SlideShare a Scribd company logo
1 of 25
RISK ASSESSMENT
PRESENTED BY
USAMA SAEED
ARSLAN ZAFAR
WHAT IS A RISK ASSESSMENT?
It is a way of determining risks and dangers in work
places.
In risk assessment we think about what might cause harm/risk to a project
or workplace and decide whether you are taking reasonable steps to
prevent that harm.
If the harm/risk cannot be avoided in a safe way, then the risk
assessment will say that the activity shouldn’t be carried
out.
CONTINUED…
Risk assessment involve 2 things…
Identifying and analyzing potential (future) events that may have a
negative impact on project.
 For example Risk Analysis.
Making judgments "on the tolerability of the risk on the basis of a risk
analysis" while considering influencing factors.
 For example Risk Evaluation.
CONTINUED…
In simple words, risk assessment analyzes what can go wrong…
How likely it is to happen…
What the potential consequences are…
How tolerable the identified risk is.
Based on this Risk Assessment, the impact of risk can be expressed as
quantitative or qualitative.
HOW TO DO RISK ASSESSMENT
There are no fixed rules for this.
But a few general principles.
Five(5) steps are followed to ensure risk assessment is done correctly.
STEPS IN RISK ASSESSMENT
Identify
Hazards
Risk Analysis
Risk
Evaluation
Risk Control
Review
STEP 1 IDENTIFY HAZARDS
The process of finding, listing, and characterizing hazards.
Difference between Hazard and Risk.
A Hazard is ‘something with the potential to cause harm’.
Risk is the chance, high or low, that somebody or something could be
harmed by these and other hazards.
It can be identified by using many methods, for example asking employees,
monitoring carefully.
STEP 2 RISK ANALYSIS
A process for understanding the nature of hazards and determining the
level of risk.
It tells who or what might be harmed and how.
It provides basis for risk evaluation and decisions about risk control.
Includes data, analysis, opinions, interests of stakeholders.
STEP 3 EVALUATION
After identifying hazard and analyzing risk we evaluate them.
The hazards can either be removed completely…
Or the risks can be controlled so that the its effect is unlikely.
If there is no way to eliminate a risk use precaution.
 For example, try and carry out a less risky activity.
It is done usually using Risk Assessment Matrix.
STEP 4 RISK CONTROL
Implementing actions after risk evaluation decisions.
1. Elimination – get rid of the risk altogether.
2. Substitution – exchange one risk for something less likely or severe.
3. Physical Controls - eliminate contact with the hazard.
Risk control can involve monitoring and re-evaluation.
STEP 5 MONITOR AND REVIEW
You must ensure that the control measures are achieving the desired level
of control.
You must review the assessment on a regular basis or if anything changes.
 For example, new staff, change in machinery or process.
Use Project Risk Register to monitor, review and track risks.
Review your assessment and update if possible.
WHEN TO DO?
Before new processes or activities are introduced.
Before changes are introduced to existing processes or activities
When hazards are identified.
WHO SHOULD DO?
Risk assessments should always be carried out by a person who is
experienced and competent.
Competence can be expressed as a combination of Knowledge, Awareness,
training, and experience.
Competence does not mean knowing everything.
Competence means knowing when to call for help or assistance.
RISK ASSESSMENT
MATRIX
WHAT IS IT?
A risk assessment matrix is a is a project management tool used during
risk assessment.
Its main function is to prioritize risks.
Based on likelihood or probability(on Y-axis) and impact(on X-axis) of a
risk.
Also known as risk matrix.
CONTINUED…
It falls under the qualitative and quantitative risk analyses process.
