Outcomes
    As a result of successful implementation of this process:
 
    - 
        All of the activities carried out within IT support the desired risk posture while providing the maximal benefit
    
 
    - 
        The business and IT are able to appropriately respond to threats and opportunities
    
 
    - 
        Minimal risk exists in the fulfillment of fiduciary responsibilities to stakeholders of the business
 
     
 
    Scope
    This process provides the overall framework in which risks are handled. Other processes within IT work in conjunction
    with this process to ensure that specific risk areas are adequately responded to and covered.
 
    Risks occur from a variety of internal and external sources, and cover the range of strategic, tactical, and
    operational activities. Consideration of risk covers the potential opportunity from a risk outcome happening in
    addition to the more traditional consideration of possible downside outcomes.
 
    
        Includes
    
    
        - 
            External risk sources1 such as: 
            
                - 
                    Financial: Interest rates, foreign exchange, credit
                
 
                - 
                    Strategic: Competition, industry and customer changes, mergers and acquisition integration
                
 
                - 
                    Operational: Regulations, Culture, Board Composition
                
 
                - 
                    Hazard: Natural events, environment, contracts
                
 
             
         
        - 
            Internal risk sources: 
            
                - 
                    Employees
                
 
                - 
                    Information systems
                
 
                - 
                    Accounting controls
                
 
                - 
                    Cash flow
                
 
                - 
                    Research and development
                
 
                - 
                    Facilities
                
 
             
         
        - 
            Risk workshops
        
 
        - 
            Mitigation strategies
        
 
     
    
        Excludes
    
    
        - 
            Identification of compliance requirements and controls (Compliance Management)
        
 
        - 
            Security-specific risk management (Security Management), though overall decision making is part of this process
        
 
        - 
            Implementation and operation of the recommended risk controls (responsibility of the target IT processes)
        
 
        - 
            Business Continuity Management (Business responsibility in conjunction with IT Service Continuity
            Management) 
        
 
     
 
    Key performance indicators
    - 
        Number of identified risks
    
 
    - 
        Average risk probability
    
 
    - 
        Average probability of top 100 risks
    
 
    - 
        Number of implemented controls
    
 
    - 
        Number of controls implemented on an emergency basis
    
 
 
    Relation to other processes
    - 
        Project proposals must be assessed for risks before initiating projects (Program and Project Management). In addition, programs and projects are
        monitored for risks in an ongoing manner. 
    
 
    - 
        New solutions are assessed for risks before completion (Solution Analysis and Design). 
    
 
    - 
        Identified risks are important for creating the Security Policy (Security Management). Security reports also provide a basis for assessing the effectiveness of controls. 
    
 
 
    For more information
    For more information, see Risk Management in the ITIL® documentation. 
     
 
     1Taken from A Risk Management Standard. The Institute of Risk Management. 2002
  |