SlideShare une entreprise Scribd logo
1  sur  116
A- Eliciting risk information -Communication and consultation may occur within   the organization or between the organization     and its stakeholders. -It is very rare that only one person will hold all the  information needed to identify the risks to a business or even to an activity or project. -It therefore important to identify the range of            stakeholders who will assist in making this         information complete. 2
B-Managing stakeholder perceptions for                     management of risk 3
Tips for effective communication and consultation • Determine at the outset whether a communication   strategy and/or plan is required • Determine the best method or media for                    communication and consultation • The significance or complexity of the issue or           activity in question can be used as a guide as      to how much communication and consultation      is required: the more complex and significant to    the organization, the more detailed and                 comprehensive the requirement. 4
Step 2. Establish the context provides a five-step process to assist with establishing the context within which risk will be identified.  1-Establish the internal context  2-Establish the external context  3-Establish the risk management                                                                         context  4- Develop risk criteria  5- Define the structure for risk analysis 5
SWOT A widely used framework for organizing and using data and information gained from situation analysis Encompasses both internal and external environments One of the most effective tools in the analysis of environmental data and information
SWOT description A SWOT analysis generates information that is helpful in matching an organization’s or a group’s goals, programs, and capacities to the social environment in which they operate It is an instrument within strategic planning When combined with a dialogue, it is a participatory process
SWOT Factors affecting an organization can usually be classified as:  Internal factors Strengths (S)  Weaknesses (W) External factors Opportunities (O)   Threats (T) Weaknesses Strengths Opportunities Threats
SWOT: internal factors Strengths Positive tangible and intangible attributes, internal to an organization. They are within the organization’s control Weaknesses Factors that are within an organization’s control that detract from its ability to attain the core goal. In which areas might the organization improve?
SWOT: external factors Opportunities External attractive factors that represent the reason for an organization to exist and develop. What opportunities exist in the environment which will propel the organization? Identify them by their “time frames” Threats External factors, beyond an organization’s control, which could place the organization’s mission or operation at risk. The organization may benefit by having contingency plans to address them should they occur Classify them by their “seriousness” and “probability of occurrence”
1- Establish the internal context -As previously discussed, risk is the chance of something happening that will impact on objectives.  As such, the objectives and goals of a business, project or activity must first be identified to ensure that all significant risks are understood.  This ensures that risk decisions always support the broader goals and objectives of the business. This approach encourages long-term and strategic thinking. 11
In establishing the internal context, the business owner may also ask themselves the following questions: - Is there an internal culture that needs to be considered? For example, are staff Resistant to change? Is there a professional culture that might create unnecessary risks for the business? - What staff groups are present? - What capabilities does the business have in terms of people, systems, processes, equipment and other resources? 12
2. Establish the external context This step defines the overall environment in which a business operates and includes an understanding of the clients’ or customers’ perceptions of the business. An analysis of these factors will identify the strengths, weaknesses, opportunities and threats to the business in the external environment. 13
A business owner may ask the following questions when determining the external context: • What regulations and legislation must the business comply with? • Are there any other requirements the business needs to comply with? • What is the market within which the business operates? Who are the competitors? • Are there any social, cultural or political issues that need to be considered? 14
Tips for establishing internal and external contexts  -Determine the significance of the activity in achieving the organization's goals and objectives - Define the operating environment - Identify internal and external stakeholders and determine their involvement in the risk management process. 15
3- Establish the risk management context - Before beginning a risk identification exercise, it is important to define the limits, objectives and scope of the activity or issue under examination.  - For example, in conducting a risk analysis for a new project, such as the introduction of a new piece of equipment or a new product line, it is important to clearly identify the parameters for this activity to ensure that all significant risks are identified. 16
Tips for establishing the risk management context • Define the objectives of the activity, task or function   • Identify any legislation, regulations, policies, standards and operating procedures that need to be complied with  • Decide on the depth of analysis required and allocate resources accordingly  • Decide what the output of the process will be, e.g. a risk assessment, job safety analysis or a board presentation. The output will determine the most appropriate structure and type of documentation. 17
What Is a Stakeholder? Stakeholders are those who have a stake or claim in some aspect of a company’s products, operations, markets, industry and outcomes Customers			– Investors Employees		 	– Suppliers Government agencies	– Communities Stakeholders can influence and are influenced by businesses
Topic 2 Identify risks
Legal Risk Price Risk Environmental Risk Financial Risk 5 D’s Risk- Death- Disability- Disagreement- Divorce- Disaster Family Goals Relationship/Public Relations Risk & Objectives Human Resources Risk Production Risk 11 Overall Categories of Risk
