... I Page 1 of 13 I... Back 'i

Similar documents
..._ I Page 1 of 6 ~ LOG200 Intermediate Acquisition Logistics. lesson 6.1- Cost Estimating & PPBE- Overview RESOURCES I PRIMT 1 HELP

... I Poge 1of4 I... Back Next

CLB024 Introduction to Cost Risk Analysis

..._ I Page 1 o f 1 2 Back i,... ) Next

... I Poge1of4 I... Back Next

~ I Page l of 20 I... Back. Next

CLB024 Introduction to Cost Risk Analysis. ~ I Poge 1 of 10 I... Back a. Lesson 3- Cost Risk Analysis TOC I RESOURCES 1 PRINT 1 HELP

=- ~ = _. ..._ I Pil ge 1 of 19 Ill- Back Next. LOG 200 I ntermediate Acquisition Logistics

0470_022817_03_chap01.fm Page 11 Wednesday, September 8, :29 PM. Part I The basics of project risk management

RISK M A N A G E M E N T P L A N

1st Capacity Building Seminar on Enterprise Risk Management

RISK MANAGEMENT and ISO 17025:2017

Schedule I. Quincy Public School District No. 172 RISK MANAGEMENT PROGRAM

MIS 5206 Protection of Information Assets - Unit #4 - Risk Evaluation. MIS 5206 Protecting Information Assets

Fundamentals of Risk Management from an Environmental Perspective. Cassandra M. Dillon, Systran / UTA ETI

... I P ge1of 43 I... Back Next

Solvency Assessment and Management: Stress Testing Task Group Discussion Document 96 (v 3) General Stress Testing Guidance for Insurance Companies

Remediation Risk Management: A Comprehensive Approach for Reducing Remediation Uncertainties

Session 3 December 13, 8:30-9:30am. Managing Federal Credit Programs

... I Poge 1of17 I... Back Next

Risk Management Guidelines

Accounting for Management: Concepts & Tools v.2.0- Course Transcript Presented by: TeachUcomp, Inc.

LCS International, Inc. PMP Review. Chapter 6 Risk Planning. Presented by David J. Lanners, MBA, PMP

Kidsafe NSW Risk Management Plan. August 2014

4. Outline of EIA for Development Assistance

Risk Management Plan for the Ocean Observatories Initiative

1.1. This document forms the Council s Risk Management Strategy. It sets out:

Every project is risky, meaning there is a chance things won t turn out exactly as planned.

Risk Management Plan for the <Project Name> Prepared by: Title: Address: Phone: Last revised:

Challenges of implementation. a regulatory perspective

RISK MANAGEMENT POLICY

Risk Management Strategy Highland Council Pension Fund

INTERNAL AUDIT PLAN OF ACTIVITIES

Canvass of Floodplain Management Professionals on Flood Insurance Successes & Concerns

RISK MANAGEMENT. Budgeting, d) Timing, e) Risk Categories,(RBS) f) 4. EEF. Definitions of risk probability and impact, g) 5. OPA

AN INTRODUCTION TO RISK CONSIDERATION

Auckland Transport HS03-01 Risk and Hazard Management

~ I Page1of J2 I ~ Back Next

Perpetual s Risk Management Framework

client user GUIDE 2011

The Role of Quality Risk Management in the Manufacture of Biological Products CBER Perspective

Master Class: Construction Health and Safety: ISO 31000, Risk and Hazard Management - Standards

RISK MANAGEMENT MADE EASY. Susan Parente Project Management Symposium.

Intermediate Systems Acquisition Course. Integrated Baseline Reviews (IBRs)

Risk Evaluation, Treatment and Reporting

ก ก Tools and Techniques for Enterprise Risk Management (ERM)

Answers to Frequently Asked Questions Comprehensive Quality & Risk Program

Applying COSO s Enterprise Risk Management Integrated Framework

Guidance Note: Stress Testing Credit Unions with Assets Greater than $500 million. May Ce document est également disponible en français.

