Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
    • About Us
    • Colophon
    • Survey
  • Reliability.fm
  • Articles
    • CRE Preparation Notes
    • NoMTBF
    • on Leadership & Career
      • Advanced Engineering Culture
      • ASQR&R
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • AI & Predictive Maintenance
      • Asset Management in the Mining Industry
      • CMMS and Maintenance Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • RCM Blitz®
      • ReliabilityXperience
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
      • The People Side of Maintenance
      • The Reliability Mindset
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Field Reliability Data Analysis
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability by Design
      • Reliability Competence
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
      • Reliability Knowledge
    • on Risk & Safety
      • CERM® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Institute of Quality & Reliability
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • R for Engineering
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Statistical Methods for Failure-Time Data
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Glossary
    • Feed Forward Publications
    • Openings
    • Books
    • Webinar Sources
    • Podcasts
  • Courses
    • Your Courses
    • Live Courses
      • Introduction to Reliability Engineering & Accelerated Testings Course Landing Page
      • Advanced Accelerated Testing Course Landing Page
    • Integral Concepts Courses
      • Reliability Analysis Methods Course Landing Page
      • Applied Reliability Analysis Course Landing Page
      • Statistics, Hypothesis Testing, & Regression Modeling Course Landing Page
      • Measurement System Assessment Course Landing Page
      • SPC & Process Capability Course Landing Page
      • Design of Experiments Course Landing Page
    • The Manufacturing Academy Courses
      • An Introduction to Reliability Engineering
      • Reliability Engineering Statistics
      • An Introduction to Quality Engineering
      • Quality Engineering Statistics
      • FMEA in Practice
      • Process Capability Analysis course
      • Root Cause Analysis and the 8D Corrective Action Process course
      • Return on Investment online course
    • Industrial Metallurgist Courses
    • FMEA courses Powered by The Luminous Group
    • Foundations of RCM online course
    • Reliability Engineering for Heavy Industry
    • How to be an Online Student
    • Quondam Courses
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home
  • Barringer Process Reliability Introduction Course Landing Page
  • Upcoming Live Events
You are here: Home / Articles / Risk Tip #6 – Managing Shared Risks

by Greg Hutchins Leave a Comment

Risk Tip #6 – Managing Shared Risks

Risk Tip #6 – Managing Shared Risks

Guest Post by Rod Farrar (first posted on CERM ® RISK INSIGHTS – reposted here with permission)

I have often been asked to provide insight into the management of shared risks, particularly by those working in Commonwealth Government Departments.

Element 7 of the Commonwealth Risk Management Policy states that: each entity must implement arrangements to understand and contribute to the management of shared risks.  It goes onto to define shared risks as: those risks extending beyond a single entity which require shared oversight and management. Accountability and responsibility for the management of shared risks must include any risks that extend across entities and may involve other sectors, community, industry or other jurisdictions.

That might sound simple enough – but is it?

The answer to that question lies in my view that in organisations of today there is no such thing as a risk that isn’t a shared risk.  There would be very few organisations where the ownership of the risk, the ownership of the controls and those affected by the consequences would reside in one functional area.

To that end, the way I manage shared risks (i.e. – every risk), is shown in the process below:

Each of these steps is described below.

The Methodology

Step 1 – identify the risk

Identify the event/incident that, if it occurs, will have an impact on the objectives of the organisation

Step 2 – identify the causes

Identify the potential causes of the identified risks.  Identifying the causes is one of the most critical steps in any risk identification. If you don’t identify the causes, then how can you ever hope to identify the controls needed to stop it happening?

Step 3 – identify the controls aligned to each of the causes

Identifying the controls directly linked to the causes will highlight where there may be control gaps that need to be filled.  It may also highlight opportunities to reduce the number of controls in circumstances when the controls may not be contributing to the management of that (or any other) risk.

Step 4 – identify owners for each of the controls

It is critical to identify the owners of the controls.  Without ownership, no-one will have responsibility for maintaining the currency of the control, ensuring its effective implementation, and/or the measurement of effectiveness.

These owners will become part of the stakeholder group for the management of the risk.

Step 5 – detail the consequences should the risk eventuate (including who will be affected)

Understanding the breadth of consequences will provide an understanding of, not only the impact of the risk, but also the stakeholders inside and outside of the organisation that will be affected.

Step 6 – identify the controls aligned to each of the consequences

Identifying the controls linked to the consequences will, once again, highlight where there may be control gaps that need to be filled.  It will also highlight other stakeholders that will be responsible/relevant in the response to an incident should the risk eventuate.

Step 7 – identify owners for each of the controls

These owners will become part of the stakeholder group for the management of the risk.

Step 8 – identify other stakeholders

During this step, we identify:

  • Organisations or functions that provide:
  • Decision making;
  • Funding;
  • Services related to the risk (including outsourced providers);
  • Policy (including regulators).

Organisations/groups that will be impacted, directly or indirectly by the consequences should the risk occur but who do not fit into the categories above. These are secondary stakeholders.