ESTABLISH THE CONTEXT IDENTIFY RISKS ANALYSE RISKS MONITOR AND REVIEW RISK ASSESSMENT COMMUNICATE AND CONSULT EVALUATE RISKS TREAT RISKS Today's Topic Identify risks Topic 1- Invite relevant parties to assist in the identification of risks  Topic 2- Research risks that may apply to scope  Topic 3 - Use tools and techniques to generate a list of risks that apply to the scope, in consultation with relevant parties Reference: AS/NZS 4360
Topic 1 Invite relevant parties to assist in the identification of risks
Government Employees Business Owners Community Consumers Who can assist in identifying Risk ?Business Stakeholders !
Who Are Business Stakeholders? Primary and Secondary Stakeholders ,[object Object]
Secondary stakeholders are those that have a public or special interest stake in the organization,[object Object]
Class Activity  Who Are Stakeholders ? Organization
Step 3. Identify the risks Risk cannot be managed unless it is first identified. Once the context of the business has been defined, the next step is to utilize the information to identify as many risks as possible.
The aim of risk identification is to identify possible risks that may affect, either negatively or positively, the objectives of the business and the activity under analysis. Answering the following questions identifies the risk:
Topic 2 Research risks that may apply to scope
There are two main ways to identify risk:    1- Identifying retrospective risks Retrospective risks are those that have previously occurred, such as incidents or accidents. Retrospective risk identification is often the most common way to identify risk, and the easiest. It’s easier to believe something if it has happened before. It is also easier to quantify its impact and to see the damage it has caused.
There are many sources of information about retrospective risk. These include:   • Hazard or incident logs or registers   • Audit reports   • Customer complaints   • Accreditation documents and reports   • Past staff or client surveys   • Newspapers or professional media, such as journals or websites.
2-Identifying prospective risks Prospective risks are often harder to identify. These are things that have not yet happened, but might happen some time in the future. Identification should include all risks, whether or not they are currently being managed. The rationale here is to record all significant risks and monitor or review the effectiveness of their control.
Topic 3 Use tools and techniques to generate a list of risks that apply to the scope, in consultation with relevant parties
Methods for identifying prospective risks include: •Observation Generate ideas requirecreativity  Brainstorming with staffor external stakeholders   • Researching the economic, political, legislative and operating environment- PEST Analysis    • Conducting interviewswith relevant people and/or organizations   • Undertaking surveys of staff or clientsto identify anticipated issues or problems   • Flow charting a process- Fish bone diagram   • Reviewingsystem design or preparing system analysis techniques.
Risks identification through:   Observation
Class Exercise
What do you see?
Are they moving?
Risk Identification tool :  Observation   Observation – viewing or witnessing workplace hazards – is one of two methods for collecting data
Observation: Some Suggested Tools Checklists  Scaled Ratings  Interval Observations  Narrative comments 
Observation As A Data Collection Tool to identify Risk  Observation as a tool means either:   Conducting a real time assessment (“on the spot”) OR  Drawing on your experiences (using recent memories of a situation or workplace)
The Two Tests Reliability and Validity  Reliability:  how dependably or consistently an observation measures a characteristic.  Validity:  depends on the purpose of the analysis.  Does your observation give an accurate and complete picture?
Maximizing Observation AAD – Appropriate, Adequate  and Documented Use Appropriate samples of performance. Is your sample Adequate?  Is there enough content to make a reasoned assessment?  Document the assessment.
Be Creative for Risk Identification
Improving Creativity to identify Risk  Left- and Right-Brain Functions- Class activity
Creative Decision-Making& Risk Identification Model of Decision-Making Source: Reprinted with permission of the Free Press, a Division of Macmillan, Inc., from David Braybrooke and Charles C. Lindbloom. A Strategy of Decision, copyright © 1963 by The Free Press of Glencoe.
Brainstorm ideas for  identifying Risk
Brainstorming Brainstorming is a lateral thinking process. Brainstorming encourages open and random thinking and communications
Brainstorming Brainstorming emphasizes right-brain activity. Rules for brainstorming: Put judgment and evaluation aside temporarily. Turn imagination loose, and start offering the results. Think of as many ideas as you can. Seek combination and improvement. Record all ideas in full view. Evaluate at a later session.
Conduct PEST Analysis to Identify Risks
PEST Analysis SUMMARY
Conduct Interview with expert    To identify risks
Conduct Interviews with Experts Talk with peoplein the industry who understand the value chain, the markets and the customers.
Data Collection Tool 2:  Interviewing Main types of interview for data collection:  the informal conversational interview the interview guide approach the standardized open-ended interview the fixed-response interview
Conduct surveys     to identify risks
Surveys Survey is the first step of market research.   A survey collects information from a specific group of people or data on a specific subject:   Forms of survey Includes : Face to face -Personal interview Telephone Mail  Focus group and group interview
Cause & Effect/Fishbone/Ishikawa Diagramto identify Risks
Cause & Effect Diagram ,[object Object]
Used to identify the potential causes for an effect (problem) in the process
Identifies and organizes potential areas for improvement activities,[object Object]
System analysis     to identify risks
Risk Identification ProcessSystem Approach PMI – Project Risk Management Risk Identification Process Sanjeev,  Vivek, Manjuwww.perotsystems.com
Summary –Risk Identification Reference :http://www.madrid.org/cs/StaticFiles/Emprendedores/Analisis_Riesgos/pages/pdf/metodologia/3IdentificaciondelosRiesgos_en.pdf
Tips for effective risk identification Select a risk identification methodology appropriate to the type of risk and the nature of the activity  Involve the right people in risk identification activities  Take a life cycle approach to risk identification and determine how risks change and evolve throughout this cycle.
Step 4. Analyze the risks During the risk identification step, a business owner may have identified many risks and it is often not possible to try to address all those identified. The risk analysis step will assist in determining which risks have a greater consequence or impact than others.
