All language subtitles for KU PMGT 823 Session 3 (Part A)-Identifying Risks Process
Afrikaans
Akan
Albanian
Amharic
Arabic
Armenian
Azerbaijani
Basque
Belarusian
Bemba
Bengali
Bihari
Bosnian
Breton
Bulgarian
Cambodian
Catalan
Cebuano
Cherokee
Chichewa
Chinese (Simplified)
Chinese (Traditional)
Corsican
Croatian
Czech
Danish
Dutch
English
Esperanto
Estonian
Ewe
Faroese
Filipino
Finnish
French
Frisian
Ga
Galician
Georgian
German
Greek
Guarani
Gujarati
Haitian Creole
Hausa
Hawaiian
Hebrew
Hindi
Hmong
Hungarian
Icelandic
Igbo
Indonesian
Interlingua
Irish
Italian
Japanese
Javanese
Kannada
Kazakh
Kinyarwanda
Kirundi
Kongo
Korean
Krio (Sierra Leone)
Kurdish
Kurdish (SoranĂ®)
Kyrgyz
Laothian
Latin
Latvian
Lingala
Lithuanian
Lozi
Luganda
Luo
Luxembourgish
Macedonian
Malagasy
Malay
Malayalam
Maltese
Maori
Marathi
Mauritian Creole
Moldavian
Mongolian
Myanmar (Burmese)
Montenegrin
Nepali
Nigerian Pidgin
Northern Sotho
Norwegian
Norwegian (Nynorsk)
Occitan
Oriya
Oromo
Pashto
Persian
Polish
Portuguese (Brazil)
Portuguese (Portugal)
Punjabi
Quechua
Romanian
Romansh
Runyakitara
Russian
Samoan
Scots Gaelic
Serbian
Serbo-Croatian
Sesotho
Setswana
Seychellois Creole
Shona
Sindhi
Sinhalese
Slovak
Slovenian
Somali
Spanish
Spanish (Latin American)
Sundanese
Swahili
Swedish
Tajik
Tamil
Tatar
Telugu
Thai
Tigrinya
Tonga
Tshiluba
Tumbuka
Turkish
Turkmen
Twi
Uighur
Ukrainian
Urdu
Uzbek
Vietnamese
Welsh
Wolof
Xhosa
Yiddish
Yoruba
Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,160 --> 00:00:04,860
Hi everyone and welcome back to PMGT
823.
2
00:00:05,260 --> 00:00:09,240
In today's session, we will focus on one
of the most important stages in risk
3
00:00:09,240 --> 00:00:11,300
management, that is identifying risk.
4
00:00:11,660 --> 00:00:13,280
This is where everything begins.
5
00:00:13,520 --> 00:00:17,080
If we don't know what risks we are
facing, we cannot manage them
6
00:00:17,480 --> 00:00:21,620
So in this session, we will explore how
to identify potential risks in a
7
00:00:21,620 --> 00:00:22,920
structured, thoughtful way.
8
00:00:23,140 --> 00:00:26,380
We will use proven tools, examples, and
a case study.
9
00:00:26,720 --> 00:00:28,320
So let's get started together.
10
00:00:37,580 --> 00:00:41,480
Alright, let's dive into Part A of
Module 3, the process of identifying
11
00:00:41,660 --> 00:00:45,500
In this section, we will walk through
the steps that usually project teams
12
00:00:45,500 --> 00:00:49,260
to recognize and document potential
risks before they become problems.
13
00:00:50,080 --> 00:00:54,620
Understanding this process is key to
managing uncertainty in any project, and
14
00:00:54,620 --> 00:00:57,580
is one of the most foundational skills
in project risk management.
15
00:00:57,920 --> 00:01:02,020
So let's take a closer look at how this
process works in real -world project
16
00:01:02,020 --> 00:01:03,020
settings.
17
00:01:06,030 --> 00:01:07,870
Now let's get into the process itself.
18
00:01:08,510 --> 00:01:12,690
Identifying risks is actually the second
step in project risk management, and it
19
00:01:12,690 --> 00:01:13,690
is a critical one.
20
00:01:13,850 --> 00:01:18,590
In this step, we aim to identify both
individual risks and the overall source
21
00:01:18,590 --> 00:01:19,870
uncertainty in a project.
22
00:01:20,170 --> 00:01:23,270
What is important here is not just
listing risk randomly.
