All language subtitles for KU PMGT 823 Session 3 (Part A)-Identifying Risks Process

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (SoranĂ®)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,160 --> 00:00:04,860 Hi everyone and welcome back to PMGT 823. 2 00:00:05,260 --> 00:00:09,240 In today's session, we will focus on one of the most important stages in risk 3 00:00:09,240 --> 00:00:11,300 management, that is identifying risk. 4 00:00:11,660 --> 00:00:13,280 This is where everything begins. 5 00:00:13,520 --> 00:00:17,080 If we don't know what risks we are facing, we cannot manage them 6 00:00:17,480 --> 00:00:21,620 So in this session, we will explore how to identify potential risks in a 7 00:00:21,620 --> 00:00:22,920 structured, thoughtful way. 8 00:00:23,140 --> 00:00:26,380 We will use proven tools, examples, and a case study. 9 00:00:26,720 --> 00:00:28,320 So let's get started together. 10 00:00:37,580 --> 00:00:41,480 Alright, let's dive into Part A of Module 3, the process of identifying 11 00:00:41,660 --> 00:00:45,500 In this section, we will walk through the steps that usually project teams 12 00:00:45,500 --> 00:00:49,260 to recognize and document potential risks before they become problems. 13 00:00:50,080 --> 00:00:54,620 Understanding this process is key to managing uncertainty in any project, and 14 00:00:54,620 --> 00:00:57,580 is one of the most foundational skills in project risk management. 15 00:00:57,920 --> 00:01:02,020 So let's take a closer look at how this process works in real -world project 16 00:01:02,020 --> 00:01:03,020 settings. 17 00:01:06,030 --> 00:01:07,870 Now let's get into the process itself. 18 00:01:08,510 --> 00:01:12,690 Identifying risks is actually the second step in project risk management, and it 19 00:01:12,690 --> 00:01:13,690 is a critical one. 20 00:01:13,850 --> 00:01:18,590 In this step, we aim to identify both individual risks and the overall source 21 00:01:18,590 --> 00:01:19,870 uncertainty in a project. 22 00:01:20,170 --> 00:01:23,270 What is important here is not just listing risk randomly. 23 00:01:23,550 --> 00:01:28,110 We are documenting their characteristics, potential causes, and 24 00:01:28,110 --> 00:01:29,150 impact our objectives. 25 00:01:30,040 --> 00:01:34,420 as shown in this diagram we will use specific inputs like the project 26 00:01:34,420 --> 00:01:39,760 plan and historical data and apply tools like brainstorming interviews and root 27 00:01:39,760 --> 00:01:45,100 cause analysis and generate key outputs such as the risk register we will break 28 00:01:45,100 --> 00:01:47,300 this down together throughout the next slide 29 00:01:52,000 --> 00:01:56,060 deeper into risk identification it is important to recognize the range of 30 00:01:56,060 --> 00:02:01,120 we are looking for this process is not just about spotting isolated issues it 31 00:02:01,120 --> 00:02:05,020 includes identifying broader sources of uncertainty that can affect the whole 32 00:02:05,020 --> 00:02:09,400 project we are aiming to capture both individual risks such as a delayed 33 00:02:09,400 --> 00:02:13,680 shipment or a miscommunication with a vendor and systemic risks such as 34 00:02:13,680 --> 00:02:18,540 organizational culture or unclear rules that can amplify uncertainty over time 35 00:02:19,340 --> 00:02:24,160 Clear documentation at this stage lays the foundation for effective analysis 36 00:02:24,160 --> 00:02:26,520 a well -targeted risk response that comes later. 37 00:02:29,960 --> 00:02:32,720 Risk identification isn't a solo activity. 38 00:02:33,020 --> 00:02:36,540 It is a collaborative process that brings together people from different 39 00:02:36,540 --> 00:02:40,940 perspectives. Of course, the project manager and project team members are at 40 00:02:40,940 --> 00:02:45,720 center of this. But ideally, we also involve customers, end users, and 41 00:02:45,720 --> 00:02:49,420 matter experts who can help us but risk that we might overlook. 42 00:02:49,840 --> 00:02:54,520 Even people outside the core team like other project managers or operations 43 00:02:54,520 --> 00:02:56,920 managers can offer valuable insight. 44 00:02:57,280 --> 00:03:01,720 It is important that all stakeholders be encouraged to speak up about potential 45 00:03:01,720 --> 00:03:05,120 risks, especially those tied to their own areas of expertise. 46 00:03:05,460 --> 00:03:09,780 But at the same time, we should never rely too heavily on SMEs. 47 00:03:14,000 --> 00:03:17,900 One important thing to keep in mind is that risk identification isn't a one 48 00:03:17,900 --> 00:03:18,659 -time task. 49 00:03:18,660 --> 00:03:22,320 It is an iterative process that continues throughout the project 50 00:03:23,020 --> 00:03:28,100 As project evolves, new risks may emerge, and our understanding of 51 00:03:28,100 --> 00:03:29,420 risks may also change. 