Analysis – Level of risk
  • 26. Risk probability – Select the technique  Environmental risk assessment  Structure « What if? » (SWIFT)  Root cause analysis  Failure mode effect analysis  Fault tree analysis  Cause and consequence analysis  Decision tree  Human reliability analysis  Bow tie analysis  Reliability centred maintenance  FN curves  Risk indices  Consequence/probability matrix
  • 27. Selection of risk assessment technique Risk Identification Risk Analysis - Consequence Risk Analysis – Probability Risk Analysis – Control assessment Risk Analysis – Level of risk
  • 28. Control - Adequacy 1 = Adequate 2 = Adequate but over controlled 3 = Partially Adequate 4 = Inadequate Control 1 Control 2 Control 3 Control 4
  • 29. Control - Effectiveness Control 1 Control 2 Control 3 Control 4 1 = Effective 2 = Partially Effective 3 = Ineffective 1 = Effective 2 = Partially Effective 3 = Ineffective 1 = Effective 2 = Partially Effective 3 = Ineffective 1 = Effective 2 = Partially Effective 3 = Ineffective
  • 30. Selection of risk assessment technique Risk Identification Risk Analysis - Consequence Risk Analysis – Probability Risk Analysis – Control assessment Risk Analysis – Level of risk
  • 32. ISO 31000 Training Courses Exam and certification fees are included in the training price. www.pecb.com/iso-31000-training-courses| | www.pecb.com/events
  • 33. THANK YOU ? 087 808 0922 eddie.devries@onesourceafrica.co.za www.onesourceafrica.co.za za.linkedin.com/in/eddie-de-vries-644ba815