What are the risk management steps in their order of priority?

A management process is effective only if each risk identified is prioritized and properly classified. Here are the steps to do so.

Recognize the risks:

Before prioritizing risks, they have to be identified. Typically, risk managers create a list of threats based on past events and what they have learned from previous projects.

In this process, it is very useful to create a risk management checklist, in which the main sources and risk factors are investigated.

The list of lessons learned is made up of threats that had not been considered during the planning of previous projects and that somehow affected the expected results.  

Considering the impact these problems had on previous projects and preparing for similar results will prevent you from repeating the same mistakes over and over again.

This is important because, despite having the best risk management plan in place, unforeseen events, design errors or omissions may occur.

Although some risks are unpredictable and unlikely, these must be included in a risk and control matrix. That way, people in charge are assigned before the risk occurs. This risk matrix needs to be updated and revised frequently.

After the risks have been identified, the impact and likelihood of their occurrence should be measured and ranked from most critical to least critical, i.e. prioritized.

How to prioritize risk with a control matrix

The priority of risks may vary depending on the type of company or project.

There are multiple quantitative and qualitative techniques to prioritize risks. The former include cardinal risk, probability and time frame assessments, as well as sensitivity, expected monetary value, modeling and simulation analyses.

Qualitative techniques for prioritizing risk include probability and impact analysis. A risk matrix is often used to categorize risks according to frequency and urgency. This is a risk management method that helps to systematize the process. Here's how to do it.

1) Identify the risks

Similar to recognizing risk, all potential risks to the project must be listed before conducting the assessments. Even events that are very unlikely should be considered.

2) Measure the probability

Each risk identified should be classified based on the likelihood that it will occur. The scale for this ranking depends on the criteria established for each company or project. A scale of 1-5 could be used as values, with 1 being unlikely and 5 being likely, or simply by measuring them with a percentage.

3) Assess the impact

The impact of different risks should be classified based on the established guidelines for measuring probability. Of course, the impact can also change over the timeline of the project.

For example, an unforeseen condition may not have an impact at the beginning, so it would be classified as 1. As the project progresses, when it is close to completion, that same condition may cause schedule interruptions or budgetary issues, which would change its priority from 1 to 4.

4) Calculate the total risk

The overall risk associated with a given event can be calculated depending on the scale used to measure probability and impact. On this basis, risks can be weighed according to their probability as low, medium or high. This way, the team will know which risks are most urgent.

After calculating the overall risk for each event, stakeholders should consider the urgency of each type of risk. If all or most of the risks are shown as high, they should be reviewed and reclassified.

Remember that the objective of the risk matrix in Excel is to show what risks to focus on. Therefore, it makes no sense to label all or most of the risks as priorities, as the team would not know which one to focus on first.

5) Update the matrix with the team

Many projects begin following an organized procedure with a solid risk matrix file, but as the project progresses, the team forgets that this document exists.

Since priorities and impacts change, failing to update the risk matrix is the main reason why some risks seem to emerge out of nowhere at the last minute. To have a successful risk management program, the control matrix must be regularly updated by all team members. If this is done consistently, it will be easier to mitigate the impact of the risks.

Start to prioritize the risks now! Click below and download a free control matrix. In the Excel file, all you need to include is the probability and impact according to the specified criteria. The risk matrix will calculate the level of risk and assign a score for it. 

Risk represents any kind of uncertainty that can improve or reduce the ability to achieve your objectives. It can take many forms, including risks affecting projects, finances, security and privacy, and the environment. For both positive risks (opportunities) or negative ones, you need an intentional approach to understand the balance between risk and reward. This article focuses on the process for managing risks that could have a negative impact on your organization; similar processes apply to determining how to exploit beneficial uncertainty, i.e., positive risk.

Recent history has highlighted the impact that risk factors can have on how businesses and individuals operate -- and on whether they can continue to do so. The ability to navigate risk better than competitors will certainly contribute to the enterprise's success. Failure to do so could spell disaster, perhaps beyond recovery.

For these reasons, it is important to apply a proven and consistent risk management process. When built upon a solid foundation of understanding the organization's goals, objectives and internal/external context, a risk management process will help ensure your organization's success.

