Home > Articles > Professional Certifications

This chapter is from the book

Risk Management

  • Plan Risk Management—11.1
  • Identify Risks—11.2
  • Perform Qualitative Risk Analysis—11.3
  • Perform Quantitative Risk Analysis—11.4
  • Plan Risk Responses—11.5

PMI's risk management philosophy is based on a proactive approach to preventing negative risks and enhancing positive risks. Key points to remember about risk include

  • Risk can be either positive or negative. Positive risks are opportunities; negative risks are threats.
  • A risk breakdown structure (RBS) is used to organize risk in a hierarchical structure.
  • Monte Carlo analysis is a technique using simulations and probability in determining quantitative risk analysis.
  • Risk categories are important in classifying risk.
  • Probability and impact are both needed to assess risks.
  • Quantitative analysis is generally reserved for high-probability, high-impact risk.
  • Risk management planning and risk response planning are not the same activities.
  • Risk identification is an iterative process that is performed throughout the project, not just during planning.
  • Decision tree analysis is a technique using probabilities and costs for structured decision making.
  • Five of the six risk management processes are conducted during the planning process group.
  • The risk register is an important tool for capturing and tracking risks.

The risk methodology is a definition of how risk will be managed. It includes the approach, tools, and techniques to be used for the project. The approach details how the steps of the risk process will be conducted. For example, the approach could specify that risk analysis will be conducted at the end of each planning meeting. The tools can include the risk register, the risk breakdown structure, the probability and impact matrix, and checklists.

Risk Management Planning and Risk Response Planning

The risk management plan includes the risk methodology, roles/responsibilities, budget, execution timing, and definitions for risk categories, probabilities, and impacts. It is a summation of how the project team will carry out the remainder of the risk management activities for the project. The risk management plan should not be confused with the risk response plan, which is where the project manager captures responses to specific risks that have been identified during the risk identification process.

The risk management plan is the single output of the plan risk management process. Table 4.10 shows the inputs, tools and techniques, and outputs for the plan risk management process.

Table 4.10. Plan Risk Management Inputs, Tools and Techniques, and Outputs

Inputs

Tools and Techniques

Outputs

Project scope statement

Planning meetings and analysis

Risk management plan

Cost management plan

Schedule management plan

Communications management plan

Enterprise environmental factors

Organizational process assets

Risk Breakdown Structure (RBS)

A risk breakdown structure (RBS) is a tool that can be used to organize risks in a hierarchical fashion. The structure is defined using the risk categories. Even if an RBS is not used, risk categories are still defined in risk management planning. Risk categories can include

  • Technical—Risk associated with using new technology.
  • External—Risk associated with forces or entities outside the project organization. External risks can include external suppliers, customers, weather, and market conditions.
  • Organizational—Risk associated with either the organization running the project or the organization where the project will be implemented.
  • Project Management—Risk associated with project management processes.

Risk Probability and Impact

Probability can be defined as the likelihood that a risk will occur. It can be expressed mathematically (.2) or as a relative scale (low, medium, high). The definition for probability is developed during risk management planning.

Impact is the effect a risk has if it does occur. It can also be defined on a relative scale or mathematically. The definition for impact is developed during risk management planning.

The team documents in the project management plan detail how probabilities and impacts are measured. For example, a red/yellow/green scale might be used, where high-probability, high-impact risks are red; low-probability, low-impact risks are green; and so forth. A probability and impact matrix can also be used; for an example, refer to PMBOK Fourth Edition, Figure 11-10.

Risk Identification, Analysis, Response Planning, and Monitoring/Controlling

In the risk management process, completing the risk management plan is the first step. After the plan is in place, according to PMI the next steps in the risk management process are

  • Identification
  • Analysis (qualitative and quantitative)
  • Response planning
  • Monitoring/controlling (discussed in Chapter 6, "Project Control")

Identify Risks

The identify risks process is determines the risks that might affect the project and characterizes those risks.

Obviously, the ability to identify risks is key in an effective risk management process. Keep in mind that identifying risks is not just the project manager's responsibility; team members, subject matter experts, customers, stakeholders, and others are involved in this process. Table 4.11 shows the inputs, tools and techniques, and outputs for the identify risks process.

