SlideShare a Scribd company logo
1 of 28
Download to read offline
Tathagat Varma


Tathagat Varma
 Session 5/12: 10-Jun-2010
    Risk
    Negative Risk vs Positive Risk
    Secondary Risk Vs. Residual Risk
    Known Unknowns and Unknown Unknowns
    Risk Category
    Risk Proximity
    Risk Probability
    Risk Impact
    Risk Tolerance / Risk Appetite
    Risk Response Strategy
    Risk Reserve, Management Contingency Reserve
    Risk Management Approaches
    Risk is an uncertain event in future that, if/when
     occurs, impacts the project objectives like scope,
     cost, schedule or quality
    A risk could have multiple causes and multiple
     impacts
         A cause could be requirement, assumption, constraint or a
          condition that creates possibility of positive or negative
          outcomes
    Risk conditions could include aspects of an
     organization’s or a project’s environment that
     may contribute to project risk, such as immature
     project management practices, etc.
    PRINCE2 defines risk as: ‘Uncertainty of
     Outcome – whether positive opportunity or
     negative threat’.
    Project risk represents inherent uncertainty in
     any project
    A project risk that has materialized has no
     uncertainty anymore!
       Should   be treated as an issue and addressed as such
    Negative Risks (“Threats”)
       Negative   impact
    Positive Risks (“Opportunities”)
       Positive   impact
    Avoid
    Transfer
    Mitigate
    Accept
    Risk avoidance involves changing the project
     plan to eliminate the threat entirely.
    The most radical risk avoidance strategy
     would be to shut down the project entirely!
    Risk transfer requires shifting some or all of the negative
     impact of a threat, along with partnership of response, to a
     third party.
    Transferring the risk simply gives another party the
     responsibility for its management – it does not eliminate
     it.
    Transferring liability for risk is most effective in dealing
     with financial risk exposure, and tools could include
     insurance, guarantees, performance bonds, warranties, etc.
    Contracts may be used to transfer liability for specified
     risks to another party:
         For example, when a buyer has capabilities that the seller doesn’t,
          it might be prudent to transfer some work and its concurrent risk
          contractually back to buyer
         In many cases, use of a cost-plus contract may transfer the cost risk
          to the buyer, while a fixed-price contract may transfer risk to the
          seller
    Risk mitigation implies a reduction in the
     probability or impact of an adverse risk event
     to be within acceptable threshold limits.
    Taking early action to reduce the probability
     or impact of a risk occurring in the project is
     often more effective than trying to repair the
     damage after the risk has happened.
    When it is not possible to reduce the
     probability, a mitigation response might
     address the risk impact by targeting linkages
     that determine the severity
    The strategy indicates that the project team
     has decided not to change the project plan to
     deal with a risk, or is unable to identify any
     other suitable response strategy.
    This strategy is adopted because it is seldome
     possible to eliminate all threats from a project
    This strategy could be active or passive
       Passive acceptance requires no action except to
        document the strategy, leaving the project team to
        deal with risks and when they occur
       Most common active acceptance strategy is to
        establish a contingency reserve, including amount of
        time, money or resources to handle the risk
    Exploit
    Share
    Enhance
    Accept
    This strategy might be selected for risks with
     positive impacts where the organization
     wishes to ensure that the opportunity is
     realized. This strategy seeks to eliminate the
     uncertainty associated with a particular
     upside risk by ensuring the opportunity
     definitely happens.
    Example, assigning an organization’s most
     talented resources to the project to reduce the
     time to completion or to provide lower cost
     than originally planned
    Sharing a positive risk involves allocating
     some or all of the ownership of the
     opportunity to a third party who is best able
     to capture the opportunity for the benefit of a
     project
    Examples include risk-sharing partnerships,
     teams, special-purpose companies, etc. which
     can be established with the express purpose
     of taking advantage of the opportunity so that
     all parties gain from their actions.
    This strategy is used to increase the
     probability and/or positive impacts of an
     opportunity.
    Identifying and maximizing key drivers of
