Lecture 7. Requirements Prioritisation. Risk Management

Size: px
Start display at page:

Download "Lecture 7. Requirements Prioritisation. Risk Management"

Transcription

1 Lecture 7 Requirements Prioritisation Risk Management 246

2 Lecture 7 Requirements Prioritisation Risk Management 247

3 Basics of Prioritisation Need to select what to implement Ä Customers (usually) ask for way too much Ä Balance time-to-market with amount of functionality Ä Decide which features go into the next release For each requirement/feature, ask: Ä How important is this to the customer? Ä How much will it cost to implement? Ä How risky will it be to attempt to build it? Perform Triage: Ä Some requirements *must* be included Ä Some requirements should definitely be excluded Ä That leaves a pool of nice-to-haves, which we must select from. 248

4 A Cost-Value Approach Calculate return on investment Ä Assess each requirement s importance to the project as a whole Ä Assess the relative cost of each requirement Ä Compute the cost-value trade-off: Value (percent) High priority Medium priority 5 Low priority Cost (percent) 249

5 A Cost-Value Approach Calculate return on investment Ä Assess each requirement s importance to the project as a whole Ä Assess the relative cost of each requirement Ä Compute the cost-value trade-off: Value (percent) 30 High priority 25 Two approaches: 20 Medium priority Ä Absolute 15 scale (e.g. dollar values) Ø Requires much domain experience 10 Ä Relative values (e.g. less/more; a little, somewhat, very) 5 Ø Much easier to elicit Low priority Ø Prioritization becomes a sorting problem Cost (percent) 250

6 Hard to quantify differences Some complications Ä easier to say x is more important than y Ä than to estimate by how much. Not all requirements comparable Ä E.g. different level of abstraction Ä E.g. core functionality vs. customer enhancements Requirements may not be independent Ä No point selecting between X and Y if they are mutually dependent Stakeholders may not be consistent Ä E.g. If X > Y, and Y > Z, then presumably X > Z? Stakeholders might not agree Ä Different cost/value assessments for different types of stakeholder 251

7 Hierarchical Prioritisation Group Requirements into a hierarchy Ä e.g. A goal tree Only make comparisons between branches of a single node: Better train system Comparison set 1 serve more passengers minimize costs improve safety add new tracks Comparison set 2 increase train speed more frequent trains minimize operation costs minimize development costs Comparison set 3 increase safe distance Comparison set 4 clearer signalling 252

8 Analy&c Hierarchy Process (AHP) Source: Adapted from Karlsson & Ryan 1997 Create n x n matrix (for n requirements) Ä For element (x,y) in the matrix enter: Ø 1 - if x and y are of equal value Ø 3 - if x is slightly more preferred than y Ø 5 - if x is strongly more preferred than y Ø 7 - if x is very strongly more preferred than y Ø 9 - if x is extremely more preferred than y Ø (use the intermediate values, 2,4,6,8 if compromise needed) Ä and for (y,x) enter the reciprocal. EsJmate the eigenvalues: Ä E.g. averaging over normalized columns Ø Calculate the sum of each column Ø Divide each element in the matrix by the sum of it s column Ø Calculate the sum of each row Ø Divide each row sum by the number of rows This gives a value for each requirement: Ä giving the esjmated percentage of total value of the project 253

9 AHP example - es&ma&ng costs Req1 Req2 Req3 Req4 Req1 1 1/3 2 4 Req Req3 1/2 1/5 1 1/3 Req4 1/4 1/3 3 1 Normalise columns Req1-26% of the cost Req2-50% of the cost Req3-9% of the cost Req4-16% of the cost Result Req1 Req2 Req3 Req4 Req Req Req Req Sum the rows sum sum/

10 Repeat AHP process twice: Ä Once to estimate relative value Ä Once to estimate relative cost Plot ROI graph High priority Value (percent) x x x x x Medium priority Low priority Cost (percent) 255

11 Other selection criteria Above average value Below average cost Value (percent) x x x Above average in both cost and value x Above average cost Below average value x Relative Probability x x Low Risk Exposure x x High Risk Exposure x Cost (percent) Relative Loss 256

12 Security Risk Management in Airline Turnaround Sector Check-in passenger information Ä Risk1: Blacklisted passenger presents fake document, gets checked-in because personnel could be bribed Ä Risk2: Attacker uses phishing to extract passenger booking number and uses it to check-in to the flight Luggage information Ä Risk3: The personnel records values lower than actual weight of luggage and ground operations uses the information in the loading of the aircraft Ä Risk4:The personnel accepts luggage and adds contraband items to a passenger s luggage v v Fuel slip Ø Ø Risk5: A malicious insider with access to the computer that stores the fuel slip performs changes to the data contained in the fuel slip Risk6: The attacker intercepts the fuel slip, changes the data contained and sends it to the supplier Cargo assignment Ø Ø Risk7: A malicious insider with access rights performs changes to the cargo assignment document before it is sent to a service provider Risk8: An attacker hacks the airline mailing list, receives the cargo assignment, changes the data contained and sends the cargo assignment to a service provider 257 [Matulevičius et al., 2016] FDSE

13 Security Risk Management in Airline Turnaround Sector Check-in passenger information Ä Risk1: Blacklisted passenger presents fake document, gets checked-in because personnel could be bribed Ä Risk2: Attacker uses phishing to extract passenger booking number and uses it to check-in to the flight Luggage information Ä Risk3: The personnel records values lower than actual weight of luggage and ground operations uses the information in the loading of the aircraft Ä Risk4:The personnel accepts luggage and adds contraband items to a passenger s luggage v v Fuel slip Ø Ø Risk5: A malicious insider with access to the computer that stores the fuel slip performs changes to the data contained in the fuel slip Risk6: The attacker intercepts the fuel slip, changes the data contained and sends it to the supplier Cargo assignment Ø Ø Risk7: A malicious insider with access rights performs changes to the cargo assignment document before it is sent to a service provider Risk8: An attacker hacks the airline mailing list, receives the cargo assignment, changes the data contained and sends the cargo assignment to a service provider 258 [Matulevičius et al., 2016] FDSE

