SlideShare une entreprise Scribd logo
1  sur  11
CONFIDENTIAL: This document contains information that is confidential and proprietary to EtQ, Inc. Disclosure, copying, distribution
or use without the express permission of EtQ is prohibited. Copyright 2013 EtQ, Inc. All rights reserved.
5 minutes on…
Risk Assessment: Creating a Risk
Matrix
Tim Lozier, EtQ, Inc.
Risk is the new Benchmark
• Business are moving at a faster rate
• Compliance needs to be maintained – need a
systematic, quantitative measure
• Risk is becoming the new benchmark for compliance
– Objective, Repeatable
– Helps to make better, more informed decisions
Step 1. Defining Risk
• Not easy! Companies spend time and money building a
risk taxonomy
• Risk comes from Hazards and Harms
– Hazards = A situation that poses a level of threat to life, health,
property or environment (an undesired event)
– Harms = resulting damages from the Hazard
– Risk = The potential that a chosen action or activity will lead to an
undesirable event
– Control = A method of evaluating potential losses and taking
action to reduce or eliminate the potential for an undesired event
Step 2. Quantifying Hazards and Harms
• We need a scale – Severity and Frequency
– Define the level of Risk on a pre-defined Scale:
Severity Description
Catastrophic Likely to result in death
Critical Potential for severe injury
Moderate Potential for moderate injury
Minor Potential for minor injury
Negligible No significant risk of injury
Frequency Description
Frequent Hazard likely to occur
Probable Hazard will be experienced
Occasional Some manifestations of the hazard are likely to occur
Remote Manifestations of the hazard are possible, but unlikely
Improbable Manifestations of the hazard are very unlikely
Step 3. Build it all into a Risk Matrix
• The Risk Matrix: tool used in the Risk Assessment process, it
allows the severity of the risk of an event occurring to be
determined.
• Graphically displays the total of each of the
hazards/harms that contribute to the risk
– Severity = X
– Probability = Y
– Risk Score = XY
Y
X
RISK
(XY)
Hold On – There are some “gray areas”
• Risks are not always “black and white”
• When defining risk management, some organizations
find it convenient to categorize risks into the following
three regions:
• The broadly acceptable region (Generally Acceptable - GA)
• The ALARP (As Low As Reasonably Practicable) region; and
• The intolerable region (Generally Unacceptable - GU)
GU
GA
ALARP
But how many zones?
How to determine ALARP?
Probability
Severity
Step 4. Test your Risk Matrix
• You must vet the matrix
– Risk score is a mathematical measure
– Use “real world” examples to ensure validity of the matrix
– Example: False symmetry in risk matrix – needs to be validated
with real world situations
5 10 15 20 25
4 8 12 16 20
3 6 9 12 15
2 4 6 8 10
1 2 3 4 5
PROBABILITY
SEVERITY
10
10
A Vetted Risk Matrix is just a Tool
• Risk Matrix is designed as a tool, not a solution
– Risk is only quantifying the result
– Organizations need to work on interpreting the decision
• Risk Teams review events to make decisions, using the
Risk Matrix as a tool for the decision-making process
How to Apply The Risk Matrix - Example
• Use Risk Assessment to filter adverse events
– What is the risk of the event, versus when it came into the
system
– Prioritize events by their RISK not their due date
• Resolve low-priority events at the source where they
are found
– Minor Complaints/Nonconformances/Audit findings
– Events with little impact can be immediately resolved
• Risk Mitigation: Applies risk assessment to verification
and effectiveness in Corrective Action
– Are we reducing the risk to the right level?
– Are we truly mitigating risk of recurrence?
Where’s
the Risk
here?
Conclusion
• Risk Assessment is great tool for making informed decisions
• Understand your Hazards and Harms within the organization
• Build a scale that makes sense to your organization
• Plot the scale on a graph to form a Risk Matrix
• Determine where the acceptable and unacceptable risk lie
• Then, vet that matrix with real-world historical examples
• Use the Risk Matrix as a tool within a Risk team to filter adverse
events by their Risk
For more than 5 minutes…
EtQ’s Blog on Risk Matrix
blog.etq.com
Webcasts on EtQ’s Risk
Based system
www.etq.com/webinar
www.etq.com
info@etq.com
516.293.0946

Contenu connexe

Tendances

Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideSlideTeam
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentationmmagario
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides SlideTeam
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesSlideTeam
 
Risk Management Procedure And Guidelines PowerPoint Presentation Slides
Risk Management Procedure And Guidelines PowerPoint Presentation Slides Risk Management Procedure And Guidelines PowerPoint Presentation Slides
Risk Management Procedure And Guidelines PowerPoint Presentation Slides SlideTeam
 
Risk management
Risk managementRisk management
Risk managementMECandPMV
 
Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides SlideTeam
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesILRI
 
Everything you need to know about Risk Management
Everything you need to know about Risk ManagementEverything you need to know about Risk Management
Everything you need to know about Risk ManagementITM Platform
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides SlideTeam
 
Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelinesHaris Tahir
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk AssessmentSteve Bishop
 

Tendances (20)

Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
 
Risk management
Risk management Risk management
Risk management
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
 
Risk Management Procedure And Guidelines PowerPoint Presentation Slides
Risk Management Procedure And Guidelines PowerPoint Presentation Slides Risk Management Procedure And Guidelines PowerPoint Presentation Slides
Risk Management Procedure And Guidelines PowerPoint Presentation Slides
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides Risk Management Procedure PowerPoint Presentation Slides
Risk Management Procedure PowerPoint Presentation Slides
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniques
 
Risk management
Risk managementRisk management
Risk management
 
Everything you need to know about Risk Management
Everything you need to know about Risk ManagementEverything you need to know about Risk Management
Everything you need to know about Risk Management
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides
 
Risk management
Risk managementRisk management
Risk management
 
Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelines
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 

En vedette

Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...Bijan Yavar
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 
Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816duy nguyen
 
Risk assessment
Risk assessmentRisk assessment
Risk assessmentdoogstone
 
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionHazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionNorrazman Zaiha Zainol
 
Torc Thumbnail 3 Risk Matrix
Torc Thumbnail 3   Risk MatrixTorc Thumbnail 3   Risk Matrix
Torc Thumbnail 3 Risk MatrixTom O'Connor
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
Occupation Safety & Health Presentation
Occupation Safety & Health PresentationOccupation Safety & Health Presentation
Occupation Safety & Health PresentationHarlequin Consultants
 
Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop SlideShop.com
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentationalygale
 
Risk mangement
Risk mangementRisk mangement
Risk mangementcollege
 

En vedette (20)

Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
 
risk assessment
 risk assessment risk assessment
risk assessment
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 
Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionHazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
 
Torc Thumbnail 3 Risk Matrix
Torc Thumbnail 3   Risk MatrixTorc Thumbnail 3   Risk Matrix
Torc Thumbnail 3 Risk Matrix
 
Stellungnahme ADR
Stellungnahme ADRStellungnahme ADR
Stellungnahme ADR
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Occupation Safety & Health Presentation
Occupation Safety & Health PresentationOccupation Safety & Health Presentation
Occupation Safety & Health Presentation
 
Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop
 
Risk vs. reward decision matrix
Risk vs. reward decision matrixRisk vs. reward decision matrix
Risk vs. reward decision matrix
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
Unit 5 risk assessment and management
Unit 5 risk assessment and managementUnit 5 risk assessment and management
Unit 5 risk assessment and management
 
risk assessment
risk assessmentrisk assessment
risk assessment
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
 
Risk mangement
Risk mangementRisk mangement
Risk mangement
 

Similaire à Risk Assessment: Creating a Risk Matrix

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptxdotco
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Risk Management
Risk ManagementRisk Management
Risk Managementysshah
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Week 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfWeek 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfJeffreyKwame1
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptAsifHussain654789
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptShahbazAhmad736457
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.pptbillugamma06
 
Risk Management process.pptx
Risk Management process.pptxRisk Management process.pptx
Risk Management process.pptxMohanVeerabomala
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.pptKareemRasmy1
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...samahhamed3
 
John Salter Local Government Risk Management Strategic Lessons
John Salter   Local Government   Risk Management Strategic LessonsJohn Salter   Local Government   Risk Management Strategic Lessons
John Salter Local Government Risk Management Strategic Lessonsepcb
 

Similaire à Risk Assessment: Creating a Risk Matrix (20)

Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptx
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Reliability
ReliabilityReliability
Reliability
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Week 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfWeek 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdf
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.ppt
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.ppt
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
Risk Management process.pptx
Risk Management process.pptxRisk Management process.pptx
Risk Management process.pptx
 
3_orm.ppt
3_orm.ppt3_orm.ppt
3_orm.ppt
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.ppt
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...
 
John Salter Local Government Risk Management Strategic Lessons
John Salter   Local Government   Risk Management Strategic LessonsJohn Salter   Local Government   Risk Management Strategic Lessons
John Salter Local Government Risk Management Strategic Lessons
 

Plus de EtQ, Inc.

How Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food RecallsHow Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food RecallsEtQ, Inc.
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskEtQ, Inc.
 
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1EtQ, Inc.
 
How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?EtQ, Inc.
 
How Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand ReputationHow Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand ReputationEtQ, Inc.
 
How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain EtQ, Inc.
 
Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach EtQ, Inc.
 
Taking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality ManagementTaking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality ManagementEtQ, Inc.
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ, Inc.
 
What to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software SolutionWhat to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software SolutionEtQ, Inc.
 
