SlideShare a Scribd company logo
1 of 24
Risk Assessments
INSTRUCTOR: NELSIE GRACE P. DOLOR
Risk Assessment
In simplistic terms, risk can be defined as a function of what is at
risk and how likely is it to be at risk .
The term “exposure” in relation to risk could be defined as “an
unwanted event or outcome that management would wish to avoid”.
A risk assessment is the process of identifying, measuring, and
analyzing risks relevant to a program or process.
This assessment is systematic, iterative, and subject to both
quantitative and qualitative inputs and factors. Furthermore, it is
also dependent on the timeframe of the review.
Identification of Risks
Identification of Risks
Identification of Risks
Identification of Risks
Internal Constraints
It is imperative to remember that there are internal and external constraints in organizations.
Internal constraints typically include:
Equipment. The types of equipment available and the ways they are used limit the ability of the
process to produce more high quality goods and deliver services.
People. Lack of skilled and motivated workers limits the productive capacity of any process.
Attitudes and other mental models (e.g., feeling defeated, victimized, or hopeless) embraced
by workers can lead to behaviors that become a constraint on the process.
Policies. Written and unwritten policies can prevent the process from producing more of higher
quality goods and services.
Measurement of Risks
The measurement process can be either subjective or quantitative, and either
driven by facts or not.
Subjective measures are driven by the participants’ experience and intuition
about the risks involved.
 three-point scale: high–medium–low
 five-point scale: unlikely–possible–likely–almost certain
 Impact measures: minor–moderate–major–catastrophic
Definitions of Likelihood
Definitions of Impact
Sample Measurement
Sample Measurement
The Risk Matrix
The risk matrix is a widely used and highly effective tool to record and analyze
the objectives, risks, and controls in the program or process that is being audited
as defined in the scope definition.
The risk matrix is an essential ingredient when conducting risk-based audits, as
they provide a means to capture and analyze these items.
Layout varies by organization
Sample
Risk
Matrix
Assessing Risk and Control Types
The conduct of a risk assessment means that we should look for weaknesses
(sometimes referred to as vulnerabilities) that would make an asset susceptible
to damage or loss from the hazard.
Vulnerability - “degree to which people, property, resources, systems, and
cultural, economic, environmental, and social activity is susceptible to harm,
degradation, or destruction on being exposed to a hostile agent or factor.”
When it comes to vulnerabilities, some common weaknesses are the age,
condition, and location of buildings, and their contents (e.g., near coastal or
seismic areas, critical systems on lower floors that are susceptible to flooding,
shared office locations).
Approaches in Identifying Relevant
Events
1. Objectives based - Identify events that may hinder the ability of the
organization to achieve its
objectives partially or completely.
◦ In this case, brainstorming and the Delphi method* may be useful
techniques to collect the relevant information and assess the impact of
these events. Note that the event does not have to be negative in its
immediate interpretation.
*The Delphi method, also known as the estimate-talk-estimate technique (ETE), is a
systematic and qualitative method of forecasting by collecting opinions from a group of
experts through several rounds of questions.
Approaches in Identifying Relevant
Events
2. Scenario based. Create different scenarios or alternative ways of achieving
objectives and determine how forces interact. A useful approach is to identify
triggers that can start–stop different scenarios from occurring. By identifying
and understanding the triggers caused or accelerated by these scenarios, the
organization can better prepare itself to leverage opportunities and avoid
negative consequences.
For either of these two approaches, management must consider the external and
internal factors that can affect event occurrence:
◦ External. For example, economic, business, natural environment, political, social, and
technological factors.
◦ Internal. Examples include infrastructure, personnel, processes, and technology.
Approaches in Identifying Relevant
Events
3. Common-risk checking. Use a prefabricated list of common risks in
your industry or area of scope.
4. Risk charting. Combination of above approaches consists of listing
resources at risk and the threats to those resources. Identify the risk
factors and the consequences. Hazards are of concern to the extent
that they can result in some kind of loss to the program, process, or
organization. The impact of these hazards and how to reduce them is
the next aspect of the risk assessment process. This is referred to as
mitigation.
Assessing Risk
The risk assessment, with the identification of hazards, assets at risk, impact
analysis, and response activities can serve the organization well and increase the
likelihood that goals and objectives will be achieved. The challenge today is
greater than in the past, however, because in today’s dynamic and highly
competitive business and operating environment, organizations lacking the
ability to adapt, and take advantage of opportunities proactively are as likely to
fail as those that poorly manage the risk of adverse outcomes.
Organizations must be resilient, so as much as anticipating adverse outcomes is
key to success, the lack of flexibility to embrace new technologies, understand,
and capitalize on new technologies, financial products, emerging markets, and
social dynamics can be the cause of ruin.
TOP-DOWN
RISK
ASSESSMENT
BOTTOM-UP
RISK
ASSESSMENT
END

