Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Defense Logistics Information Service
Risk Management Plan (RMP)
Seven Domains of a Typical IT Infrastructure
"The process involved with identifying, analyzing, and responding to risk. It includes maximizing the results of positive risks and minimizing the consequences of negative events"
By: Sean Rowe
David McKee
Troy Jones
" It's not "if" it's "when!"
Probability and Impact Matrix
Why do we Manage Risk?
Probability Scale
Impact Scale
Likelihood of Occurrence
Likelihood Class
Consequence
Extreme =
Fatal damage is expected
High =
Severe damage or potential damage
Improved probability of success/ optimum project.
Project can be cut short because of risk level.
Moderate =
Lost time or some potential down time, small risk
<0.01% chance
0.01 -0.1% chance
0.1-1% chance
1 - 10% chance
>10% chance
Not Likely (NL) =
Low (L) =
Moderate (M) =
High (H) =
Expected (E) =
Low =
Small risk or little damage
Negligible =
No concern
Probability and Impact Plots
Identify Risks
Tools & Techniques
Use the six risk mangement processes:
Inputs
Outputs
Risk Register
Perform Quantitative Risk Analysis
Tools & Techniques
Inputs
Information Gathering Techniques
Risk Register
Risk Management Plan
Cost Management Plan
Schedule Management Plan
Organizational Process Assets
Tools & Techniques
Outputs
Planning Meetings and Analysis
Risk Register Updates
Outputs
Plan Risk Responses
Inputs
Risk Management Plan
Outputs
Tools & Techniques
Inputs
Risk Register
Risk Management Plan
Risk Register Updates
Risk-related Contract Decisions
Project Management Plan Updates
Diagramming Techniques
Testing
Time
Project Prioritization
Product Delivered
Late
Computer Incident Response Team Plan
Types of Incidents to the organization:
Materials
Personnel
Bad Specs
Insufficient
Resources
DoS Attack- Prevents system or network from providing a service
Effect
Potential Causes
Malware- Malicious software (viruses, worms, mobile code and Trojan horses
Unauthorized Access- Person who gains access to resources even though it may be accidental
Inappropriate Usage- Users violate internal policies and could result in lost of money to the organization
Strategies
Risk Register
Updated risk categories
Positive Risk ( Opportunities)
Negative Risks ( or Threats)
Perform Qualitative Risk Analysis
Monitor and Control Risks
Inputs
Tools & Techniques
Outputs
Inputs
Risk Register
Risk Management Plan
Project Scope Statement
Organizational Process Assets
Risk Register Updates
Organizational Process Assets
Change Request
Project Management Updates
Project Document Updates
Outputs
Risk Register Updates
Risk Register
Project Management Plan
Work Performance Information
Performance Reports