SlideShare a Scribd company logo
Managing
product risk
Alex Pandel & Michael Torres, 18F
In partnership with the Department of the Interior’s Office of Natural Resources Revenue
Every product effort has risks.
Identifying, tracking and managing
them from the beginning is critical to
product success.
2
What is product
risk?
3
A product risk is anything that could
get in the way of the team achieving
the vision
4
Risks can be internal or external.
5
Risks can be internal or external.
They can be around business,
product, project or process.
6
Risks can be internal or external.
They can be around business,
product, project or process. They
have varying impacts, and
likelihoods.
7
Like anything else, risks change all
the time, because the world changes
8
Like anything else, risks change all
the time, because the world
changes. So they need to be
constantly assessed.
9
Some risks get riskier over time
10
Some risks subside over time
11
New risks can develop at any time
12
Actively managing risk is an
important part of any product
process
13
Managing risk
14
Managing risk is a practice that
helps minimize the impact of threats
to the product
15
1 2 3 4 5
The practice of risk management
DefineIdentify
Managing product risk
Prioritize Mitigate and
measure
Communicate
Identify
Don’t wait for risks to find you. Keep
an eye out for risks and identify and
record them quickly
17
Define
What is the nature of the risk? What
is its potential impact? What is its
likelihood?
18
Prioritize
Which risks do you work on now?
Which can wait?
19
20
Risk requirement Risk tolerance
Financial capacity
Prioritize the risks
that are required,
that the team feels
comfortable taking,
and that you can
afford
Mitigate and measure
Come up with a plan to mitigate high
priority risks and work it into your
product backlog. Come up with
metrics to measure your progress
21
Communicate
Make sure everyone knows what
you’re doing to mitigate the high
priority risks and what’s working
22
Risks and their status need to be
visible to everyone at all times.
23
Because they affect stakeholders,
users and any constituent who
hopes to get value from the product
24
Risk management
as a feature
25
It’s tempting to want to avoid talking
about risk because it scares people.
26
But in fact, risk management is
already a focus of what product
teams build and do. And, that’s a
good thing!
27
There is always a risk that security
may be breached on a given system,
which is why we implement
authentication and authorization.
28
There is always a risk that working
on large complex features will result
in problematic implementations,
which is why we break complex
features into smaller ones.
29
There is always a risk that we will
miss a critical stakeholder which is
why we continually communicate our
product story
30
Protecting your constituents from
risk is valuable. So, this work should
be called out and prioritized along
with any other value you are trying to
deliver
31
So, make a point to bring up risks
and talk openly about them with your
team and any stakeholders.
32
Doing this protects your team and
opens you up to innovation.
33
What are your
product risks?
34

More Related Content

Similar to Managing product risk

PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
DorraLamouchi1
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
avisha23
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
Prime Infoserv
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core Consulting
CORE Consulting
 
project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
BetshaTizazu2
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk Management
Kelvin Fredson
 
Risk Management in Agile Methodology.ppt
Risk Management in Agile Methodology.pptRisk Management in Agile Methodology.ppt
Risk Management in Agile Methodology.ppt
Knoldus Inc.
 
Risk Management Presentation (Agile).pptx
Risk Management Presentation (Agile).pptxRisk Management Presentation (Agile).pptx
Risk Management Presentation (Agile).pptx
Knoldus Inc.
 
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
Mark Ritchie
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as Opportunity
Glen Alleman
 
Project/Program Risk management
Project/Program Risk managementProject/Program Risk management
Project/Program Risk management
Shan Sokhanvar (CISM, AWS-SAP, PMP, MCTS)
 
Risk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptxRisk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptx
muthukrishnaveni anand
 
M09_Risk Assessment ebook
M09_Risk Assessment ebookM09_Risk Assessment ebook
M09_Risk Assessment ebookKanchana Bishop
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptx
AhmadHassanein
 
Risk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshopRisk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshop
Association for Project Management
 
Risk management
Risk managementRisk management
Risk management
Ajit Kumar
 
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
Dr Riyaz Muhmmad
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
SAJJAD KHUDHUR ABBAS
 

Similar to Managing product risk (20)

PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core Consulting
 
project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk Management
 
Risk Management in Agile Methodology.ppt
Risk Management in Agile Methodology.pptRisk Management in Agile Methodology.ppt
Risk Management in Agile Methodology.ppt
 
Risk Management Presentation (Agile).pptx
Risk Management Presentation (Agile).pptxRisk Management Presentation (Agile).pptx
Risk Management Presentation (Agile).pptx
 
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as Opportunity
 
Project/Program Risk management
Project/Program Risk managementProject/Program Risk management
Project/Program Risk management
 
Risk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptxRisk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
M09_Risk Assessment ebook
M09_Risk Assessment ebookM09_Risk Assessment ebook
M09_Risk Assessment ebook
 
سيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptxسيمينار إدارة المخاطر (1).pptx
سيمينار إدارة المخاطر (1).pptx
 
Risk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshopRisk descriptions from 'Coconut island' risk workshop
Risk descriptions from 'Coconut island' risk workshop
 
Risk management
Risk managementRisk management
Risk management
 
Pm session10
Pm session10Pm session10
Pm session10
 
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 

More from Alex Pandel

Visibility and continuous updates
Visibility and continuous updatesVisibility and continuous updates
Visibility and continuous updates
Alex Pandel
 
Broadcasting your product narrative
Broadcasting your product narrativeBroadcasting your product narrative
Broadcasting your product narrative
Alex Pandel
 
Crafting a central product narrative
Crafting a central product narrativeCrafting a central product narrative
Crafting a central product narrative
Alex Pandel
 
Scrum overview
Scrum overviewScrum overview
Scrum overview
Alex Pandel
 
Measurement and metrics
Measurement and metricsMeasurement and metrics
Measurement and metrics
Alex Pandel
 
The process of building a backlog
The process of building a backlogThe process of building a backlog
The process of building a backlog
Alex Pandel
 
Roadmapping
RoadmappingRoadmapping
Roadmapping
Alex Pandel
 
Product Management 101
Product Management 101Product Management 101
Product Management 101
Alex Pandel
 

More from Alex Pandel (8)

Visibility and continuous updates
Visibility and continuous updatesVisibility and continuous updates
Visibility and continuous updates
 
Broadcasting your product narrative
Broadcasting your product narrativeBroadcasting your product narrative
Broadcasting your product narrative
 
Crafting a central product narrative
Crafting a central product narrativeCrafting a central product narrative
Crafting a central product narrative
 
Scrum overview
Scrum overviewScrum overview
Scrum overview
 
Measurement and metrics
Measurement and metricsMeasurement and metrics
Measurement and metrics
 
The process of building a backlog
The process of building a backlogThe process of building a backlog
The process of building a backlog
 
Roadmapping
RoadmappingRoadmapping
Roadmapping
 
Product Management 101
Product Management 101Product Management 101
Product Management 101
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Managing product risk