23
00:01:23,550 --> 00:01:28,110
We are documenting their
characteristics, potential causes, and
24
00:01:28,110 --> 00:01:29,150
impact our objectives.
25
00:01:30,040 --> 00:01:34,420
as shown in this diagram we will use
specific inputs like the project
26
00:01:34,420 --> 00:01:39,760
plan and historical data and apply tools
like brainstorming interviews and root
27
00:01:39,760 --> 00:01:45,100
cause analysis and generate key outputs
such as the risk register we will break
28
00:01:45,100 --> 00:01:47,300
this down together throughout the next
slide
29
00:01:52,000 --> 00:01:56,060
deeper into risk identification it is
important to recognize the range of
30
00:01:56,060 --> 00:02:01,120
we are looking for this process is not
just about spotting isolated issues it
31
00:02:01,120 --> 00:02:05,020
includes identifying broader sources of
uncertainty that can affect the whole
32
00:02:05,020 --> 00:02:09,400
project we are aiming to capture both
individual risks such as a delayed
33
00:02:09,400 --> 00:02:13,680
shipment or a miscommunication with a
vendor and systemic risks such as
34
00:02:13,680 --> 00:02:18,540
organizational culture or unclear rules
that can amplify uncertainty over time
35
00:02:19,340 --> 00:02:24,160
Clear documentation at this stage lays
the foundation for effective analysis
36
00:02:24,160 --> 00:02:26,520
a well -targeted risk response that
comes later.
37
00:02:29,960 --> 00:02:32,720
Risk identification isn't a solo
activity.
38
00:02:33,020 --> 00:02:36,540
It is a collaborative process that
brings together people from different
39
00:02:36,540 --> 00:02:40,940
perspectives. Of course, the project
manager and project team members are at
40
00:02:40,940 --> 00:02:45,720
center of this. But ideally, we also
involve customers, end users, and
41
00:02:45,720 --> 00:02:49,420
matter experts who can help us but risk
that we might overlook.
42
00:02:49,840 --> 00:02:54,520
Even people outside the core team like
other project managers or operations
43
00:02:54,520 --> 00:02:56,920
managers can offer valuable insight.
44
00:02:57,280 --> 00:03:01,720
It is important that all stakeholders be
encouraged to speak up about potential
45
00:03:01,720 --> 00:03:05,120
risks, especially those tied to their
own areas of expertise.
46
00:03:05,460 --> 00:03:09,780
But at the same time, we should never
rely too heavily on SMEs.
47
00:03:14,000 --> 00:03:17,900
One important thing to keep in mind is
that risk identification isn't a one
48
00:03:17,900 --> 00:03:18,659
-time task.
49
00:03:18,660 --> 00:03:22,320
It is an iterative process that
continues throughout the project
50
00:03:23,020 --> 00:03:28,100
As project evolves, new risks may
emerge, and our understanding of
51
00:03:28,100 --> 00:03:29,420
risks may also change.
52
00:03:29,640 --> 00:03:32,720
That's why ongoing monitoring on risk is
very essential.
53
00:03:33,450 --> 00:03:38,170
The frequency of risk identification and
who participates in each cycle or phase
54
00:03:38,170 --> 00:03:43,650
depends on the project size, complexity,
and risk profile, and it should all be
55
00:03:43,650 --> 00:03:45,490
defined in our risk management plan.
56
00:03:46,250 --> 00:03:48,590
As you can see in the diagrams below,
57
00:03:49,320 --> 00:03:52,860
This applies across both waterfall and
agile approaches.
58
00:03:53,140 --> 00:03:57,620
In both cases, risk identification needs
to happen regularly, not just at the
59
00:03:57,620 --> 00:04:02,600
start of the project. So remember, risk
identification isn't a box to check. It
60
00:04:02,600 --> 00:04:03,600
is a habit to maintain.
61
00:04:07,120 --> 00:04:11,840
To identify risks effectively, we need
solid information, and here we outline
62
00:04:11,840 --> 00:04:14,020
where that information usually comes
from.