14 Security Risk Management in Airline Turnaround Sector Check-in passenger information Ä Risk1: Blacklisted passenger presents fake document, gets checked-in because personnel could be bribed Ä Risk2: Attacker uses phishing to extract passenger booking number and uses it to check-in to the flight Luggage information Ä Risk3: The personnel records values lower than actual weight of luggage and ground operations uses the information in the loading of the aircraft Ä Risk4:The personnel accepts luggage and adds contraband items to a passenger s luggage v v Fuel slip Ø Ø Risk5: A malicious insider with access to the computer that stores the fuel slip performs changes to the data contained in the fuel slip Risk6: The attacker intercepts the fuel slip, changes the data contained and sends it to the supplier Cargo assignment Ø Ø Risk7: A malicious insider with access rights performs changes to the cargo assignment document before it is sent to a service provider Risk8: An attacker hacks the airline mailing list, receives the cargo assignment, changes the data contained and sends the cargo assignment to a service provider [Matulevičius et al., 2016] FDSE

15 Requirements Priori&za&on Why PrioriJzaJon is needed Ä Basic Trade- offs Cost- Value Approach Ä SorJng Requirements by cost/value Ä EsJmaJng RelaJve Costs/Values using AHP 260

16 Lecture 7 Requirements Prioritisation Risk Management 261

17 Risk Management About Risk Ä Risk is the possibility of suffering loss Ä Risk itself is not bad, it is essential to progress Ä The challenge is to manage the amount of risk Two Parts: Ä Risk Assessment Ä Risk Control Useful concepts: Ä For each risk: Risk Exposure Ø RE = p(unsat. outcome) X loss(unsat. outcome) Ä For each mitigation action: Risk Reduction Leverage Ø RRL = (REbefore - REafter) / cost of intervention 262

18 Continuous Risk Management Identify: Ä Search for and locate risks before they become problems Ø Systematic techniques to discover risks Analyse: Ä Transform risk data into decision-making information Ä For each risk, evaluate: Ø Impact Ø Probability Ø Timeframe Ä Classify and Prioritise Risks Plan Ä Choose risk mitigation actions Track Ä Monitor risk indicators Ä Reassess risks Control Ä Correct for deviations from the risk mitigation plans Communicate Ä Share information on current and emerging risks Source: Adapted from SEI Continuous Risk Management Guidebook 263

19 Risk Assessment Quantitative: Ä Measure risk exposure using standard cost & probability measures Ä Note: probabilities are rarely independent Qualitative: Ä Develop a risk classification matrix: Likelihood of Occurrence Very likely Possible Unlikely (5) Loss of Life Catastrophic Catastrophic Severe (4) Loss of Spacecraft (3) Loss of Mission (2) Degraded Mission Catastrophic Severe Severe Severe Severe High High Moderate Low (1) Inconvenience Moderate Low Low 264

20 Top 10 Development Risks (+ Countermeasures) Personnel Shortfalls Ä use top talent Ä team building Ä training Unrealistic schedules/budgets Ä multisource estimation Ä designing to cost Ä requirements scrubbing Developing the wrong software functions Ä better requirements analysis Ä organizational/operational analysis Developing the wrong User Interface Ä prototypes, scenarios, task analysis Gold Plating Ä requirements scrubbing Ä cost benefit analysis Ä designing to cost Continuing stream of reqts changes Ä high change threshold Ä information hiding Ä incremental development Shortfalls in externally furnished components Ä early benchmarking Ä inspections, compatibility analysis Shortfalls in externally performed tasks Ä pre-award audits Ä competitive designs Real-time performance shortfalls Ä targeted analysis Ä simulations, benchmarks, models Straining computer science capabilities Ä technical analysis Ä checking scientific literature 265

21 Risk Management Risk Management is a systematic activity Ä Requires both technical and management attention Ä Requires system-level view Ä Should continue throughout a project Techniques exist to identify and assess risks Ä E.g. fault tree analysis Ä E.g. Risk assessment matrix Risk and Requirements engineering Ä Risk analysis can uncover new requirements Ø Especially for safety-critical or security-critical applications Ä Risk analysis can uncover feasibility concerns Ä Risk analysis will assist in appropriate management action 266

22 Misuse cases A modeling technique use cases Ä Normal actors and wanted functionality + Ä Mis-users, harmful acts Makes it possible to discuss Ä Security requirements together with functional requirements. Ä With a technique that is Ø In normal use Ø Relatively easy to understand for end-users As with use-cases, there are two possibilities: Ä Diagrams Ä Textual descriptions 267

23 Misuse cases A modeling technique use cases Ä Normal actors and wanted functionality + Ä Mis-users, harmful acts Makes it possible to discuss Ä Security requirements together with functional requirements. Ä With a technique that is Ø In normal use Ø Relatively easy to understand for end-users As with use-cases, there are two possibilities: Ä Diagrams Ä Textual descriptions 268

24 Register customer threaten Flood system threaten Order goods threaten Get privileges Customer inlcude threaten Reveal customer Protect info mitigate Steal card info Outside Crook Submit question threaten threaten Spread malicious code Submit review mitigate Shop Clerk Screen input System Administrator 269

25 Security risk management process 270

26 1. Context and Assets Identification 2. Security Objectives Determination Description of organisation and its environment Ä sensitive activities related to information security

