Plan Risk Responses is the process of developing options and strategies to address overall project risk exposure and individual risks. It identifies appropriate ways to handle risks through techniques like expert judgment, data analysis, and decision making. The output can include updates to the project management plan, schedule, cost baseline, and risk register.
Plan Risk Responses is the process of developing options, selecting strategies, and agreeing on actions to address overall project risk exposure, as well as to treat individual project risks
In this presentation we look at approach of analyzing risks, we get into details of qualitative risk analysis and quantitative risk analysis. This presentation will help professionals who are preparing for PMP certification exam
Plan Risk Responses is the process of developing options, selecting strategies, and agreeing on actions to address overall project risk exposure, as well as to treat individual project risks
In this presentation we look at approach of analyzing risks, we get into details of qualitative risk analysis and quantitative risk analysis. This presentation will help professionals who are preparing for PMP certification exam
The concepts and processes on how to perform project risk management according to PMBOK Guide 6th edition. You'll find key concepts and terms, plan risk management, identify risks, perform qualitative & quantitative risks analysis, plan risk responses, implement risk responses, and monitor risks.
Integrating Risk into your Balanced Scorecard Andrew Smart
Pulling together into a single framework the two separate disciplines of strategy management and risk management, and how it is possible to integrate it with Balanced Scorecard. This presentation provides a practical guide for organizations to shape and execute sustainable strategies with full understanding of how much risk they are willing to accept in pursuit of strategic goals.
Please contact andrew.smart@stratexsystems.com for more details about the presentation or to have a talk about our software solutions.
A risk is defined as “an uncertain event or condition that, if it occurs, has a positive and negative effect on a project’s objectives.” Risk is inherent with any project, and project managers should assess risk continually and develop plan to address them. The risk management plan contains an analysis of likely risks with both high and low impact, as well as mitigation strategies to help the project avoid being derailed should common problems arise. Risk management plans should be periodically reviewed by the project team in order to avoid having the analysis become stale and not reflective of actual potential project risks. Most critical, risk management plans include a risk strategy.
This module on Managing Risk discusses different type of risk that needs to be taken into account by the management while implementing a project. The other topics converged in this module include probability-impact matrix, Risk Quantification; Mitigating/Transferring risk; Risk audits/Review; Sample Risk plan and how to initiate Risk Management Planning.
The above presentation talks about the risk involved in any project. The project risk identification, quantification, response and its control is also thoroughly explained.
PMP, PMBOK (R) 5th Edition,
CH: 11: Project Risk Management
--> Represents one of two biggest chapters, of the PMBOK
==> Too much useful, for the people who have concern in the project management field, & the risk management field as well
Plan Risk Responses : PMP : Project Risk ManagementSaket Bansal
This presentation is about Planning risk responses. This presentation talks about response strategies for positive and negative risks. We also conducted web session using this presentations and recording of web session can be found here https://www.youtube.com/watch?v=b5UTxqw1Uaw
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/overview-of-program-management-1537
DOCUMENT DESCRIPTION
This presentation provides an overview to Program Management. It broadly follows the PMI's standard for Program Management. This document describes the context of the program, how to initiate and control projects as a part of program lifecycle, how to manage transitions, and how to obtain outcomes towards benefits realization. It also describes the key roles involved in program management and how Program Governance Board can facilitate program success.
Programs are taken up to realize benefits towards achieving organizational strategic objectives. Whereas projects produce discrete outputs, program management focuses on their synergization towards obtaining of outcomes and benefits.
Portfolio management is a key linking factor between program management and the organizational strategy. Programs, in turn consist of multiple inter-related projects collectively creating a coherent capability, which are then transitioned to the concerned functional departments to obtain desired outcomes.
The concepts and processes on how to perform project risk management according to PMBOK Guide 6th edition. You'll find key concepts and terms, plan risk management, identify risks, perform qualitative & quantitative risks analysis, plan risk responses, implement risk responses, and monitor risks.
Integrating Risk into your Balanced Scorecard Andrew Smart
Pulling together into a single framework the two separate disciplines of strategy management and risk management, and how it is possible to integrate it with Balanced Scorecard. This presentation provides a practical guide for organizations to shape and execute sustainable strategies with full understanding of how much risk they are willing to accept in pursuit of strategic goals.
Please contact andrew.smart@stratexsystems.com for more details about the presentation or to have a talk about our software solutions.