     these positive-impact risks may increase the
     probability of their occurrence
    Examples of enhancing opportunities include
     adding more resources to an activity to finish
     early
    Accepting the opportunity is being willing to
     take advantage of it if it comes along, but not
     actively pursuing it
    Some responses are designed for use only if
     certain events occur. For some risks, it is
     appropriate for the project team to make a
     response plan that will only be executed
     under certain predefined conditions, if it is
     believed that there will be sufficient warning
     to implement the plan.
    Events that trigger the contingency response,
     such as missing intermediate milestones or
     gaining higher priority wait a supplier should
     be defied and tracked
    A secondary risk can be defined as a risk
     created by the response to another risk.
       In other words, the secondary risk is a consequence
        of dealing with the original risk.
       A simple way to look at this is to think of project
        management as a chess game in which one has to
        think as many moves ahead as possible. One has to
        consider the reaction to the reaction, or in other
        words, the consequences that could arise from
        dealing with a problem or risk.
       Secondary risks are generally not as severe or
        significant as primary risks, but can become so if not
        anticipated and planned for appropriately.
    Exposure to loss remaining after other known
     risks have been countered, factored in, or
     eliminated.
       Residual  risk primarily is applied to any element of
       risk that remains once the risk assessment as been
       made and responses implemented.
    Defense Secretary Donald Rumsfeld, Feb
     12, 2002:
       “Reports that say that something hasn't
      happened are always interesting to me,
      because as we know, there are known
      knowns; there are things we know we know.
      We also know there are known unknowns;
      that is to say we know there are some things
      we do not know. But there are also unknown
      unknowns -- the ones we don't know we
      don't know.”
    The term was in use within the US military establishment long
     before Rumsfeld's quote. An early use of the term comes from a
     paper entitled Clausewitz and Modern War Gaming: losing can
     be better than winning by Raymond B. Furlong, Lt Gen, USAF
     (Ret.) in the Air University Review, July-August 1984:
         “ To those things Clausewitz wrote about uncertainty and chance, I would add
          a few comments on unknown unknowns--those things that a commander
          doesn't even know he doesn't know. Participants in a war game would describe
          an unknown unknown as unfair, beyond the ground rules of the game. But real
          war does not follow ground rules, and I would urge that games be "unfair" by
          introducing unknown unknowns.[7] ” “
         NASA space exploration should largely address a problem class in reliability
          and risk management stemming primarily from human error, system risk and
          multi-objective trade-off analysis, by conducting research into system
          complexity, risk characterization and modeling, and system reasoning. In
          general, in every mission we can distinguish risk in three possible ways: a)
          known-known, b) known-unknown, and c)unknown-unknown. It is probable,
          almost certain, that space exploration will partially experience similar known or
          unknown risks embedded in the Apollo missions, Shuttle or Station unless
          something alters how NASA will perceive and manage safety and reliability. [8]
    From the same time, conservative lawyer Richard Epstein wrote
     a well known article in the University of Chicago Law Review
     about the American labour law doctrine of employment at will
     (the idea that workers can be fired without warning or reason,
     unless their contract states terms that are better). In giving some
     of his reasons in defense of the contract at will, he wrote this.
         “ The contract at will is also a sensible private adaptation to the
          problem of imperfect information over time. In sharp contrast to the
          purchase of standard goods, an inspection of the job before acceptance
          is far less likely to guarantee its quality thereafter. The future is not
          clearly known. More important, employees, like employers, know
          what they do not know. They are not faced with a bolt from the blue,
          with an "unknown unknown." Rather they face a known unknown for
          which they can plan. The at-will contract is an essential part of that
          planning because it allows both sides to take a wait-and-see attitude to
