SlideShare une entreprise Scribd logo
1  sur  11
CONFIDENTIAL: This document contains information that is confidential and proprietary to EtQ, Inc. Disclosure, copying, distribution
or use without the express permission of EtQ is prohibited. Copyright 2013 EtQ, Inc. All rights reserved.
5 minutes on…
Risk Assessment: Creating a Risk
Matrix
Tim Lozier, EtQ, Inc.
Risk is the new Benchmark
• Business are moving at a faster rate
• Compliance needs to be maintained – need a
systematic, quantitative measure
• Risk is becoming the new benchmark for compliance
– Objective, Repeatable
– Helps to make better, more informed decisions
Step 1. Defining Risk
• Not easy! Companies spend time and money building a
risk taxonomy
• Risk comes from Hazards and Harms
– Hazards = A situation that poses a level of threat to life, health,
property or environment (an undesired event)
– Harms = resulting damages from the Hazard
– Risk = The potential that a chosen action or activity will lead to an
undesirable event
– Control = A method of evaluating potential losses and taking
action to reduce or eliminate the potential for an undesired event
Step 2. Quantifying Hazards and Harms
• We need a scale – Severity and Frequency
– Define the level of Risk on a pre-defined Scale:
Severity Description
Catastrophic Likely to result in death
Critical Potential for severe injury
Moderate Potential for moderate injury
Minor Potential for minor injury
Negligible No significant risk of injury
Frequency Description
Frequent Hazard likely to occur
Probable Hazard will be experienced
Occasional Some manifestations of the hazard are likely to occur
Remote Manifestations of the hazard are possible, but unlikely
Improbable Manifestations of the hazard are very unlikely
Step 3. Build it all into a Risk Matrix
• The Risk Matrix: tool used in the Risk Assessment process, it
allows the severity of the risk of an event occurring to be
determined.
• Graphically displays the total of each of the
hazards/harms that contribute to the risk
– Severity = X
– Probability = Y
– Risk Score = XY
Y
X
RISK
(XY)
Hold On – There are some “gray areas”
• Risks are not always “black and white”
• When defining risk management, some organizations
find it convenient to categorize risks into the following
three regions:
• The broadly acceptable region (Generally Acceptable - GA)
• The ALARP (As Low As Reasonably Practicable) region; and
• The intolerable region (Generally Unacceptable - GU)
GU
GA
ALARP
But how many zones?
How to determine ALARP?
Probability
Severity
Step 4. Test your Risk Matrix
• You must vet the matrix
– Risk score is a mathematical measure
– Use “real world” examples to ensure validity of the matrix
– Example: False symmetry in risk matrix – needs to be validated
with real world situations
5 10 15 20 25
4 8 12 16 20
3 6 9 12 15
2 4 6 8 10
1 2 3 4 5
PROBABILITY
SEVERITY
10
10
A Vetted Risk Matrix is just a Tool
• Risk Matrix is designed as a tool, not a solution
– Risk is only quantifying the result
– Organizations need to work on interpreting the decision
• Risk Teams review events to make decisions, using the
Risk Matrix as a tool for the decision-making process
How to Apply The Risk Matrix - Example
• Use Risk Assessment to filter adverse events
– What is the risk of the event, versus when it came into the
system
– Prioritize events by their RISK not their due date
• Resolve low-priority events at the source where they
are found
– Minor Complaints/Nonconformances/Audit findings
– Events with little impact can be immediately resolved
• Risk Mitigation: Applies risk assessment to verification
and effectiveness in Corrective Action
– Are we reducing the risk to the right level?
– Are we truly mitigating risk of recurrence?
Where’s
the Risk
here?
Conclusion
• Risk Assessment is great tool for making informed decisions
• Understand your Hazards and Harms within the organization
• Build a scale that makes sense to your organization
• Plot the scale on a graph to form a Risk Matrix
• Determine where the acceptable and unacceptable risk lie
• Then, vet that matrix with real-world historical examples
• Use the Risk Matrix as a tool within a Risk team to filter adverse
events by their Risk
For more than 5 minutes…
EtQ’s Blog on Risk Matrix
blog.etq.com
Webcasts on EtQ’s Risk
Based system
www.etq.com/webinar
www.etq.com
info@etq.com
516.293.0946

Contenu connexe

Tendances

Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisAlin Veronika
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideSlideTeam
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk AssessmentSteve Bishop
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides SlideTeam
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk managementSubhendu Datta
 
Everything you need to know about Risk Management
Everything you need to know about Risk ManagementEverything you need to know about Risk Management
Everything you need to know about Risk ManagementITM Platform
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safetyjchsafety
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesSlideTeam
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management OverviewJIGNESH PADIA
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Wil Rickards
 
Risk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation SlidesRisk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation SlidesSlideTeam
 

Tendances (20)

Risk identification
Risk identificationRisk identification
Risk identification
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Risk assessment-training
Risk assessment-trainingRisk assessment-training
Risk assessment-training
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative Analysis
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Risk Management Training
Risk Management TrainingRisk Management Training
Risk Management Training
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 
Everything you need to know about Risk Management
Everything you need to know about Risk ManagementEverything you need to know about Risk Management
Everything you need to know about Risk Management
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safety
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Risk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation SlidesRisk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation Slides
 