5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software Solutions5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software SolutionsEtQ, Inc.
 
How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control SystemEtQ, Inc.
 
5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software Solutions5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software SolutionsEtQ, Inc.
 

Plus de EtQ, Inc. (13)

How Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food RecallsHow Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food Recalls
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber Risk
 
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
 
How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?
 
How Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand ReputationHow Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand Reputation
 
How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain
 
Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach
 
Taking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality ManagementTaking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality Management
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance Management
 
What to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software SolutionWhat to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software Solution
 
5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software Solutions5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software Solutions
 
How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control System
 
5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software Solutions5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software Solutions
 

Dernier

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 

Dernier (20)

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 

Risk Assessment: Creating a Risk Matrix

  • 1. CONFIDENTIAL: This document contains information that is confidential and proprietary to EtQ, Inc. Disclosure, copying, distribution or use without the express permission of EtQ is prohibited. Copyright 2013 EtQ, Inc. All rights reserved. 5 minutes on… Risk Assessment: Creating a Risk Matrix Tim Lozier, EtQ, Inc.
  • 2. Risk is the new Benchmark • Business are moving at a faster rate • Compliance needs to be maintained – need a systematic, quantitative measure • Risk is becoming the new benchmark for compliance – Objective, Repeatable – Helps to make better, more informed decisions
  • 3. Step 1. Defining Risk • Not easy! Companies spend time and money building a risk taxonomy • Risk comes from Hazards and Harms – Hazards = A situation that poses a level of threat to life, health, property or environment (an undesired event) – Harms = resulting damages from the Hazard – Risk = The potential that a chosen action or activity will lead to an undesirable event – Control = A method of evaluating potential losses and taking action to reduce or eliminate the potential for an undesired event
  • 4. Step 2. Quantifying Hazards and Harms • We need a scale – Severity and Frequency – Define the level of Risk on a pre-defined Scale: Severity Description Catastrophic Likely to result in death Critical Potential for severe injury Moderate Potential for moderate injury Minor Potential for minor injury Negligible No significant risk of injury Frequency Description Frequent Hazard likely to occur Probable Hazard will be experienced Occasional Some manifestations of the hazard are likely to occur Remote Manifestations of the hazard are possible, but unlikely Improbable Manifestations of the hazard are very unlikely
  • 5. Step 3. Build it all into a Risk Matrix • The Risk Matrix: tool used in the Risk Assessment process, it allows the severity of the risk of an event occurring to be determined. • Graphically displays the total of each of the hazards/harms that contribute to the risk – Severity = X – Probability = Y – Risk Score = XY Y X RISK (XY)
  • 6. Hold On – There are some “gray areas” • Risks are not always “black and white” • When defining risk management, some organizations find it convenient to categorize risks into the following three regions: • The broadly acceptable region (Generally Acceptable - GA) • The ALARP (As Low As Reasonably Practicable) region; and • The intolerable region (Generally Unacceptable - GU) GU GA ALARP But how many zones? How to determine ALARP? Probability Severity
  • 7. Step 4. Test your Risk Matrix • You must vet the matrix – Risk score is a mathematical measure – Use “real world” examples to ensure validity of the matrix – Example: False symmetry in risk matrix – needs to be validated with real world situations 5 10 15 20 25 4 8 12 16 20 3 6 9 12 15 2 4 6 8 10 1 2 3 4 5 PROBABILITY SEVERITY 10 10
  • 8. A Vetted Risk Matrix is just a Tool • Risk Matrix is designed as a tool, not a solution – Risk is only quantifying the result – Organizations need to work on interpreting the decision • Risk Teams review events to make decisions, using the Risk Matrix as a tool for the decision-making process
  • 9. How to Apply The Risk Matrix - Example • Use Risk Assessment to filter adverse events – What is the risk of the event, versus when it came into the system – Prioritize events by their RISK not their due date • Resolve low-priority events at the source where they are found – Minor Complaints/Nonconformances/Audit findings – Events with little impact can be immediately resolved • Risk Mitigation: Applies risk assessment to verification and effectiveness in Corrective Action – Are we reducing the risk to the right level? – Are we truly mitigating risk of recurrence? Where’s the Risk here?
  • 10. Conclusion • Risk Assessment is great tool for making informed decisions • Understand your Hazards and Harms within the organization • Build a scale that makes sense to your organization • Plot the scale on a graph to form a Risk Matrix • Determine where the acceptable and unacceptable risk lie • Then, vet that matrix with real-world historical examples • Use the Risk Matrix as a tool within a Risk team to filter adverse events by their Risk
  • 11. For more than 5 minutes… EtQ’s Blog on Risk Matrix blog.etq.com Webcasts on EtQ’s Risk Based system www.etq.com/webinar www.etq.com info@etq.com 516.293.0946