Indentification-Logo

Identification

Risk Identification is a continually recurring process that identifies new threats and opportunities.

1. Overview
2. Describe the Risk
3. Assign a Risk Owner
4. Establish the Risk Level
5. Define a Risk Window
Continue to the Assessment Steps
1. Overview
The vehicle for risk identification can vary to suit context and requirements of where the ERM framework is being applied. Common methods include workshops where key stakeholders are convened and risk surveys which can leverage the perspectives of a wider group.
The ERM team are available to help guide and facilitate the most appropriate method of identification.
The steps included within the identification stage of this framework represent the required attributes for risk creation.
For WDesk user training see the ERM SharePoint site.