A risk is defined as “an uncertain event or condition that, if it occurs, has a positive and negative effect on a project’s objectives.” Risk is inherent with any project, and project managers should assess risk continually and develop plan to address them. The risk management plan contains an analysis of likely risks with both high and low impact, as well as mitigation strategies to help the project avoid being derailed should common problems arise. Risk management plans should be periodically reviewed by the project team in order to avoid having the analysis become stale and not reflective of actual potential project risks. Most critical, risk management plans include a risk strategy.
This module on Managing Risk discusses different type of risk that needs to be taken into account by the management while implementing a project. The other topics converged in this module include probability-impact matrix, Risk Quantification; Mitigating/Transferring risk; Risk audits/Review; Sample Risk plan and how to initiate Risk Management Planning.
The above presentation talks about the risk involved in any project. The project risk identification, quantification, response and its control is also thoroughly explained.
PMP, PMBOK (R) 5th Edition,
CH: 11: Project Risk Management
--> Represents one of two biggest chapters, of the PMBOK
==> Too much useful, for the people who have concern in the project management field, & the risk management field as well
Plan Risk Responses : PMP : Project Risk ManagementSaket Bansal
This presentation is about Planning risk responses. This presentation talks about response strategies for positive and negative risks. We also conducted web session using this presentations and recording of web session can be found here https://www.youtube.com/watch?v=b5UTxqw1Uaw
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/overview-of-program-management-1537
DOCUMENT DESCRIPTION
This presentation provides an overview to Program Management. It broadly follows the PMI's standard for Program Management. This document describes the context of the program, how to initiate and control projects as a part of program lifecycle, how to manage transitions, and how to obtain outcomes towards benefits realization. It also describes the key roles involved in program management and how Program Governance Board can facilitate program success.
Programs are taken up to realize benefits towards achieving organizational strategic objectives. Whereas projects produce discrete outputs, program management focuses on their synergization towards obtaining of outcomes and benefits.
Portfolio management is a key linking factor between program management and the organizational strategy. Programs, in turn consist of multiple inter-related projects collectively creating a coherent capability, which are then transitioned to the concerned functional departments to obtain desired outcomes.
Organizational project maturity model (opm3)Daniele Pinto
Introduction to Organizational Project Maturity Model is a guideline to set up and operate the enterprise linking the business strategy down to the operations.
For additional information: https://www.pmprofessional.ch
For Details : https://www.mudassiriqbal.net/planning-process-group/
The Planning process group from Project Management Process Groups provides a detailed project plan to deliver the project objectives successfully. Planning is a key to success and therefore PMI, focusses on it more than any other Project Management Process Group.
Project Management Body of Knowledge edition 5 overview.
For animated PowerPoint version check https://drive.google.com/open?id=0By_1gNcMlZs6YlVsVDlEcEJacFU
PROJECTCON | AGILECON Midwest 2019 in Indianapolis on May 10, 2019
Presenter: Bill Dow
A Guide to Risk Management
Most Project Managers struggle with managing risks and issues. It is a daily struggle, project managers don’t track and understand the purpose of risk management well enough, so we see them either ignore it all together or do the bare minimum. In this presentation, we will walk through the purpose and tracking of risks on projects.