Types of RiskBusiness Related Financial – includes cash flow, budgetary requirements, tax obligations, creditor and debtor management, remuneration and other general account management concerns. Equipment – extends to equipment used to conduct the business and includes everyday use, maintenance, depreciation, theft, safety and upgrades. Organisational – relates to the internal requirements of a business, extending to the cultural, structural and human resources of the business. Security – includes the business premises, assets and people. Also extends to security of company information, intellectual property, and technology. Legal & regulatory compliance – includes legislation, regulations, standards, codes of practice and contractual requirements. Also extends to compliance with additional ‘rules’ such as policies, procedures or expectations, which may be set by contracts, customers or the social environment.
Types of RiskBusiness Related Reputation – entails the threat to the reputation of the business due to the conduct of the entity as a whole, the viability of products/services, or the conduct of employees or others associated with the business. Operational – covers the planning, daily operational activities, resources (including people) and support required within the a business that results in the successful development and delivery of products/services. Contractual – meeting obligations required in a contract including delivery, product/service quality, guarantees/warranties, insurance and other statuatory requirements, non-performance. Service delivery – relates to the delivery of services, including the quality of service provided, or the manner in which a product is delivered. Includes customer interaction and after-sales service.
Types of RiskBusiness Related Commercial – includes risks associated with market placement, business growth, product development, diversification and commercial success. Also to the commercial viability of products/services, extending through establishment, retention, growth of a customer base and return. Project – includes the management of equipment, finances, resources, technology, timeframes and people involved in the management of projects. Extends to internal operational projects, business development and external projects such as those undertaken for clients. Safety – including everyone associated with the business: individual, workplace and public safety. Also applies to the safety of products/services delivered by the business. Workplace safety - Every business has a duty of care underpinned by State and Federal legislation. This means that all reasonable steps must be taken to protect the health and safety of everyone at the workplace. Occupational health and safety is integrated with the overall risk management strategy to ensure that risks and hazards are always identified and reported. Measures must also be taken to reduce exposure to the risks as far as possible.
Types of RiskBusiness Related Stakeholder management – includes identifying, establishing and maintaining the right relationships with both internal and external stakeholders. Client-customer relationship – potential loss of clients due to internal and external factors. Strategic – includes the planning, scoping, resourcing and growth of the business. Technology – includes the implementation, management, maintenance and upgrades associated with technology. Extends to recognising critical IT infrastructure and loss of a particular service/function for an extended period of time. It further takes into account the need and cost benefit associated with technology as part of a business development strategy.
Classification of Risk  Reference :http://www.madrid.org/cs/StaticFiles/Emprendedores/Analisis_Riesgos/pages/pdf/metodologia/3IdentificaciondelosRiesgos_en.pdf
Class Exercise  Trainer will give you a scenario Using the templates  Identify Risks  Assess Risks
Measuring Consequence ,[object Object]
Widespread industrial action (months)
Majority of stakeholders severely disadvantaged (months)Catastrophic ,[object Object]
Sustained industrial action (weeks)
Multiple stakeholders severely disadvantaged (weeks)Major ,[object Object]
Consistent industrial dispute (weeks)
Multiple stakeholders significantly disadvantaged (weeks)Moderate ,[object Object]
Limited industrial action (days)
Minority of stakeholders experience disadvantage (days)Minor ,[object Object]
Isolated industrial unrest (days)
Stakeholders experience minimal disadvantage (days)Insignificant
Measuring Likelihood Risk is occurring now, or is extremely likely to happen within current circumstances Almost  Certain Balance of probability will occur Likely May occur but against short term probabilities Possible Could occur but not anticipated Unlikely Occurrence requires exceptional circumstance and/or over a long period of time Rare
Risk Rating Consequence Insignificant (1) Minor (2) Moderate (3) Major (4) Catastrophic (5) Likelihood Almost Certain (A) Significant High Extreme Extreme Significant Likely (B) Medium Significant Significant High Extreme Possible (C) Low Medium Significant High High Unlikely (D) Low Low Medium Significant High Rare (E) Low Low Medium Significant Significant
Increasing risk Intolerable Level of risk e.g. ‘HIGH’ Tolerable Evaluation
The need for action Intolerable Treat immediately Treat in the near future Treat in the longer term Monitor Tolerable
Risk Treatment Risk Treatment for Business Risk Treatment for OHS
[object Object]
Possible
Critical duration
Need improved controls
Further mitigation is practicable
Extreme risk
Immediate occurrence
Prolonged duration
Poor/no controls
No feasible mitigation
Below risk tolerance
Very low probability
Transient duration
Effective controls
Further mitigation not practicable
Lost opportunity
Possible
Critical duration
Need new direction
Benefit > costTreat the intolerable risks-Business Treatment Options ,[object Object]
Possible
Critical duration
Controls adequate
Internal mitigation not practicable/ affordableAvoid	 Share  Exploit Accept Reduce
Stress Risk Assessment Work Organisation Resources R oles and relationships I ndividual Environment Demands
Topic 3-Analyze risks
Four Rules of Risk Management. Integrate risk management into planning.It’s easier to integrate risk management early in the life cycle of any operation (training).
Four Rules of Risk Management. Accept no unnecessary risks.  The key word is “unnecessary”.  An unnecessary risk is a risk that does not contribute meaningfully to the mission.  Leaders who take unnecessary risks are gambling.

