How to Identify Risks In Your Project

Identifty Risks processTodd planned for a weekend camping trip with his friends. They planned the route, camping gear, compass, sleeping bags, food, beer, but overlooked one important risk associated with such trips.

Todd and his friends partied into the night, enjoyed the camp-fire, and went to sleep well after mid-night. And a grizzly bear decided to say hello in the wee hours of morning.

When an unplanned risk materializes, it can cripple the project or bring it to a grounding halt.

Identifying risks is one of the easiest processes, in a way. Our minds are wired to look for things that can go wrong, and that is what required for this process. Only caution to be exercised is to keep things in the realm of practicality.

This is also where maximum effort needs to be invested. The project manager needs to involve as many stakeholders as possible in the risk identification meetings.

Who identifies risks?

It could be the same team that worked on risk planning. Or it can be the team and few more people that know about the project and/or have experience working with similar project. Some organizations have risk management experts to help project teams identify risks.

Involving the team increases a sense of ownership in them. Also, when team actively thinks about risks they develop a mental frame that helps them deal with the risks in case they materialize.

How do we go about identifying risks?

First of all what we need is the Risk management plan.

How do we identify a risk involved with any work that you want to do?

By analyzing that work carefully.

For instance, risks involved with Mount Everest expedition are identified by analyzing climbing techniques, equipment and mountaineering gears used, health of climbers, support systems and weather condition.

On a project, things can go wrong in project costing, its scope, schedule or quality.

Hence these must be studied closely, and analyzed carefully to identify risks. Therefore, we need scope, cost, and schedule baseline. We also need cost, schedule, and quality management plans to carefully study. There may be risks associated with people hired for the project, either with their availability or skillset, hence resource management plan becomes an input.

Activity cost estimates and duration estimates are to be looked at to see whether they seem sufficient to complete the tasks. If team feels that some of them are not sufficient then they are considered to be risks.

If the team identifies cost or duration estimates of any activity on the critical path to be risky, it heightens overall project risk. This is because if an activity on the critical path slips, entire project slips.

Some of the stakeholders have good knowledge about the project and/or domain, and involving them in risk identification exercise will be beneficial. You would need stakeholders register to identify such stakeholders.

Some of the useful project documents are assumptions log and work performance reports.

Procurement documents describe the work sourced out to another organization. These will help you understand risk involved with that work, based on its complexity and dependability with the work your team is doing. For instance, if deliverable from seller is delayed by a week (if there is no buffer in place) what risk will it pose for project dates?

We already understand from earlier processes why organizational process assets and enterprise environmental factors as important. The former can help you with lessons learned, risk documentation formats and templates, the latter can give you published checklists, commercial risk databases and risk attitude.

How do we do this?

Documentation reviews is about closely reviewing all project documents such as plans, contracts, contracts, written assumptions and so on we considered during inputs. Look for inconsistencies amongst them and if found identify the risks.

  • Brainstorming is a group technique which is done under a facilitator. Multiple groups can brainstorm independently and identify risks. With this exercise risk categories, scale, definitions can also be updated. Nominal group technique, explained as part of Collect requirements process, also can be used to identify risks.
  • Delphi technique is a ‘collective intelligence’ principle based method which means that decisions from a structured group of experts are more accurate than decisions from individuals. It is explained as part of Collect Requirements process.

This is driven by a facilitator and need not be done by putting all experts in one room. Often means of communication such as mails are employed by facilitator. She first sends the questions to the group of experts and seeks their feedback. She then collates them, removes everyone’s names against their feedback and circulates back with the group.

Once a consensus nears (or based on number of rounds) the narrowed down decision is taken as final. Anonymity is important here to avoid bandwagon effort or halo effect, which may influence each other’s feedback.

  • Interviewing is quite useful as you tap into people’s understanding of the project and issues, and unearth risks.
  • Root cause analysis is about studying a problem, investigating the root causes and identifying preventive actions.

Checklist analysis is about analyzing check lists available in the system. Lowest level of Risk Breakdown Structure can also be considered as a checklist to assess risks. Checklists can never be exhaustive so this approach is a bit limited in this respect.

Assumptions analysis is just that – looking closely at all assumptions made in subsidiary plans, cost and duration estimates and project documents and then checking if they hide any potential risks.

Cause and effect diagrams are also called Ishikawa diagrams or Fishbone diagrams. These are used to identify potential factors causing an effect.

Example: Kathy from Landscaping project analyzed a defect found in the jogging track –

Fishbone diagram
Figure: Fishbone diagram

Influence diagrams are decision diagrams used to model a decision situation showing the factors that influence decision. This makes it easy to understand all influencing factors and take informed decision.

Checklist analysis is about analyzing check lists available in the system. Lowest level of Risk Breakdown Structure can also be considered as a checklist to assess risks. Checklists can never be exhaustive so this approach is a bit limited in this respect.

SWOT analysis is a structured planning method making use of Strengths, Weaknesses, Opportunities and Threats involved in an environment, in order to make most of it. While first two are internal factors, last two are external (in the environment) factors. SWOT analysis is done for the entire project from a holistic perspective.

SWOT analysisFigure: SWOT analysis. Image courtesy: Wikipedia

Then there are prompt lists.

What is a prompt list?

A prompt list is sort of a memory aid. An acronym that stands for predefined risk categories are quite useful.

Consider these –

PESTLE stands for Political, Economical, Social, Technological, Legal, Environmental. Simply focusing on these categories may unearth many risks that otherwise we may miss.

The other one to consider is VUCA, which stands for Volatility, Uncertainty, Complexity, Ambiguity.

Similarly, TECOP stands for Technical, Environmental, Commercial, Operational, Political.

What do we get?

Risk register is the sole output of Identify Risks process. This also is the starting point of this document. And during other risk management processes risk information in it gets elaborated/refined/modified.

Risk register contains list all identified risks, their root causes, potential responses, persons assigned for risk and other similar details as needed by the project.

You don’t really need to identify potential responses to risks during this process. It is actually part of Plan Risk Responses process. However, sometimes responses become apparent while analyzing root causes, in which case you just log them.

Simple risk registerFigure: Sample risk register, that Kathy may come up with for her Landscaping project

Risk report is another document created during this process, and updated or refined throughout the project. Especially during risk analysis exercise.

This is a summary presentation of overall project risk and individual risks. The format of the risk report is included in the risk management plan.

How often are risks identified?

One of the possible risks while driving a car is possibility of an accident. To avoid it we keep checking certain things, consciously or unconsciously, such as speed of the car in relation to traffic, presence of potholes, obstacles or slippery liquids on the road, level of gas in the car, and engine temperature. And we do it throughout the drive.

Similarly, we need to keep revisiting risk register regularly during project execution to assess current risks or identify new ones. As project moves through phases different type of risks may be discovered.

It is best to tag these planning meetings to milestones, such as delivery of module or phase, so that identification of risks become a regular exercise among project activities.

Now that we have identified the potential risks on the project, it is time to analyze them – first qualitatively and then quantitatively. Let’s get down to do it now.

like the post


<-- Liked this post? Help your friends by sharing this using social network buttons. Thanks for being awesome!

OSP sidebar


PMP Study Books

Help Run This Blog At No Cost To You.. Use this box to search and purchase your stuff on Amazon. Thanks!

{ 1 comment… add one }
  • Anitha M September 27, 2018, 10:50 am

    Thank you very much, Its very easy & simple to remember the concepts.

Share via