Key Takeaways:
Learn the purpose behind Risk Management
Discover the key steps in Risk Management
Uncover Risk Management tools and techniques
Event Website: https://projectconevent.com
LinkedIn: https://www.linkedin.com/company/projectcon-llc
Facebook: http://www.facebook.com/ProjectConEvent
Twitter: http://www.twitter.com/projectconevent
YouTube: https://www.youtube.com/channel/UCLLG1SGPs1L5YLoFndvGGhQ
Instagram: https://www.instagram.com/projectconevent
Presentation Slides: https://slideshare.com/projectcon
Post Event Trailer: https://youtu.be/1_RzFBnZ7bo
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
2. Plan Risk Responses
Coincides with PMBOK 11.5
Process Group and Knowledge Area Mapping
Knowledge Areas Initiating Planning Process Group Executing Process Group Monitoring and Controlling Process Group Closing Process Group
4. Project Integration
Management
4.1 Develop Project Charter
4.2 Develop Project Management
Plan
4.3 Direct and Manage Project Work
4.4 Manage Project Knowledge
4.5 Monitor and Control Project Work
4.6 Perform Integrated Change Control
4.7 Close Project or Phase
5. Project Scope
Management
5.1 Plan Scope Management
5.2 Collect Requirements
5.3 Define Scope
5.4 Create WBS
5.5 Validate Scope
5.6 Control Scope
6. Project Schedule
Management
6.1 Plan Schedule Management
6.2 Define Activities
6.3 Sequence Activities
6.4 Estimate Activity Durations
6.5 Develop Schedule
6.6 Control Schedule
7. Project Cost Management
7.1 Plan Cost Management
7.2 Estimate Costs
7.3 Determine Budget
7.4 Control Costs
8. Project Quality
Management
8.1 Plan Quality Management 8.2 Manage Quality 8.3 Control Quality
9. Project Resource
Management
9.1 Plan Resource Management
9.2 Estimate Activity Resources
9.3 Acquire Resources
9.4 Develop Team
9.5 Manage Team
9.6 Control Resources
10. Project Communications
Management
10.1 Plan Communications
Management
10.2 Manage Communications 10.3 Monitor Communications
11. Project Risk
Management
11.1 Plan Risk Management
11.2 Identify Risks
11.3 Perform Qualitative Risk Analysis
11.4 Perform Quantitative Risk
Analysis
11.5 Plan Risk Responses
11.6 Implement Risk Responses 11.7 Monitor Risks
12. Project Procurement
Management
12.1 Plan Procurement Management 12.2 Conduct Procurements 12.3 Control Procurements
13. Project Stakeholder
Management
13.1 Identify Stakeholders 13.2 Plan Stakeholder Engagement
13.3 Manage Stakeholder
Engagement
13.4 Monitor Stakeholder Engagement
3. What is it?
Plan Risk Responses is the process of developing options, selecting
strategies, and agreeing on actions to address overall project risk
exposure, as well as to treat individual project risks.
Why?
The key benefit of this process is that it identifies appropriate ways to
address overall project risk and individual project risks. This process
also allocates resources and inserts activities into project documents
and the project management plan as needed.
Plan Risk Responses
Coincides with PMBOK 11.5
4. Plan Risk Responses
Coincides with PMBOK 11.5
Inputs Tools & Techniques Outputs
1. Project management plan
• Resource management plan
• Risk management plan
• Cost baseline
2. Project documents
• Lessons learned register
• Project schedule
• Project team assignments
• Resource calendars
• Risk register
• Risk report
• Stakeholder register
3. Enterprise environmental factors
4. Organizational process assets
1. Expert judgment
2. Data gathering
• Interviews
3. Interpersonal and team skills
• Facilitation
4. Strategies for threats
5. Strategies for opportunities
6. Contingent response strategies
7. Strategies for overall project risk
8. Data analysis
• Alternatives analysis
• Cost-benefit analysis
9. Decision making
• Multicriteria decision analysis
1. Change Requests
2. Project management plan updates
• Schedule management plan
• Cost management plan
• Quality management plan
• Resource management plan
• Procurement management plan
• Scope baseline
• Schedule baseline
• Cost baseline
3. Project document updates
• Assumption log
• Cost forecasts
• Lessons learned register
• Project schedule
• Project team assignments
• Risk register
• Risk report
Inputs, Tools & Techniques, Outputs
5. Plan Risk Responses
Coincides with PMBOK 11.5
11.5 Plan Risk
Responses
Project
Management
Plan
Enterprise/Orga
nization
• Lessons learned register
• Project schedule
• Project team assignments
• Resource calendars
• Risk register
• Risk report
• Stakeholder register
• Enterprise environmental
factors
• Organizational process assets
Project
Documents
Project
Management
Plan
• Change Requests• Resource management
plan
• Risk management plan
• Cost baseline
4.6 Perform
Integrated
Change Control
Project
Documents
• Schedule management plan
• Cost management plan
• Quality management plan
• Resource management plan
• Procurement management
plan
• Scope baseline
• Schedule baseline
• Cost baseline
• Assumption log
• Cost forecasts
• Lessons learned register
• Project schedule
• Project team assignments
• Risk register
• Risk report
6. Overview
• Effective and appropriate risk responses can minimize individual threats, maximize
individual opportunities, and reduce overall project risk exposure. Unsuitable risk
responses can have the converse effect.
• Risk responses should be appropriate for the significance of the risk, cost-effective
in meeting the challenge, realistic within the project context, agreed upon by all
parties involved, and owned by a responsible person.
• Specific actions are developed to implement the agreed-upon risk response
strategy, including primary and backup strategies, as necessary.