52 00:03:29,640 --> 00:03:32,720 That's why ongoing monitoring on risk is very essential. 53 00:03:33,450 --> 00:03:38,170 The frequency of risk identification and who participates in each cycle or phase 54 00:03:38,170 --> 00:03:43,650 depends on the project size, complexity, and risk profile, and it should all be 55 00:03:43,650 --> 00:03:45,490 defined in our risk management plan. 56 00:03:46,250 --> 00:03:48,590 As you can see in the diagrams below, 57 00:03:49,320 --> 00:03:52,860 This applies across both waterfall and agile approaches. 58 00:03:53,140 --> 00:03:57,620 In both cases, risk identification needs to happen regularly, not just at the 59 00:03:57,620 --> 00:04:02,600 start of the project. So remember, risk identification isn't a box to check. It 60 00:04:02,600 --> 00:04:03,600 is a habit to maintain. 61 00:04:07,120 --> 00:04:11,840 To identify risks effectively, we need solid information, and here we outline 62 00:04:11,840 --> 00:04:14,020 where that information usually comes from. 63 00:04:14,700 --> 00:04:19,040 first we rely on project management plan especially components like schedule 64 00:04:19,040 --> 00:04:24,480 cost and risk management plans these give us context and structure then we 65 00:04:24,480 --> 00:04:29,760 baselines like wbs schedule and cost baselines which helps us spot where 66 00:04:29,760 --> 00:04:35,120 might go off track project documents such as assumption log and issue log 67 00:04:35,120 --> 00:04:37,180 contains clues about potential risks 68 00:04:38,250 --> 00:04:42,510 Contracts and agreements are another key area. Look for hidden risks in 69 00:04:42,510 --> 00:04:45,750 milestone dates, penalties, or vague terms in contracts. 70 00:04:46,170 --> 00:04:51,210 We also use procurement documentation and also enterprise environmental 71 00:04:51,210 --> 00:04:57,030 like industry reports and organizational process assets like lessons learned and 72 00:04:57,030 --> 00:04:58,510 templates from past projects. 73 00:05:01,470 --> 00:05:05,010 Let's take a quick look at the main categories of risks you will likely 74 00:05:05,010 --> 00:05:06,110 encounter in a project. 75 00:05:06,760 --> 00:05:10,540 First, we have scope risks. These relate to things like unclear requirements, 76 00:05:10,940 --> 00:05:13,240 technology challenge, or unrealistic capabilities. 77 00:05:13,680 --> 00:05:18,620 Then there are change and defect risks, often tied to evolving specifications or 78 00:05:18,620 --> 00:05:19,620 quality issues. 79 00:05:19,760 --> 00:05:24,480 We also have schedule risks, which can stem from inaccurate time estimates or 80 00:05:24,480 --> 00:05:25,540 unreliable suppliers. 81 00:05:25,940 --> 00:05:28,120 And finally, resource risks. 82 00:05:28,350 --> 00:05:32,490 which include anything from staffing shortage or missing equipment or 83 00:05:32,490 --> 00:05:36,850 facilities. These categories help us organize our thinking and guide the 84 00:05:36,850 --> 00:05:41,130 identification process, and we will explore each of them more in the 85 00:05:41,130 --> 00:05:42,130 sections. 86 00:05:44,830 --> 00:05:48,990 When it comes to identifying risk, sometimes the hardest part is knowing 87 00:05:48,990 --> 00:05:49,869 to start. 88 00:05:49,870 --> 00:05:53,210 Here we have a list of great sources to help generate ideas. 89 00:05:53,450 --> 00:05:58,580 For example, industry and government databases often provide risk checklists, 90 00:05:58,580 --> 00:06:03,940 case studies published articles or professional societies like PMI can 91 00:06:03,940 --> 00:06:08,860 -to -date insight from across the field don't forget about looking sideways at 92 00:06:08,860 --> 00:06:14,800 your competitors what risks have they encountered and internally your 93 00:06:14,800 --> 00:06:19,940 suppliers team members and even management are all valuable voices in 94 00:06:19,940 --> 00:06:25,710 potential risks the key message here is that don't try to do this alone There is 95 00:06:25,710 --> 00:06:30,250 a wealth of information already out there, and you just need to know where 96 00:06:30,250 --> 00:06:31,250 start. 97 00:06:33,350 --> 00:06:37,410 When it comes to identifying risks, there's not just one way to do it. As 98 00:06:37,410 --> 00:06:38,910 can see, we have a whole toolkit available. 99 00:06:39,510 --> 00:06:43,550 It often starts with expert judgment, tapping into people who have seen 100 00:06:43,550 --> 00:06:46,270 projects before and know where teams can go wrong. 101 00:06:46,970 --> 00:06:51,370 We also use a range of data gathering techniques like brainstorming, 102 00:06:51,370 --> 00:06:52,370 and interviews. 103 00:06:52,970 --> 00:06:56,650 Tools like the affinity diagram help organize those ideas visually. 