Boston Chapter AGA 2018 Regional Professional Development Conference. Brandeis University Professor Erich Schumann May 2018

Applying Risk-based Decision-making Methods/Tools to U.S. Navy Antiterrorism Capabilities

Recognizing and Mitigating Risk in Acquisition Programs

Proposed Criteria for Determining Scope of Section 215 Activities Request for Comments on Revised Draft

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ]

What Does a Risk Manager Do? By Keith Wentz, Risk Management and Underwriting Manager, CCAP

Risk Management Plan PURPOSE: SCOPE:

Lecture 7. Requirements Prioritisation. Risk Management

Project Risk Management

M_o_R (2011) Foundation EN exam prep questions

State Medicaid Snapshot: Affordable Care Act Implementation

RISKS. Diane Van Hoy and Jacob Kloos

Affecting Capital Planning and Investment Control (CPIC)

Planning the Risk Management File Audit

Software Processes. Minsoo Ryu. Hanyang University. Real-Time Computing and Communications Lab., Hanyang University

Security Risk Management

Key Themes. Organizational Dynamics and Effective Risk Management. Organizational Alignment. Risk Management Effectiveness

An Update On Association Policies, Health Checks & Guidelines To A Safer Hockey Association. Lauren Woods Member Engagement & Operations

CLB024 Introduction to Cost Risk Analysis

Crowe, Dana, et al "EvaluatingProduct Risks" Design For Reliability Edited by Crowe, Dana et al Boca Raton: CRC Press LLC,2001

Presented to: Eastern Idaho Chapter Project Management Institute. Presented by: Carl Lovell, PMP Contract and Technical Integration.

Risk Management Policy and Strategy

Risk Management at the Deutsche Bundesbank March 2011

The 7 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 15 th 2012

A Project Management Guide for Researchers

EC/67/SC/CRP.22. Risk management in UNHCR. Executive Committee of the High Commissioner s Programme. Standing Committee 67 th meeting.

Sections of the ORSA Report

MUSTER AG RISK MANAGEMENT

Risk Management: Principles, Methodologies and Techniques. Peter Getugi Internal Audit Manager ILRI

Managing Project Risk DHY

Common Safety Methods CSM

B2BC Welcome and Information Session Monday, May 23 8:45 a.m. 9:45 a.m.

RISK ASSESSMENT IN SHIP OPERATIONS

IFC Response to Third Monitoring Report of IFC s Response to: CAO Audit of a Sample of IFC Investments in Third-Party Financial Intermediaries

Procedure for Address Business Risk and Opportunities

Fiduciary Risk Range of Practice - April 2012

RISK COMMITTEE TERMS OF REFERENCE. The Board has resolved to establish a Committee of the Board to be known as the Risk Committee.

Northwest Regional Data Center

BS&P Guidelines for NYISO Budget Preparation/ Financing and for Project Monitoring. Draft 07/1423/03

2 Risk assessment why?

Certified Defense Financial Manager (CDFM)

I. What is CRR and Why is it Important?

Risk Management & FMEAs. By Jay P. Patel, ASQ Fellow CEO & President QPS Institute

12 GeV CEBAF Upgrade. Risk Management Plan

Final Business Plan and Budget. Florida Reliability Coordinating Council, Inc. Approved:

Risk Management at Central Bank of Nepal

Risk Management. CITS5501 Software Testing and Quality Assurance

Discovery Driven Planning

RISK MANAGEMENT MANUAL

... I Pagelof 4S I...

Project Selection Risk

Transcription:

Lesson 2.1 RM~ Relationship to.?~'s Risk, Issue and Opportunity Management Guide for OoO Acqu1s1t1on Programs Welcome to RMF Relationship to OoO's Risk Management Guide for Acquisition Programs RESOURCES I PRIN T I HELP View CR Submit CR The Risk Management Framework (RMF) is not the only process that req uires us to manage risk throughout a system's life cycle from a security perspective. The Department of Defense (DoD)'s Risk, Issue, and Opportunity Management ( RIOM) Guide for Defense Acquisition Programs requirements should also be considered when addressing cybersecurity life cycle risks. There are steps and phases involved in each process that we will integrate in efforts to truly "bake in security" for our DoD Information Systems ( IS) and Platform Information Technology (PIT) Systems, IT Products, and IT Services.... I Page 1 of 13 I... Back 'i J Next

ISA220 Risk Managem ent Framework for Practitio ner s Lesson 2.1 - RM~ Relationship to _D_o;D"s Risk, Issue and Opportunity RESOURCES f PRINT f HELP Welcome to RMF Relationship to DoD's Risk Management Guide for Acquisition Programs, Cont. As system owners, we strive for the alignment and balance in our system(s). Using the RMF process along with the DoD's Risk Management for Acquisition program requirements enables us to manage risk throughout a system's life cycle from a security perspective. Each of these processes includes steps and phases. We will discuss how these processes are integrated in efforts to solidify security requirements into our DoD IT and PIT Systems, IT Products, and IT Services. ~ I P ge2of13 I... Back ii Next