63
00:04:14,700 --> 00:04:19,040
first we rely on project management plan
especially components like schedule
64
00:04:19,040 --> 00:04:24,480
cost and risk management plans these
give us context and structure then we
65
00:04:24,480 --> 00:04:29,760
baselines like wbs schedule and cost
baselines which helps us spot where
66
00:04:29,760 --> 00:04:35,120
might go off track project documents
such as assumption log and issue log
67
00:04:35,120 --> 00:04:37,180
contains clues about potential risks
68
00:04:38,250 --> 00:04:42,510
Contracts and agreements are another key
area. Look for hidden risks in
69
00:04:42,510 --> 00:04:45,750
milestone dates, penalties, or vague
terms in contracts.
70
00:04:46,170 --> 00:04:51,210
We also use procurement documentation
and also enterprise environmental
71
00:04:51,210 --> 00:04:57,030
like industry reports and organizational
process assets like lessons learned and
72
00:04:57,030 --> 00:04:58,510
templates from past projects.
73
00:05:01,470 --> 00:05:05,010
Let's take a quick look at the main
categories of risks you will likely
74
00:05:05,010 --> 00:05:06,110
encounter in a project.
75
00:05:06,760 --> 00:05:10,540
First, we have scope risks. These relate
to things like unclear requirements,
76
00:05:10,940 --> 00:05:13,240
technology challenge, or unrealistic
capabilities.
77
00:05:13,680 --> 00:05:18,620
Then there are change and defect risks,
often tied to evolving specifications or
78
00:05:18,620 --> 00:05:19,620
quality issues.
79
00:05:19,760 --> 00:05:24,480
We also have schedule risks, which can
stem from inaccurate time estimates or
80
00:05:24,480 --> 00:05:25,540
unreliable suppliers.
81
00:05:25,940 --> 00:05:28,120
And finally, resource risks.
82
00:05:28,350 --> 00:05:32,490
which include anything from staffing
shortage or missing equipment or
83
00:05:32,490 --> 00:05:36,850
facilities. These categories help us
organize our thinking and guide the
84
00:05:36,850 --> 00:05:41,130
identification process, and we will
explore each of them more in the
85
00:05:41,130 --> 00:05:42,130
sections.
86
00:05:44,830 --> 00:05:48,990
When it comes to identifying risk,
sometimes the hardest part is knowing
87
00:05:48,990 --> 00:05:49,869
to start.
88
00:05:49,870 --> 00:05:53,210
Here we have a list of great sources to
help generate ideas.
89
00:05:53,450 --> 00:05:58,580
For example, industry and government
databases often provide risk checklists,
90
00:05:58,580 --> 00:06:03,940
case studies published articles or
professional societies like PMI can
91
00:06:03,940 --> 00:06:08,860
-to -date insight from across the field
don't forget about looking sideways at
92
00:06:08,860 --> 00:06:14,800
your competitors what risks have they
encountered and internally your
93
00:06:14,800 --> 00:06:19,940
suppliers team members and even
management are all valuable voices in
94
00:06:19,940 --> 00:06:25,710
potential risks the key message here is
that don't try to do this alone There is
95
00:06:25,710 --> 00:06:30,250
a wealth of information already out
there, and you just need to know where
96
00:06:30,250 --> 00:06:31,250
start.
97
00:06:33,350 --> 00:06:37,410
When it comes to identifying risks,
there's not just one way to do it. As
98
00:06:37,410 --> 00:06:38,910
can see, we have a whole toolkit
available.
99
00:06:39,510 --> 00:06:43,550
It often starts with expert judgment,
tapping into people who have seen
100
00:06:43,550 --> 00:06:46,270
projects before and know where teams can
go wrong.
101
00:06:46,970 --> 00:06:51,370
We also use a range of data gathering
techniques like brainstorming,
102
00:06:51,370 --> 00:06:52,370
and interviews.
103
00:06:52,970 --> 00:06:56,650
Tools like the affinity diagram help
organize those ideas visually.
104
00:06:57,030 --> 00:07:01,630
Then comes data analysis, including root
cause analysis and SWOT.
105
00:07:01,910 --> 00:07:05,590
These can help us dig deeper into what's
driving potential risks.
106
00:07:06,130 --> 00:07:10,270
Don't underestimate the power of
interpersonal and team skills or simply
107
00:07:10,270 --> 00:07:13,910
up structured meetings to gather
insights from stakeholders.