What are the 5 steps of the risk management process?

Many bodies of knowledge have documented risk management, but perhaps the best known is that of the International Organization for Standardization, or ISO. The ISO 31000 standard, Risk management -- Guidelines, includes extensive information on how to communicate about, manage and monitor various risks. The process is essentially the same for any type of entity and comprises the following five steps:

  1. Identify the risks.
  2. Analyze the likelihood and impact of each.
  3. Prioritize risk based on enterprise objectives.
  4. Treat (or respond to) the risk conditions.
  5. Monitor results and use those to adjust, as necessary.

While these steps are straightforward, every business has unique factors that affect how it should manage and monitor risk. To determine and apply those factors, it is helpful to apply a risk management framework as part of a comprehensive approach to planning, executing and tracking overall management of the various risks.

Figure 1. An effective risk management process requires these five steps.

It's also important to keep in mind that the goal of the risk management process, in the context of a broad framework, is not to completely eliminate all risk but to determine acceptable levels of risk, given your objectives, and then work to keep those risk factors within agreed-upon boundaries. The steps below will help to determine and apply specific actions to do so.

1. Identify risks

The first step is to determine the potential risks themselves. That requires some context: To consider what could go wrong, one needs to begin with what must go right.

Begin the process with a review of your goals and objectives and the various resources or assets that enable them. Risk practitioners often apply a top-down, bottom-up approach to thinking about what might impede those objectives.

The top-down portion considers mission-critical programs that should not be impaired (like sales transactions in a retail store or manufacturing processes in a factory); it then lists the conditions that might impair those programs.

For the bottom-up portion, one can consider various known threat sources (like earthquakes, ransomware attacks or economic downturns) and ponder what impact those might have on the enterprise.

Because risk is, by definition, any uncertainty that affects objectives, a risk is only a risk if it has impact. The more impactful a risk is, the higher the priority. The analysis of that priority will occur in the next step, but first one needs to consider the various risk factors to create a scenario that can be measured.

NIST Interagency Report (NISTIR) 8286A -- "Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM)" -- provides guidance on developing risk scenarios. According to the report, the following four elements are necessary to be present to describe a negative risk (see Figure 2):

  1. a valuable asset or resource that would be impacted;
  2. a source of a threatening action that would act against that asset;
  3. a preexisting condition (or vulnerability) that enables that threat source to act; and
  4. some harmful impact that occurs from the threat source exploiting that vulnerability.

With these building blocks, one can compose a broad set of risk scenarios to be analyzed, sorted and treated. Describing the risk as a scenario helps with communicating the risk conditions and analyzing the likelihood and impact of the risk. It also makes it easier to consider how to respond. An example scenario might be, "The manufacturing plant is affected by a power outage resulting from a tropical storm, disrupting plant operations for several days."

Figure 2. A negative risk is defined as having these four attributes.

While hindsight is never perfect, it provides useful insight into what risk events might occur in the future. In particular, it can be helpful to review headlines about risks that similar businesses have faced, the conditions that enabled them and how the risks impacted the organizations.

Risk categories

In considering various types of risk, it may be helpful to organize them into categories. That categorization enables each type of risk to be considered and tracked by individuals or teams that are familiar with particular topics. For example, the Committee of Sponsoring Organizations of the Treadway Commission, a joint initiative of professional organizations that provides risk management guidance, has suggested that risk can be organized into the following four areas:

  • strategic risk (e.g., reputation, customer relations, technical innovation);
  • financial and reporting risk (e.g., market, tax, credit);
  • compliance and governance risk (e.g., ethics, regulatory, international trade, privacy); and
  • operational risk (e.g., information and technology security and privacy, supply chain, labor issues, natural disasters).

Categories of risks also help to integrate information as managers communicate about, track and adjust risk response. For each risk category, an intentional process for developing the scenarios will ensure that the list is sufficiently comprehensive. Many tools are available to help visualize and evaluate the scenarios. Examples include the following:

The final component of this first step, risk identification, is to record the findings in a risk register. The risk register provides a means of communicating and tracking the various risks throughout subsequent steps. The NISTIR 8286 report cited above provides an example of such a register, along with a sample risk detail template in which to record many of the results of the risk management process steps.

