Read the entire entry – common access

Welcome to this crowd-sourced risk register!

Over time, we will end up collecting a rich list of risks that have been identified in many different initiatives and some ideas as to the possible responses and their effectiveness. Caveat emptor: the data is only as good as what is entered.

If you’d like to add your experience, please do. The more data points there are, the more useful the database becomes.

Click here to go to the data entry page

Here’s the database. For reasons of space, it is set up in the planning view (what risks were identified). You can sort it, and you can search for particular words.  If you want to see the full record of a risk event (minus identifying data fields), click the link. Choose that link also if you want to edit the record (only the person who entered it, or the site admins, can edit it).

Project sourceSSC-10
Risk CategoryThe solution may run into security issues
Risk EventThe system might be attacked by hackers
Initiative Size$500,001 to $2 million
IndustryIT (Information Technology solutions)
Foreseen?Yes
Percent cost loading0
Pct schedule loading0
Response SelectedMitigate
Planned Response

System will undergo IT Security review and C&A. This may reduce much of the risk but is unlikely to eliminate it altogether.

Plan Implemented?Yes
Risk Monitoring

There was no monitoring plan

Risk Occurred ?TBD (initiative not completed yet)