Table 4.11. Identify Risks Inputs, Tools and Techniques, and Outputs

Inputs

Tools and Techniques

Outputs

Risk management plan

Documentation reviews

Risk register

Activity cost estimates

Information gathering techniques

Activity duration estimates

Checklist analysis

Scope baseline

Assumptions analysis

Stakeholder register

Diagramming techniques

Cost management plan

SWOT analysis (Strength, Weakness, Opportunity, Threat)

Schedule management plan

Expert judgment

Quality management plan

Project documents

Enterprise environmental factors

Organizational process assets

The Risk Register

The risk register is the output of the identify risks process. The risk register contains the following information:

  • Risk description
  • Date identified
  • Category
  • Potential responses
  • Current status

Qualitative and Quantitative Risk Analysis

Qualitative risk analysis provides further definition to the identified risks in order to determine responses to them. The key terms are probability and impact. Probability is important because it measures how likely a risk will occur. A high-probability risk deserves more attention than a low-probability risk. Likewise, impact is a measure of how the risk will affect the project should it occur. A risk with low impact has a different response than one with a high impact.

Qualitative risk analysis quickly prioritizes risks in order to conduct response planning and quantitative risk analysis, if used. Using the probability of the impact and a probability impact matrix, the project manager develops a prioritized list of risks. The output to this step is captured in the risk register. Table 4.12 shows the inputs, tools and techniques, and outputs for the perform qualitative risk analysis process.

Table 4.12. Perform Qualitative Risk Analysis Inputs, Tools and Techniques, and Outputs

Inputs

Tools and Techniques

Outputs

Risk register

Risk probability and impact assessment

Risk register updates

Risk management plan

Probability and impact matrix

Project scope statement

Risk data quality assessment

Organizational process assets

Risk categorization

Risk urgency assessment

Expert judgment

Quantitative risk analysis assigns numerical values to risks and looks at those risks that are high on the list of prioritized risks during qualitative risk analysis. The goal of this process is to quantify possible outcomes for the project, determine probabilities of outcomes, further identify high impacting risks, and develop realistic scope, schedule, and cost targets based on risks. Table 4.13 shows the inputs, tools and techniques, and outputs for the perform quantitative risk analysis process.

Table 4.13. Perform Quantitative Risk Analysis Inputs, Tools and Techniques, and Outputs

Inputs

Tools and Techniques

Outputs

Risk register

Data gathering and representation techniques

Risk register updates

Risk management plan

Quantitative risk analysis and modeling techniques

Cost management plan

Expert judgment

Schedule management plan

Organizational process assets

A key tool used in quantitative risk analysis is decision tree analysis. Using a decision tree diagram (see Figure 4.3), the impact of different scenarios is captured. Both probability and cost are used, resulting in an expected monetary value (EMV).

Figure 4.3

Figure 4.3 An example of a decision tree analysis.

For this example, there are two vendors for a software package; Acme and WebCo. The details of the two options are presented in Table 4.14.

Table 4.14. Decision Tree Analysis Example Data

Acme

WebCo

Purchase cost

$120,000

$130,000

Maintenance

$75,000/year (98% reliability)

$70,000/year (99% reliability)

Failure cost

$100,000 (2% probability)

$50,000 (1% probability)

Responses to Positive and Negative Risk

After all risks are identified, options to deal with the risks must be identified. Each risk is assigned to one or more owners to carry out the planned response. The responses are documented in the risk register after it has been updated in the plan risk responses process. Table 4.15 shows the inputs, tools and techniques, and outputs for the plan risk responses process.

Table 4.15. Plan Risk Responses Inputs, Tools and Techniques, and Outputs

Inputs

Tools and Techniques

Outputs

Risk register

Strategies for negative risks or threats

Risk register updates

Risk management plan

Strategies for positive risks or opportunities

Risk-related contract decisions

Contingent response strategiesplan

Project management updates

Expert judgment

Project document updates

There are four responses to negative risks:

  • Avoid
  • Transfer
  • Mitigate
  • Accept

For positive risks the responses include

  • Exploit
  • Share
  • Enhance
  • Accept

They are summarized in Table 4.16.

