1-5
DOMAIN 1 - TASK 5
This session will equip you with essential skills in risk analysis, including key formulas and methods—qualitative, quantitative, and hybrid. You'll learn to select and apply the Design Basis Threat (DBT) and utilize the all-hazards risk assessment framework. Additionally, you'll discover how to align risk management strategies with your business goals and assess residual risk while building a sustainable monitoring process.
⚙️ Qualitative Risk Analysis
📈 Quantitative Risk Analysis
🔄 Hybrid Risk Analysis
Assesses threats across three broad categories:
Why it matters: Helps prioritize investments and create a more resilient enterprise risk plan.
📌 Document all accepted risks—especially in regulated environments.
Security professionals must:
📚 Tip: Use metrics and dashboards to convey residual risks to leadership.
Security's job: Integrate physical security into ERM just like finance integrates risk from investments.
After applying countermeasures, some risk will still remain.
📌 Residual Risk = Total Risk – Mitigation Impact
Security professionals must:
Threats evolve. So must your controls.
✅ Good practices:
In physical security, risk is the likelihood of a threat exploiting a vulnerability to harm an asset.
Core Risk Formula:
Risk = Threat × Vulnerability × Consequence
Each element must be assessed appropriately to define priorities and shape countermeasure decisions.
🧾 What is a Loss Event Profile (LEP)?
A Loss Event Profile (LEP) is a structured record that describes specific types of adverse events an organization may face, detailing their frequency, severity, affected assets, and consequences.
A Loss Event Profile documents:
LEPs help prioritize mitigation by risk magnitude.
© Copyright. All rights reserved.
Legal Notice | Privacy Policy
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.