Step 9 – based on the owners identified in steps 4, 5, 7 and 8 – develop a stakeholder map

The stakeholder map is a visual representation of the stakeholders identified through previous steps. They will be stakeholders that will be responsible for trying to prevent the risk, detect any instances of the risk, those that implement corrective controls after the event if it occurs, and those affected by the consequences (secondary stakeholders).

Step 10 – assign ownership to the risk

Once the stakeholder group has been identified, ownership can now be assigned.  This can be difficult in some circumstances as the majority of the controls associated with the risk may not sit in the area responsible for the outcomes.

The level of ownership of the risk within the organisation is also a key consideration.  My rule of thumb regarding this is that the ownership of the risk must be at or above the ownership of the highest-level control.  My rationale for this lies in the fact that, in order to be able to assure that a risk is being managed effectively, the risk owner needs to gain assurance from the control owners as to the effectiveness of the control.  A risk owner at a lower level of the organisation will not necessarily have the authority to request assurance from a control owner at a higher level of the organisation and, as such, it becomes impossible to gain a full understanding of the risk and its likelihood.

Step 11 – remainder of process (assign likelihood, consequence, determine risk level, evaluate, treat .etc.).

We will not go through the full process beyond the assigning of ownership, however, before that can be done, all of the steps we have listed above need to be completed.

Example

So, let’s go through this step by step for a risk that is common to many organisations.

Step 1 – identify the risk

The risk we will use for this example is:

Unauthorised access to, release of or misuse of confidential information

Step 2 – identify the causes

In this case, there are a number of causes that may lead to this risk occurring:

Step 3 – identify the controls aligned to each of the causes

We can then identify controls for the identified causes:

Step 4 – identify owners for each of the controls

We then identify the owners for each of these controls:

Step 5 – detail the consequences should the risk eventuate (including who will be affected)

The consequences in this case are as follows:

  • Negative impact on reputation;
  • Potential legal action;
  • Potential interest from the regulator.

Step 6 – identify the controls aligned to each of the consequences

Step 7 – identify owners for each of the controls

In this case the owners are as follows:

Step 8 – identify other stakeholders

In this case, there are a range of other stakeholders that have ‘skin In the game’ that may not own the controls previously listed but fall into the categories previously outlined.

  • Organisations or functions that provide decision making; funding; services related to the risk (including outsourced providers); and policy (including regulators).
    • Secretary;
    • Head Corporate Services (owns IT, procurement and security functions);
    • IT contractor;
    • Classified waste contractor;
    • Procurement Manager; and
    • Contract Manager.
  • Organisations/groups that will be impacted, directly or indirectly by the consequences should the risk occur but who do not fit into the categories above. These are secondary stakeholders.
    • Clients/companies that have had their data released

Step 9 – based on the owners identified in steps 4, 5 and 7 – develop a stakeholder map

Based on the analysis to date, the following is the stakeholder map for this risk:

Step 10 – assign ownership to the risk

In this case, based on the level of the controls, the most appropriate person to be the owner of this risk is the Head Corporate Services.

Conclusion

The simple facts that organisations need to recognise are:

  • All risks within the organisation are shared risks; and
  • Ownership of those risks needs to rest at or above the level of the person who owns the highest-level control.

We have only looked at a risk internal to an organisation where all the controls are owned within that organisation.  Consider the complexity of managing risks where there are controls that are owned by other organisations.  To illustrate, here is the stakeholder map for the risk of a collision of two trains:

If the stakeholders are not understood, and the process shown in this blog is not undertaken – an organisation can never hope to effectively manage their (shared) risks.

COPYRIGHT © PALADIN RISK MANAGEMENT SERVICES 2017

Bio:

Rod is an accomplished risk consultant with extensive experience in the delivery of professional consultancy services to Government, corporate and not-for-profit sectors.

Rod’s Risk Management expertise is highly sought after as is the insight he provides in his risk management training and workshop facilitation.

Rod has been recognised by the Risk Management Institution of Australia, as the 2016 Risk Consultant of the Year and one of the first five Certified ChiefRisk Officers in Australasia

To let Paladin Risk Management Services help you to secure your organisation’s future, contact us now. Fill in this form or contact Rod on (+61) 400 666 142 or rod@paladinrisk.com.au

Filed Under: Articles, CERM® Risk Insights, on Risk & Safety

About Greg Hutchins

Greg Hutchins PE CERM is the evangelist of Future of Quality: Risk®. He has been involved in quality since 1985 when he set up the first quality program in North America based on Mil Q 9858 for the natural gas industry. Mil Q became ISO 9001 in 1987

He is the author of more than 30 books. ISO 31000: ERM is the best-selling and highest-rated ISO risk book on Amazon (4.8 stars). Value Added Auditing (4th edition) is the first ISO risk-based auditing book.

« Safety Shower Installations
Note from “Inside FMEA” Author »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERM® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • Gremlins today
  • The Power of Vision in Leadership and Organizational Success
  • 3 Types of MTBF Stories
  • ALT: An in Depth Description
  • Project Email Economics

© 2025 FMS Reliability · Privacy Policy · Terms of Service · Cookies Policy