Coincides with PMBOK 11.5
Plan Risk Responses
7. Plan Risk Responses - Inputs
Coincides with PMBOK 11.5
Project Management Plan
Project management plan components include:
• Resource management plan
• Risk management plan
• Cost baseline
8. Plan Risk Responses - Inputs
Coincides with PMBOK 11.5
Project Documents
Project documents that can be considered as inputs for this process include:
• Lessons learned register
• Project schedule
• Project team assignments
• Resource calendars
• Risk register
• Risk report
• Stakeholder register
9. Coincides with PMBOK 11.5
Enterprise Environmental Factors
The enterprise environmental factors that can influence the Plan Risk
Responses process include but are not limited to the risk appetite and
thresholds of key stakeholders.
Plan Risk Responses - Inputs
10. Coincides with PMBOK 11.5
Organisational Process Assets
The organizational process assets that can influence the Plan Risk Responses process
include but are not limited to:
• Templates for the risk management plan, risk register, and risk report
• Historical databases
• Lessons learned repositories from similar projects
Plan Risk Responses - Inputs
11. Plan Risk Responses - Tools & Techniques
Coincides with PMBOK 11.5
Expert Judgment
Expertise should be considered from individuals or groups with specialized
knowledge in the following topics:
Threat response strategies
Opportunity response strategies
Contingent response strategies
Overall project risk response strategies.
12. Plan Risk Responses - Tools & Techniques
Coincides with PMBOK 11.5
Data Gathering
Data-gathering techniques that can be used for this process include but are not limited
to interviews. Development of responses to individual project risks and overall project
risk may be undertaken during structured or semi-structured interviews with risk
owners. Other stakeholders may also be interviewed if necessary. The interviewer
should promote an environment of trust and confidentiality in the interview setting to
encourage honest and unbiased decisions.
13. Plan Risk Responses - Tools & Techniques
Coincides with PMBOK 11.5
Interpersonal and Team Skills
Interpersonal and team skills that can be used for this process includes but are not
limited to facilitation. The use of facilitation improves the effectiveness of developing
responses to individual project risks and overall project risk. A skilled facilitator can
help risk owners understand the risk, identify and compare alternative possible risk
response strategies, choose an appropriate response strategy, and identify and
overcome sources of bias.
14. Plan Risk Responses - Tools & Techniques
Coincides with PMBOK 11.5
Strategies for threats
Five alternative strategies may be considered for dealing with threats, as
follows
• Escalate
• Avoid
• Transfer
• Mitigate
• Accept
15. Coincides with PMBOK 11.5
Strategies for Opportunities
Plan Risk Responses - Tools & Techniques
Five alternative strategies may be considered for dealing with opportunities, as
follows:
• Escalate
• Exploit
• Share
• Enhance
• Accept
16. Coincides with PMBOK 11.5
Contingent Response Strategies
Plan Risk Responses - Tools & Techniques
• For some risks, it is appropriate for the project team to make a response plan that
will only be executed under certain predefined conditions, if it is believed that there
will be sufficient warning to implement the plan.
• Events that trigger the contingency response, such as missing intermediate
milestones or gaining higher priority with a seller, should be defined and tracked.
• Risk responses identified using this technique are often called contingency plans or
fallback plans and include identified triggering events that set the plans in effect.
17. Coincides with PMBOK 11.5
Strategies for Overall Project Risk
Plan Risk Responses - Tools & Techniques
Risk responses should be planned and implemented not only for individual
project risks but also to address overall project risk:
• Avoid
• Exploit
• Transfer/share
• Mitigate/Enhance
• Accept
18. Coincides with PMBOK 11.5
Data Analysis
Plan Risk Responses - Tools & Techniques
A number of alternative risk response strategies may be considered. Data
analysis techniques that can be used to select a preferred risk response
strategy include:
• Alternatives analysis
• Cost-benefit analysis
19. Coincides with PMBOK 11.5
Decision Making
Plan Risk Responses - Tools & Techniques
Decision-making techniques that can be used to select a risk response strategy include
but are not limited to multicriteria decision analysis. Criteria for risk response
selection may include:
• Cost of response
• Likely effectiveness of response in changing probability and/or impact
• Resource availability
• Timing constraints (urgency, proximity, and dormancy)
• Level of impact if the risk occurs
• Effect of response on related risks
• Introduction of secondary risks
20. Plan Risk Responses – Outputs
Coincides with PMBOK 11.5
Change Requests
Planned risk responses may result in a change request to the cost and schedule
baselines or other components of the project management plan. Change requests are
processed for review and disposition through the Perform Integrated Change Control
process (Section 4.6).
