The IT risk assessment template features a pre-built template with two request forms that’ll improve the way you manage risks and resources. This guide will demonstrate how to:
- Submit new RAID reports.
- View and track reports from a unified table.
- Move reports through each workflow stage.
- Use a dashboard to manage and mitigate risks.
Step 1: Submit a RAID form
The IT risk assessment template includes ready-to-use request forms that’ll help you create new RAID reports.
The request forms require you to fill out necessary details like RAID type, descriptions of the RAID, the cost to the business, and whether or not it should be considered a risk.
Each risk can be rated through a conditional RAID form, which measures its impact, probability, and proximity. These factors determine the report’s overall risk score, which ranges from 3-15.
Once submitted, new RAID reports will be sent to the “RAID Intake” folder and can be viewed from a consolidated table view. This table view displays new incoming risks, along with relevant information like problem statuses and business costs.
Program and risk managers can use this table view to increase their visibility of incoming reports across different teams and projects.
You can also share each report with other teams to help keep them up to speed on important issues.
Step 2: Determine risks
Depending on the severity or urgency of each report, teams can then decide whether or not to classify each report as a risk.
Risks can be confirmed by changing the status of the report to “In Progress.” It’ll then be automatically sorted into the “RAID Log” folder.