Risk Management
Risk ManagementRisk Management
Risk Management
 

En vedette

Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...Bijan Yavar
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 
Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelinesHaris Tahir
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 
Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816duy nguyen
 
Risk assessment
Risk assessmentRisk assessment
Risk assessmentdoogstone
 
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionHazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionNorrazman Zaiha Zainol
 
Torc Thumbnail 3 Risk Matrix
Torc Thumbnail 3   Risk MatrixTorc Thumbnail 3   Risk Matrix
Torc Thumbnail 3 Risk MatrixTom O'Connor
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
Occupation Safety & Health Presentation
Occupation Safety & Health PresentationOccupation Safety & Health Presentation
Occupation Safety & Health PresentationHarlequin Consultants
 
Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop SlideShop.com
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentationalygale
 

En vedette (20)

Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
Risk Matrix, Definition, Theory and Practice (B - Exercise) / DRM Series / Bi...
 
risk assessment
 risk assessment risk assessment
risk assessment
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelines
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 
Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionHazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
 
Torc Thumbnail 3 Risk Matrix
Torc Thumbnail 3   Risk MatrixTorc Thumbnail 3   Risk Matrix
Torc Thumbnail 3 Risk Matrix
 
Stellungnahme ADR
Stellungnahme ADRStellungnahme ADR
Stellungnahme ADR
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Occupation Safety & Health Presentation
Occupation Safety & Health PresentationOccupation Safety & Health Presentation
Occupation Safety & Health Presentation
 
Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop Risk Matrix Table by Slideshop
Risk Matrix Table by Slideshop
 
Risk vs. reward decision matrix
Risk vs. reward decision matrixRisk vs. reward decision matrix
Risk vs. reward decision matrix
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
Unit 5 risk assessment and management
Unit 5 risk assessment and managementUnit 5 risk assessment and management
Unit 5 risk assessment and management
 
risk assessment
risk assessmentrisk assessment
risk assessment
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
 

Similaire à Risk Assessment: Creating a Risk Matrix

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptxdotco
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Risk Management
Risk ManagementRisk Management
Risk Managementysshah
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Week 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfWeek 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfJeffreyKwame1
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptAsifHussain654789
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptShahbazAhmad736457
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.pptbillugamma06
 
Risk Management process.pptx
Risk Management process.pptxRisk Management process.pptx
Risk Management process.pptxMohanVeerabomala
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.pptKareemRasmy1
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...samahhamed3
 
John Salter Local Government Risk Management Strategic Lessons
John Salter   Local Government   Risk Management Strategic LessonsJohn Salter   Local Government   Risk Management Strategic Lessons
John Salter Local Government Risk Management Strategic Lessonsepcb
 

Similaire à Risk Assessment: Creating a Risk Matrix (20)

Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptx
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Reliability
ReliabilityReliability
Reliability
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Week 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdfWeek 2 Introduction to risk management.pdf
Week 2 Introduction to risk management.pdf
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.ppt
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.ppt
 
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt12_BUSINESS RISK  ufuhf isbifb MANAGEMENT.ppt
12_BUSINESS RISK ufuhf isbifb MANAGEMENT.ppt
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
Risk Management process.pptx
Risk Management process.pptxRisk Management process.pptx
Risk Management process.pptx
 
3_orm.ppt
3_orm.ppt3_orm.ppt
3_orm.ppt
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.ppt
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...
 
John Salter Local Government Risk Management Strategic Lessons
John Salter   Local Government   Risk Management Strategic LessonsJohn Salter   Local Government   Risk Management Strategic Lessons
John Salter Local Government Risk Management Strategic Lessons
 

Plus de EtQ, Inc.

How Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food RecallsHow Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food RecallsEtQ, Inc.
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskEtQ, Inc.
 
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1EtQ, Inc.
 
How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?EtQ, Inc.
 
How Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand ReputationHow Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand ReputationEtQ, Inc.
 
How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain EtQ, Inc.
 
Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach EtQ, Inc.
 
Taking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality ManagementTaking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality ManagementEtQ, Inc.
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ, Inc.
 
What to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software SolutionWhat to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software SolutionEtQ, Inc.
 
5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software Solutions5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software SolutionsEtQ, Inc.
 
How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control SystemEtQ, Inc.
 
5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software Solutions5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software SolutionsEtQ, Inc.
 

Plus de EtQ, Inc. (13)

How Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food RecallsHow Quality Management Systems Take the Crisis Out of Food Recalls
How Quality Management Systems Take the Crisis Out of Food Recalls
 
How Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber RiskHow Companies Like Siemens Manage Cyber Risk
How Companies Like Siemens Manage Cyber Risk
 
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
Top Tips for Managing Brand Reputation During Food & Drink M&As – Part 1
 
How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?How Avoidable is the Food Waste in Your Food Supply Chain?
How Avoidable is the Food Waste in Your Food Supply Chain?
 
How Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand ReputationHow Food Suppliers Like Parmalat Manage Brand Reputation
How Food Suppliers Like Parmalat Manage Brand Reputation
 
How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain How Can We Use Big Data in the Food Supply Chain
How Can We Use Big Data in the Food Supply Chain
 
Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach Assessing the compliance of your food supply chain--an integrated approach
Assessing the compliance of your food supply chain--an integrated approach
 
Taking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality ManagementTaking Quality Outside your Four Walls with Supplier Quality Management
Taking Quality Outside your Four Walls with Supplier Quality Management
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance Management
 
What to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software SolutionWhat to Look for When Selecting a Quality Management Software Solution
What to Look for When Selecting a Quality Management Software Solution
 
5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software Solutions5 Things to Look for in Employee Training Software Solutions
5 Things to Look for in Employee Training Software Solutions
 
How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control System
 
5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software Solutions5 Things to Look for in Corrective Action Software Solutions
5 Things to Look for in Corrective Action Software Solutions
 

Dernier

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 

Dernier (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 

Risk Assessment: Creating a Risk Matrix

  • 1. CONFIDENTIAL: This document contains information that is confidential and proprietary to EtQ, Inc. Disclosure, copying, distribution or use without the express permission of EtQ is prohibited. Copyright 2013 EtQ, Inc. All rights reserved. 5 minutes on… Risk Assessment: Creating a Risk Matrix Tim Lozier, EtQ, Inc.
  • 2. Risk is the new Benchmark • Business are moving at a faster rate • Compliance needs to be maintained – need a systematic, quantitative measure • Risk is becoming the new benchmark for compliance – Objective, Repeatable – Helps to make better, more informed decisions
  • 3. Step 1. Defining Risk • Not easy! Companies spend time and money building a risk taxonomy • Risk comes from Hazards and Harms – Hazards = A situation that poses a level of threat to life, health, property or environment (an undesired event) – Harms = resulting damages from the Hazard – Risk = The potential that a chosen action or activity will lead to an undesirable event – Control = A method of evaluating potential losses and taking action to reduce or eliminate the potential for an undesired event
  • 4. Step 2. Quantifying Hazards and Harms • We need a scale – Severity and Frequency – Define the level of Risk on a pre-defined Scale: Severity Description Catastrophic Likely to result in death Critical Potential for severe injury Moderate Potential for moderate injury Minor Potential for minor injury Negligible No significant risk of injury Frequency Description Frequent Hazard likely to occur Probable Hazard will be experienced Occasional Some manifestations of the hazard are likely to occur Remote Manifestations of the hazard are possible, but unlikely Improbable Manifestations of the hazard are very unlikely
  • 5. Step 3. Build it all into a Risk Matrix • The Risk Matrix: tool used in the Risk Assessment process, it allows the severity of the risk of an event occurring to be determined. • Graphically displays the total of each of the hazards/harms that contribute to the risk – Severity = X – Probability = Y – Risk Score = XY Y X RISK (XY)
  • 6. Hold On – There are some “gray areas” • Risks are not always “black and white” • When defining risk management, some organizations find it convenient to categorize risks into the following three regions: • The broadly acceptable region (Generally Acceptable - GA) • The ALARP (As Low As Reasonably Practicable) region; and • The intolerable region (Generally Unacceptable - GU) GU GA ALARP But how many zones? How to determine ALARP? Probability Severity
  • 7. Step 4. Test your Risk Matrix • You must vet the matrix – Risk score is a mathematical measure – Use “real world” examples to ensure validity of the matrix – Example: False symmetry in risk matrix – needs to be validated with real world situations 5 10 15 20 25 4 8 12 16 20 3 6 9 12 15 2 4 6 8 10 1 2 3 4 5 PROBABILITY SEVERITY 10 10
  • 8. A Vetted Risk Matrix is just a Tool • Risk Matrix is designed as a tool, not a solution – Risk is only quantifying the result – Organizations need to work on interpreting the decision • Risk Teams review events to make decisions, using the Risk Matrix as a tool for the decision-making process
  • 9. How to Apply The Risk Matrix - Example • Use Risk Assessment to filter adverse events – What is the risk of the event, versus when it came into the system – Prioritize events by their RISK not their due date • Resolve low-priority events at the source where they are found – Minor Complaints/Nonconformances/Audit findings – Events with little impact can be immediately resolved • Risk Mitigation: Applies risk assessment to verification and effectiveness in Corrective Action – Are we reducing the risk to the right level? – Are we truly mitigating risk of recurrence? Where’s the Risk here?
  • 10. Conclusion • Risk Assessment is great tool for making informed decisions • Understand your Hazards and Harms within the organization • Build a scale that makes sense to your organization • Plot the scale on a graph to form a Risk Matrix • Determine where the acceptable and unacceptable risk lie • Then, vet that matrix with real-world historical examples • Use the Risk Matrix as a tool within a Risk team to filter adverse events by their Risk
  • 11. For more than 5 minutes… EtQ’s Blog on Risk Matrix blog.etq.com Webcasts on EtQ’s Risk Based system www.etq.com/webinar www.etq.com info@etq.com 516.293.0946