27 3. Risk Analysis

28 3. Risk Analysis 273

29 4. Risk Treatment Decisions Risk treatment decisions Avoiding risk Transferring risk Retaining risk Reducing risk Definition Decision not to be involved in, or to withdraw from a risk Sharing with another party the burden of loss for a risk Accepting the burden of loss from a risk Action to lessen the probability, negative consequences, or both, associated with a risk

30 5. Security Requirements Definition

31 5. Security Requirements Definition 276

32 What have we learnt today? Requirements Prioritisation Risk Management 277

Fundamentals of Project Risk Management

Fundamentals of Project Risk Management Fundamentals of Project Risk Management Introduction Change is a reality of projects and their environment. Uncertainty and Risk are two elements of the changing environment and due to their impact on

More information

client user GUIDE 2011

client user GUIDE 2011 client user GUIDE 2011 STEP ACTION Accessing Risk Register 1. Type https://www.scm rms.ca/riskregister/login.aspx 2. Click in the Username field on the Risk Register home page. 3. Type your Username and

More information

Scouting Ireland Risk Management Framework

Scouting Ireland Risk Management Framework No. SID 124A/15 Gasóga na héireann/scouting Ireland Issued Amended 20 th June 2015 Deleted Source: National Management Committee Scouting Ireland Risk Management Framework Revision Date Description # 20/06/2015

More information

Project Theft Management,

Project Theft Management, Project Theft Management, by applying best practises of Project Risk Management Philip Rosslee, BEng. PrEng. MBA PMP PMO Projects South Africa PMO Projects Group www.pmo-projects.co.za philip.rosslee@pmo-projects.com

More information

What Makes Risk Management Work?

What Makes Risk Management Work? What Makes Risk Management Work? Rick Wells Associate, Risk Management MIRARCO Mining Innovation, Sudbury, Canada w w w. m i r a r c o. o r g Agenda Introduction; Risk Assessment vs Risk Management; Issues

More information

An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association. Lauren Woods Member Engagement & Operations

An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association. Lauren Woods Member Engagement & Operations An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association Lauren Woods Member Engagement & Operations Association Health Checks Issues arising from the health check: 3/27

More information

Risk Management. CITS5501 Software Testing and Quality Assurance

Risk Management. CITS5501 Software Testing and Quality Assurance Risk Management CITS5501 Software Testing and Quality Assurance (Source: Pressman, R. Software Engineering: A Practitioner s Approach. McGraw-Hill, 2005) 2017, Semester 1 Definition of Risk A risk is a

More information

Project Risk Management. Prof. Dr. Daning Hu Department of Informatics University of Zurich

Project Risk Management. Prof. Dr. Daning Hu Department of Informatics University of Zurich Project Risk Management Prof. Dr. Daning Hu Department of Informatics University of Zurich Learning Objectives Understand what risk is and the importance of good project risk management Discuss the elements

More information

Common Safety Methods CSM

Common Safety Methods CSM Common Safety Methods CSM A common safety method on risk evaluation and assessment Directive 2004/49/EC, Article 6(3)(a) Presented by: matti.katajala@safetyadvisor.fi / www.safetyadvisor.fi Motivation

More information

Tangible Assets Threats and Hazards: Risk Assessment and Management in the Port Domain

Tangible Assets Threats and Hazards: Risk Assessment and Management in the Port Domain Journal of Traffic and Transportation Engineering 5 (2017) 271-278 doi: 10.17265/2328-2142/2017.05.004 D DAVID PUBLISHING Tangible Assets Threats and Hazards: Risk Assessment and Management in the Port

More information

Project Management for the Professional Professional Part 3 - Risk Analysis. Michael Bevis, JD CPPO, CPSM, PMP

Project Management for the Professional Professional Part 3 - Risk Analysis. Michael Bevis, JD CPPO, CPSM, PMP Project Management for the Professional Professional Part 3 - Risk Analysis Michael Bevis, JD CPPO, CPSM, PMP What is a Risk? A risk is an uncertain event or condition that, if it occurs, has a positive

More information

Risk Management. Webinar - July 2017

Risk Management. Webinar - July 2017 Risk Management Webinar - July 2017 Compiled by: Raaghieb Najjaar, Yaeesh Yasseen & Rashied Small Adapted and Facilitated by: Professor Enslin J. van Rooyen Risk Management - June 2017 2 Defining Risk

More information

Understanding the customer s requirements for a software system. Requirements Analysis

Understanding the customer s requirements for a software system. Requirements Analysis Understanding the customer s requirements for a software system Requirements Analysis 1 Announcements Homework 1 Correction in Resume button functionality. Download updated Homework 1 handout from web

More information

Risk Management. Seminar June Compiled by: Raaghieb Najjaar, Yaeesh Yasseen & Rashied Small

Risk Management. Seminar June Compiled by: Raaghieb Najjaar, Yaeesh Yasseen & Rashied Small Risk Management Seminar June 2017 Compiled by: Raaghieb Najjaar, Yaeesh Yasseen & Rashied Small Defining Risk Risk reflects the chance that the actual event may be different than the planned / expected

More information

Contents INTRODUCTION...4 THE STEPS IN MANAGING RISKS ESTABLISH GOALS AND CONTEXT IDENTIFY THE RISKS...8

Contents INTRODUCTION...4 THE STEPS IN MANAGING RISKS ESTABLISH GOALS AND CONTEXT IDENTIFY THE RISKS...8 Contents INTRODUCTION...4 THE STEPS IN MANAGING RISKS...4 1. ESTABLISH GOALS AND CONTEXT...5 2. IDENTIFY THE RISKS...8 Identifying the risks... 8 Identify the sources of the risks... 8 Identify the impact

More information

EFFECTIVE TECHNIQUES IN RISK MANAGEMENT. Joseph W. Mayo, PMP, RMP, CRISC September 27, 2011

