Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FACTORIDENTIFY EXISTING CONTROLS
&
EFFECTIVENESS OF MITIGATIONIS RISK DECREASING,
INCREASING OR STATIC?RESIDUAL RISK FACTORRISK OWNER1aSecurity software is not properly installed or updatedSecurity team fails to ensure that the most up-to-date security software is installed with the new hardware10
Likelihood (2)
Impact (5)Existing Controls - Training of regulations for compliance with security protocols. Effectiveness of Mitigation - Monthly security reviews suggesting improved security amongst the whole network. Decreasing4
L (2)
I (2)Organization2aSoftware support was not initially setupWith the installation of new hardware, software support was not setup and fully registered12
Likelihood 3
Impact 4Existing Controls - Notifications are sent out before hardware upgrades. Effectiveness of mitigation - Overall reduction of hardware not registered.Decreasing6
L (6)
I (2)End users 3aFunds drained before all hardware has been upgradedCost report was below target point resulting in delays of upgrade to some of the older computers resulting in more increased time reports for project12
L(2)
I(6)Existing Controls - Cost calculations are projected well before any upgrades. Effectiveness of Mitigation - Decrease in the risk on going over project spending on future upgrades.Decreasing6
L (3)
I (2)End users
&"Arial,Bold"&14CHRE Risk Register 2011-12 &12Last updated 28/04/11
&9NOTE: each risk is scored according to the risk matrix. &10
&"Arial,Bold"&9KEY: LA Linda Allan, CB Christine Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior Management Team Page &P of &N
Page &P of &N
Essay2/Example/Example writing.docx
The attached file shows an excerpt from a Risk Analysis Plan for a team project. The project was to offer Pinellas County an online support system for home-schooled families. This program is different from the traditional K-12 online programs because it doesn’t follow the conventional grading methods—it would be only for home schooled children so that the parents could access materials, videos and teaching information that would supplement their individualized home schooling curriculum.
We started with a risk breakdown structure to identify the risks by categorizing them into different activities that were relevant to the project. We then performed a qualitative risk analysis and assigned a numeric value to the probability of the risk on a scale of 1-5. We charted these risks and color coded them in a Risk Severity Matrix. This analysis allowed us to rank the risks and identify the top ten risks that scored in the Medium and High probability categories (yellow and red sections) as the focus for the Risk Response Plan.
We then created a Risk Response Plan for each of the top ten risks and categorized the responses by “avoid, mitigate, accept, contingency or transfer” as well as included a specific response plan for each risk. The Response Plan also included a trigger to.
Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FAC.docx
1. Significant risksHEADLINE RISKDESCRIPTION OF
RISKINHERENT RISK FACTORIDENTIFY EXISTING
CONTROLS
&
EFFECTIVENESS OF MITIGATIONIS RISK DECREASING,
INCREASING OR STATIC?RESIDUAL RISK FACTORRISK
OWNER1aSecurity software is not properly installed or
updatedSecurity team fails to ensure that the most up-to-date
security software is installed with the new hardware10
Likelihood (2)
Impact (5)Existing Controls - Training of regulations for
compliance with security protocols. Effectiveness of Mitigation
- Monthly security reviews suggesting improved security
amongst the whole network. Decreasing4
L (2)
I (2)Organization2aSoftware support was not initially setupWith
the installation of new hardware, software support was not setup
and fully registered12
Likelihood 3
Impact 4Existing Controls - Notifications are sent out before
hardware upgrades. Effectiveness of mitigation - Overall
reduction of hardware not registered.Decreasing6
L (6)
I (2)End users 3aFunds drained before all hardware has been
upgradedCost report was below target point resulting in delays
of upgrade to some of the older computers resulting in more
increased time reports for project12
L(2)
I(6)Existing Controls - Cost calculations are projected well
before any upgrades. Effectiveness of Mitigation - Decrease in
the risk on going over project spending on future
upgrades.Decreasing6
L (3)
I (2)End users
2. &"Arial,Bold"&14CHRE Risk Register 2011-12
&12Last updated 28/04/11
&9NOTE: each risk is scored according to the risk matrix. &10
&"Arial,Bold"&9KEY: LA Linda Allan, CB Christine
Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior
Management Team Page &P of &N
Page &P of &N
Essay2/Example/Example writing.docx
The attached file shows an excerpt from a Risk Analysis Plan
for a team project. The project was to offer Pinellas County an
online support system for home-schooled families. This program
is different from the traditional K-12 online programs because it
doesn’t follow the conventional grading methods—it would be
only for home schooled children so that the parents could access
materials, videos and teaching information that would
supplement their individualized home schooling curriculum.