          their relationship so that new and more accurate choices can be made
          on the strength of improved information.[9]
    Known Unknown
       refers to circumstances or outcomes that are known
        to be possible, but it is unknown whether or not they
        will be realized.
       The term is used in project planning and decision
        analysis to explain that any model of the future can
        only be informed by information that is currently
        available to the observer and, as such, faces
        substantial limitations and unknown risk.
       Known risks are those that have been identified and
        analysed, making it possible to plan responses for
        those risks
    Unknown Unknowns
       refers to circumstances or outcomes that were not
        conceived of by an observer at a given point in time.
       Specific unknown risks can’t be managed
        proactively, which suggests that project team should
        create a contingency plan
    Risks can be categorized under headings:
       Strategic/Commercial;
       Economic/Financial/Market;
       Legal  & Regulatory;
       Organisational/Management/Human factors;
       Political; Environmental;
       Technical/Operational/Infrastructure
    Operational Risk: Risks of loss due to improper process implementation, failed system or some external events risks.
     Examples can be Failure to address priority conflicts, Insufficient resources or No proper subject training etc.
    Schedule Risk: Project schedule get slip when project tasks and schedule release risks are not addressed properly.
     Schedule risks mainly affect on project and finally on company economy and may lead to project failure
    Budget Risk: Wrong budget estimation or Project scope expansion leads to Budget / Cost Risk.  This risk may lead to
     either a delay in the delivery of the project or sometimes even an incomplete closure of the project.
    Business Risk: Non-availability of contracts or purchase order at the start of the project or delay in receiving proper
     inputs from the customer or business analyst may lead to business risks.
    Technical Environment Risk: These are the risks related to the environment under which both the client and the
     customer work. For example, constantly changing development or production  or testing environment can lead to this
     risk.
    Information Security Risk: The risks related to the security of information like confidentiality or integrity of customer’s
     personal / business data. The Access rights / privileges failure will lead to leakage of confidential data.
     Programmatic Risks: The external risks beyond the operational limits. These are outside the control of the program.
     These external events can be Running out of fund or Changing customer product strategy and priority or Government
     rule changes etc.
    Infrastructure Risk: Improper planning of infrastructure / resources may lead to risks related to slow network
     connectivity or complete failure of connectivity at both the client and the customer sites. So, it is important to do proper
     planning of infrastructure for the efficient development of a project.
    Quality and Process Risk: This risk occures due to 
          incorrect application of process tailoring and deviation guidelines .
          New employees allocated to the project not trained in the quality processes and procedures adopted by the organization
    Resource Risk: This risk depends on factors like Schedule, Staff, Budget and Facilities. Improper management of any of
     these factors leads to resource risk.
    Supplier Risk: This type of risk may occurs when some third party supplier is involved in the development of the
     project. This risk occurs due to the uncertain or inadequate capability of supplier.
    Technology Risk: It is related to the complete change in technology or introduction of a new technology.
    Technical and Architectural Risk: These types of risks generally generally leads to failure of functionality and
     performance. It addresses the hardware and software tools & supporting equipments used in the project. The risk for this
     category may be due to — Capacity, Suitability, usability, Familiarity, Reliability, System Support and deliverability.
    Risks are contained within the project by carrying out a
     Risk Analysis
         Identification;
         Evaluation;
         Response and
         Action selection
    and addressed through Risk Management
         Planning & Resourcing;
         Monitoring & Reporting
    A Risk Analysis may identify one of the following five
     suitable responses:
         Prevention,
         Reduction,
         Transference,
         Contingency and
         Acceptance.
    Denial is NOT a valid risk response.
    ‘When’ the risk is likely to occur is known as
     the risk’s ‘Proximity’.