EFFECTIVE TECHNIQUES IN RISK MANAGEMENT. Joseph W. Mayo, PMP, RMP, CRISC September 27, 2011 EFFECTIVE TECHNIQUES IN RISK MANAGEMENT Joseph W. Mayo, PMP, RMP, CRISC September 27, 2011 Effective Techniques in Risk Management Risk Management Overview Exercise #1 Break Risk IT Exercise #2 Break Risk

More information

Presented at the 2010 ISPA/SCEA Joint Annual Conference and Training Workshop -

Presented at the 2010 ISPA/SCEA Joint Annual Conference and Training Workshop - Abstract Risk Identification and Visualization in a Concurrent Engineering Team Environment Jairus Hihn 1, Debarati Chattopadhyay, Robert Shishko Mission Systems Concepts Section Jet Propulsion Laboratory/California

More information

2.2 For Board Members to approve the five high risks the Trust is facing:

2.2 For Board Members to approve the five high risks the Trust is facing: HEREFORD HOSPITALS NHS TRUST PUBLIC BOARD MEETING 28 TH JANUARY 2011 COMPANY SECRETARY S REPORT NICOLA.LICENCE@HHTR.NHS.UK BOARD ASSURANCE FRAMEWORK 1.0 INTRODUCTION 1.1 The attached Board Assurance Framework

More information

Classification Based on Performance Criteria Determined from Risk Assessment Methodology

Classification Based on Performance Criteria Determined from Risk Assessment Methodology OFFSHORE SERVICE SPECIFICATION DNV-OSS-121 Classification Based on Performance Criteria Determined from Risk Assessment Methodology OCTOBER 2008 This document has been amended since the main revision (October

More information

RISK MANAGEMENT. Budgeting, d) Timing, e) Risk Categories,(RBS) f) 4. EEF. Definitions of risk probability and impact, g) 5. OPA

RISK MANAGEMENT. Budgeting, d) Timing, e) Risk Categories,(RBS) f) 4. EEF. Definitions of risk probability and impact, g) 5. OPA RISK MANAGEMENT 11.1 Plan Risk Management: The process of DEFINING HOW to conduct risk management activities for a project. In Plan Risk Management, the remaining FIVE risk management processes are PLANNED

More information

Manage Risk STUDENT HANDOUT

Manage Risk STUDENT HANDOUT DIPLOMA OF BUSINESS BSB50215 or BSB50207 Study Support materials for Manage Risk BSBRSK501 BSBRSK501 in BSB50215 includes the requirement that answer refer to the current R.M. standard. DD. STUDENT HANDOUT

More information

Quality Control & Compliance Initiative. This document is publicly available to any staff member on the following network path:

Quality Control & Compliance Initiative. This document is publicly available to any staff member on the following network path: Quality Control & Compliance Initiative RISK ASSESSMENT Author: Phonovation Quality Control Group Gavin Carpenter Effective Date: 20 th Nov 2013 Revised: 20 th Jan 2015 Revised by: To: Pedro Quintas All

More information

Post-Class Quiz: Information Security and Risk Management Domain

Post-Class Quiz: Information Security and Risk Management Domain 1. Which choice below is the role of an Information System Security Officer (ISSO)? A. The ISSO establishes the overall goals of the organization s computer security program. B. The ISSO is responsible

More information

Draft risk-based planning principles

Draft risk-based planning principles Draft risk-based planning principles Overview of the risk management standard 1. The ISO 31000:2009 standard (Risk management Principles and guidelines) is an internationally recognised framework used

More information

Job Safety Analysis Preparation And Risk Assessment

Job Safety Analysis Preparation And Risk Assessment Job Safety Analysis Preparation And Risk Assessment Sample Only Reference CPL_PCR_JSA_Risk_Assessment Revision Number SAMPLE ONLY Document Owner Sample Date 2015 File Location Procedure Revision Date Major

More information

Risk Evaluation. Chapter Consolidation of Risk Analysis Results

Risk Evaluation. Chapter Consolidation of Risk Analysis Results Chapter 9 Risk Evaluation At this point we have identified the risks and analyzed their likelihood and consequence. From this we can establish the risk level and compare it to the risk evaluation criteria,

More information

JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY

JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY Two Mark Question for Student s Reference 1. Define software project management. Software Project Management has key ideas

More information

Risk Management Plan for the <Project Name> Prepared by: Title: Address: Phone: Last revised:

Risk Management Plan for the <Project Name> Prepared by: Title: Address: Phone:   Last revised: for the Prepared by: Title: Address: Phone: E-mail: Last revised: Document Information Project Name: Prepared By: Title: Reviewed By: Document Version No: Document Version Date: Review Date:

More information

Risk Management Process-02. Lecture 06 By: Kanchan Damithendra

Risk Management Process-02. Lecture 06 By: Kanchan Damithendra Risk Management Process-02 Lecture 06 By: Kanchan Damithendra Risk Analysis Risk Register The main output of the risk identification process is a list of identified risks and other information needed to

More information

RISK MANAGEMENT POLICY October 2015

RISK MANAGEMENT POLICY October 2015 RISK MANAGEMENT POLICY October 2015 1. INTRODUCTION 1.1 The primary objective of risk management is to ensure that the risks facing the business are appropriately managed. 1.2 Paringa Resources Limited

More information

Exam Questions PMI-RMP

Exam Questions PMI-RMP Exam Questions PMI-RMP PMI Risk Management Professional https://www.2passeasy.com/dumps/pmi-rmp/ 1. You are the project manager of a new project in your organization. You and the project team have identified

More information

INSE 6230 Total Quality Project Management

INSE 6230 Total Quality Project Management INSE 6230 Total Quality Project Management Lecture 6 Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project