We started with a risk breakdown structure to identify the risks
by categorizing them into different activities that were relevant
to the project. We then performed a qualitative risk analysis and
assigned a numeric value to the probability of the risk on a
scale of 1-5. We charted these risks and color coded them in a
Risk Severity Matrix. This analysis allowed us to rank the risks
and identify the top ten risks that scored in the Medium and
High probability categories (yellow and red sections) as the
focus for the Risk Response Plan.
We then created a Risk Response Plan for each of the top ten
risks and categorized the responses by “avoid, mitigate, accept,
contingency or transfer” as well as included a specific response
plan for each risk. The Response Plan also included a trigger to
know when the risk was coming, and an owner to execute the
response.
3. Essay2/Example/Excel example.pdf
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 11 of 15
Appendix A: RBS Risk Breakdown Structure
Source: (Larson & Gray, 2014, p. 208)
Created by Team1
Classroom at
Home Project
5. retrieval
Design
User interface
for youth
User interface
for non-native
speakers
Development
Programming
delays
Security risks
on servers
Testing
Ability to
reveal all
problems
Marketing
Program not
known by
parents
Program
under-utilized
Students not
6. disciplined to
use
Parents not
being
responsible to
guide
Parents not
realizing
program is
free
Confusion
with enrolled
vs home
schooled
Non-
Floridians
interest
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 12 of 15
APPENDIX B: Risk Severity Matrix
Low
8. 3
Parents not
realizing program
is free
Student questions Availability of teachers
Login and
password
retrieval
Program under-
utilized
2
Subjects offered Website location Program not known by
parents
Programming
delays
Non-Floridians
interest
1
User interface for
youth
User interface for
non-native
speakers
9. Confusion with
enrolled vs home
schooled
1 2 3 4 5
Low Impact Medium
Impact
High Impact
Source: (Larson & Gray, 2014, p. 212), Created by Team1
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 13 of 15
APPENDIX C: Risk Response Matrix
Source: (Project Management Docs, 2015), Created by Team1
Risk Risk Category
Prob-
ability Impact
Risk
Score
Risk
10. Ranking Risk Response Trigger Risk Owner
Users' understanding
of program Production 4 5 20 1
Conduct a student training
program that must be
completed prior to class
starting
>20% of students
complain about
program Herb Walker
Technical difficulties
for users Production 4 4 16 2
Recruit a smail group of
IT support staff, available
via phone
>15% students suffer
technical problems Jason Black
Teacher technical
difficulties Production 4 4 16 3
Recruit a smail group of
IT support staff, available
via phone
>10% teachers suffer
technical problems Jason Black
Computer and
Browswer
11. Compatability Production 5 3 15 4
Design different types of
virtual software that is
compatible with the same
accessebile browser
(Mozilla Firefox)
Increase in
technological
advances Herb Walker
Program under-
utilized Marketing 3 5 15 5
Conduct a student training
program that must be
completed prior to starting
class
A decrease of study
toold being
used/decrease in
passing grades Herb Walker
Login and passord
retrevial Production 3 4 12 6
Recruit a smail group of
IT support staff, available
via phone(troubleshoot)
Increase in students
being locked out of
school programs Jason Black
12. Security Risks on
Servers Development 4 3 12 7
Transfer security
surveillance to an outside
company to ensure safety
of students and teachers The start of the school Mary White
Non-Floridian's
interest Marketing 2 5 10 8
Explain to Non-Floridians
interested in the program
that you must live in
Florida for the 1 year prior
to starting
Non-Floridians
inquiring about the
virtual school program Tom Sunday
Availability of teachers Planning 3 3 9 9
Recruit more teachers
with a versatile
background of teaching
many subjects
Parents complaints of
school curricullum Mary White
Ability to Reveal All
Problems Testing 4 2 8 10
Conduct more practice
pilots during school off
13. seasons
The start of the school
year Ron Smith
Risk Identification Risk ResponseQualitative Rating
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 14 of 15
APPENDIX D: Risk Responsibility Matrix
Risk Responsibility Matrix