Table 4.16. Summary of Risk Responses

Response

Description

Risk Type

Avoid

Eliminating the threat by changing the project management plan.

Negative

Transfer

Shifting the risk to a third party.

Negative

Mitigate

Reducing either the probability or impact of the risk.

Negative

Exploit

Taking steps to make the opportunity happen.

Positive

Share

Using a third party to help capture the opportunity.

Positive

Enhance

Increasing the probability or positive impact of the risk.

Positive

Accept

Taking no steps in the project because of the risk. Contingency reserves might be established.

Positive and Negative

Risk Monitoring and Controlling

The risk process is not just performed once during the planning process. Throughout the project, risks must be continually monitored, with additional analysis and risk response development as new risks are identified. Risk monitoring and controlling focuses both on identification and analysis of new risks, as well as tracking previously identified risks and risk triggers.

Risks should be re-evaluated when the following events occur:

  • A risk trigger is identified
  • A change request is approved
  • Key project milestones are reached
  • Project phases end
  • Deviations are detected in variance and trend analysis
  • Corrective or preventive actions are implemented

Cram Quiz

Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can.

  1. Which input is not used for risk identification?

    bullet.jpg

    A. Project charter

    bullet.jpg

    B. Scope baseline

    bullet.jpg

    C. Cost management plan

    bullet.jpg

    D. Academic studies

  2. In evaluating project risk, a decision tree analysis is most helpful in which of the following scenarios?

    bullet.jpg

    A. Describing a potential risk and the implications for each available choice and outcome associated with the risk

    bullet.jpg

    B. Describing a potential risk and the most likely choice and outcome associated with the risk

    bullet.jpg

    C. Describing a potential risk and the least likely choice and outcome associated with the risk

    bullet.jpg

    D. None of the above

  3. The identification of risks associated with a project happens when?

    bullet.jpg

    A. Occurs only at the beginning of a project when the risk management plan is developed

    bullet.jpg

    B. Is an ongoing process, regularly scheduled throughout the life cycle of a project

    bullet.jpg

    C. Occurs as needed throughout the life cycle of a project

    bullet.jpg

    D. Both C and D

  4. Which of the following is the only valid tool and technique for the plan risk management process?

    bullet.jpg

    A. Reserve analysis

    bullet.jpg

    B. Planning meetings and analysis

    bullet.jpg

    C. Expert judgment

    bullet.jpg

    D. Contingent response strategies

  5. Which input is not used for the qualitative risk analysis process?

    bullet.jpg

    A. Cost management plan

    bullet.jpg

    B. Risk register

    bullet.jpg

    C. Risk management plan

    bullet.jpg

    D. Project scope statement

  6. Which tool and technique is not used for the Plan Risk Responses process?

    bullet.jpg

    A. Strategies for positive risks or opportunities

    bullet.jpg

    B. Contingent response strategies

    bullet.jpg

    C. Risk audits

    bullet.jpg

    D. Expert judgment

Cram Quiz Answers

  1. Answer A is correct. The project charter is not used. The scope baseline and cost management plan are used. Academic studies are part of enterprise environmental factors that also include commercial databases, benchmarking, or other industry studies.

  2. Answer A is the correct response. A decision tree diagram can be used to consider potential risks and all the implications associated with the risk. You can include every conceivable choice and outcome. Every option is considered. Answer B is incorrect because choice and outcome are limited to the most probable scenario. Answer C is incorrect because choice and outcome are limited to the least probable scenario. Answer D is incorrect.

  3. Answer D is the best response. Risk analysis is not limited to the beginning of a project's life cycle when the risk management plan is developed. The risk management plan should include a tool for risk assessment as a continuous process throughout the project. Risk reassessment should be a scheduled component of the project but should also have the flexibility to occur as needed at greater or lesser intervals based on the level of risk.

  4. Answer B is correct. Planning meetings and analysis is the only tool and technique defined for the plan risk management process. All of the other answers refer to tools and techniques from other processes.

  5. Answer A is correct. The cost management plan is an input for the perform quantitative risk analysis process. All of the other answers are valid inputs for the perform qualitative risk analysis process.

  6. Answer C is correct. Risk audits are a tool and technique for the monitor and control risks process. All other answers are valid tools and techniques for the plan risk response process.

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020