More Related Content

What's hot

Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...Liana Underwood
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshopBestoutcome
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)Serdar Temiz
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Risk management
Risk managementRisk management
Risk managementMECandPMV
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk managementPMC Mentor
 
Project risk management
Project risk managementProject risk management
Project risk managementDewang Agrawal
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register simplesteps
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk managementPractiTest
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniquesMarco De Santis, PMP, CFPP
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementTorsten Koerting
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Dhamo daran
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
Risk management plan
Risk management planRisk management plan
Risk management planKashif Mastan
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk ManagementGlen Alleman
 

What's hot (20)

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
Susan Parente Presents: Busting Barriers to Risk Management: PM Reston Lunche...
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshop
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register
 
Pmp risk management
Pmp risk managementPmp risk management
Pmp risk management
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk management
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniques
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
Risk management plan
Risk management planRisk management plan
Risk management plan
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk Management
 
Project Risk
Project RiskProject Risk
Project Risk
 

Viewers also liked

Haskayne School of Business - Project Risk Management Guest Lecture
Haskayne School of Business - Project Risk Management Guest LectureHaskayne School of Business - Project Risk Management Guest Lecture
Haskayne School of Business - Project Risk Management Guest LecturejasonZal
 
WINs Process Mapping - Risk Assessment Session
WINs Process Mapping - Risk Assessment SessionWINs Process Mapping - Risk Assessment Session
WINs Process Mapping - Risk Assessment Sessionjohncarrollcanyon
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Goutama Bachtiar
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk ManagementGunjan Patel
 
Project Risk Management - PMBOK5
Project Risk Management - PMBOK5Project Risk Management - PMBOK5
Project Risk Management - PMBOK5pankajsh10
 

Viewers also liked (6)

Haskayne School of Business - Project Risk Management Guest Lecture
Haskayne School of Business - Project Risk Management Guest LectureHaskayne School of Business - Project Risk Management Guest Lecture
Haskayne School of Business - Project Risk Management Guest Lecture
 
WINs Process Mapping - Risk Assessment Session
WINs Process Mapping - Risk Assessment SessionWINs Process Mapping - Risk Assessment Session
WINs Process Mapping - Risk Assessment Session
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
Project Risk Management - PMBOK5
Project Risk Management - PMBOK5Project Risk Management - PMBOK5
Project Risk Management - PMBOK5
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Similar to Risk Management Fundamentals

Lecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxLecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxMehediHasan636262
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)JOSEPH Maas
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk ManagementKelvin Fredson
 
IntroductionThe standards of venture risk administration can be .docx
IntroductionThe standards of venture risk administration can be .docxIntroductionThe standards of venture risk administration can be .docx
IntroductionThe standards of venture risk administration can be .docxmariuse18nolet
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docxjesusamckone
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docxRAJU852744
 
Ten rules of project risk management
Ten rules of project risk managementTen rules of project risk management
Ten rules of project risk managementTony
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
Risk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptxRisk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptxmuthukrishnaveni anand
 
Transforming project risk management into project uncertainty management
Transforming project risk management into project uncertainty managementTransforming project risk management into project uncertainty management
Transforming project risk management into project uncertainty managementHani Saad
 
ERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxManiPSamRCBS
 
10 golden rules of project risk management
10 golden rules of project risk management10 golden rules of project risk management
10 golden rules of project risk managementpinalti
 
Risky Business
Risky BusinessRisky Business
Risky Business3gamma
 
Event and Non-Event Risk - PMP/CAPM from PMI
Event and Non-Event Risk  - PMP/CAPM from PMIEvent and Non-Event Risk  - PMP/CAPM from PMI
Event and Non-Event Risk - PMP/CAPM from PMIMudassir Iqbal
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 

Similar to Risk Management Fundamentals (20)

Risk management
Risk managementRisk management
Risk management
 
Lecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxLecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptx
 
Risk
Risk Risk
Risk
 
PRM & PPM.pptx
PRM & PPM.pptxPRM & PPM.pptx
PRM & PPM.pptx
 
Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)Implementing Ways to Limit Risk (Risk Mitigation)
Implementing Ways to Limit Risk (Risk Mitigation)
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk Management
 
Project Management 08
Project Management 08Project Management 08
Project Management 08
 
IntroductionThe standards of venture risk administration can be .docx
IntroductionThe standards of venture risk administration can be .docxIntroductionThe standards of venture risk administration can be .docx
IntroductionThe standards of venture risk administration can be .docx
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
 
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
130 MASTERING RISK AND PROCUREMENT IN PROJECT MANAGEMENTre.docx
 
Ten rules of project risk management
Ten rules of project risk managementTen rules of project risk management
Ten rules of project risk management
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
Risk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptxRisk Management and Control(Insurance).pptx
Risk Management and Control(Insurance).pptx
 
Transforming project risk management into project uncertainty management
Transforming project risk management into project uncertainty managementTransforming project risk management into project uncertainty management
Transforming project risk management into project uncertainty management
 
ERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptx
 
10 golden rules of project risk management
10 golden rules of project risk management10 golden rules of project risk management
10 golden rules of project risk management
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Event and Non-Event Risk - PMP/CAPM from PMI
Event and Non-Event Risk  - PMP/CAPM from PMIEvent and Non-Event Risk  - PMP/CAPM from PMI
Event and Non-Event Risk - PMP/CAPM from PMI
 
Risk evaluation
Risk evaluationRisk evaluation
Risk evaluation
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 

More from Tathagat Varma

Can AI finally "cure" the Marketing Myopia?
Can AI finally "cure" the Marketing Myopia?Can AI finally "cure" the Marketing Myopia?
Can AI finally "cure" the Marketing Myopia?Tathagat Varma
 
AI in Manufacturing: Opportunities & Challenges
AI in Manufacturing: Opportunities & ChallengesAI in Manufacturing: Opportunities & Challenges
AI in Manufacturing: Opportunities & ChallengesTathagat Varma
 
Preparing for the next ________?
Preparing for the next ________?Preparing for the next ________?
Preparing for the next ________?Tathagat Varma
 
AI in Business: Opportunities & Challenges
AI in Business: Opportunities & ChallengesAI in Business: Opportunities & Challenges
AI in Business: Opportunities & ChallengesTathagat Varma
 
Leadership Agility Mindsets
Leadership Agility MindsetsLeadership Agility Mindsets
Leadership Agility MindsetsTathagat Varma
 
Building an AI Startup
Building an AI StartupBuilding an AI Startup
Building an AI StartupTathagat Varma
 
Agility in an AI / DS / ML Project
Agility in an AI / DS / ML ProjectAgility in an AI / DS / ML Project
Agility in an AI / DS / ML ProjectTathagat Varma
 
AI Technology Delivering Business Value
AI Technology Delivering Business Value AI Technology Delivering Business Value
AI Technology Delivering Business Value Tathagat Varma
 
Nurturing Innovation Mindset
Nurturing Innovation MindsetNurturing Innovation Mindset
Nurturing Innovation MindsetTathagat Varma
 
PMOs and Complexity Management
PMOs and Complexity ManagementPMOs and Complexity Management
PMOs and Complexity ManagementTathagat Varma
 
An Introduction to the Systematic Inventive Thinking (SIT) Method
An Introduction to the Systematic Inventive Thinking (SIT) MethodAn Introduction to the Systematic Inventive Thinking (SIT) Method
An Introduction to the Systematic Inventive Thinking (SIT) MethodTathagat Varma
 
I blog...therefore I am!
I blog...therefore I am!I blog...therefore I am!
I blog...therefore I am!Tathagat Varma
 
Bridging the gap between Education and Learning
Bridging the gap between Education and LearningBridging the gap between Education and Learning
Bridging the gap between Education and LearningTathagat Varma
 
Is my iceberg melting?
Is my iceberg melting?Is my iceberg melting?
Is my iceberg melting?Tathagat Varma
 
Digital Business Model Innovation
Digital Business Model InnovationDigital Business Model Innovation
Digital Business Model InnovationTathagat Varma
 
25 Years of Evolution of Software Product Management: A practitioner's perspe...
25 Years of Evolution of Software Product Management: A practitioner's perspe...25 Years of Evolution of Software Product Management: A practitioner's perspe...
25 Years of Evolution of Software Product Management: A practitioner's perspe...Tathagat Varma
 
Agility from First Principles
Agility from First PrinciplesAgility from First Principles
Agility from First PrinciplesTathagat Varma
 

More from Tathagat Varma (20)

Can AI finally "cure" the Marketing Myopia?
Can AI finally "cure" the Marketing Myopia?Can AI finally "cure" the Marketing Myopia?
Can AI finally "cure" the Marketing Myopia?
 
AI in Manufacturing: Opportunities & Challenges
AI in Manufacturing: Opportunities & ChallengesAI in Manufacturing: Opportunities & Challenges
AI in Manufacturing: Opportunities & Challenges
 
Preparing for the next ________?
Preparing for the next ________?Preparing for the next ________?
Preparing for the next ________?
 