Risk Event Response Contingency Plan Trigger
Who is
Responsible
Users'
Understanding of
program
Mitigate
Conduct a student training program that
must be completed prior to class starting
>20% of students complain
about program
Herb Walker
14. Technical Difficulties
for users
Mitigate
Recruit a small group of IT support staff,
available via phone
>15% students suffer technical
problems
Jason Black
Teacher Technical
Difficulties
Mitigate
Recruit a small group of IT support staff,
available via phone
>10% teachers suffer technical
problems
Jason Black
Computer and
Browser
Compatibility
Mitigate
Design different types of the virtual
software that is compatible with the
same accessible browser (Mozilla Firefox)
Increase in technological
15. advances
Herb Walker
Program under-
utilized
Mitigate
Conduct a student training program that
must be completed prior to class starting
A decrease of study tools being
used/decrease in passing
grades
Herb Walker
Login and password
retrieval
Mitigate
Recruit a small group of IT support staff,
available via phone (troubleshoot
problems)
Increase in Students being
locked out of school programs
Jason Black
Security Risks on
Servers
Transfer
Transfer security surveillance to an
16. outside company to ensure safety of
students and teachers
The start of school year Mary White
Non-Floridian's
interest
Accept
Explain to Non-Floridian's interested in
program that you must live in Florida for
the 1 year prior to starting
Non-Floridians inquiring about
Virtual School Program
Tom Sunday
Availability of
teachers
Mitigate
Recruit more teachers with a versatile
background of teaching many subjects
Parent complaints of school
curriculum
Mary White
Ability to reveal all
problems
Mitigate
17. Conduct more practice pilots during
school off seasons
The start of school year Ron Smith
Source: (Project Management Docs, 2015), Created by Team1
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 15 of 15
REFERENCES
HHS. (2015, April 1). Health and Human Services. Retrieved
from HHS:
http://www.hhs.gov/ocio/eplc/EPLC%20Archive%20Documents/
05%20-
%20Risk%20Management%20Plan/eplc_risk_management_temp
late.doc
Larson, E. W., & Gray, C. F. (2014). Project Management: the
managerial process, Sixth edition.
New York: McGraw-Hill Education.
Project Management Docs. (2015, April 3). Project Planning
Templates. Retrieved from Project
Management Docs:
http://www.projectmanagementdocs.com/project-planning-
templates/risk-register.html
5432154321High ImpactMedium ImpactLow ImpactReferences
18. Essay2/Instructions.docx
Essay 2:
Instructions:
Review the following download: Detailed Risk Matrix sample in
Excel
format. (http://www.professionalstandards.org.uk/docs/voluntar
y-registers/risk-matrix-template.xlsx?sfvrsn=4 ). This type of
Risk matrix is fast becoming a standard tool in projects, plus
general activities for federal and local government. Our
textbook had some content on this, however, this was too
limited, see the suggested link for more detail.
Share your version of a risk matrix and provide a specific
example of a significant process or project. Enter a file and a
quality explanation using no less than 180 words. [Your
example should involve a large amount of money or an event
that will have an influence over a long period for a number of
people.]
I will provide an example by someone else in this folder. Please
use template to complete.
Essay2/risk-matrix-template (1).xlsx
Significant risksHEADLINE RISKDESCRIPTION OF
RISKINHERENT RISK FACTORIDENTIFY EXISTING
CONTROLS
&
EFFECTIVENESS OF MITIGATIONIS RISK DECREASING,
INCREASING OR STATIC?RESIDUAL RISK FACTORRISK
OWNER1aExample: Personal Behaviour - Registrants violate
boundariesRegistrants fail to establish appropriate boundaries
with services users, i.e. do not explain professional relationship
to service users and violate boundaries, i.e. emotional, sexual,
19. etc. Registrants abuse their position of power.
Disclaimer: The purpose of this generic example is to give
applicants an idea of how to complete this matrix. It would not
necessarily be described as it is done here. The existing controls
and mitigation actions are some of the possible controls and
actions we would expect to see in place but not all of them are
listed here. For example, for this specific risk safeguarding
issues would have to be considered and actions put in place.
