You are on page 1of 4

ASSESSMENT 2

Program Risk
Student Name:
Student No.:

PROGRAM RISK
This document is designed to assist you in completing Assessment 2 for this unit in order to meet the APC questions
and the performance criteria you will be assessed against. Where asked to provide examples, please base your answer
on the case study from Assessment 1 – AB-99 case study for the defense contractor.

1. GIVE DESCRIPTIONS OF THE FOLLOWING TOOLS AND TECHNIQUES FOR RISK


IDENTIFICATION:
- THE DELPHI TECHNIQUE
- ROOT CAUSE ANALYSIS
- BENCHMARKING

Include in your description for each:


How use could use them to identify and analyse risks and who would you consult/include in the process. (PC1.2)

How will you ensure risk management is visible and dynamic so risks are assigned and managed in a timely manner?
(PC1.4)

2. GIVE DESCRIPTION OF THE FOLLOWING METHODS AND HOW THEY MAY BE USED IN
THE PROCESS OF RISK MANAGEMENT:
- BRAINSTORMING
- RANKING RISKS
- CREATING MITIGATION STRATEGIES

1
ASSESSMENT 2
Program Risk
In the Risk Management Strategy you produced for assessment 1, you listed key roles responsible for managing risks.
Explain the role of the Program Manager in managing risks that should be added to the Risk Management Strategy.
(PC2.1)

How will you review progress, analyse variance and initiate risk responses to achieve program objectives in dynamic risk
environments? (PC2.2)

Complete the below table based on the AB-99 case study from Assessment 1. (PC2.3, PC 2.4)

REMEDIAL RISK ACTION PLAN


Item 26
Risk Supply of computer chip X90 cannot be sourced in sufficient numbers
Summary of Action to Agreement was put in place with the supplier in China and a deposit paid to
date: guarantee shipment and the required number to be delivered in June 2020.
Due to the delay in software development, the new rollout and installation of the
chip into the helicopters has been delayed until July 2021.
The supplier has advised that the X90 chip is being phased out will not be
supported in July 2021. As the conditions of the agreement were not met by the
defense contractor, they are not required to continue to supply the X90 chip
under the agreement.
Proposed Remedial Actions 

Resource Requirements 

Costings 

Who will be assigned


accountability and
responsibility to manage
remedial action?
Timing 

2
ASSESSMENT 2
Program Risk
Reporting/Monitoring  (How often and how will it be done?)

What Stakeholders have  (You need to say who and what methods used to consult with them)
been consulted in
developing this remedial
action
Approval of Proposed 
remedial action:
(Who/what group?)

3. IDENTIFY THREE ASPECTS THAT THE RISK MANAGEMENT FRAMEWORK SHOULD


ENABLE IN RELATION TO RISKS

4. GIVE FIVE EXAMPLES OF POLICIES/PROCEDURES/PROGRAMS THAT MAY BE


INCLUDED WITHIN THE RISK MANAGEMENT SYSTEM
Develop and maintain a program risk management system to enable effective management and communication of
risks, controls, treatments and outcomes to stakeholders across the program (PC1.5)
If you completed the Risk Management System template provided in Assessment 1, please attach the document to
meet this criteria. If you did not complete the Risk Management System template then you will need to develop a
program risk management system which will need to be written in your own words – refer to the Assessment 1
template as guidance.

5. IDENTIFY THREE TYPES OF OUTCOMES THAT SHOULD BE INCLUDED WHEN UPDATING


THE RISK REGISTER

Review and analyse program outcomes to assess the effectiveness of the risk management methodology. (PC3.2)
3
ASSESSMENT 2
Program Risk

Analyse, document and recommend lessons learned for application in other programs – use the AB-99 case study in
answering this criteria. (PC3.3)

Provide an example from the AB-99 case study of a residual risk you would transfer at the completion of the program
and how you would go about transferring it, include notification of stakeholder in your answer. (PC3.1)

6. SPECIFY FOUR DETAILS THAT SHOULD BE INCLUDED WITHIN A RISK REGISTER

Risk Bearer Identity


Probability of occurrence of the risk
The most effective way to control the risk
Risk rank
Explain the use of a dynamic risk register across a program (KE)

You might also like