Contenu connexe

Tendances

Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 
Risk management
Risk managementRisk management
Risk managementMECandPMV
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Managementcgautam
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and managementTanmoy Sinha
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk AnalysisCIToolkit
 
Risk mangement
Risk mangementRisk mangement
Risk mangementcollege
 
Chapter 1 risk management
Chapter 1 risk managementChapter 1 risk management
Chapter 1 risk managementRione Drevale
 
Quantitative Project Risk Analysis
Quantitative Project Risk AnalysisQuantitative Project Risk Analysis
Quantitative Project Risk AnalysisIntaver Insititute
 
Chapter 1 An Overview Of Project Management
Chapter 1  An Overview Of Project ManagementChapter 1  An Overview Of Project Management
Chapter 1 An Overview Of Project ManagementMahesh Bendigeri
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Managementansula
 
Project risk management
Project risk managementProject risk management
Project risk managementDewang Agrawal
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
Risk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation SlidesRisk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation SlidesSlideTeam
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 

Tendances (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Plan Risk responses
Plan Risk responsesPlan Risk responses
Plan Risk responses
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Risk mangement
Risk mangementRisk mangement
Risk mangement
 
Risk management
Risk managementRisk management
Risk management
 
Chapter 1 risk management
Chapter 1 risk managementChapter 1 risk management
Chapter 1 risk management
 
Quantitative Project Risk Analysis
Quantitative Project Risk AnalysisQuantitative Project Risk Analysis
Quantitative Project Risk Analysis
 
Chapter 1 An Overview Of Project Management
Chapter 1  An Overview Of Project ManagementChapter 1  An Overview Of Project Management
Chapter 1 An Overview Of Project Management
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Risk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation SlidesRisk Management Tools And Techniques PowerPoint Presentation Slides
Risk Management Tools And Techniques PowerPoint Presentation Slides
 
Risk management
Risk managementRisk management
Risk management
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 

Similaire à Presentation manage risk

Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.pptUday Nayakwadi
 
How to Assess Integrity Risks for a Company ?
How to Assess Integrity Risks for a Company ?How to Assess Integrity Risks for a Company ?
How to Assess Integrity Risks for a Company ?iohann Le Frapper
 
How to assess risk for a company
How to assess risk for a companyHow to assess risk for a company
How to assess risk for a companyOECDglobal
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
How to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential StepsHow to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential StepsCase IQ
 
IRGC Guidelines for Emerging Risk Governance
IRGC Guidelines for Emerging Risk GovernanceIRGC Guidelines for Emerging Risk Governance
IRGC Guidelines for Emerging Risk Governanceirgc_risk
 
Thinking About The Future
Thinking About The FutureThinking About The Future
Thinking About The FutureNigel Tebbutt
 
MeTA MSP workshop: The Generic Multi Stakeholder Process Model
MeTA MSP workshop: The Generic Multi Stakeholder Process ModelMeTA MSP workshop: The Generic Multi Stakeholder Process Model
MeTA MSP workshop: The Generic Multi Stakeholder Process ModelMeTApresents
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption RiskDr Darren O'Connell AGIA
 
QMS Simplified in its very basic context
QMS Simplified in its very basic contextQMS Simplified in its very basic context
QMS Simplified in its very basic contextButchEnalpe
 
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)Keith Darcy
 

Similaire à Presentation manage risk (20)

RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
Rmp
RmpRmp
Rmp
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
risk management.pdf
risk management.pdfrisk management.pdf
risk management.pdf
 
Risk management
Risk managementRisk management
Risk management
 
How to Assess Integrity Risks for a Company ?
How to Assess Integrity Risks for a Company ?How to Assess Integrity Risks for a Company ?
How to Assess Integrity Risks for a Company ?
 
How to assess risk for a company
How to assess risk for a companyHow to assess risk for a company
How to assess risk for a company
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
Capital Markets
Capital MarketsCapital Markets
Capital Markets
 
How to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential StepsHow to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential Steps
 
IRGC Guidelines for Emerging Risk Governance
IRGC Guidelines for Emerging Risk GovernanceIRGC Guidelines for Emerging Risk Governance
IRGC Guidelines for Emerging Risk Governance
 
STAKEHOLDER-IDENTIFICATION.pptx
STAKEHOLDER-IDENTIFICATION.pptxSTAKEHOLDER-IDENTIFICATION.pptx
STAKEHOLDER-IDENTIFICATION.pptx
 
Thinking About The Future
Thinking About The FutureThinking About The Future
Thinking About The Future
 
MeTA MSP workshop: The Generic Multi Stakeholder Process Model
MeTA MSP workshop: The Generic Multi Stakeholder Process ModelMeTA MSP workshop: The Generic Multi Stakeholder Process Model
MeTA MSP workshop: The Generic Multi Stakeholder Process Model
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk
 
QMS Simplified in its very basic context
QMS Simplified in its very basic contextQMS Simplified in its very basic context
QMS Simplified in its very basic context
 
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
 

Dernier

Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptxExploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptxTexas Flange
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIIRODORI inc.
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsCaitlinCummins3
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsStefan Wolpers
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra
 
PEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTAR
PEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTARPEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTAR
PEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTARdoktercalysta
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfAgusHalim9
 
Global Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdfGlobal Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdfAmer Morgan
 
5 Brilliant Ways To Buy Verified Payoneer Accounts In 2024
5 Brilliant Ways To Buy Verified Payoneer Accounts In 20245 Brilliant Ways To Buy Verified Payoneer Accounts In 2024
5 Brilliant Ways To Buy Verified Payoneer Accounts In 2024https://localsmmshop.com/
 
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...BabaJohn3
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxOs Hillman
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.daisycvs
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementsirhcs
 
NFS- Operations Presentation - Recurrent
NFS- Operations Presentation - RecurrentNFS- Operations Presentation - Recurrent
NFS- Operations Presentation - Recurrenttoniquemcintosh1
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesHaseebBashir5
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfMont Surfaces
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
1Q24_EN hyundai capital 1q performance
1Q24_EN   hyundai capital 1q performance1Q24_EN   hyundai capital 1q performance
1Q24_EN hyundai capital 1q performanceirhcs
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionAlejandro Cremades
 

Dernier (20)

Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptxExploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORI
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
WAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdfWAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdf
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
PEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTAR
PEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTARPEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTAR
PEMATANG SIANTAR 0851/8063/4797 JUAL OBAT ABORSI CYTOTEC PEMATANG SIANTAR
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
 
Global Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdfGlobal Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdf
 
5 Brilliant Ways To Buy Verified Payoneer Accounts In 2024
5 Brilliant Ways To Buy Verified Payoneer Accounts In 20245 Brilliant Ways To Buy Verified Payoneer Accounts In 2024
5 Brilliant Ways To Buy Verified Payoneer Accounts In 2024
 
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptx
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statements
 
NFS- Operations Presentation - Recurrent
NFS- Operations Presentation - RecurrentNFS- Operations Presentation - Recurrent
NFS- Operations Presentation - Recurrent
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
1Q24_EN hyundai capital 1q performance
1Q24_EN   hyundai capital 1q performance1Q24_EN   hyundai capital 1q performance
1Q24_EN hyundai capital 1q performance
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 

Presentation manage risk

  • 1.
  • 2. A- Eliciting risk information -Communication and consultation may occur within the organization or between the organization and its stakeholders. -It is very rare that only one person will hold all the information needed to identify the risks to a business or even to an activity or project. -It therefore important to identify the range of stakeholders who will assist in making this information complete. 2
  • 3. B-Managing stakeholder perceptions for management of risk 3
  • 4. Tips for effective communication and consultation • Determine at the outset whether a communication strategy and/or plan is required • Determine the best method or media for communication and consultation • The significance or complexity of the issue or activity in question can be used as a guide as to how much communication and consultation is required: the more complex and significant to the organization, the more detailed and comprehensive the requirement. 4
  • 5. Step 2. Establish the context provides a five-step process to assist with establishing the context within which risk will be identified. 1-Establish the internal context 2-Establish the external context 3-Establish the risk management context 4- Develop risk criteria 5- Define the structure for risk analysis 5
  • 6. SWOT A widely used framework for organizing and using data and information gained from situation analysis Encompasses both internal and external environments One of the most effective tools in the analysis of environmental data and information
  • 7. SWOT description A SWOT analysis generates information that is helpful in matching an organization’s or a group’s goals, programs, and capacities to the social environment in which they operate It is an instrument within strategic planning When combined with a dialogue, it is a participatory process
  • 8. SWOT Factors affecting an organization can usually be classified as: Internal factors Strengths (S) Weaknesses (W) External factors Opportunities (O) Threats (T) Weaknesses Strengths Opportunities Threats
  • 9. SWOT: internal factors Strengths Positive tangible and intangible attributes, internal to an organization. They are within the organization’s control Weaknesses Factors that are within an organization’s control that detract from its ability to attain the core goal. In which areas might the organization improve?
  • 10. SWOT: external factors Opportunities External attractive factors that represent the reason for an organization to exist and develop. What opportunities exist in the environment which will propel the organization? Identify them by their “time frames” Threats External factors, beyond an organization’s control, which could place the organization’s mission or operation at risk. The organization may benefit by having contingency plans to address them should they occur Classify them by their “seriousness” and “probability of occurrence”
  • 11. 1- Establish the internal context -As previously discussed, risk is the chance of something happening that will impact on objectives. As such, the objectives and goals of a business, project or activity must first be identified to ensure that all significant risks are understood. This ensures that risk decisions always support the broader goals and objectives of the business. This approach encourages long-term and strategic thinking. 11
  • 12. In establishing the internal context, the business owner may also ask themselves the following questions: - Is there an internal culture that needs to be considered? For example, are staff Resistant to change? Is there a professional culture that might create unnecessary risks for the business? - What staff groups are present? - What capabilities does the business have in terms of people, systems, processes, equipment and other resources? 12
  • 13. 2. Establish the external context This step defines the overall environment in which a business operates and includes an understanding of the clients’ or customers’ perceptions of the business. An analysis of these factors will identify the strengths, weaknesses, opportunities and threats to the business in the external environment. 13
  • 14. A business owner may ask the following questions when determining the external context: • What regulations and legislation must the business comply with? • Are there any other requirements the business needs to comply with? • What is the market within which the business operates? Who are the competitors? • Are there any social, cultural or political issues that need to be considered? 14
  • 15. Tips for establishing internal and external contexts -Determine the significance of the activity in achieving the organization's goals and objectives - Define the operating environment - Identify internal and external stakeholders and determine their involvement in the risk management process. 15
  • 16. 3- Establish the risk management context - Before beginning a risk identification exercise, it is important to define the limits, objectives and scope of the activity or issue under examination. - For example, in conducting a risk analysis for a new project, such as the introduction of a new piece of equipment or a new product line, it is important to clearly identify the parameters for this activity to ensure that all significant risks are identified. 16
  • 17. Tips for establishing the risk management context • Define the objectives of the activity, task or function • Identify any legislation, regulations, policies, standards and operating procedures that need to be complied with • Decide on the depth of analysis required and allocate resources accordingly • Decide what the output of the process will be, e.g. a risk assessment, job safety analysis or a board presentation. The output will determine the most appropriate structure and type of documentation. 17
  • 18. What Is a Stakeholder? Stakeholders are those who have a stake or claim in some aspect of a company’s products, operations, markets, industry and outcomes Customers – Investors Employees – Suppliers Government agencies – Communities Stakeholders can influence and are influenced by businesses
  • 20. Legal Risk Price Risk Environmental Risk Financial Risk 5 D’s Risk- Death- Disability- Disagreement- Divorce- Disaster Family Goals Relationship/Public Relations Risk & Objectives Human Resources Risk Production Risk 11 Overall Categories of Risk
  • 21. ESTABLISH THE CONTEXT IDENTIFY RISKS ANALYSE RISKS MONITOR AND REVIEW RISK ASSESSMENT COMMUNICATE AND CONSULT EVALUATE RISKS TREAT RISKS Today's Topic Identify risks Topic 1- Invite relevant parties to assist in the identification of risks Topic 2- Research risks that may apply to scope Topic 3 - Use tools and techniques to generate a list of risks that apply to the scope, in consultation with relevant parties Reference: AS/NZS 4360
  • 22. Topic 1 Invite relevant parties to assist in the identification of risks
  • 23. Government Employees Business Owners Community Consumers Who can assist in identifying Risk ?Business Stakeholders !
  • 24.
  • 25.
  • 26. Class Activity Who Are Stakeholders ? Organization
  • 27. Step 3. Identify the risks Risk cannot be managed unless it is first identified. Once the context of the business has been defined, the next step is to utilize the information to identify as many risks as possible.
  • 28. The aim of risk identification is to identify possible risks that may affect, either negatively or positively, the objectives of the business and the activity under analysis. Answering the following questions identifies the risk:
  • 29. Topic 2 Research risks that may apply to scope
  • 30. There are two main ways to identify risk: 1- Identifying retrospective risks Retrospective risks are those that have previously occurred, such as incidents or accidents. Retrospective risk identification is often the most common way to identify risk, and the easiest. It’s easier to believe something if it has happened before. It is also easier to quantify its impact and to see the damage it has caused.
  • 31. There are many sources of information about retrospective risk. These include: • Hazard or incident logs or registers • Audit reports • Customer complaints • Accreditation documents and reports • Past staff or client surveys • Newspapers or professional media, such as journals or websites.