Lesson 2.1 - RM~ Relationship to_d_o_o's Risk, Issue and Opportunity Management Guide for DoO Acqms1t1on Programs RESOUR CES I PRINT I HELP Effective Cyber security in DoO Acquisition Programs Effective cybersecurity in DoD acquisit ion programs encompasses all of the actions taken t o ensure t he confidentialit y, integrit y, and availabilit y of system information to enable warfighting operations. Cybersecurity risk managemelilt tasks begin early in the system development life cycle and are important in shaping the secu rity capabilities of the I nformation System (I S). If these t asks are not adequately performed during the initiation, development, and acquisition phases of the system development life cycle, the tasks will, by necessity, be undertaken later in the life cycle a nd will be more costly and time consuming to implement, and could negatively affect the performance of the I S. Cybersecurity risk managemelilt must continue during operations and sustainment. Risk management may include the application of new or rev ised security controls prior t o the integration of new IT services or products into an existing operational I S, in order t o maintain the security of the operational IS. Program Managers bear the responsibilit y of int egrating cybersecurit y, including required resources, int o the system's acquisition life cycle activities. ~ I Page3of13 l... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk Risk ~ management process for all DoD acquisition Monitoring~ programs. These risk items include: Risk Planning Risk Identjficatjon Risk Analysjs Risk Handljng Risk Monjtorjng Risk Handling How has the risk changed? Should the risk be accepted, avoided, transferred, or mitigated? Risk Analysis Wtlat are the likelihood and consequence of the risk? Risk Planning What is the program's risk management process? Risk Identificat ion Wtlat can go wrong?... I P ge 4ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk management process for all DoD acquisition programs. These risk items include: Risk..--------------!;M;lloll.lli~~... Long Descript ion ~ Risk Planning Mo ni toring~ What is 1he program's risk Risk Planning Risk Identificati The risk management process is a five-step process. Risk Analysis With communication and feedback, the process can flow from one risk Risk Handling item to another. Important questions are asked at each risk item. Risk Monitoring These risk items and questions are: Risk Planning: What is the program's risk management process? Risk Identification: What can go wrong? Risk Analysis: What are the likelihood and consequence of the risk? Risk Handling: Should the risk be accepted, avoided, transferred, or mitigated? Risk Monitoring: How has the risk changed? Risk tification at can go vrong? likelihood and consequence of the risk?... I Page4of13 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk Risk ~ management process for all DoD acquisition Monitoring~ programs. These risk items include: Risk Planning Risk Identjficatjon Risk Analysjs Risk Handljng Risk Monjtorjng Risk Planning is developing and Risk Handling How has the risk changed? documenting organized, Should the risk be comprehensive, and interactive accepted, avoided, strategies and methods for transferred, or identifying risks. What is the program's risk management process? mitigated? Risk Analysis Wtlat are the likelihood and consequence of the risk? Risk Planning What is the program's risk management process? Risk Identification Wtlat can go wrong?... I P ge 4ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk Risk ~ management process for all DoD acquisition Monitoring~ programs. These risk items include: Risk Planning Risk Identjficatjon Risk Analysjs Risk Handljng Risk Monjtorjng Risk Identification is discovering, Risk Handling How has the risk changed? defining, describing, documenting Should the risk be accepted, avoided, transferred, or adversely affect a project. mitigated? and communicating risks before they become problems and What can go wrong? Risk Analysis Wtlat are the likelihood and consequence of the risk? Risk Planning What is the program's risk management process? Risk Identification Wtlat can go wrong?... I P ge 4ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk Risk ~ management process for all DoD acquisition Monitoring~ programs. These risk items include: Risk Planning Risk Identjficatjon Risk Analysjs Risk Handljng Risk Monjtorjng Risk Analysis is to assess all the Risk Handling How ha sthe risk changed? risks identified during the Should the risk be accepted, avoided, determine their likelihood of transferred, or mitigated? Identification step in order to occurrence and most probable impac t. Risk Analysis What are the likelihood and consequence of the risk? Wtlat are the likelihood and consequence of the risk? Risk Planning What is the program's risk management process? Risk Identification Wtlat can go wrong?... I P ge 4ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk Risk ~ Risk Planning management process for all DoD acquisition M onitoring~ What is the programs. These risk items include: How has the risk program's risk management changed? Risk Planning Risk Identjficatjon Risk Analysjs Risk Handljng Risk Monjtorjng Risk Handling is the methodology Risk Handling used by the DoD to handle risk as part of the DoD Risk, Issue and Opportunity Management Process. Four options are recognized by the DoD for handling risks. These include: Risk Acceptance, Risk Should the risk be accepted, avoided, transferred, or mitigated? Risk Analysis Avoidance, Risk Transfer, and Risk Wtlat are the Mitigation. likelihood and Should the risk be accepted, avoided, transferred, or mitigated? consequence of the risk? process? Risk Identification Wtlat can go wrong?... I P ge 4ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Management Process for Acquisition Programs Risk management is a cyclical five-step process that provides a useful framework for understanding and dealing with any and all program risks, including cybersecurity. It serves as the overarching risk Risk ~ Risk Planning management process for all DoD acquisition Monitoring~ What is the programs. These risk items include: How has the risk program's risk Risk Planning Risk Identjficatjon Risk Analysjs Risk Handljng Risk Monjtorjng Risk Handling changed? management process? Risk Monitoring is the process that Identification systematically tracks and evaluates Should the risk be the effectiveness of risk-handling accepted, avoided, actions against established metrics. transferred, or Monitoring results may also provide mitigated? a basis for developing additional handling options and identifying new Risk Analysis risks. likelihood and Wtlat are the How has the risk changed? consequence of the risk? Risk Wtlat can go wrong?... I P ge 4 ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Planning Risk Planning involves developing and documenting organized, comprehensive, and interactive strategies and methods for identifying risks. It is also used for perfonning risk assessments to establish risk handling priorities, developing risk handling plans, monitoring the status of risk handling actions, detennining and obtaining the resources to implemen t the risk management strategies. Important question to ask: What can go wrong?... I P ge Sof l J Back