AI in Business: Opportunities & Challenges
AI in Business: Opportunities & ChallengesAI in Business: Opportunities & Challenges
AI in Business: Opportunities & Challenges
 
Leadership Agility Mindsets
Leadership Agility MindsetsLeadership Agility Mindsets
Leadership Agility Mindsets
 
Building an AI Startup
Building an AI StartupBuilding an AI Startup
Building an AI Startup
 
Agility in an AI / DS / ML Project
Agility in an AI / DS / ML ProjectAgility in an AI / DS / ML Project
Agility in an AI / DS / ML Project
 
Cognitive Chasms
Cognitive ChasmsCognitive Chasms
Cognitive Chasms
 
AI Technology Delivering Business Value
AI Technology Delivering Business Value AI Technology Delivering Business Value
AI Technology Delivering Business Value
 
Nurturing Innovation Mindset
Nurturing Innovation MindsetNurturing Innovation Mindset
Nurturing Innovation Mindset
 
Thought Leadership
Thought LeadershipThought Leadership
Thought Leadership
 
PMOs and Complexity Management
PMOs and Complexity ManagementPMOs and Complexity Management
PMOs and Complexity Management
 
An Introduction to the Systematic Inventive Thinking (SIT) Method
An Introduction to the Systematic Inventive Thinking (SIT) MethodAn Introduction to the Systematic Inventive Thinking (SIT) Method
An Introduction to the Systematic Inventive Thinking (SIT) Method
 
Agile at Scale
Agile at ScaleAgile at Scale
Agile at Scale
 
I blog...therefore I am!
I blog...therefore I am!I blog...therefore I am!
I blog...therefore I am!
 
Bridging the gap between Education and Learning
Bridging the gap between Education and LearningBridging the gap between Education and Learning
Bridging the gap between Education and Learning
 
Is my iceberg melting?
Is my iceberg melting?Is my iceberg melting?
Is my iceberg melting?
 
Digital Business Model Innovation
Digital Business Model InnovationDigital Business Model Innovation
Digital Business Model Innovation
 
25 Years of Evolution of Software Product Management: A practitioner's perspe...
25 Years of Evolution of Software Product Management: A practitioner's perspe...25 Years of Evolution of Software Product Management: A practitioner's perspe...
25 Years of Evolution of Software Product Management: A practitioner's perspe...
 
Agility from First Principles
Agility from First PrinciplesAgility from First Principles
Agility from First Principles
 