2. Analyze risk likelihood and impact

As noted above, a risk is only a risk if it has impact, so the second step of the risk management process is to analyze how likely it is that a risk will occur and that it will have a measurable impact.

There's a whole science to risk analysis, but essentially this step is a calculation of the probability of a risk event occurring and an estimation of the impact of the consequences if that happened. While there is often an immediate impact, there may be other subsequent consequences, as well, so it is important to consider each of these factors in the calculations. Consider the loss of a laptop containing patient health records -- there will be an immediate property loss, but the loss of that patient information could result in fines, lawsuits and reputational damage that far exceed the cost of the lost device.

Risk analysis should include time factors as a part of the calculation. Financial reporting systems are often considered critical, but during tax preparation time their integrity and availability needs might be particularly important. The frequency of risk events is another time-based factor to consider.

Many organizations use general, or qualitative, terms to express those values. For example, we often use terms such as "high risk" or "low probability" to communicate risk, or perhaps use red-yellow-green color schemes. Organizations may benefit from a more scientific and specific quantitative approach to risk analysis. For example, the Factor Analysis of Information Risk (FAIR) approach, instantiated in the Open Group's OpenFAIR standard, can be used to perform detailed risk calculations that may be more helpful than colors for estimating.

There are dozens of methods to perform both qualitative and quantitative risk analysis, many of which are described in the ISO/IEC (International Electrotechnical Commission) standard 31010, "Risk management -- Risk assessment techniques." That publication points out that the techniques "are used within the risk assessment steps of identifying, analyzing, and evaluating risk as described in ISO 31000, and more generally whenever there is a need to understand uncertainty and its effects."

3. Prioritize based on enterprise objectives

The results of risk analysis enable the risks to be sorted and ranked based on their importance. Since resources are likely to be limited, prioritization helps to highlight those risks that will be most likely and most impactful. Reflecting these results in a risk map helps to visualize the relative importance of each risk and may also be helpful in sharing risk observations with other stakeholders -- particularly those who may be providing (or authorizing) resources to respond to those risks.

While the initial prioritization of risks may be based on the combination of likelihood and impact, the final ranking might be influenced by factors that are important to those stakeholders. For example, if leadership has expressed that customer trust is a key value for the enterprise, then risks that might impact customers could be highlighted.

4. Treat risks in a cost-effective manner

With a prioritized list of risks in place, the next step is to evaluate the options available to treat those risks and apply various methods and controls to achieve an acceptable level of risk. There are several options available to do so, including the following:

  • If the risk, based on leadership's risk appetite, is already at an acceptable level, no further treatment is necessary.
  • If it is possible to share some of the impact with another entity (e.g., an insurance firm, an external service provider), then some of the risk may be transferred in that manner.
  • Where practical, various management, technical and administrative risk controls may be applied that will help reduce the likelihood or impact of each risk to an acceptable level.
  • If none of these risk response methods can be applied, then risk managers must avoid the risk by eliminating the activities or exposures that would enable the scenario being considered.

It is important to be sure that the methods applied are both effective and cost-effective. This approach explains why a bank might use a 20-cent chain to protect an ink pen and a million-dollar vault to protect its cash reserves. The resources required to treat the risk should be commensurate with the assets being protected.

5. Monitor risk management results

Even after each of the above steps, it is important that results be tracked and monitored to ensure that risks remain within the limits established by the organization's leaders. Risk conditions can change rapidly, asset values can fluctuate and stakeholder preferences can change. A critical part of monitoring is ensuring that managers and senior leaders are informed about progress toward risk goals and changes that might have organizational impact. The cycle is similar to the PDSA (Plan-Do-Study-Act) cycle popularized by Dr. W. Edwards Deming, enabling continual improvement of the risk management process. As various teams throughout the organization take actions to identify, analyze and respond to risk, the results inform and refine the next iteration.

Conclusion

Through application of these steps, in the context of a broader framework of governance and management, organizations can consistently identify those risks that are likely to have a harmful impact, then prioritize cost-effective treatment and monitor the results to maintain continual improvement.