More information

Introduction to Risk for Project Controls

Introduction to Risk for Project Controls Introduction to Risk for Project Controls By Eukeni Urrechaga, PE Quick view at Project Controls Project Controls, like project management, is much an art as it is a science. The secret of good project

More information

European Railway Agency Recommendation on the 1 st set of Common Safety Methods (ERA-REC SAF)

European Railway Agency Recommendation on the 1 st set of Common Safety Methods (ERA-REC SAF) European Railway Agency Recommendation on the 1 st set of Common Safety Methods (ERA-REC-02-2007-SAF) The Director, Having regard to the Directive 2004/49/EC 1 of the European Parliament, Having regard

More information

Risk Management Plan for the Ocean Observatories Initiative

Risk Management Plan for the Ocean Observatories Initiative Risk Management Plan for the Ocean Observatories Initiative Version 1.0 Issued by the ORION Program Office July 2006 Joint Oceanographic Institutions, Inc. 1201 New York Ave NW, Suite 400, Washington,

More information

Risk Management at Central Bank of Nepal

Risk Management at Central Bank of Nepal Risk Management at Central Bank of Nepal A. Introduction to Supervisory Risk Management Framework in Banks Nepal Rastra Bank(NRB) Act, 2058, section 35 (a) requires the NRB management is to design and

More information

Kidsafe NSW Risk Management Plan. August 2014

Kidsafe NSW Risk Management Plan. August 2014 Kidsafe NSW Risk Management Plan August 2014 Document Control Document Approval Name & Position Signature Date Document Version Control Version Status Date Prepared By Comments Document Reviewers Name

More information

ENTERPRISE RISK MANAGEMENT (ERM) The Conceptual Framework

ENTERPRISE RISK MANAGEMENT (ERM) The Conceptual Framework ENTERPRISE RISK MANAGEMENT (ERM) The Conceptual Framework ENTERPRISE RISK MANAGEMENT (ERM) ERM Definition The Conceptual Frameworks: CAS and COSO Risk Categories Implementing ERM Why ERM? ERM Maturity

More information

RISK MANAGEMENT FRAMEWORK

RISK MANAGEMENT FRAMEWORK RISK MANAGEMENT FRAMEWORK 1. INTRODUCTION (Company) acknowledges that risk is inherent in its business. The Company faces a broad range of risks as a listed entertainment organisation. The Company s risk

More information

Table of Contents Advantages Disadvantages/Limitations Sources of additional information. Standards, textbooks & web-sites.

Table of Contents Advantages Disadvantages/Limitations Sources of additional information. Standards, textbooks & web-sites. Table of Contents Table of Contents 1. Consequence Analysis & Risk Reduction Option Selection 1.1. A description of the techniques, including its purpose 1.1.0.. Introduction 1.1.0.3. Consequence Analysis

More information

Appendix L Methodology for risk assessment

Appendix L Methodology for risk assessment Bay of Plenty Regional Policy Statement 347 Appendix L Methodology for risk assessment Compliance with Appendix L means: (a) (b) Use of Steps 1 to 6 below (the default methodology); or Use of a recognised

More information

Chapter-8 Risk Management

Chapter-8 Risk Management Chapter-8 Risk Management 8.1 Concept of Risk Management Risk management is a proactive process that focuses on identifying risk events and developing strategies to respond and control risks. It is not

More information

Executive Board Annual Session Rome, May 2015 POLICY ISSUES ENTERPRISE RISK For approval MANAGEMENT POLICY WFP/EB.A/2015/5-B

Executive Board Annual Session Rome, May 2015 POLICY ISSUES ENTERPRISE RISK For approval MANAGEMENT POLICY WFP/EB.A/2015/5-B Executive Board Annual Session Rome, 25 28 May 2015 POLICY ISSUES Agenda item 5 For approval ENTERPRISE RISK MANAGEMENT POLICY E Distribution: GENERAL WFP/EB.A/2015/5-B 10 April 2015 ORIGINAL: ENGLISH

More information

Auckland Transport HS03-01 Risk and Hazard Management

Auckland Transport HS03-01 Risk and Hazard Management Auckland Transport HS03-01 Risk and Hazard Management (Procedure uncontrolled when printing) Relating to Standard: HS03 Risk and Hazard Management Standard December 2016 Health and Safety-Procedure-HS03-01

More information

1.1 Financial products

1.1 Financial products CHAPTER 1. INTRODUCTION 7 1.1 Financial products One can invest in a lot of financial products: The basic investment products like savings accounts. Products with a higher risk like stocks. In this section

More information

APPLICATION OF FORMAL SAFETY ASSESSMENT IN THE LEGAL ACTIVITY OF INTERNATIONAL MARITIME

APPLICATION OF FORMAL SAFETY ASSESSMENT IN THE LEGAL ACTIVITY OF INTERNATIONAL MARITIME Journal of KONES Powertrain and Transport, Vol. 21, No. 4 2014 ISSN: 1231-4005 e-issn: 2354-0133 ICID: 1130510 DOI: 10.5604/12314005.1130510 APPLICATION OF FORMAL SAFETY ASSESSMENT IN THE LEGAL ACTIVITY

More information

RISK ANALYSIS GUIDE FOR PRIVATE INITIATIVE PROJECTS

RISK ANALYSIS GUIDE FOR PRIVATE INITIATIVE PROJECTS N A T I O N A L C O N C E S S I O N C O U N C I L RISK ANALYSIS GUIDE FOR PRIVATE INITIATIVE PROJECTS PREPARED BY: ENGINEER ÁLVARO BORBON M. PRIVATE INITIATIVE PROGRAM DECEMBER 2008 INDEX Guide Purpose...