Lesson 2.1 - RM~ Relationship to_d_o_d's Risk, Issue and Opportunity Risk Identification Risk Identification includes discovering, defining, describing, documenting and communicating risks before they become problems and adversely affect a proj ect. Accurate and complete risk identification is vital for effective risk management. I n order t o manage risks effectively, they must first be identified. The important aspect of risk identification is to capture as many risks as possible. During the risk identification process,.all possible risks should be submitt ed. Not all risks will be acted upon. Once more details are known about each risk, the decision will be made by the proj ect members as t o the handling of each risk. There are various t echniques that can be used for risk identification. Useful techniques include brainstorming methods as well as systematic inspections and process analysis. Regardless of the technique used, it is essential t o include key functional area personnel t o ensu re no risks go undiscovered. Important question to ask: ' What is the program's risk management process? "AU... I Page6oft3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Analysis Risk analysis provides an estimate of each risk's likelihood and consequence, as well as the resulting risk level in order to more effectively manage risks and prioritize risk handling efforts. Likelihood is the evaluated probability an event will occur given existing conditions. The estimated likelihood of the risk must be tied to a well-defined risk event or condition, and risk statement. Important questions to ask: How big is the risk? What is the likelihood and consequence of the risk?... I P ge7ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Handling Risk Handling is the methodology used by the DoD to handle risk as part of the DoD Risk, Issue, and Opportunity Management Process. The DoD recognizes four options for handling risks: Risk Acceotance Risk Ayojdance Risk Transfer Risk Mi tjgatjon Important question to ask: Should the risk be accepted, avoided, transferred, or m itigated?... I P ge8ofl3 I... Back

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Risk Handling Risk Handling is the methodology used by the DoD to handle risk as part of the DoD Risk, Issue, and Opportunity Management Process. The DoD recognizes four options for handling risks: Risk Acceptance Risk Avoidance Risk Transfer Risk Mitigation Risk Accept ance A risk management method used in the business or investment field. Accepting risk occurs when the cost of managing a certain type of risk is accepted, because the risk involved is not adequate to warrant the added cost it will take to avoid it. Important question to"""-------------~ Should the risk be accepted, avoided, transferred, or mitigated?... I Page8of 13 I... Back Next

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Risk Handling Risk Handling is the methodology used by the DoD to handle risk as part of the DoD Risk, Issue, and Opportunity Management Process. The DoD recognizes four options for handling risks: Risk Acceptance Risk Avoidance Risk Transfer Risk Mitigation Risk Avoidance Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization's assets. Whereas risk management aims to control the damages and financial consequences of threatening events, risk avoidance seeks to avoid Important question to compromising events entirely. Should the risk be accepted, avoided, transferred, or mitigated?... I Page8of 13 I... Back Next

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Risk Handling Risk Handling is the methodology used by the DoD to handle risk as part of the DoD Risk, Issue, and Opportunity Management Process. The DoD recognizes four options for handling risks: Risk Acceptance Risk Avoidance Risk Transfer Risk Mitigation Risk Transfer Risk transfer is a risk management and control strategy that involves the contractual shifting of a pure risk from one party to another. One example is the purchase of an insurance policy, by which a specified risk of loss is passed from the policyholder to the insurer. Important question to """-------------~ Should the risk be accepted, avoided, transferred, or mitigated?... I Page8of13 I... Back Next