21. Plan Risk Responses – Outputs
Coincides with PMBOK 11.5
Project Management Plan Updates
Project documents that can be considered as outputs for this process include:
• Schedule management plan
• Cost management plan
• Quality management plan
• Resource management plan
• Procurement management plan
• Scope baseline
• Schedule baseline
• Cost baseline
22. Plan Risk Responses – Outputs
Coincides with PMBOK 11.5
Project Document Updates
Project documents that can be considered as outputs for this process include:
• Assumption log
• Cost forecasts
• Lessons learned register
• Project schedule
• Project team assignments
• Risk register
• Risk report
Editor's Notes
This process is performed throughout the project.
Once risks have been identified, analyzed, and prioritized, plans should be developed by the nominated risk owner for addressing every individual project risk the project team considers to be sufficiently important, either because of the threat it poses to the project objectives or the opportunity it offers.
The project manager should also consider how to respond appropriately to the current level of overall project risk.
A contingency plan (or fallback plan) can be developed for implementation if the selected strategy turns out not to be fully effective or if an accepted risk occurs.
Secondary risks should also be identified. Secondary risks are risks that arise as a direct result of implementing a risk response.
A contingency reserve is often allocated for time or cost. If developed, it may include identification of the conditions that trigger its use.
Resource management plan - The resource management plan is used to help determine how resources allocated to agreed-upon risk responses will be coordinated with other project resources.
Risk management plan - Risk management roles and responsibilities and risk thresholds are used in this process.
Cost baseline - The cost baseline has information on the contingency fund that is allocated to respond to risks.
Lessons learned register - Lessons learned about effective risk responses used in earlier phases of the project are reviewed to determine if similar responses might be useful during the remainder of the project.
Project schedule - The schedule is used to determine how agreed-upon risk responses will be scheduled alongside other project activities.
Project team assignments - Project team assignments can show the resources that can be allocated to agreed-upon risk responses.
Resource calendars - Resource calendars identify when potential resources are available to be allocated to agreed-upon risk responses.
Risk register - The risk register contains details of individual project risks that have been identified and prioritized, and for which risk responses are required. The priority level for each risk can help to guide the selection of appropriate risk responses.
Risk report - The risk report presents the current level of overall risk exposure of the project that will inform selection of the risk response strategy. The risk report may also list individual project risks in priority order and provide additional analysis of the distribution of individual project risks that may inform risk response selection.
Stakeholder register - The stakeholder register identifies potential owners for risk responses.
Expert input may be sought from individuals with particular subject matter expertise relevant to a specific individual project risk, for example, where specialist technical knowledge is required.
Escalate - Escalation is appropriate when the project team or the project sponsor agrees that a threat is outside the scope of the project or that the proposed response would exceed the project manager’s authority. Escalated risks are managed at the program level, portfolio level, or other relevant part of the organization, and not on the project level.
Avoid - Risk avoidance is when the project team acts to eliminate the threat or protect the project from its impact. It may be appropriate for high-priority threats with a high probability of occurrence and a large negative impact.
Transfer - Transfer involves shifting ownership of a threat to a third party to manage the risk and to bear the impact if the threat occurs. Risk transfer often involves payment of a risk premium to the party taking on the threat.
Mitigate - In risk mitigation, action is taken to reduce the probability of occurrence and/or impact of a threat. Early mitigation action is often more effective than trying to repair the damage after the threat has occurred.
Accept - Risk acceptance acknowledges the existence of a threat, but no proactive action is taken. This strategy may be appropriate for low-priority threats, and it may also be adopted where it is not possible or cost-effective to address a threat in any other way.
Escalate - This risk response strategy is appropriate when the project team or the project sponsor agrees that an opportunity is outside the scope of the project or that the proposed response would exceed the project manager’s authority. Escalated opportunities are managed at the program level, portfolio level, or other relevant part of the organization, and not on the project level.
Exploit - The exploit strategy may be selected for high-priority opportunities where the organization wants to ensure that the opportunity is realized. This strategy seeks to capture the benefit associated with a particular opportunity by ensuring that it definitely happens, increasing the probability of occurrence to 100%.