The inherent and residual risk factor are not a real assessment -
they were included here to demonstrate how to calculate the
factor. 12
Likelihood 4
Impact 3Existing Controls: Adherence to Ethical Framework
and Code of Practice. Mandatory CPD and supervision audited
by Professional Standards Authority at annual renewal of
registration. Training provided by organisation. Leaflets and
other information material available to registrants. Professional
Conduct Procedure in place. Case facts and sanctions published
on website to promote learning amongst registrants.
Effectiveness of Mitigation: annual review of conduct cases
suggests reduction of complaints against registrants in relation
to boundary violations. Decreasing6
L (2)
I (3)X (organisation holding register)1b1c1d1e2aExample:
Technical Competence - Lack of effectivenessRegistrants do not
have the skills to practice so service provided does not have
expected effect/outcome. Registrants cannot identify underlying
issues and do not refer service user to appropriate qualified
professional.
Disclaimer: The purpose of this generic example is to give
applicants an idea of how to complete this matrix. It would not
necessarily be described as it is done here. 20
L (4)
20. I (5)Existing control: Education and training equips registrant
with skills to practice. Mandatory CPD requirements assist
registrants to keep their skills up to date. Mandatory
supervision identifies potential skill gaps and recommends
appropriate training. Registrants sign up to Code of
Practice/Ethical Framework that require them to practise within
their competence and refer service users to other professionals
if required. Organisation provides guidance on underlying
health/social issues, for example, offers a protocol/checklist to
registrants with common issues and symptoms.
Effectiveness of mitigation: reduced number of complaints
alleging lack of therapeutical effectiveness; feedback from
supervisors; organisation monitors use of protocol/checklist by
registrants and ascertains that 90% of registrants use the
protocol; research demonstrates issue/risk is managed
appropriately; organisation offers CPD on effectiveness and
underlying issues undertaken by 70% of registrants.Decreasing4
L (2)
I (2)X (organisation holding register);
registrant;
supervisor2b2c2d3aExample: Business Practice - Misleading
advertising by registrantsA; B; C;16
L(4)
I(4)X; Y; Z Static8
L (4)
I (2)3b3c3d
&"Arial,Bold"&14CHRE Risk Register 2011-12
&12Last updated 28/04/11
&9NOTE: each risk is scored according to the risk matrix. &10
&"Arial,Bold"&9KEY: LA Linda Allan, CB Christine
Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior
Management Team Page &P of &N
Page &P of &N
21. Essay 1:
What is the preferred method of calculating a contingency
reserve?
250 words of detail of the above topic.
Contingency reserve is the amount of time/or cost added to the
project to deal with known unknowns like identified risk. This
is a project management class.
Example topic from another student (not related, just example
so please dont use any of this):
rom the risk management plan, a contingency plan is put into
place if the threat or opportunity occurs (Mulcahy, p. 205).
Although they may not be implemented, contingency plans are
plan actions created for an event that may occur but is not a fact
or inevitable. The purpose is to develop a response action to a
risk identified earlier in the risk management plan.
As a contingency plan is an “insurance policy should a major
risk occur” (De Sousa, 2009). It is considered “Plan A” in
response to the identified risk. For instance, your organization
has created a new healthcare drug and is awaiting FDA approval
but it is taking longer than anticipated. You know that holding
back beginning stages of production will increase costs so you
begin preparing the labels and shipment procedures to help
reduce the delay.
With risks there should always be a “Plan B” which is where the
fallback plan comes into play. These types of plans are
“implemented when the contingency plan fails or is not fully
effective” (Usmani, 2012). For instance, following the previous
example of the contingency plan, if preparing the labels and
shipment procedures does not truly reduce the delay, the
fallback plan would then be executed. In this situation the
fallback plan would be to use preordered and prepared supplies
from a pre-identified supplier to arrange the second shipment
for deployment earlier than originally scheduled to make up for
22. the delay from the first shipment.
“Contingency and fallback plans are the backbones of your risk
management plan which help you manage the identified risk”
(Usmani, 2012). By having both in place it creates a guideline
of what needs to happen if a threat or opportunity arises rather
than not being adequately prepared; which can lead to bigger
issues.
References:
De Sousa, S. (2009). What is Contingency Planning? My PM
Expert, the fast track to project success. Retrieved
from: http://www.my-
project-management-expert.com/what-is-contingency-
planning.html
Mulcahy, R. (2010). Risk Management: Tricks of the trade for
project managers (2nd ed.). United States of America: RMC
Publications,
Inc.
Essay 2: