SlideShare a Scribd company logo
1 of 10
Project Management
Key Concepts
Strategies for Threats
Vs
Strategies for Opportunities
What is it?
Strategies for threats and opportunities are plans of actions
that are considered for dealing with risks (both negative and
positive) in a project.
Strategies for Threats Vs Strategies for Opportunities
Strategies for Threats
1. Escalate
2. Avoid
3. Transfer
4. Mitigate
5. Accept
Strategies for Threats Vs Strategies for Opportunities
Strategies for Opportunities
1. Escalate
2. Exploit
3. Share
4. Enhance
5. Accept
Five strategies considered for dealing with threats:
Escalate
• Escalating the risk (or proposed response) to a
higher level that would be affected if the threat
occurred (i.e. Executive Manager or a Sponsor)
Avoid
• Risk avoidance is when we are moving or changing
the project objective to avoid the risk.
Strategies for Threats Vs Strategies for Opportunities
Strategies for Threats Vs Strategies for Opportunities
Transfer
• Transfer involves shifting ownership of a threat
to a third party (for a price) to manage the risk
and to bear the impact if the threat occurs (i.e.
Insurance)
Mitigate
• Taking action to reduce the probability of
occurrence and/or impact of a threat (using
things like prototyping, more tests, less complex
processes)
Strategies for Threats Vs Strategies for Opportunities
Accept
• Risk acceptance acknowledges the existence
of a threat, but no proactive action is taken.
• Acceptance may be appropriate for low-
priority threats, and may also be adopted
where it is not possible or cost-effective to
address a threat in any other way.
Five strategies considered for dealing with
opportunities:
Escalate
• When an opportunity is outside the scope of the
project or would exceed the project manager’s
authority.
Exploit
• The exploit strategy may be selected for high-priority
opportunities where the organization wants to
ensure that the opportunity is realized.
Strategies for Threats Vs Strategies for Opportunities
Strategies for Threats Vs Strategies for Opportunities
Share
• Sharing involves transferring ownership of an
opportunity to a third party so that it shares some
of the benefit if the opportunity occurs.
Enhance
• The enhance strategy is used to increase the
probability and/or impact of an opportunity.
• The probability of occurrence of an opportunity
may be increased by focusing attention on its
causes.
Strategies for Threats Vs Strategies for Opportunities
Accept
• Acceptance acknowledges the existence of
an opportunity, but no proactive action is
taken.
• Acceptance may be appropriate for low-
priority opportunities, and may also be
adopted where it is not possible or cost-
effective to address an opportunity in any
other way.

More Related Content

What's hot

Calculate the Risk
Calculate the RiskCalculate the Risk
Calculate the RiskSalih Islam
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - IDr. Shiv S Tripathi
 
Risk Management
Risk ManagementRisk Management
Risk Managementrajuinstru
 
Risk Management Plan Slides
Risk Management Plan SlidesRisk Management Plan Slides
Risk Management Plan Slidesvivian weeks
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Risk Management
Risk ManagementRisk Management
Risk Managementysshah
 
Risk Management: A Key Success Factor
Risk Management: A Key Success FactorRisk Management: A Key Success Factor
Risk Management: A Key Success FactorERAUWebinars
 
Risk analysis Chapter
Risk analysis ChapterRisk analysis Chapter
Risk analysis ChapterSINGHZEE
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesILRI
 
Risk management process
Risk management processRisk management process
Risk management processeduCBA
 
Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 
Risks and TCoR
Risks and TCoRRisks and TCoR
Risks and TCoRkruijsse
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)JOSEPH Maas
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learningVanita Ahuja
 
Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd
Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd
Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd Healthcare consultant
 
Strategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate riskStrategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate riskESI14
 

What's hot (20)

Calculate the Risk
Calculate the RiskCalculate the Risk
Calculate the Risk
 
Risk management
Risk managementRisk management
Risk management
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management Plan Slides
Risk Management Plan SlidesRisk Management Plan Slides
Risk Management Plan Slides
 
Risk management
Risk managementRisk management
Risk management
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
FDA Guidance for risk evaluation and mitigation strategies - Professor Peiva...
FDA Guidance for risk evaluation and mitigation strategies  - Professor Peiva...FDA Guidance for risk evaluation and mitigation strategies  - Professor Peiva...
FDA Guidance for risk evaluation and mitigation strategies - Professor Peiva...
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management: A Key Success Factor
Risk Management: A Key Success FactorRisk Management: A Key Success Factor
Risk Management: A Key Success Factor
 
Risk analysis Chapter
Risk analysis ChapterRisk analysis Chapter
Risk analysis Chapter
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniques
 
Risk management process
Risk management processRisk management process
Risk management process
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risks and TCoR
Risks and TCoRRisks and TCoR
Risks and TCoR
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learning
 
Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd
Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd
Who would ever fore see risk identification? by Dr.Mahboob ali khan Phd
 
Strategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate riskStrategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate risk
 

Similar to 11.5 Strategies for Threats vs Opportunities

Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptxSaranSaravanan22
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.pptbillugamma06
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation StrategiesErnst Dettbarn
 
Strategic risks-and-opportunities-powerpoint-flores
Strategic risks-and-opportunities-powerpoint-floresStrategic risks-and-opportunities-powerpoint-flores
Strategic risks-and-opportunities-powerpoint-floresAlo Lacsamana
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxAhmadHassanein
 
Project management course for MSC students Chapter 4 and 5
Project management course for MSC students Chapter 4 and 5Project management course for MSC students Chapter 4 and 5
Project management course for MSC students Chapter 4 and 5Abebaw31
 
Stephen Ward: Performance uncertainty management is a more effective approach...
Stephen Ward: Performance uncertainty management is a more effective approach...Stephen Ward: Performance uncertainty management is a more effective approach...
Stephen Ward: Performance uncertainty management is a more effective approach...Association for Project Management
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementKaustubh Gupta
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docxjesusamckone
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docxRAJU852744
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
Professional Networking: 3 key roles of accountant
Professional Networking: 3 key roles of accountantProfessional Networking: 3 key roles of accountant
Professional Networking: 3 key roles of accountantTony Vidler, CFP, CLU, ChFC
 

Similar to 11.5 Strategies for Threats vs Opportunities (20)

Plan risk responses
Plan risk responsesPlan risk responses
Plan risk responses
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptx
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
 
Strategic risks-and-opportunities-powerpoint-flores
Strategic risks-and-opportunities-powerpoint-floresStrategic risks-and-opportunities-powerpoint-flores
Strategic risks-and-opportunities-powerpoint-flores
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptx
 
Project management course for MSC students Chapter 4 and 5
Project management course for MSC students Chapter 4 and 5Project management course for MSC students Chapter 4 and 5
Project management course for MSC students Chapter 4 and 5
 
Stephen Ward: Performance uncertainty management is a more effective approach...
Stephen Ward: Performance uncertainty management is a more effective approach...Stephen Ward: Performance uncertainty management is a more effective approach...
Stephen Ward: Performance uncertainty management is a more effective approach...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
Project Controls Expo 18th Nov 2014 - "Practical Applications of a Risk Manag...
 
Chap007
Chap007Chap007
Chap007
 
Risk project mgt, infra
Risk project mgt, infraRisk project mgt, infra
Risk project mgt, infra
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Strategic management
Strategic managementStrategic management
Strategic management
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
Planning and Decision Making process
Planning and Decision Making processPlanning and Decision Making process
Planning and Decision Making process
 
Professional Networking: 3 key roles of accountant
Professional Networking: 3 key roles of accountantProfessional Networking: 3 key roles of accountant
Professional Networking: 3 key roles of accountant
 

More from DavidMcLachlan1

10.1 Plan Communication Management
10.1 Plan Communication Management10.1 Plan Communication Management
10.1 Plan Communication ManagementDavidMcLachlan1
 
12.1 Procurement Contracts
12.1 Procurement Contracts12.1 Procurement Contracts
12.1 Procurement ContractsDavidMcLachlan1
 
12.2 Conduct Procurements
12.2 Conduct Procurements12.2 Conduct Procurements
12.2 Conduct ProcurementsDavidMcLachlan1
 
12.3 Control Procurements
12.3 Control Procurements12.3 Control Procurements
12.3 Control ProcurementsDavidMcLachlan1
 
5.1 Plan Scope Management
5.1 Plan Scope Management5.1 Plan Scope Management
5.1 Plan Scope ManagementDavidMcLachlan1
 
4.4 Manage Project Knowledge
4.4 Manage Project Knowledge4.4 Manage Project Knowledge
4.4 Manage Project KnowledgeDavidMcLachlan1
 
Project Cost Forecasting Techniques with EAC, ETC, VAC, TCPI
Project Cost Forecasting Techniques with EAC, ETC, VAC, TCPIProject Cost Forecasting Techniques with EAC, ETC, VAC, TCPI
Project Cost Forecasting Techniques with EAC, ETC, VAC, TCPIDavidMcLachlan1
 
Scenario - Project Management Processes | 2 of 2
Scenario - Project Management Processes | 2 of 2Scenario - Project Management Processes | 2 of 2
Scenario - Project Management Processes | 2 of 2DavidMcLachlan1
 
Scenario - Project Management Processes | 1 of 2
Scenario - Project Management Processes | 1 of 2Scenario - Project Management Processes | 1 of 2
Scenario - Project Management Processes | 1 of 2DavidMcLachlan1
 
Scenario - The Project Management Environment
Scenario - The Project Management EnvironmentScenario - The Project Management Environment
Scenario - The Project Management EnvironmentDavidMcLachlan1
 
Agile Scenarios - Delivering an Agile Environment
Agile Scenarios - Delivering an Agile EnvironmentAgile Scenarios - Delivering an Agile Environment
Agile Scenarios - Delivering an Agile EnvironmentDavidMcLachlan1
 
Agile Scenarios - Core Practices
Agile Scenarios - Core PracticesAgile Scenarios - Core Practices
Agile Scenarios - Core PracticesDavidMcLachlan1
 
Agile Core Practices - Rolling Wave Planning
Agile Core Practices - Rolling Wave PlanningAgile Core Practices - Rolling Wave Planning
Agile Core Practices - Rolling Wave PlanningDavidMcLachlan1
 
6.0 Auxiliary Agile and Lean Frameworks
6.0 Auxiliary Agile and Lean Frameworks6.0 Auxiliary Agile and Lean Frameworks
6.0 Auxiliary Agile and Lean FrameworksDavidMcLachlan1
 
5.0 Core Agile and Lean Frameworks
5.0 Core Agile and Lean Frameworks5.0 Core Agile and Lean Frameworks
5.0 Core Agile and Lean FrameworksDavidMcLachlan1
 
7.0 Delivering in an Agile Environment
7.0 Delivering in an Agile Environment7.0 Delivering in an Agile Environment
7.0 Delivering in an Agile EnvironmentDavidMcLachlan1
 
4.0 The Agile Core Practices
4.0 The Agile Core Practices4.0 The Agile Core Practices
4.0 The Agile Core PracticesDavidMcLachlan1
 
3.0 The Agile Manifesto and Clarifying principles
3.0 The Agile Manifesto and Clarifying principles3.0 The Agile Manifesto and Clarifying principles
3.0 The Agile Manifesto and Clarifying principlesDavidMcLachlan1
 

More from DavidMcLachlan1 (20)

10.1 Plan Communication Management
10.1 Plan Communication Management10.1 Plan Communication Management
10.1 Plan Communication Management
 
9.5 Manage Team
9.5 Manage Team9.5 Manage Team
9.5 Manage Team
 
12.1 Procurement Contracts
12.1 Procurement Contracts12.1 Procurement Contracts
12.1 Procurement Contracts
 
12.2 Conduct Procurements
12.2 Conduct Procurements12.2 Conduct Procurements
12.2 Conduct Procurements
 
12.3 Control Procurements
12.3 Control Procurements12.3 Control Procurements
12.3 Control Procurements
 
6.5 Develop Schedule
6.5 Develop Schedule6.5 Develop Schedule
6.5 Develop Schedule
 
5.1 Plan Scope Management
5.1 Plan Scope Management5.1 Plan Scope Management
5.1 Plan Scope Management
 
4.4 Manage Project Knowledge
4.4 Manage Project Knowledge4.4 Manage Project Knowledge
4.4 Manage Project Knowledge
 
Project Cost Forecasting Techniques with EAC, ETC, VAC, TCPI
Project Cost Forecasting Techniques with EAC, ETC, VAC, TCPIProject Cost Forecasting Techniques with EAC, ETC, VAC, TCPI
Project Cost Forecasting Techniques with EAC, ETC, VAC, TCPI
 
Scenario - Project Management Processes | 2 of 2
Scenario - Project Management Processes | 2 of 2Scenario - Project Management Processes | 2 of 2
Scenario - Project Management Processes | 2 of 2
 
Scenario - Project Management Processes | 1 of 2
Scenario - Project Management Processes | 1 of 2Scenario - Project Management Processes | 1 of 2
Scenario - Project Management Processes | 1 of 2
 
Scenario - The Project Management Environment
Scenario - The Project Management EnvironmentScenario - The Project Management Environment
Scenario - The Project Management Environment
 
Agile Scenarios - Delivering an Agile Environment
Agile Scenarios - Delivering an Agile EnvironmentAgile Scenarios - Delivering an Agile Environment
Agile Scenarios - Delivering an Agile Environment
 
Agile Scenarios - Core Practices
Agile Scenarios - Core PracticesAgile Scenarios - Core Practices
Agile Scenarios - Core Practices
 
Agile Core Practices - Rolling Wave Planning
Agile Core Practices - Rolling Wave PlanningAgile Core Practices - Rolling Wave Planning
Agile Core Practices - Rolling Wave Planning
 
6.0 Auxiliary Agile and Lean Frameworks
6.0 Auxiliary Agile and Lean Frameworks6.0 Auxiliary Agile and Lean Frameworks
6.0 Auxiliary Agile and Lean Frameworks
 
5.0 Core Agile and Lean Frameworks
5.0 Core Agile and Lean Frameworks5.0 Core Agile and Lean Frameworks
5.0 Core Agile and Lean Frameworks
 
7.0 Delivering in an Agile Environment
7.0 Delivering in an Agile Environment7.0 Delivering in an Agile Environment
7.0 Delivering in an Agile Environment
 
4.0 The Agile Core Practices
4.0 The Agile Core Practices4.0 The Agile Core Practices
4.0 The Agile Core Practices
 
3.0 The Agile Manifesto and Clarifying principles
3.0 The Agile Manifesto and Clarifying principles3.0 The Agile Manifesto and Clarifying principles
3.0 The Agile Manifesto and Clarifying principles
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

11.5 Strategies for Threats vs Opportunities

  • 3. What is it? Strategies for threats and opportunities are plans of actions that are considered for dealing with risks (both negative and positive) in a project. Strategies for Threats Vs Strategies for Opportunities
  • 4. Strategies for Threats 1. Escalate 2. Avoid 3. Transfer 4. Mitigate 5. Accept Strategies for Threats Vs Strategies for Opportunities Strategies for Opportunities 1. Escalate 2. Exploit 3. Share 4. Enhance 5. Accept
  • 5. Five strategies considered for dealing with threats: Escalate • Escalating the risk (or proposed response) to a higher level that would be affected if the threat occurred (i.e. Executive Manager or a Sponsor) Avoid • Risk avoidance is when we are moving or changing the project objective to avoid the risk. Strategies for Threats Vs Strategies for Opportunities
  • 6. Strategies for Threats Vs Strategies for Opportunities Transfer • Transfer involves shifting ownership of a threat to a third party (for a price) to manage the risk and to bear the impact if the threat occurs (i.e. Insurance) Mitigate • Taking action to reduce the probability of occurrence and/or impact of a threat (using things like prototyping, more tests, less complex processes)
  • 7. Strategies for Threats Vs Strategies for Opportunities Accept • Risk acceptance acknowledges the existence of a threat, but no proactive action is taken. • Acceptance may be appropriate for low- priority threats, and may also be adopted where it is not possible or cost-effective to address a threat in any other way.
  • 8. Five strategies considered for dealing with opportunities: Escalate • When an opportunity is outside the scope of the project or would exceed the project manager’s authority. Exploit • The exploit strategy may be selected for high-priority opportunities where the organization wants to ensure that the opportunity is realized. Strategies for Threats Vs Strategies for Opportunities
  • 9. Strategies for Threats Vs Strategies for Opportunities Share • Sharing involves transferring ownership of an opportunity to a third party so that it shares some of the benefit if the opportunity occurs. Enhance • The enhance strategy is used to increase the probability and/or impact of an opportunity. • The probability of occurrence of an opportunity may be increased by focusing attention on its causes.
  • 10. Strategies for Threats Vs Strategies for Opportunities Accept • Acceptance acknowledges the existence of an opportunity, but no proactive action is taken. • Acceptance may be appropriate for low- priority opportunities, and may also be adopted where it is not possible or cost- effective to address an opportunity in any other way.