More information

RISK MANAGEMENT PROFESSIONAL. 1 Powered by POeT Solvers Limited

RISK MANAGEMENT PROFESSIONAL. 1   Powered by POeT Solvers Limited RISK MANAGEMENT PROFESSIONAL 1 www.pmtutor.org Powered by POeT Solvers Limited This presentation is copyright 2009 by POeT Solvers Limited. All rights reserved. This presentation is protected by the Nigerian

More information

Risk Management Relevance to PAS 55 (ISO 55000) Deciding on processes to implement risk management

Risk Management Relevance to PAS 55 (ISO 55000) Deciding on processes to implement risk management Risk Management Relevance to PAS 55 (ISO 55000) Deciding on processes to implement risk management Jeff Hollingdale DQS South Africa jeffh@dqs.co.za PAS 55 Risk Management The guideline states: (4.4.7);

More information

January CNB opinion on Commission consultation document on Solvency II implementing measures

January CNB opinion on Commission consultation document on Solvency II implementing measures NA PŘÍKOPĚ 28 115 03 PRAHA 1 CZECH REPUBLIC January 2011 CNB opinion on Commission consultation document on Solvency II implementing measures General observations We generally agree with the Commission

More information

Business Auditing - Enterprise Risk Management. October, 2018

Business Auditing - Enterprise Risk Management. October, 2018 Business Auditing - Enterprise Risk Management October, 2018 Contents The present document is aimed to: 1 Give an overview of the Risk Management framework 2 Illustrate an ERM model Page 2 What is a risk?

More information

Procedure: Risk management

Procedure: Risk management Procedure: Risk management Purpose To outline the procedures involved for identification, assessment and management of risks. Procedure Introduction 1. This procedure outlines the University s Risk Awareness

More information

@ - Presentation Caveat

@ - Presentation Caveat @ - Presentation Caveat The following presentation was made by Marv Nuss of Nuss Sustainment Solutions at the 2013 Aircraft Airworthiness and Sustainment Conference Australia. The presentation title is:

More information

Access the Mobile App: Or Search in your App store: COSC2015. #IATA_CabinSafety

Access the Mobile App:  Or Search in your App store: COSC2015. #IATA_CabinSafety Welcome! Access the Mobile App: http://eventmobi.com/cs2015 Or Search in your App store: COSC2015 #IATA_CabinSafety Risk Assessment: Identifying your safety risks Facilitator: Nancy Rockbrune Assistant

More information

RISK MANAGEMENT GUIDE FOR DOD ACQUISITION

RISK MANAGEMENT GUIDE FOR DOD ACQUISITION RISK MANAGEMENT GUIDE FOR DOD ACQUISITION Sixth Edition (Version 1.0) August, 2006 Department of Defense Table of Contents. Key Activity - Risk Analysis... 11.1. Purpose... 11.2. Risk Reporting Matrix...

More information

Risk Assessment for Drug Products with Device Components

Risk Assessment for Drug Products with Device Components Risk Assessment for Drug Products with Device Components Khaudeja Bano, M.D. Senior Medical Director, Medical Device Safety Head, Pharmacovigilance and Patient Safety AbbVie Inc. Process consisting of:

More information

A DECISION SUPPORT SYSTEM FOR HANDLING RISK MANAGEMENT IN CUSTOMER TRANSACTION

A DECISION SUPPORT SYSTEM FOR HANDLING RISK MANAGEMENT IN CUSTOMER TRANSACTION A DECISION SUPPORT SYSTEM FOR HANDLING RISK MANAGEMENT IN CUSTOMER TRANSACTION K. Valarmathi Software Engineering, SonaCollege of Technology, Salem, Tamil Nadu valarangel@gmail.com ABSTRACT A decision

More information

Business Process Management

Business Process Management Business Process Management Paolo Bottoni Lecture 5: AdvancedBPM Adapted from the slides for the book : Dumas, La Rosa, Mendling & Reijers: Fundamentals of Business Process Management, Springer 2013 http://courses.cs.ut.ee/2013/bpm/uploads/main/itlecture3.ppt

More information

Escorts Limited. Risk Management Policy

Escorts Limited. Risk Management Policy Escorts Limited Risk Management Policy Version Effective From Approved By 1.0 25 05 2016 BOARD OF DIRECTORS 1 Table of Contents 1. Introduction 4 1.1 Preamble 4 1.2 Objective 4 1.3 Importance of Risk Management

More information

Multiple Objective Asset Allocation for Retirees Using Simulation

Multiple Objective Asset Allocation for Retirees Using Simulation Multiple Objective Asset Allocation for Retirees Using Simulation Kailan Shang and Lingyan Jiang The asset portfolios of retirees serve many purposes. Retirees may need them to provide stable cash flow

More information

Concepts in Risk-based Assessment Risk in Medical Imaging Ehsan Samei, PhD. Outline. Outline 8/3/2016

Concepts in Risk-based Assessment Risk in Medical Imaging Ehsan Samei, PhD. Outline. Outline 8/3/2016 Concepts in -based Assessment in Medical Imaging Ehsan Samei, PhD Outline Why of talk about risk? Science of risk and risk assessment in imaging Radiation risk in terms of patient welfare Outline Why of

More information

Fortuity Management in Software Development: A Review

Fortuity Management in Software Development: A Review ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Fortuity

More information

Risk Management Policy

Risk Management Policy Risk Management Policy April 2017 1 Introduction 1.1 The primary objective of risk management is to ensure that the risks facing the business are appropriately managed. 1.2 Force is committed to ensuring

More information

Risk Management: Assessing and Controlling Risk

Risk Management: Assessing and Controlling Risk Risk Management: Assessing and Controlling Risk Introduction Competitive Disadvantage To keep up with the competition, organizations must design and create a safe environment in which business processes