Share - Sharing involves transferring ownership of an opportunity to a third party so that it shares some of the benefit if the opportunity occurs. It is important to select the new owner of a shared opportunity carefully so they are best able to capture the opportunity for the benefit of the project.
Enhance - The enhance strategy is used to increase the probability and/or impact of an opportunity. Early enhancement action is often more effective than trying to improve the benefit after the opportunity has occurred.
Accept - Accepting an opportunity acknowledges its existence but no proactive action is taken. This strategy may be appropriate for low-priority opportunities, and it may also be adopted where it is not possible or cost-effective to address an opportunity in any other way.
Avoid - Where the level of overall project risk is significantly negative and outside the agreed-upon risk thresholds for the project, an avoid strategy may be adopted.
Exploit - Where the level of overall project risk is significantly positive and outside the agreed-upon risk thresholds for the project, an exploit strategy may be adopted.
Transfer/share - If the level of overall project risk is high but the organization is unable to address it effectively, a third party may be involved to manage the risk on behalf of the organization.
Mitigate/enhance - These strategies involve changing the level of overall project risk to optimize the chances of achieving the project’s objectives.
Accept - Where no proactive risk response strategy is possible to address overall project risk, the organization may choose to continue with the project as currently defined, even if overall project risk is outside the agreed- upon thresholds.
Alternatives analysis - A simple comparison of the characteristics and requirements of alternative risk response options can lead to a decision on which response is most appropriate.
Cost-benefit analysis - If the impact of an individual project risk can be quantified in monetary terms, then the cost-effectiveness of alternative risk response strategies can be determined using cost-benefit analysis. The ratio of (change in impact level) divided by (implementation cost) gives the cost effectiveness of the response strategy, with a higher ratio indicating a more effective response.
Multicriteria decision analysis uses a decision matrix to provide a systematic approach for establishing key decision criteria, evaluating and ranking alternatives, and selecting a preferred option
Schedule management plan - Changes to the schedule management plan, such as changes to resource loading and leveling, or updates to the schedule strategy, are incorporated.
Cost management plan - Changes to the cost management plan, such as changes to cost accounting, tracking, and reports, as well as updates to the budget strategy and how contingency reserves are consumed, are incorporated.
Quality management plan - Changes to the quality management plan, such as changes to approaches for meeting requirements, quality management approaches, or quality control processes, are incorporated.
Resource management plan - Changes to the resource management plan, such as changes to resource allocation, as well as updates to the resource strategy, are incorporated.
Procurement management plan - Changes to the procurement management plan, such as alterations in the make-or-buy decision or contract type(s), are incorporated.
Scope baseline - Changes in the scope baseline are incorporated in response to approved changes in scope that may arise from agreed-upon risk responses.
Schedule baseline - Changes in the schedule baseline are incorporated in response to approved changes in schedule estimates that may arise from agreed-upon risk responses.
Cost baseline - Changes in the cost baseline are incorporated in response to approved changes in cost estimates that may arise from agreed-upon risk responses.
Assumption log - During the Plan Risk Responses process, new assumptions may be made, new constraints may be identified, and existing assumptions or constraints may be revisited and changed. The assumption log should be updated with this new information.
Cost forecasts - Cost forecasts may change as a result of planned risk responses.
Lessons learned register - The lessons learned register is updated with information about risk responses that may be useful for future phases of the project or future projects.
Project schedule - Activities relating to agreed-upon risk responses may be added to the project schedule.
Project team assignments - Once the responses are confirmed, the necessary resources should be allocated to each action associated with a risk response plan. These resources include suitably qualified and experienced personnel to execute the agreed-upon action (usually within the project team) a specific budget and time allowance for the action, and any required technical resources to complete the action.
Risk register - The risk register is updated when appropriate risk responses are chosen and agreed upon. Updates to the risk register may include but are not limited to:
Agreed-upon response strategies;
Specific actions to implement the chosen response strategy;
Trigger conditions, symptoms, and warning signs of a risk occurrence;
Budget and schedule activities required to implement the chosen responses;
Contingency plans and risk triggers that call for their execution;
Fallback plans for use when a risk that has occurred and the primary response proves to be inadequate;
Residual risks that are expected to remain after planned responses have been taken, as well as those that have been deliberately accepted; and
Secondary risks that arise as a direct outcome of implementing a risk response.
Risk report - The risk report may be updated to present agreed-upon responses to the current overall project risk exposure and high-priority risks, together with the expected changes that may be expected as a result of implementing these responses.