Risk Management Fundamentals

  • 1. Tathagat Varma Tathagat Varma Session 5/12: 10-Jun-2010
  • 2.   Risk   Negative Risk vs Positive Risk   Secondary Risk Vs. Residual Risk   Known Unknowns and Unknown Unknowns   Risk Category   Risk Proximity   Risk Probability   Risk Impact   Risk Tolerance / Risk Appetite   Risk Response Strategy   Risk Reserve, Management Contingency Reserve   Risk Management Approaches
  • 3.   Risk is an uncertain event in future that, if/when occurs, impacts the project objectives like scope, cost, schedule or quality   A risk could have multiple causes and multiple impacts   A cause could be requirement, assumption, constraint or a condition that creates possibility of positive or negative outcomes   Risk conditions could include aspects of an organization’s or a project’s environment that may contribute to project risk, such as immature project management practices, etc.   PRINCE2 defines risk as: ‘Uncertainty of Outcome – whether positive opportunity or negative threat’.
  • 4.   Project risk represents inherent uncertainty in any project   A project risk that has materialized has no uncertainty anymore!   Should be treated as an issue and addressed as such
  • 5.   Negative Risks (“Threats”)   Negative impact   Positive Risks (“Opportunities”)   Positive impact
  • 6.   Avoid   Transfer   Mitigate   Accept
  • 7.   Risk avoidance involves changing the project plan to eliminate the threat entirely.   The most radical risk avoidance strategy would be to shut down the project entirely!
  • 8.   Risk transfer requires shifting some or all of the negative impact of a threat, along with partnership of response, to a third party.   Transferring the risk simply gives another party the responsibility for its management – it does not eliminate it.   Transferring liability for risk is most effective in dealing with financial risk exposure, and tools could include insurance, guarantees, performance bonds, warranties, etc.   Contracts may be used to transfer liability for specified risks to another party:   For example, when a buyer has capabilities that the seller doesn’t, it might be prudent to transfer some work and its concurrent risk contractually back to buyer   In many cases, use of a cost-plus contract may transfer the cost risk to the buyer, while a fixed-price contract may transfer risk to the seller
  • 9.   Risk mitigation implies a reduction in the probability or impact of an adverse risk event to be within acceptable threshold limits.   Taking early action to reduce the probability or impact of a risk occurring in the project is often more effective than trying to repair the damage after the risk has happened.   When it is not possible to reduce the probability, a mitigation response might address the risk impact by targeting linkages that determine the severity
  • 10.   The strategy indicates that the project team has decided not to change the project plan to deal with a risk, or is unable to identify any other suitable response strategy.   This strategy is adopted because it is seldome possible to eliminate all threats from a project   This strategy could be active or passive   Passive acceptance requires no action except to document the strategy, leaving the project team to deal with risks and when they occur   Most common active acceptance strategy is to establish a contingency reserve, including amount of time, money or resources to handle the risk
  • 11.   Exploit   Share   Enhance   Accept
  • 12.   This strategy might be selected for risks with positive impacts where the organization wishes to ensure that the opportunity is realized. This strategy seeks to eliminate the uncertainty associated with a particular upside risk by ensuring the opportunity definitely happens.   Example, assigning an organization’s most talented resources to the project to reduce the time to completion or to provide lower cost than originally planned
  • 13.   Sharing a positive risk involves allocating some or all of the ownership of the opportunity to a third party who is best able to capture the opportunity for the benefit of a project   Examples include risk-sharing partnerships, teams, special-purpose companies, etc. which can be established with the express purpose of taking advantage of the opportunity so that all parties gain from their actions.
  • 14.   This strategy is used to increase the probability and/or positive impacts of an opportunity.   Identifying and maximizing key drivers of these positive-impact risks may increase the probability of their occurrence   Examples of enhancing opportunities include adding more resources to an activity to finish early
  • 15.   Accepting the opportunity is being willing to take advantage of it if it comes along, but not actively pursuing it
  • 16.   Some responses are designed for use only if certain events occur. For some risks, it is appropriate for the project team to make a response plan that will only be executed under certain predefined conditions, if it is believed that there will be sufficient warning to implement the plan.   Events that trigger the contingency response, such as missing intermediate milestones or gaining higher priority wait a supplier should be defied and tracked
  • 17.   A secondary risk can be defined as a risk created by the response to another risk.   In other words, the secondary risk is a consequence of dealing with the original risk.   A simple way to look at this is to think of project management as a chess game in which one has to think as many moves ahead as possible. One has to consider the reaction to the reaction, or in other words, the consequences that could arise from dealing with a problem or risk.   Secondary risks are generally not as severe or significant as primary risks, but can become so if not anticipated and planned for appropriately.
  • 18.   Exposure to loss remaining after other known risks have been countered, factored in, or eliminated.   Residual risk primarily is applied to any element of risk that remains once the risk assessment as been made and responses implemented.
  • 19.   Defense Secretary Donald Rumsfeld, Feb 12, 2002:   “Reports that say that something hasn't happened are always interesting to me, because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns -- the ones we don't know we don't know.”