More information

METHODOLOGY For Risk Assessment and Management of PPP Projects

METHODOLOGY For Risk Assessment and Management of PPP Projects METHODOLOGY For Risk Assessment and Management of PPP Projects December 26, 2013 The publication was produced for review by the United States Agency for International Development. It was prepared by Environmental

More information

Challenges of implementation. a regulatory perspective

Challenges of implementation. a regulatory perspective Challenges of implementation of ICH Q 9 a regulatory perspective Jacques Morénas Deputy Director Inspectorate and Companies Department The French Health Products Safety Agency (AFSSAPS) telephone : 33

More information

Application of Triangular Fuzzy AHP Approach for Flood Risk Evaluation. MSV PRASAD GITAM University India. Introduction

Application of Triangular Fuzzy AHP Approach for Flood Risk Evaluation. MSV PRASAD GITAM University India. Introduction Application of Triangular Fuzzy AHP Approach for Flood Risk Evaluation MSV PRASAD GITAM University India Introduction Rationale & significance : The objective of this paper is to develop a hierarchical

More information

AN INTRODUCTION TO RISK CONSIDERATION

AN INTRODUCTION TO RISK CONSIDERATION AN INTRODUCTION TO RISK CONSIDERATION Introduction This cookbook aims at recalling basic concepts and providing simple tools and possibilities of applying the "considering of risks and opportunities" in

More information

ENTERPRISE RISK AND STRATEGIC DECISION MAKING: COMPLEX INTER-RELATIONSHIPS

ENTERPRISE RISK AND STRATEGIC DECISION MAKING: COMPLEX INTER-RELATIONSHIPS ENTERPRISE RISK AND STRATEGIC DECISION MAKING: COMPLEX INTER-RELATIONSHIPS By Mark Laycock The views and opinions expressed in this paper are those of the authors and do not necessarily reflect the official

More information

Risk Management Strategy

Risk Management Strategy Risk Management Strategy 2016 2019 Version: 6 Policy Lead/Author & Deputy Director of Quality position: Ward / Department: Nursing Directorate Replacing Document: Version 5 Approving Committee Quality

More information

Risk Assessment and Plan OUTDOOR ACTIVITIES, EVENTS & CAMPS

Risk Assessment and Plan OUTDOOR ACTIVITIES, EVENTS & CAMPS Risk Assessment and Plan OUTDOOR ACTIVITIES, EVENTS & CAMPS INSTRUCTIONS FOR USING RISK ASSESSMENT TEMPLATE When completing a risk management assessment focus your thoughts on three critical areas: 1.

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Fraud Risk Assessment Part 2 2017 Association of Certified Fraud Examiners, Inc. Fraud Risk Assessment Frameworks Frameworks are helpful for performing, evaluating, and reporting

More information

Information Technology Project Management, Sixth Edition

Information Technology Project Management, Sixth Edition Management, Sixth Edition Prepared By: Izzeddin Matar. Note: See the text itself for full citations. Understand what risk is and the importance of good project risk management Discuss the elements involved

More information

Association for Project Management 2008

Association for Project Management 2008 Contents List of tables vi List of figures vii Foreword ix Acknowledgements x 1. Introduction 1 2. Understanding and describing risks 4 3. Purposes of risk prioritisation 12 3.1 Prioritisation of risks

More information

Security Risk Management

Security Risk Management Security Risk Management Related Chapters Chapter 53: Risk Management Also Chapter 32 Security Metrics: An Introduction and Literature Review Chapter 62 Assessments and Audits 2 Definition of Risk According

More information

RISK ASSESSMENT AND ITS MANAGEMENT IN MINING INDUSTRY

RISK ASSESSMENT AND ITS MANAGEMENT IN MINING INDUSTRY RISK ASSESSMENT AND ITS MANAGEMENT IN MINING INDUSTRY *Ram Prasad Choudhary Department of Mining Engineering, National Institute of Technology Karnataka, Surathkal-575025 *Author for Correspondence ABSTRACT

More information

machine design, Vol.7(2015) No.4, ISSN pp

machine design, Vol.7(2015) No.4, ISSN pp machine design, Vol.7(205) No.4, ISSN 82-259 pp. 9-24 Research paper ANALYSIS AND RISK ASSESSMENT OF IMPLEMENTATION OF THE AUTOMATED CAR PARKING SYSTEM PROJECT Radoslav TOMOVIĆ, * - Rade GRUJIČIĆ University

More information

TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD

TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD RISK MANAGEMENT FRAMEWORK 2017 Overview Tonga National Qualifications and Accreditation Board (TNQAB) was established in 2004, after the Tonga National

More information

Project Management in ICT. Prof. Dr. Harald Wehnes

Project Management in ICT. Prof. Dr. Harald Wehnes Project Management in ICT Prof. Dr. Harald Wehnes 6.2 Risk management Project Management 1 1 1 Risk management in projects "risk management is project management for adults" Tom De Marco all projects include

More information

Presented to: Eastern Idaho Chapter Project Management Institute. Presented by: Carl Lovell, PMP Contract and Technical Integration.