Typically looks like a chart and contains the following columns…
 Probability
 Impact
 Ratings
 Rankings
Rating is calculated as…
 Probability of risk * Impact of risk
PROBABILITY
The probability rating means the likelihood (chance) of risk to occur.
It is recorded in percentage.
LIKELIHOOD
The likelihood of a risk is broken down into parts as…
Very Likely A risk that is almost certain to show-up during project
execution. More then 80% chances.
Likely Risks that have 60-80% chances of occurrence can be
grouped as likely.
Possible Risks which have a near 50/50 probability of occurrence.
Unlikely Risks that have a low probability of occurrence but still can
not be ruled out completely. Almost 20-40 % chances
Very
Unlikely
Rare and exceptional risks which have a less than 10%
chance of occurrence.
RISK IMPACT
Risk impact refers to how much the risk, if it occurs, will effect the project
scope, cost or schedule.
Insignificant Risks that bring no real negative consequences or pose no
significant threat to the organization or project.
Minor Risks that have a small potential for negative consequences but
will not significantly impact overall success.
Moderate Risks that could potentially bring negative consequences, posing
a moderate threat to the project or organization.
Critical Risks with substantial negative consequences that will seriously
impact the success of the organization or project.
Catastrophic Risks with extreme negative consequences that could cause the
entire project to fail or severely impact daily operations of the
organization.
CLASSIFYING AND PRIORITIZING RISK
Matrix Insignifi
cant
Minor Moderat
e
Critical Catastr
ophic
Rare Low Low Medium Medium High
Unlikel
y
Low Medium Medium Medium High
Possible Low Medium Medium High Critical
Likely Medium Medium High High Critical
Very
Likely
Medium High High Critical Critical
Apart from other divisions, Matrix has 4
major zones.
A low-risk zone that is considered acceptable,
consequences of the risk are minor, These
types of risks are generally ignored (Green).
A moderate risk zone that may or may not be
acceptable, come with slightly more serious
consequences, If possible, take steps to
prevent medium risks from occurring
(Yellow).
Impact
Probability
CLASSIFYING AND PRIORITIZING RISK
 A high-risk zone that is considered unacceptable, these are serious risks that
both have significant consequences, and are likely to occur. Prioritize and respond
to these risks in the near term. (Orange).
 A critical-risk zone that is considered extremely unacceptable, Catastrophic
risks that have severe consequences and are highly likely to occur, these risks are
the highest priority. You should respond to them immediately, as they can threaten
the success of the organization or project. (Red)
AFTER RANKING
Once you’ve ranked your risks, you can make a risk response plan.
A risk response plan is about…
To prevent or address those risks that are “high” or “extreme.”
You may not need to respond to risks ranked “low” or “medium” before work
begins.
Response for the risk depend upon both priority or rating and ranking.
WHY TO USE RISK MATRIX
In risk assessments, you don’t have to use a risk matrix…
If you have identified hazards and have a plan to avoid risks.
Why use matrix…
To understand the severity of risks being caused.
To rank or prioritize risk.
To prevent major risks at time to avoid negative consequences.
EXAMPLE
 A risk with probability of 4 and
impact of 3
 4 * 3 = 12
 A risk with probability of 5 and
impact of 2
 5 * 2 = 10
 A risk with probability of 2 and
impact of 5
 2 * 5 = 10
 So in all the risk after prioritization
we will plan to handle the risk
according to their ranking.
Matrix 1 2 3 4 5
5 5 10 15 20 25
4 4 8 12 16 20
3 3 6 9 12 15
2 2 4 6 8 10
1 1 2 3 4 5
Impact
Probability
END

