Search Risks (Threats)

The Search Risks (Threats) page allows you to search the company database for past and existing threats.  The database consists of data from open and closed projects across multiple business units.  This gives you the ability to analyze all risks and see if they apply to your current project.  If you find a threat or opportunity that you want to copy, you have the option to include the mitigation plan/step(s) and edit the risk data before copying them over to the selected project.  The Qualitative Score Fields and User Defined Fields will not be copied over since every project is different when it comes to these fields.  If the project is not selected the access privileges will correspond to the selected threat’s project.  Only threats of projects whose classified field is set to No will be displayed in the Search Risks section.

 

search_risk_threat

Figure 1

 

Navigate Page:

There is an option placed at the top of the page to navigate from one page to another.  To navigate to Search Risk (Opportunities), click the Opportunities radio button shown in Figure 1.

 

Search:

The Search function allows the user to search for a threat based on a keyword.  This method is faster when you are working with large amount of data.  Threat details can be searched even if the project is not selected.  If the project is not selected the fields correspond to the selected threat’s project.

 Steps:

  1. Risk Register —> Search Risks —> Threats
  2. Click the Search button.  (Figure 1)
  3. Enter the search keyword (which can be the ID or name) and click the Search button and select the required threat.  (Figure 2)

 

search_risk_threat_search

Figure 2

 

To Filter the search area contents

Steps:

  1. Select the required column.  (Figure 2)
  2. Enter the value based on which filtering is to be done.  (Figure 2)
  3. Click the Filter button.  (Figure 2)

To Sort the data

  1. Select the required column.  (Figure 2)
  2. Select the order (Ascending/Descending) in which sorting is to be done.  (Figure 2)
  3. Click the Sort button to sort the data in the search area.  (Figure 2)

    To reset the details for filter and sort fields, click the Reset button.  (Figure 2)

 

User Defined Fields Section:

Any user defined or custom field will be shown in this section.  There is no limit to the number of user defined fields. In Search Risks (Threats) even though user defined fields are visible they cannot be copied to the current project.

User Defined Fields are added as follows:

Project settings —> Custom Fields

 

Risk Notes Section:

The Risk notes added from Risk Details (Threats) or Spreadsheet View (Threats) are visible in this section.  The user cannot add or edit risk notes from Search Risks (Threats).

 

Recovery Plan Section:

The Recovery Plan section is used to document what will be done if a mitigation is not successful and the risk event does occur.  It also documents the steps the team should be prepared to take if the risk becomes a reality.  If a Recovery plan has been added to the selected threat it will be visible in this section.  Users cannot add or edit the recovery plan from Search Risks (Threats).

 

Closure Section:

The Closure Section is used for documenting the actual impact of the risk event on the project.

 

Qualitative Score Section:

Qualitative Score fields include Probability, Cost, Schedule and Additional Impacts, if any.  (Figure 1)  These fields are used to set the pre-mitigated score.  If Probability and impacts have a value of either Undefined or No Risk, the risk score will be zero.  Even though the risk score of a selected threat is visible it cannot be copied to the selected project.

 

Data Mapping Section:

The Data Mapping section shows which Breakdown structure the selected threat is mapped to, and at what level (Project, Business Unit, or Enterprise).  It is not required to map data, but it will be useful when the time comes to report at the portfolio level.

Project Organizational Breakdown Structure, Project Work Breakdown Structure and Project Risk Breakdown structure details are added from the page:

Project Settings —>Project Breakdown Structure

Business Organizational Breakdown Structure, Business Work Breakdown Structure, Business Risk Breakdown structure, Enterprise Organizational Breakdown Structure, Enterprise Risk Breakdown structure, Enterprise Work Breakdown Structure are added from the page:

Portfolio Management —> Manage Breakdown Structure

Enterprise Risk details are added from the page:

Portfolio Management —> Reports —> Enterprise Risk List

 

To Map data:

Steps:

  1. Click the map data link to map data for the corresponding field.  (Figure 1)
  2. Select the required data from the select box.  (Figure 3)
  3. Click the Select WBS button (if Work Breakdown Structure), Select OBS button (if Organizational Breakdown Structure), Select RBS button (if Risk Breakdown Structure) to finish.  (Figure 3)

The step described above applies to all Organizational Breakdown Structure, Work Breakdown Structure and Risk Breakdown Structure fields.

 

search_risk_break_down

Figure 3

 

To search for a particular value (Figure 3), enter the value and click the Search button.  To list all the values available click the Show All button.

Mitigation Details:

Users can track their Mitigation Plan or individual mitigation steps.  The mitigation plan is a compilation of the individual steps below it.  The mitigation plan cost is rolled up from the cost of each mitigation step.  Tracking mitigation steps creates accountability when the step owner and planned dates are tracked.  Reports can be generated to identify all mitigation steps that are currently behind schedule.

The qualitative and quantitative scoring fields (Probability, Cost, Schedule, etc.) in the mitigation steps represent the residual risk that remains after a mitigation step is completed.  The goal is to mitigate a risk until it is gone, however often this is not possible.  It is important to document any residual risk that cannot be removed for the benefit of the project team and the accuracy of Monte Carlo simulations.  Any graph that highlights a post-mitigated score will focus on the residual risk after all mitigation steps have been completed.  The status of a mitigation step and the actual dates should be updated as the steps are started and finished.  There is an option not to copy both mitigation plan and steps or mitigation steps alone to the selected project.

If you do not want to copy both mitigation plan and steps to the selected project, click Do not Copy Mitigation Plan & Steps checkbox shown in Figure 4.  If you do not want to copy just the mitigation steps, click the checkbox under the Do not Copy this Step column in Figure 5.

 

search_risk_miti_plan

Figure 4

search_risk_miti_spreadsheet

Figure 5

 

Copy To Current Project:

This functionality is used to copy a selected threat to the selected project.

Steps:

  1. Risk Register —> Search Risks —> Threats
  2. Select the required threat.
  3. Click the Copy To Current Project button to copy the selected threat to the current project.  (Figure 1)