+ All Categories
Home > Education > Risk framework

Risk framework

Date post: 20-Jun-2015
Category:
Upload: advance-innovation-group-wwwadvanceinnovationgroupcom
View: 280 times
Download: 0 times
Share this document with a friend
Description:
A Framework for Risk Management Risk management is the identification, assessment and prioritization of the risk followed by coordinated and economical application of the resources to minimize, monitor and control the probability and/or impact of an action or event identified as a risk. So we work on risk identification, assess the possible impact of the risk, quantify the risk by calculating RPN (Risk Priority Number), find out monetary value, find out the current control, identify residual risk (by revisiting RPN), determine monetary value, classify risk based on residual RPN, work on "RMS" Risk Management Strategy", prepare "RTP" risk treatment plan (how to handle risk), risk monitoring and closing the risk. Additionally, it is advisable that you also visit and subscribe Advance Innovation Group Blog (http://advanceinnovationgroup.com/blog) for more Lean Six Sigma Projects, Case Studies on Lean Six Sigma, Lean Six Sigma Videos, Lean Six Sigma Discussions, Lean Six Sigma Jobs etc.
Popular Tags:
19
Risk Management Framework
Transcript
Page 1: Risk framework

Risk Management Framework

Page 2: Risk framework

www.sdgc.com SDG Confidential & Proprietary

2

Introduction

What is Risk?

Risk may be defined as “the threat or probability of an action or event, that may adversely affect an organization's ability to achieve its objectives”.

What is Risk Management?

Risk management is the identification, assessment and prioritization of risk followed by coordinated and economical application of resources to minimize, monitor and control probability and/or impact of action or event identified as risk.

Page 3: Risk framework

www.sdgc.com SDG Confidential & Proprietary

The Risk Framework

Risk Identification

Assess the Possible Impact

Quantify the Risk - Risk Priority Number

Determine Monetary Value

Determine the Current Control

Identify Residual Risk (Revisit RPN)

Determine Monetary Value

Classify Risk Based on Residual RPN

Risk Management Strategy

Risk Treatment Plan

Risk Monitoring & Closure

Page 4: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

D

et

RP

N

Determine

Monetary

Value

Determine Current Controls Se

v O

cc

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

SSO ID requested

without BGC is complete

Risk shall be identified by identifying any activity that may impact organization’s business, reputation, profitability, operations, effectiveness, productivity, etc.

Risk Identification

Page 5: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Assess the Possible Impact

Impact of Risk on end desired result shall be assessed by respective process owners.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

D

et

RP

N

Determine

Monetary

Value

Determine Current Controls Se

v O

cc

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be

impacted

SSO ID requested

without BGC is complete

Breach of compliance

Page 6: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Quantify the Risk - Severity

For every risk event the severity of impact that the risk may have on the desired output shall be identified & captured in the Risk Template.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

D

et

RP

N

Determine

Monetary

Value

Determine Current Controls Se

v O

cc

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be

impacted 10

SSO ID requested

without BGC is complete

Breach of compliance

9

Note: To be rated on a scale of 1 -10, where 1 would mean least severe & 10 extremely severe.

Page 7: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Quantify the Risk - Occurrence

Periodicity of occurrence of identified Risk shall be determined & captured.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

D

et Resid

ual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10

SSO ID requested

without BGC is complete

Breach of compliance

9 5

Note: To be rated on a scale of 1 -10, where 1 would mean least occurring & 10 would mean very

frequently occurring.

Page 8: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Quantify the Risk - Detection

Probability of detection of the identified risk shall be determined & captured.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

D

et Resid

ual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4

Note: To be rated on a scale of 1 -10, where 1 would mean easily detectable & 10 would mean

Non detectable.

Page 9: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Quantify the Risk - Risk Priority Number

Multiply the Severity (Sev), Occurrence (Occ) and Detection (Det) to get the Risk Priority Number (RPN).