More Related Content

What's hot

Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and managementTaekHyeun Kim
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safetyjchsafety
 
Hazard Identification _ Risk Assessment.ppt
Hazard Identification _ Risk Assessment.pptHazard Identification _ Risk Assessment.ppt
Hazard Identification _ Risk Assessment.pptjxuaaaka
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 
Risk Management Process in OH&S
Risk Management Process in OH&SRisk Management Process in OH&S
Risk Management Process in OH&SAhmed-Refat Refat
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisAlin Veronika
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides SlideTeam
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides SlideTeam
 
Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersVictoria Finch
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 

What's hot (20)

Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
Risk Management Training
Risk Management TrainingRisk Management Training
Risk Management Training
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safety
 
Hazard Identification _ Risk Assessment.ppt
Hazard Identification _ Risk Assessment.pptHazard Identification _ Risk Assessment.ppt
Hazard Identification _ Risk Assessment.ppt
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 
Risk Management Process in OH&S
Risk Management Process in OH&SRisk Management Process in OH&S
Risk Management Process in OH&S
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative Analysis
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for ManagersRisk Assessment - Refresher Training for Managers
Risk Assessment - Refresher Training for Managers
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 

Similar to Risk Assessment Matrix Prioritization

Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptxDivyesh Jha
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Calculation of Estimated Risk for Individual/Family
Calculation of Estimated Risk for Individual/FamilyCalculation of Estimated Risk for Individual/Family
Calculation of Estimated Risk for Individual/Familymandalina landy
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation StrategiesErnst Dettbarn
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptGkMechanical
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisGaurav Singh Rajput
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RAGaurav Singh Rajput
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxAhmadHassanein
 
PMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep PresentationPMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep Presentationscottdreynolds
 
“Construction Risk Management”
“Construction Risk Management”“Construction Risk Management”
“Construction Risk Management”Ary Jamil
 
Risk Management
Risk ManagementRisk Management
Risk Managementrajuinstru
 

Similar to Risk Assessment Matrix Prioritization (20)

Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptx
 
Risk Matrix.docx
Risk Matrix.docxRisk Matrix.docx
Risk Matrix.docx
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Calculation of Estimated Risk for Individual/Family
Calculation of Estimated Risk for Individual/FamilyCalculation of Estimated Risk for Individual/Family
Calculation of Estimated Risk for Individual/Family
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RA
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
PMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep PresentationPMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep Presentation
 
Li Rmp Prep
Li Rmp PrepLi Rmp Prep
Li Rmp Prep
 
“Construction Risk Management”
“Construction Risk Management”“Construction Risk Management”
“Construction Risk Management”
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
11 risk management
11 risk management11 risk management
11 risk management
 
Risk management
Risk managementRisk management
Risk management
 

Recently uploaded

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxnoorehahmad
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !risocarla2016
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 

Recently uploaded (20)