  • 32. 2-Identifying prospective risks Prospective risks are often harder to identify. These are things that have not yet happened, but might happen some time in the future. Identification should include all risks, whether or not they are currently being managed. The rationale here is to record all significant risks and monitor or review the effectiveness of their control.
  • 33. Topic 3 Use tools and techniques to generate a list of risks that apply to the scope, in consultation with relevant parties
  • 34. Methods for identifying prospective risks include: •Observation Generate ideas requirecreativity Brainstorming with staffor external stakeholders • Researching the economic, political, legislative and operating environment- PEST Analysis • Conducting interviewswith relevant people and/or organizations • Undertaking surveys of staff or clientsto identify anticipated issues or problems • Flow charting a process- Fish bone diagram • Reviewingsystem design or preparing system analysis techniques.
  • 37. What do you see?
  • 39. Risk Identification tool : Observation Observation – viewing or witnessing workplace hazards – is one of two methods for collecting data
  • 40. Observation: Some Suggested Tools Checklists  Scaled Ratings  Interval Observations  Narrative comments 
  • 41. Observation As A Data Collection Tool to identify Risk Observation as a tool means either: Conducting a real time assessment (“on the spot”) OR Drawing on your experiences (using recent memories of a situation or workplace)
  • 42. The Two Tests Reliability and Validity Reliability:  how dependably or consistently an observation measures a characteristic. Validity: depends on the purpose of the analysis. Does your observation give an accurate and complete picture?
  • 43. Maximizing Observation AAD – Appropriate, Adequate  and Documented Use Appropriate samples of performance. Is your sample Adequate? Is there enough content to make a reasoned assessment? Document the assessment.
  • 44. Be Creative for Risk Identification
  • 45. Improving Creativity to identify Risk Left- and Right-Brain Functions- Class activity
  • 46. Creative Decision-Making& Risk Identification Model of Decision-Making Source: Reprinted with permission of the Free Press, a Division of Macmillan, Inc., from David Braybrooke and Charles C. Lindbloom. A Strategy of Decision, copyright © 1963 by The Free Press of Glencoe.
  • 47. Brainstorm ideas for identifying Risk
  • 48. Brainstorming Brainstorming is a lateral thinking process. Brainstorming encourages open and random thinking and communications
  • 49. Brainstorming Brainstorming emphasizes right-brain activity. Rules for brainstorming: Put judgment and evaluation aside temporarily. Turn imagination loose, and start offering the results. Think of as many ideas as you can. Seek combination and improvement. Record all ideas in full view. Evaluate at a later session.
  • 50. Conduct PEST Analysis to Identify Risks
  • 51.
  • 53. Conduct Interview with expert To identify risks
  • 54. Conduct Interviews with Experts Talk with peoplein the industry who understand the value chain, the markets and the customers.
  • 55. Data Collection Tool 2: Interviewing Main types of interview for data collection: the informal conversational interview the interview guide approach the standardized open-ended interview the fixed-response interview
  • 56. Conduct surveys to identify risks
  • 57. Surveys Survey is the first step of market research. A survey collects information from a specific group of people or data on a specific subject: Forms of survey Includes : Face to face -Personal interview Telephone Mail Focus group and group interview
  • 58. Cause & Effect/Fishbone/Ishikawa Diagramto identify Risks
  • 59.
  • 60. Used to identify the potential causes for an effect (problem) in the process
  • 61.
  • 62. System analysis to identify risks
  • 63. Risk Identification ProcessSystem Approach PMI – Project Risk Management Risk Identification Process Sanjeev, Vivek, Manjuwww.perotsystems.com
  • 64. Summary –Risk Identification Reference :http://www.madrid.org/cs/StaticFiles/Emprendedores/Analisis_Riesgos/pages/pdf/metodologia/3IdentificaciondelosRiesgos_en.pdf
  • 65. Tips for effective risk identification Select a risk identification methodology appropriate to the type of risk and the nature of the activity Involve the right people in risk identification activities Take a life cycle approach to risk identification and determine how risks change and evolve throughout this cycle.
  • 66. Step 4. Analyze the risks During the risk identification step, a business owner may have identified many risks and it is often not possible to try to address all those identified. The risk analysis step will assist in determining which risks have a greater consequence or impact than others.
  • 67. Types of RiskBusiness Related Financial – includes cash flow, budgetary requirements, tax obligations, creditor and debtor management, remuneration and other general account management concerns. Equipment – extends to equipment used to conduct the business and includes everyday use, maintenance, depreciation, theft, safety and upgrades. Organisational – relates to the internal requirements of a business, extending to the cultural, structural and human resources of the business. Security – includes the business premises, assets and people. Also extends to security of company information, intellectual property, and technology. Legal & regulatory compliance – includes legislation, regulations, standards, codes of practice and contractual requirements. Also extends to compliance with additional ‘rules’ such as policies, procedures or expectations, which may be set by contracts, customers or the social environment.
  • 68. Types of RiskBusiness Related Reputation – entails the threat to the reputation of the business due to the conduct of the entity as a whole, the viability of products/services, or the conduct of employees or others associated with the business. Operational – covers the planning, daily operational activities, resources (including people) and support required within the a business that results in the successful development and delivery of products/services. Contractual – meeting obligations required in a contract including delivery, product/service quality, guarantees/warranties, insurance and other statuatory requirements, non-performance. Service delivery – relates to the delivery of services, including the quality of service provided, or the manner in which a product is delivered. Includes customer interaction and after-sales service.
  • 69. Types of RiskBusiness Related Commercial – includes risks associated with market placement, business growth, product development, diversification and commercial success. Also to the commercial viability of products/services, extending through establishment, retention, growth of a customer base and return. Project – includes the management of equipment, finances, resources, technology, timeframes and people involved in the management of projects. Extends to internal operational projects, business development and external projects such as those undertaken for clients. Safety – including everyone associated with the business: individual, workplace and public safety. Also applies to the safety of products/services delivered by the business. Workplace safety - Every business has a duty of care underpinned by State and Federal legislation. This means that all reasonable steps must be taken to protect the health and safety of everyone at the workplace. Occupational health and safety is integrated with the overall risk management strategy to ensure that risks and hazards are always identified and reported. Measures must also be taken to reduce exposure to the risks as far as possible.
  • 70. Types of RiskBusiness Related Stakeholder management – includes identifying, establishing and maintaining the right relationships with both internal and external stakeholders. Client-customer relationship – potential loss of clients due to internal and external factors. Strategic – includes the planning, scoping, resourcing and growth of the business. Technology – includes the implementation, management, maintenance and upgrades associated with technology. Extends to recognising critical IT infrastructure and loss of a particular service/function for an extended period of time. It further takes into account the need and cost benefit associated with technology as part of a business development strategy.