Presented to: Eastern Idaho Chapter Project Management Institute. Presented by: Carl Lovell, PMP Contract and Technical Integration. Project Risk Management Tutorial Presented to: Eastern Idaho Chapter Project Management Institute Presented by: Carl Lovell, PMP Contract and Technical Integration March 2009 Project Risk Definition An

More information

AAS BTA Baltic Insurance Company Risks and Risk Management

AAS BTA Baltic Insurance Company Risks and Risk Management AAS BTA Baltic Insurance Company Risks and Risk Management December 2017 1 RISK MANAGEMENT SYSTEM The business of insurance represents the transfer of risk from the insurance policy holder to the insurer

More information

MODULE 5 PROJECT RISK MANAGEMENT, PROCUREMENT AND CONTRACTS

MODULE 5 PROJECT RISK MANAGEMENT, PROCUREMENT AND CONTRACTS Advanced Project Management MODULE 5 PROJECT RISK MANAGEMENT, PROCUREMENT AND CONTRACTS 06 07 November 2018 Facilitator: Mr Mondli Mbambo Module Purpose Project Risk & Procurement Managment Knowledge Risk

More information

Interpretive Structural Modeling of Interactive Risks

Interpretive Structural Modeling of Interactive Risks Interpretive Structural Modeling of Interactive isks ick Gorvett, FCAS, MAAA, FM, AM, Ph.D. Ningwei Liu, Ph.D. 2 Call Paper Program 26 Enterprise isk Management Symposium Chicago, IL Abstract The typical

More information

Crowe, Dana, et al "EvaluatingProduct Risks" Design For Reliability Edited by Crowe, Dana et al Boca Raton: CRC Press LLC,2001

Crowe, Dana, et al EvaluatingProduct Risks Design For Reliability Edited by Crowe, Dana et al Boca Raton: CRC Press LLC,2001 Crowe, Dana, et al "EvaluatingProduct Risks" Design For Reliability Edited by Crowe, Dana et al Boca Raton: CRC Press LLC,2001 CHAPTER 13 Evaluating Product Risks 13.1 Introduction This chapter addresses

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. Baselining is the comparison of past security activities and events against the organization s current performance. 2. To determine if the risk to an

More information

Cost Risk Assessment Building Success and Avoiding Surprises Ken L. Smith, PE, CVS

Cost Risk Assessment Building Success and Avoiding Surprises Ken L. Smith, PE, CVS Cost Risk Assessment Building Success and Avoiding Surprises Ken L. Smith, PE, CVS 360-570-4415 2015 HDR, Inc., all rights reserved. Addressing Cost and Schedule Concerns Usual Questions Analysis Needs

More information

4.1 Risk Assessment and Treatment Assessing Security Risks

4.1 Risk Assessment and Treatment Assessing Security Risks Information Security Standard 4.1 Risk Assessment and Treatment Assessing Security Risks Version: 1.0 Status Revised: 03/01/2013 Contact: Chief Information Security Officer PURPOSE To identify, quantify,

More information

There are many definitions of risk and risk management.

There are many definitions of risk and risk management. Definition of risk There are many definitions of risk and risk management. The definition set out in ISO Guide 73 is that risk is the effect of uncertainty on objectives. In order to assist with the application

More information

The Risky Business of. Risk Management

The Risky Business of. Risk Management The Risky Business of Risk Management 1 About Me: Jan Holt, PMP Project Management Professional (PMP) since 2005 Project Management Institute (PMI) Michiana Chapter President PMP Prep Class Instructor

More information

APPENDIX G. Guidelines for Impact Analysis for CCBFC Committees. Definitions. General Issues

APPENDIX G. Guidelines for Impact Analysis for CCBFC Committees. Definitions. General Issues APPENDIX G Guidelines for Impact Analysis for CCBFC Committees This document presents 21 guiding principles for the preparation of impact analyses supporting proposed code changes. It is intended to be

More information

Practical aspects of determining and applying a risk appetite for SMEs

Practical aspects of determining and applying a risk appetite for SMEs Practical aspects of determining and applying a risk appetite for SMEs By Tim Timchur acis, Director, ActivePro Consulting Pty Ltd Important to determine appetite for risk before determining what risk

More information

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST and Microsoft s Security Management Guide

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST and Microsoft s Security Management Guide Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft s Security Management Guide Amril Syalim Graduate School of Information Science and Electrical Engineering Kyushu University,

More information

Risk Management Policy and Framework

Risk Management Policy and Framework Risk Management Policy and Framework Risk Management Policy Statement ALS recognises that the effective management of risks is a fundamental component of good corporate governance and is vital for the

More information

We will begin the web conference shortly. When you arrive, please type the phone number from which you are calling into the chat field.

We will begin the web conference shortly. When you arrive, please type the phone number from which you are calling into the chat field. Welcome We will begin the web conference shortly. When you arrive, please type the phone number from which you are calling into the chat field. To login to the audio portion of the web conference, dial

More information

Risk Assessment Policy

Risk Assessment Policy Risk Assessment Policy Updated: April 2018 Date of next Review: April 2019 Policy Lead: Bursar Checked by: Middle Leadership Team 1. INTRODUCTION Beachborough School will have hazards which if not controlled

More information

Discovery Driven Planning

Discovery Driven Planning Discovery Driven Planning Proprietary Material K.E. Homa So, what s the problem? When evaluating the financial attractiveness of opportunities, most companies do detailed financial projections going out

More information

Board Risk Appetite Statement

Board Risk Appetite Statement SH NCP 62 Version: 3 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: This document establishes the key areas of risk and guidance on the level of risk the Board is prepared

More information

Dilemmas in risk assessment

Dilemmas in risk assessment Dilemmas in risk assessment IRS, Stockholm www.irisk.se Perspectives: Accidents & Safety Industry Occupational safety Medical services Transport Energy etc. Themes Terminology and concepts Risk assessment

More information

Risk Management Framework

Risk Management Framework Risk Management Framework Anglican Church, Diocese of Perth November 2015 Final ( Table of Contents Introduction... 1 Risk Management Policy... 2 Purpose... 2 Policy... 2 Definitions (from AS/NZS ISO 31000:2009)...

More information

Analytics across the asset life cycle

Analytics across the asset life cycle Analytics across the asset life cycle Analytics provides a powerful look forward so that asset rich organisations can chose to react or not to react with changes to the conditions and environment that

More information