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 

Risk Assessment Matrix Prioritization

  • 2. WHAT IS A RISK ASSESSMENT? It is a way of determining risks and dangers in work places. In risk assessment we think about what might cause harm/risk to a project or workplace and decide whether you are taking reasonable steps to prevent that harm. If the harm/risk cannot be avoided in a safe way, then the risk assessment will say that the activity shouldn’t be carried out.
  • 3. CONTINUED… Risk assessment involve 2 things… Identifying and analyzing potential (future) events that may have a negative impact on project.  For example Risk Analysis. Making judgments "on the tolerability of the risk on the basis of a risk analysis" while considering influencing factors.  For example Risk Evaluation.
  • 4. CONTINUED… In simple words, risk assessment analyzes what can go wrong… How likely it is to happen… What the potential consequences are… How tolerable the identified risk is. Based on this Risk Assessment, the impact of risk can be expressed as quantitative or qualitative.
  • 5. HOW TO DO RISK ASSESSMENT There are no fixed rules for this. But a few general principles. Five(5) steps are followed to ensure risk assessment is done correctly.
  • 6. STEPS IN RISK ASSESSMENT Identify Hazards Risk Analysis Risk Evaluation Risk Control Review
  • 7. STEP 1 IDENTIFY HAZARDS The process of finding, listing, and characterizing hazards. Difference between Hazard and Risk. A Hazard is ‘something with the potential to cause harm’. Risk is the chance, high or low, that somebody or something could be harmed by these and other hazards. It can be identified by using many methods, for example asking employees, monitoring carefully.
  • 8. STEP 2 RISK ANALYSIS A process for understanding the nature of hazards and determining the level of risk. It tells who or what might be harmed and how. It provides basis for risk evaluation and decisions about risk control. Includes data, analysis, opinions, interests of stakeholders.
  • 9. STEP 3 EVALUATION After identifying hazard and analyzing risk we evaluate them. The hazards can either be removed completely… Or the risks can be controlled so that the its effect is unlikely. If there is no way to eliminate a risk use precaution.  For example, try and carry out a less risky activity. It is done usually using Risk Assessment Matrix.
  • 10. STEP 4 RISK CONTROL Implementing actions after risk evaluation decisions. 1. Elimination – get rid of the risk altogether. 2. Substitution – exchange one risk for something less likely or severe. 3. Physical Controls - eliminate contact with the hazard. Risk control can involve monitoring and re-evaluation.
  • 11. STEP 5 MONITOR AND REVIEW You must ensure that the control measures are achieving the desired level of control. You must review the assessment on a regular basis or if anything changes.  For example, new staff, change in machinery or process. Use Project Risk Register to monitor, review and track risks. Review your assessment and update if possible.
  • 12. WHEN TO DO? Before new processes or activities are introduced. Before changes are introduced to existing processes or activities When hazards are identified.
  • 13. WHO SHOULD DO? Risk assessments should always be carried out by a person who is experienced and competent. Competence can be expressed as a combination of Knowledge, Awareness, training, and experience. Competence does not mean knowing everything. Competence means knowing when to call for help or assistance.
  • 15. WHAT IS IT? A risk assessment matrix is a is a project management tool used during risk assessment. Its main function is to prioritize risks. Based on likelihood or probability(on Y-axis) and impact(on X-axis) of a risk. Also known as risk matrix.
  • 16. CONTINUED… It falls under the qualitative and quantitative risk analyses process. Typically looks like a chart and contains the following columns…  Probability  Impact  Ratings  Rankings Rating is calculated as…  Probability of risk * Impact of risk
  • 17. PROBABILITY The probability rating means the likelihood (chance) of risk to occur. It is recorded in percentage.
  • 18. LIKELIHOOD The likelihood of a risk is broken down into parts as… Very Likely A risk that is almost certain to show-up during project execution. More then 80% chances. Likely Risks that have 60-80% chances of occurrence can be grouped as likely. Possible Risks which have a near 50/50 probability of occurrence. Unlikely Risks that have a low probability of occurrence but still can not be ruled out completely. Almost 20-40 % chances Very Unlikely Rare and exceptional risks which have a less than 10% chance of occurrence.
  • 19. RISK IMPACT Risk impact refers to how much the risk, if it occurs, will effect the project scope, cost or schedule. Insignificant Risks that bring no real negative consequences or pose no significant threat to the organization or project. Minor Risks that have a small potential for negative consequences but will not significantly impact overall success. Moderate Risks that could potentially bring negative consequences, posing a moderate threat to the project or organization. Critical Risks with substantial negative consequences that will seriously impact the success of the organization or project. Catastrophic Risks with extreme negative consequences that could cause the entire project to fail or severely impact daily operations of the organization.
  • 20. CLASSIFYING AND PRIORITIZING RISK Matrix Insignifi cant Minor Moderat e Critical Catastr ophic Rare Low Low Medium Medium High Unlikel y Low Medium Medium Medium High Possible Low Medium Medium High Critical Likely Medium Medium High High Critical Very Likely Medium High High Critical Critical Apart from other divisions, Matrix has 4 major zones. A low-risk zone that is considered acceptable, consequences of the risk are minor, These types of risks are generally ignored (Green). A moderate risk zone that may or may not be acceptable, come with slightly more serious consequences, If possible, take steps to prevent medium risks from occurring (Yellow). Impact Probability
  • 21. CLASSIFYING AND PRIORITIZING RISK  A high-risk zone that is considered unacceptable, these are serious risks that both have significant consequences, and are likely to occur. Prioritize and respond to these risks in the near term. (Orange).  A critical-risk zone that is considered extremely unacceptable, Catastrophic risks that have severe consequences and are highly likely to occur, these risks are the highest priority. You should respond to them immediately, as they can threaten the success of the organization or project. (Red)
  • 22. AFTER RANKING Once you’ve ranked your risks, you can make a risk response plan. A risk response plan is about… To prevent or address those risks that are “high” or “extreme.” You may not need to respond to risks ranked “low” or “medium” before work begins. Response for the risk depend upon both priority or rating and ranking.
  • 23. WHY TO USE RISK MATRIX In risk assessments, you don’t have to use a risk matrix… If you have identified hazards and have a plan to avoid risks. Why use matrix… To understand the severity of risks being caused. To rank or prioritize risk. To prevent major risks at time to avoid negative consequences.
  • 24. EXAMPLE  A risk with probability of 4 and impact of 3  4 * 3 = 12  A risk with probability of 5 and impact of 2  5 * 2 = 10  A risk with probability of 2 and impact of 5  2 * 5 = 10  So in all the risk after prioritization we will plan to handle the risk according to their ranking. Matrix 1 2 3 4 5 5 5 10 15 20 25 4 4 8 12 16 20 3 3 6 9 12 15 2 2 4 6 8 10 1 1 2 3 4 5 Impact Probability
  • 25. END