104 00:06:57,030 --> 00:07:01,630 Then comes data analysis, including root cause analysis and SWOT. 105 00:07:01,910 --> 00:07:05,590 These can help us dig deeper into what's driving potential risks. 106 00:07:06,130 --> 00:07:10,270 Don't underestimate the power of interpersonal and team skills or simply 107 00:07:10,270 --> 00:07:13,910 up structured meetings to gather insights from stakeholders. 108 00:07:17,770 --> 00:07:21,610 After we identify risks, the next step is to make sure everything is documented 109 00:07:21,610 --> 00:07:26,730 properly, and that's where these outputs come in. The assumption log captures 110 00:07:26,730 --> 00:07:31,050 the assumptions and constraints that may influence risks, and it is updated as 111 00:07:31,050 --> 00:07:32,210 new insights emerge. 112 00:07:32,670 --> 00:07:37,290 The issue log is used to track problems as they arise, whether they are project 113 00:07:37,290 --> 00:07:41,330 -related or risk -related, and it evolves as the situation changes. 114 00:07:42,000 --> 00:07:45,940 Then we have the risk register, which is really the heart of risk documentation. 115 00:07:46,420 --> 00:07:50,480 It includes all identified risks, along with important information like 116 00:07:50,480 --> 00:07:53,000 probability, impact, and assigned risk owners. 117 00:07:53,300 --> 00:07:55,460 And finally, the risk report. 118 00:07:55,720 --> 00:07:59,900 The risk report gives a high -level view of the most significant risks and any 119 00:07:59,900 --> 00:08:01,780 conclusions we have drawn through this analysis. 120 00:08:04,920 --> 00:08:08,280 Now let's zoom in on one of the most important outputs from the risk 121 00:08:08,280 --> 00:08:10,660 identification process, that is the risk register. 122 00:08:11,420 --> 00:08:15,260 Once risks are identified, they are recorded here at initial entry. 123 00:08:15,580 --> 00:08:17,740 But this document isn't static. 124 00:08:17,980 --> 00:08:22,620 It grows and evolves over time. At this stage, your register should include a 125 00:08:22,620 --> 00:08:26,900 list of identified risks, probability and impact of each, possible response 126 00:08:26,900 --> 00:08:30,300 strategies, root causes, and any updates to your risk categories. 127 00:08:30,860 --> 00:08:35,340 This register becomes a central place for tracking and managing risks 128 00:08:35,340 --> 00:08:36,460 the entire project. 129 00:08:40,270 --> 00:08:44,049 Here you can see a more detailed example of what a real -world risk register can 130 00:08:44,049 --> 00:08:47,390 look like. This one is modeled after a PMI style format. 131 00:08:47,910 --> 00:08:51,490 As you can see, it includes much more details than just a list of risks. 132 00:08:51,750 --> 00:08:55,990 It tracks information across the entire project lifecycle, from identification 133 00:08:55,990 --> 00:08:58,290 through analysis, planning, and monitoring. 134 00:08:58,950 --> 00:09:02,830 As you can see, it includes crucial information about each identified risk. 135 00:09:03,580 --> 00:09:07,900 What is important here is that this register isn't just a document. It is a 136 00:09:07,900 --> 00:09:12,160 leading tool used to guide decision making and keep the project team aligned 137 00:09:12,160 --> 00:09:13,260 risk responses. 138 00:09:14,240 --> 00:09:18,000 Soon we will see a sample of how it can be applied in a real project. 139 00:09:21,640 --> 00:09:25,660 This is a sample risk register report which expands on the risk register by 140 00:09:25,660 --> 00:09:27,980 offering a more detailed structured summary. 141 00:09:28,220 --> 00:09:33,460 It includes things like task titles, dates, descriptions, risk scores, 142 00:09:33,460 --> 00:09:34,560 and mitigation actions. 143 00:09:35,000 --> 00:09:38,540 As you can see, all of them are laid out in a formal reporting format. 144 00:09:38,800 --> 00:09:42,440 This kind of report is especially useful for communicating with senior 145 00:09:42,440 --> 00:09:47,000 stakeholders or sponsors who want a clear snapshot of where risks stand. 146 00:09:47,710 --> 00:09:51,990 Notice how risks are categorized by impact level and supported with 147 00:09:51,990 --> 00:09:57,170 strategies. This helps project leaders quickly focus on what needs attention 148 00:09:57,170 --> 00:09:58,170 why. 149 00:10:00,870 --> 00:10:05,130 And that brings us to the end of Part A of our session on identifying project 150 00:10:05,130 --> 00:10:09,370 risks. If you have any questions or need clarification on anything we covered, 151 00:10:09,590 --> 00:10:13,130 feel free to reach out, and when you are ready, please continue to Part B. 152 00:10:13,290 --> 00:10:15,190 Thanks again for watching this video. 14339

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.