More Related Content

Similar to Risk assessment for Risk management subject.pptx

BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxJASS44
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfHari319621
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfannaelctronics
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxGraciaSuratos
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
Financial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaFinancial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaReginald Walker
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain managementNishikant Rajeshirke
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docxaryan532920
 
project risk management
project risk managementproject risk management
project risk managementAshima Thakur
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage riskMichael Curtis
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxransayo
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - IDr. Shiv S Tripathi
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as OpportunityGlen Alleman
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1Paul Hunt
 

Similar to Risk assessment for Risk management subject.pptx (20)

BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
 
Risk management of supply chain
Risk management of supply chainRisk management of supply chain
Risk management of supply chain
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdf
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
 
Risk management
Risk managementRisk management
Risk management
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
Financial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaFinancial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.Qa
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain management
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 
project risk management
project risk managementproject risk management
project risk management
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage risk
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
 
2010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.12010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.1
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as Opportunity
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 

Recently uploaded

Beyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic AccountingBeyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic AccountingYourLegal Accounting
 
Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacovaimostorept
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesHaseebBashir5
 
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Aurelien Domont, MBA
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingYourLegal Accounting
 
1Q24_EN hyundai capital 1q performance
1Q24_EN   hyundai capital 1q performance1Q24_EN   hyundai capital 1q performance
1Q24_EN hyundai capital 1q performanceirhcs
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIIRODORI inc.
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsStefan Wolpers
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsRajesh Gupta
 
South Africa's 10 Most Influential CIOs to Watch.pdf
South Africa's 10 Most Influential CIOs to Watch.pdfSouth Africa's 10 Most Influential CIOs to Watch.pdf
South Africa's 10 Most Influential CIOs to Watch.pdfTHECIOWORLD
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样AS
 
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...ssuserf63bd7
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future worldChris Skinner
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfbelieveminhh
 
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfProgress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfHolger Mueller
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsCaitlinCummins3
 
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...drm1699
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)Norah Medlin
 

Recently uploaded (20)

Beyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic AccountingBeyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic Accounting
 
Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacova
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their Bookkeeping
 
1Q24_EN hyundai capital 1q performance
1Q24_EN   hyundai capital 1q performance1Q24_EN   hyundai capital 1q performance
1Q24_EN hyundai capital 1q performance
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORI
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
South Africa's 10 Most Influential CIOs to Watch.pdf
South Africa's 10 Most Influential CIOs to Watch.pdfSouth Africa's 10 Most Influential CIOs to Watch.pdf
South Africa's 10 Most Influential CIOs to Watch.pdf
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
 
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfProgress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
 
Obat Aborsi Pasuruan 0851\7696\3835 Jual Obat Cytotec Di Pasuruan
Obat Aborsi Pasuruan 0851\7696\3835 Jual Obat Cytotec Di PasuruanObat Aborsi Pasuruan 0851\7696\3835 Jual Obat Cytotec Di Pasuruan
Obat Aborsi Pasuruan 0851\7696\3835 Jual Obat Cytotec Di Pasuruan
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)
 