  • 71. Classification of Risk Reference :http://www.madrid.org/cs/StaticFiles/Emprendedores/Analisis_Riesgos/pages/pdf/metodologia/3IdentificaciondelosRiesgos_en.pdf
  • 72. Class Exercise Trainer will give you a scenario Using the templates Identify Risks Assess Risks
  • 73.
  • 75.
  • 77.
  • 79.
  • 81.
  • 83. Stakeholders experience minimal disadvantage (days)Insignificant
  • 84. Measuring Likelihood Risk is occurring now, or is extremely likely to happen within current circumstances Almost Certain Balance of probability will occur Likely May occur but against short term probabilities Possible Could occur but not anticipated Unlikely Occurrence requires exceptional circumstance and/or over a long period of time Rare
  • 85. Risk Rating Consequence Insignificant (1) Minor (2) Moderate (3) Major (4) Catastrophic (5) Likelihood Almost Certain (A) Significant High Extreme Extreme Significant Likely (B) Medium Significant Significant High Extreme Possible (C) Low Medium Significant High High Unlikely (D) Low Low Medium Significant High Rare (E) Low Low Medium Significant Significant
  • 86. Increasing risk Intolerable Level of risk e.g. ‘HIGH’ Tolerable Evaluation
  • 87. The need for action Intolerable Treat immediately Treat in the near future Treat in the longer term Monitor Tolerable
  • 88. Risk Treatment Risk Treatment for Business Risk Treatment for OHS
  • 89.
  • 93. Further mitigation is practicable
  • 103. Further mitigation not practicable
  • 108.
  • 112. Internal mitigation not practicable/ affordableAvoid Share Exploit Accept Reduce
  • 113. Stress Risk Assessment Work Organisation Resources R oles and relationships I ndividual Environment Demands
  • 115. Four Rules of Risk Management. Integrate risk management into planning.It’s easier to integrate risk management early in the life cycle of any operation (training).
  • 116. Four Rules of Risk Management. Accept no unnecessary risks. The key word is “unnecessary”. An unnecessary risk is a risk that does not contribute meaningfully to the mission. Leaders who take unnecessary risks are gambling.
  • 117. Four Rules of Risk Management. Make risk decisions at the proper level. The “ proper level” is the level where the decision maker has the maturity and experience to make a good decision. Normally, this would be the leader responsible for the mission. Decisions should be made at the lowest possible level as long as the decision maker has the experience and maturity to make a good decision.
  • 118. Four Rules of Risk Management. Accept risks if the benefit outweighs the cost.Army leaders are in the risk-taking business. There is always risk, and where there is risk, sooner or later there will be an accident, risk management minimizes these accidents.
  • 119. Levels of Risk Management. Hasty Risk Management. Deliberate Risk Management. In-depth Risk Management.
  • 120. Levels of Risk Management. Hasty Risk Management. A quick, often mental, consideration of the risk management process during an operational assessment.
  • 121. Levels of Risk Management. Deliberate Risk Management. Application of the safety risk management process using worksheets and the core elements of the process, e.g. operations analysis, preliminary hazard assessment (PHA), risk control options, training realism assessment (TRA), implementation procedures, and sustained monitoring.
  • 122. Levels of Risk Management. In-depth Risk Management. Working group application of more detailed qualitative and quantitative techniques, especially in the hazard identification, hazard assessment, and risk control options phases.
  • 123. Hazard Probability of a Risk. A risk assessment matrix is an effective tool that can be used to determine how risky an identified hazard is. Standard terms associated with risk assessment matrices include: Probability. How likely an is an event to occur. Effect. Consequences if the event occurs.
  • 124. Key Definitions. Safety Risk Management - the application of systematic thinking to the problem of making job safer (enhancing protection) and more effective. Hazard - a condition with the potential of causing injury to personnel, damage to equipment or structures, loss of material, or reduction of ability to perform a prescribed function.
  • 125. Risk - an expression of possible loss over a specific period of time or number of operational cycles. Risk Assessment - the process of detecting hazards and systematically assessing their overall risk. It involves the first two steps of the Risk Management process.
  • 126. Risk Management - a process whereby management decisions are made and actions implemented to reduce the effects of identified hazards. Gambling - Making non-systematic risk decisions.
  • 127. Assessment of quality of risk management Management information Attitude of management Governance structure Corporate culture People Approach to decision making Risk management processes Quality of implementation ILLUSTRATIVE
  • 128. Risk Response Planning After identifying and quantifying risks, you must decide how to respond to them. Four main response strategies for negative risks: Risk avoidance Risk acceptance Risk transference Risk mitigation
  • 130. The basic process steps are: Establish the context Identify the risks Analyze the risks Evaluate the risks Treat the risks Next
  • 131. Environment - business, social, regulatory, cultural, competitive, financial and political situation. SWOT - organisation's strengths, weaknesses, opportunities and threats. Stakeholders - objectives and expectations of individuals, groups and organisations with a significant interest in the business. Establish the context
  • 132. To identify risk, you need to consider two key questions: Brainstorm ideas and group under appropriate risk headings. Consider the effects on people (staff, students and other people), information, physical assets and finances, reputation. Write the final list onto the table (risk assessment summary). Identify the risks
  • 133. Risk Category (Check your Handouts) Identify the risks
  • 134. Ask Simple Questions What might happen? How might it happen? Will it be serious if it happens? How likely is it to happen? And finally, what is the risk? Analyze the risks
  • 135. Probability The likeliness that an event will occur. Almost Certain (Frequent)-occurs often. Likely - Occurs several times. Occasional) - occurs sporadically. Possible (Seldom) – Unlikely, but could occur. Unlikely – Probably won’t occur. Analyze the risks
  • 136. Consequences (Severity) Severity is the expected result of an event (degree of injury, property damage or other mission impairing factors. Critical Major Moderate Minor Analyze the risks
  • 137.
  • 138. Assess the Risk Consequences Likelihood Risk
  • 139. 5 Impact Categories Minor Disruptive Serious Critical Catastrophic
  • 140. General Likelihood definitions and examples Impact definitions against each impact category Matrix purpose designed for application to military activities Specified Risk Tolerance Thresholds
  • 141.
  • 143. Topic 4 Select and implement treatments
  • 144. Potential risk treatments Once risks have been identified and assessed, all techniques to manage the risk fall into one or more of these four major categories:[9] Avoidance (eliminate, withdraw from or not become involved) Reduction (optimize - mitigate) Sharing (transfer - outsource or insure) Retention (accept and budget)
  • 145. Step 3: Control of Risk THE HIERARCHY OF CONTROL: ELIMINATE (E) Stop the process immediately SUBSTITUTE (S) Use another product Outsource the process ENGINEER (En) Isolate the hazard (Is) Install guarding around the hazard (G) ADMINISTRATE (A) Document safe work procedures (SWP) Provide training (T) Perform inspections (I) PERSONAL PROTECTIVE EQUIPMENT (PPE) The final frontier!!!
  • 146. Hierarchy of Controls Eliminate if possible, otherwise a combination of these in this order of preference: Substitute Isolate risk Engineer out Information, instruction & training Provide Personal Protective equipment