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

D

et Resid

ual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Note: Higher the value of RPN, higher the probability of risk impacting the desired result.

Page 10: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Determine Monetary Value

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

D

et Resid

ual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Management Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Every risk shall be captured in terms of monetary impact that is associated with it. These can be Cost of replacement, Cost of lost opportunities, Cost of poor quality, Cost of correction and corrective action, Cost of prevention and preventive action, Cost of repair/rework etc.

Page 11: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Determine the Current Control

Current Controls that are in place for avoiding, reducing or transferring the impact/occurrence of the risk event shall be determined.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

Page 12: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Identify Residual Risk (Revisit RPN)

Reassign the Severity (Sev), Occurrence (Occ) and Detection (Det) values after the implementation of the current controls.

The New RPN derived as a result is known as Residual Risk (RPN).

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged 6 2 3 36

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

9 5 3 135

Page 13: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Determine Monetary Value

Monetary Value shall be recalculated after determination of current control.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged 6 2 3 36

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

9 5 3 135

Page 14: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Classify Risk Based on Residual RPN

Risk shall be classified as Critical, High, Medium, Low based on the residual RPN.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged 6 2 3 36 Low

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

9 5 3 135 High

Risk impact categorization is as follows: Critical: Residual RPN greater than or equal to 300.

High: Residual RPN falls between 100 to 299.

Medium: Residual RPN falls between 60 to 99.

Low: Less than 60.

Page 15: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Risk Management Strategy

Risk management strategy to be used to handle the particular risk shall be identified under one of the four subgroups given below:

Accept (the risk) : Acceptance involves making a conscious decision to accept the outcome should the risk event occur.

Avoid (the risk) : The organization may avoid the risk by deciding to stop, postpone, cancel, divert or discontinue with an activity that may be the cause for that risk.

Reduce (the risk) : Risk may be reduced by implementing controls to do so.

Transfer (the risk) : Risk can also be transferred to a third party (insurance company or a sub-contractor etc.).

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged 6 2 3 36 Low

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

9 5 3 135 High Reduce

Page 16: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Risk Treatment Plan

The risk treatment plan shall outline the steps, controls etc implemented in accordance with the Risk Management Strategy chosen.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged 6 2 3 36 Low Accept

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

9 5 3 135 High Reduce

BGC clearing date to be mentioned

on the SSO ID request form as a

mandate field.

Page 17: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Responsibility

Responsibility for the particular risk treatment plan shall be assigned to identified individuals.

Risk Identificatio

n

Assess the Possible Impact

Sev

Occ

Det

RP

N

Determine

Monetary Value

Determine Current Controls

Sev

Occ

Det

Residual RPN

Determine

Monetary

Value

Classify Risk

Based on

Residual RPN

Risk Managem

ent Strategy

Risk Treatment Plan

Responsibility

Date

Laptop not working

Project delivery timeline may be impacted

10 10 3 300 Replacement system can be

arranged 6 2 3 36 Low

SSO ID requested

without BGC is complete

Breach of compliance

9 5 4 180

Documented process in place to ensure that the request is sent only after BGC is cleared

(green).

9 5 3 135 High Reduce

BGC clearing date to be mentioned

on the SSO ID request form as a

mandate field.

XYZ

Page 18: Risk framework

www.sdgc.com SDG Confidential & Proprietary

Risk Monitoring & Closure

Process Owners to revisit the risk register once every month or sooner to review the residual RPN. Critical and high risks from all departments (HR, Admin, Technology etc) will need to be compiled

and sent across to the PDQ team for consolidation every quarter. It will be presented for quarterly review by Ajay, Deepak, Nag, Kaushal and who so ever they feel

needs to be a part of the review process, by PDQ. Once reviewed and actions identified PDQ will publish an organizational risk register to the relevant

stakeholders every quarter.

Page 19: Risk framework

www.sdgc.com SDG Confidential & Proprietary

THANK YOU


Recommended