Risk assessment for Risk management subject.pptx

  • 2. Risk Assessment In simplistic terms, risk can be defined as a function of what is at risk and how likely is it to be at risk . The term “exposure” in relation to risk could be defined as “an unwanted event or outcome that management would wish to avoid”. A risk assessment is the process of identifying, measuring, and analyzing risks relevant to a program or process. This assessment is systematic, iterative, and subject to both quantitative and qualitative inputs and factors. Furthermore, it is also dependent on the timeframe of the review.
  • 7. Internal Constraints It is imperative to remember that there are internal and external constraints in organizations. Internal constraints typically include: Equipment. The types of equipment available and the ways they are used limit the ability of the process to produce more high quality goods and deliver services. People. Lack of skilled and motivated workers limits the productive capacity of any process. Attitudes and other mental models (e.g., feeling defeated, victimized, or hopeless) embraced by workers can lead to behaviors that become a constraint on the process. Policies. Written and unwritten policies can prevent the process from producing more of higher quality goods and services.
  • 8. Measurement of Risks The measurement process can be either subjective or quantitative, and either driven by facts or not. Subjective measures are driven by the participants’ experience and intuition about the risks involved.  three-point scale: high–medium–low  five-point scale: unlikely–possible–likely–almost certain  Impact measures: minor–moderate–major–catastrophic
  • 13. The Risk Matrix The risk matrix is a widely used and highly effective tool to record and analyze the objectives, risks, and controls in the program or process that is being audited as defined in the scope definition. The risk matrix is an essential ingredient when conducting risk-based audits, as they provide a means to capture and analyze these items. Layout varies by organization
  • 15. Assessing Risk and Control Types The conduct of a risk assessment means that we should look for weaknesses (sometimes referred to as vulnerabilities) that would make an asset susceptible to damage or loss from the hazard. Vulnerability - “degree to which people, property, resources, systems, and cultural, economic, environmental, and social activity is susceptible to harm, degradation, or destruction on being exposed to a hostile agent or factor.” When it comes to vulnerabilities, some common weaknesses are the age, condition, and location of buildings, and their contents (e.g., near coastal or seismic areas, critical systems on lower floors that are susceptible to flooding, shared office locations).
  • 16. Approaches in Identifying Relevant Events 1. Objectives based - Identify events that may hinder the ability of the organization to achieve its objectives partially or completely. ◦ In this case, brainstorming and the Delphi method* may be useful techniques to collect the relevant information and assess the impact of these events. Note that the event does not have to be negative in its immediate interpretation. *The Delphi method, also known as the estimate-talk-estimate technique (ETE), is a systematic and qualitative method of forecasting by collecting opinions from a group of experts through several rounds of questions.
  • 17. Approaches in Identifying Relevant Events 2. Scenario based. Create different scenarios or alternative ways of achieving objectives and determine how forces interact. A useful approach is to identify triggers that can start–stop different scenarios from occurring. By identifying and understanding the triggers caused or accelerated by these scenarios, the organization can better prepare itself to leverage opportunities and avoid negative consequences. For either of these two approaches, management must consider the external and internal factors that can affect event occurrence: ◦ External. For example, economic, business, natural environment, political, social, and technological factors. ◦ Internal. Examples include infrastructure, personnel, processes, and technology.
  • 18. Approaches in Identifying Relevant Events 3. Common-risk checking. Use a prefabricated list of common risks in your industry or area of scope. 4. Risk charting. Combination of above approaches consists of listing resources at risk and the threats to those resources. Identify the risk factors and the consequences. Hazards are of concern to the extent that they can result in some kind of loss to the program, process, or organization. The impact of these hazards and how to reduce them is the next aspect of the risk assessment process. This is referred to as mitigation.
  • 19.
  • 20. Assessing Risk The risk assessment, with the identification of hazards, assets at risk, impact analysis, and response activities can serve the organization well and increase the likelihood that goals and objectives will be achieved. The challenge today is greater than in the past, however, because in today’s dynamic and highly competitive business and operating environment, organizations lacking the ability to adapt, and take advantage of opportunities proactively are as likely to fail as those that poorly manage the risk of adverse outcomes. Organizations must be resilient, so as much as anticipating adverse outcomes is key to success, the lack of flexibility to embrace new technologies, understand, and capitalize on new technologies, financial products, emerging markets, and social dynamics can be the cause of ruin.
  • 21.
  • 24. END