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Risk Handling Risk Handling is the methodology used by the DoD to handle risk as part of the DoD Risk, Issue, and Opportunity Management Process. The DoD recognizes four options for handling risks: Risk Acceptance Risk Avoidance Risk Transfer Risk Mitigation Risk Mit igat ion Develop a high-level mitigation strategy. This is an overall approach to reduce the risk impact severity and/ or probability of occurrence. It could affect a number of risks and include, for example, increasing staffing or reducing scope. Important question to """-------------~ Should the risk be accepted, avoided, transferred, or mitigated?... I Page8of13 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Risk Monitoring Risk Monitoring is a continuous process to systematically track and evaluate the performance of risk handling plans against established metrics throughout the acquisition process. Risk monitoring is performed as part of technical reviews. Important question to ask: How has the risk changed? Paige 0 ofl3 I ~ Back Next

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Aligning the RIOM Guide with the DoD RM F The 6 steps within the RMF align to the 5 phases of Risk, Issue, and Opportunity Management (RIOM ) at various stages of DoD IT life cycle. Elements of Risk Identification are aligned with RMF Steps 1, 2, and 3 and elements of Risk Analysis are aligned with RMF Steps 4 and 5. Communication and feedback are critical throughout these iterative processes for successful integration of processes. The assessment of risks drives risk response and may influence security control implementation and adjustment, while highlighting a need to continuously monitor the security state of information systems. Risk Management is an iterative, cyclical process and supports the acquisition life cycle's incremental build model to align testing, production, and other similar and complimenting processes. Please select the image to enlarge the alignment process. ~... M()N!JOll s-..;ty ''"""'.. --....... ~ -... -''""'... --.,._ \ MJlltOftlll... I Page 10of 13 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Aligning the RJOM Guide with the DoD RMF Step6 MONITOR Security Controls Step s AUTHORIZE System Step4 ASSESS Security Controls Risk Monitoring Risk Planning What is tm How has the risk pr01fam's risk changed? man.agtmt-nt I \ Risk Handling process? Risk Should tht risk bit Identification accep1ed. avoided, t~.or mitigated? Whatungo,.,_? Step3 IMPLEMENT Security Controls Step2 SELECT Security Controls Risk Analysis What 1r lhe Stepl CATEGORIZE,, ttet1hood and System const<iuence of the tis.k?... I P ge10ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to.o.o.o s Risk, Issue and Opportunity Aligning the RIOM Guide with the DoD RMF T he 6 steps within the RMF align to the 5 phases of Risk, Issue, and Opportunity Management (RIOM ) at various stages of DoD IT life cycle. Elements of Risk Identification are aligned with RMF Steps 1, 2, and 3 and elements of Risk Analysis are aligned with RMF Steps 4 and 5. Communication and feedback are critical throughout these iterative processes for successful integration of processes. The assessment of risks drives risk response and may influence security control implementatio onitor the security state of info Long Description Risk Management is a The 6 steps within the RMF align to the 5 phases of Risk, incremental build mo Issue, and Opportunity Management (RIOM ) at various stages of DoD IT life cycle. Elements of Risk Identification Please select the ima and Risk Analysis for Acquisition Programs are included in RMF Step 1 and elements of Risk Analysis and Risk Handling are included in RMF Steps 2 through 5. -... -... -- -''""'.,._ \ MJlltOftlll ycle's nting processes.... I Page10of 13 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Knowledge Review 1 True or False. Like the Risk Management Framework {RMF), DoD Risk, Issue, and Opportunity Management {RIOM) Guide for Defense Acquisition Programs is a six step cyclical process. True ~ False Check Answ er The Risk Management Process for DoD Acquisition Programs is a five step cyclical process.... I P ge11ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_d"s Risk, Issue and Opportunity Knowledge Review 2 Which processes are used to determine how to manage risk within the Department of Defense (DoD) Risk, Issue, and Opportunity Management {RIOM) Guide for Defense Acquisition Programs? Risk Planning LJ Risk Monitoring Risk Avoidance ~ All of the Above Check Answ er Risk Planning, Risk Monitoring, and Risk Avoidance are processes used to determine how to manage risk within the Department of Defense {DoD) Risk, Issue, and Opportunity Management {RIOM) Guide for Defense Acquisition Programs.... I P ge12ofl3 I... Back Next

Lesson 2.1 - RM~ Relationship to_d_o_o s Risk, Issue and Opportunity Lesson Completion You have completed the content for this lesson. To continue, select another lesson from the Table of Contents on the left. If you have closed or hidden the Table of Contents, click the Show TOC button at the top in the Atlas navigation bar.... I P ge13ofl3 I... Back Next