108
00:07:17,770 --> 00:07:21,610
After we identify risks, the next step
is to make sure everything is documented
109
00:07:21,610 --> 00:07:26,730
properly, and that's where these outputs
come in. The assumption log captures
110
00:07:26,730 --> 00:07:31,050
the assumptions and constraints that may
influence risks, and it is updated as
111
00:07:31,050 --> 00:07:32,210
new insights emerge.
112
00:07:32,670 --> 00:07:37,290
The issue log is used to track problems
as they arise, whether they are project
113
00:07:37,290 --> 00:07:41,330
-related or risk -related, and it
evolves as the situation changes.
114
00:07:42,000 --> 00:07:45,940
Then we have the risk register, which is
really the heart of risk documentation.
115
00:07:46,420 --> 00:07:50,480
It includes all identified risks, along
with important information like
116
00:07:50,480 --> 00:07:53,000
probability, impact, and assigned risk
owners.
117
00:07:53,300 --> 00:07:55,460
And finally, the risk report.
118
00:07:55,720 --> 00:07:59,900
The risk report gives a high -level view
of the most significant risks and any
119
00:07:59,900 --> 00:08:01,780
conclusions we have drawn through this
analysis.
120
00:08:04,920 --> 00:08:08,280
Now let's zoom in on one of the most
important outputs from the risk
121
00:08:08,280 --> 00:08:10,660
identification process, that is the risk
register.
122
00:08:11,420 --> 00:08:15,260
Once risks are identified, they are
recorded here at initial entry.
123
00:08:15,580 --> 00:08:17,740
But this document isn't static.
124
00:08:17,980 --> 00:08:22,620
It grows and evolves over time. At this
stage, your register should include a
125
00:08:22,620 --> 00:08:26,900
list of identified risks, probability
and impact of each, possible response
126
00:08:26,900 --> 00:08:30,300
strategies, root causes, and any updates
to your risk categories.
127
00:08:30,860 --> 00:08:35,340
This register becomes a central place
for tracking and managing risks
128
00:08:35,340 --> 00:08:36,460
the entire project.
129
00:08:40,270 --> 00:08:44,049
Here you can see a more detailed example
of what a real -world risk register can
130
00:08:44,049 --> 00:08:47,390
look like. This one is modeled after a
PMI style format.
131
00:08:47,910 --> 00:08:51,490
As you can see, it includes much more
details than just a list of risks.
132
00:08:51,750 --> 00:08:55,990
It tracks information across the entire
project lifecycle, from identification
133
00:08:55,990 --> 00:08:58,290
through analysis, planning, and
monitoring.
134
00:08:58,950 --> 00:09:02,830
As you can see, it includes crucial
information about each identified risk.
135
00:09:03,580 --> 00:09:07,900
What is important here is that this
register isn't just a document. It is a
136
00:09:07,900 --> 00:09:12,160
leading tool used to guide decision
making and keep the project team aligned
137
00:09:12,160 --> 00:09:13,260
risk responses.
138
00:09:14,240 --> 00:09:18,000
Soon we will see a sample of how it can
be applied in a real project.
139
00:09:21,640 --> 00:09:25,660
This is a sample risk register report
which expands on the risk register by
140
00:09:25,660 --> 00:09:27,980
offering a more detailed structured
summary.
141
00:09:28,220 --> 00:09:33,460
It includes things like task titles,
dates, descriptions, risk scores,
142
00:09:33,460 --> 00:09:34,560
and mitigation actions.
143
00:09:35,000 --> 00:09:38,540
As you can see, all of them are laid out
in a formal reporting format.
144
00:09:38,800 --> 00:09:42,440
This kind of report is especially useful
for communicating with senior
145
00:09:42,440 --> 00:09:47,000
stakeholders or sponsors who want a
clear snapshot of where risks stand.
146
00:09:47,710 --> 00:09:51,990
Notice how risks are categorized by
impact level and supported with
147
00:09:51,990 --> 00:09:57,170
strategies. This helps project leaders
quickly focus on what needs attention
148
00:09:57,170 --> 00:09:58,170
why.
149
00:10:00,870 --> 00:10:05,130
And that brings us to the end of Part A
of our session on identifying project
150
00:10:05,130 --> 00:10:09,370
risks. If you have any questions or need
clarification on anything we covered,
151
00:10:09,590 --> 00:10:13,130
feel free to reach out, and when you are
ready, please continue to Part B.
152
00:10:13,290 --> 00:10:15,190
Thanks again for watching this video.
14339
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.