  • 20.   The term was in use within the US military establishment long before Rumsfeld's quote. An early use of the term comes from a paper entitled Clausewitz and Modern War Gaming: losing can be better than winning by Raymond B. Furlong, Lt Gen, USAF (Ret.) in the Air University Review, July-August 1984:   “ To those things Clausewitz wrote about uncertainty and chance, I would add a few comments on unknown unknowns--those things that a commander doesn't even know he doesn't know. Participants in a war game would describe an unknown unknown as unfair, beyond the ground rules of the game. But real war does not follow ground rules, and I would urge that games be "unfair" by introducing unknown unknowns.[7] ” “   NASA space exploration should largely address a problem class in reliability and risk management stemming primarily from human error, system risk and multi-objective trade-off analysis, by conducting research into system complexity, risk characterization and modeling, and system reasoning. In general, in every mission we can distinguish risk in three possible ways: a) known-known, b) known-unknown, and c)unknown-unknown. It is probable, almost certain, that space exploration will partially experience similar known or unknown risks embedded in the Apollo missions, Shuttle or Station unless something alters how NASA will perceive and manage safety and reliability. [8]
  • 21.   From the same time, conservative lawyer Richard Epstein wrote a well known article in the University of Chicago Law Review about the American labour law doctrine of employment at will (the idea that workers can be fired without warning or reason, unless their contract states terms that are better). In giving some of his reasons in defense of the contract at will, he wrote this.   “ The contract at will is also a sensible private adaptation to the problem of imperfect information over time. In sharp contrast to the purchase of standard goods, an inspection of the job before acceptance is far less likely to guarantee its quality thereafter. The future is not clearly known. More important, employees, like employers, know what they do not know. They are not faced with a bolt from the blue, with an "unknown unknown." Rather they face a known unknown for which they can plan. The at-will contract is an essential part of that planning because it allows both sides to take a wait-and-see attitude to their relationship so that new and more accurate choices can be made on the strength of improved information.[9]
  • 22.   Known Unknown   refers to circumstances or outcomes that are known to be possible, but it is unknown whether or not they will be realized.   The term is used in project planning and decision analysis to explain that any model of the future can only be informed by information that is currently available to the observer and, as such, faces substantial limitations and unknown risk.   Known risks are those that have been identified and analysed, making it possible to plan responses for those risks
  • 23.   Unknown Unknowns   refers to circumstances or outcomes that were not conceived of by an observer at a given point in time.   Specific unknown risks can’t be managed proactively, which suggests that project team should create a contingency plan
  • 24.
  • 25.   Risks can be categorized under headings:   Strategic/Commercial;   Economic/Financial/Market;   Legal & Regulatory;   Organisational/Management/Human factors;   Political; Environmental;   Technical/Operational/Infrastructure
  • 26.   Operational Risk: Risks of loss due to improper process implementation, failed system or some external events risks. Examples can be Failure to address priority conflicts, Insufficient resources or No proper subject training etc.   Schedule Risk: Project schedule get slip when project tasks and schedule release risks are not addressed properly. Schedule risks mainly affect on project and finally on company economy and may lead to project failure   Budget Risk: Wrong budget estimation or Project scope expansion leads to Budget / Cost Risk.  This risk may lead to either a delay in the delivery of the project or sometimes even an incomplete closure of the project.   Business Risk: Non-availability of contracts or purchase order at the start of the project or delay in receiving proper inputs from the customer or business analyst may lead to business risks.   Technical Environment Risk: These are the risks related to the environment under which both the client and the customer work. For example, constantly changing development or production  or testing environment can lead to this risk.   Information Security Risk: The risks related to the security of information like confidentiality or integrity of customer’s personal / business data. The Access rights / privileges failure will lead to leakage of confidential data.   Programmatic Risks: The external risks beyond the operational limits. These are outside the control of the program. These external events can be Running out of fund or Changing customer product strategy and priority or Government rule changes etc.   Infrastructure Risk: Improper planning of infrastructure / resources may lead to risks related to slow network connectivity or complete failure of connectivity at both the client and the customer sites. So, it is important to do proper planning of infrastructure for the efficient development of a project.   Quality and Process Risk: This risk occures due to    incorrect application of process tailoring and deviation guidelines .   New employees allocated to the project not trained in the quality processes and procedures adopted by the organization   Resource Risk: This risk depends on factors like Schedule, Staff, Budget and Facilities. Improper management of any of these factors leads to resource risk.   Supplier Risk: This type of risk may occurs when some third party supplier is involved in the development of the project. This risk occurs due to the uncertain or inadequate capability of supplier.   Technology Risk: It is related to the complete change in technology or introduction of a new technology.   Technical and Architectural Risk: These types of risks generally generally leads to failure of functionality and performance. It addresses the hardware and software tools & supporting equipments used in the project. The risk for this category may be due to — Capacity, Suitability, usability, Familiarity, Reliability, System Support and deliverability.
  • 27.   Risks are contained within the project by carrying out a Risk Analysis   Identification;   Evaluation;   Response and   Action selection   and addressed through Risk Management   Planning & Resourcing;   Monitoring & Reporting   A Risk Analysis may identify one of the following five suitable responses:   Prevention,   Reduction,   Transference,   Contingency and   Acceptance.   Denial is NOT a valid risk response.
  • 28.   ‘When’ the risk is likely to occur is known as the risk’s ‘Proximity’.