7. Top Down Techniques DUE DILIGENCE ENGINEERS Two high level or top down techniques appear common: Vulnerability techniques derived from the military intelligence community and SWOT (Strengths, Weaknesses, Opportunities and Threats) from the commercial sector. Top Down Techniques DUE DILIGENCE ENGINEERS Augmented SWOT Process External / Internal Factors Opportunities Strategy Organisation Strengths Value Addeds Threats Weaknesses Vulnerabilities DUE DILIGENCE ENGINEERS Many risk decisions have simultaneous upside and downside risk elements. Market risk is an obvious form of business risk with both upside (speculative) and downside (pure) risk implications. Clinical and military risk decisions can also entail a mix of risk outcomes. Upside and Downside Risk DUE DILIGENCE ENGINEERS Project risk provides another interesting insight. In this case the upside risk is assumed in the proposal. The risk analysis generally focuses on those issues which will prevent the assumed upside benefits from being achieved. That is, it is a downside risk assessment process from an assumed upside risk position. Project Risk Decisions DUE DILIGENCE ENGINEERS The vulnerability assessment technique is used very widely to assess and propose appropriate solutions to risks that affect most organisations. This technique is used by military intelligence, strategic planners, public affairs risk analysts, project managers as well as risk engineers. Vulnerability Assessments DUE DILIGENCE ENGINEERS The central concept is to define the assets of the business and all the possible threats to them. The organisation’s Critical Success Factors can also be considered to be the organisation’s assets. Vulnerability Assessments DUE DILIGENCE ENGINEERS Vulnerability Assessments Asset Credible Threats Credible Vulnerabilities Protection Residual Vulnerabilities DUE DILIGENCE ENGINEERS The threats are then systematically matched against the assets to see which is vulnerable to each threat. Only the assessed vulnerabilities then have control efforts directed at them. This prevents the misapplication of resources to something that was really only a threat and not a vulnerability. Vulnerability Assessments DUE DILIGENCE ENGINEERS Public image and confidence Capability to perform an organisation’s function Physical resources and facilities Personnel resources Customer loyalty Assets (Critical Success Factors) DUE DILIGENCE ENGINEERS Smoke, fire, explosion Natural hazards (rain, snow, wind, earthquake etc.) Critical plant failure Failure of a major supplier Sabotage, acts of aggression Threats DUE DILIGENCE ENGINEERS Physical (e.g. buildings/fire, money/theft, equipment/ sabotage, product/contamination). Personal (e.g. injury/vehicle accident, ill health/ chemical exposure, well being/overtime). Notional (e.g. image/plant failure, confidence/currency losses, disruption to business/failure of supplier). Vulnerabilities DUE DILIGENCE ENGINEERS Risk Control (Design, Administration, Training) Risk Avoidance Risk Transfer Risk Acceptance Management Strategies DUE DILIGENCE ENGINEERS Lists are the most common way of establishing assets. For example, the Australian Risk Management Standard lists possible areas of impact as: a) Asset and resource base of the organisation, including personnel. b) Revenue and entitlements c) Costs of activities, both direct and indirect d) People e) Community f) Performance g) Timing and schedule of activities h) The environment i) Intangibles, such as reputation, goodwill, quality of life j) Organisational behaviour Assets DUE DILIGENCE ENGINEERS Dependency trees can also be used for such an assessment. Assets DUE DILIGENCE ENGINEERS Airline Dependency Tree Fare Paying Passengers Serviceable Aircraft Trained Aircrew Passengers Serviceable Airports Reservation Systems Passenger Terminals Trains, Taxis, Carparks Trained Operators Computers & Software DUE DILIGENCE ENGINEERS Threats Threats to Staff Assault Intimidation Harassment Discrimination Defamation Incidental injury (during robbery etc) Suborning of staff for fraud or collusive theft Threats to Cash Robbery Burglary Threats to Product Collusive Theft Pilferage Contamination Product Extortion DUE DILIGENCE ENGINEERS Threats Threats from Staff Pilferage Theft Fraud Malicious Damage Bomb Threat Threats of Production Interruption Bomb Threat Bomb "Hoax" Malicious Damage/Sabotage Picketing/Demonstrations/ Boycott Environmental Industrial Political DUE DILIGENCE ENGINEERS Threats Threats to Information Espionage Competitive Takeover Industrial Political Fraud Misappropriation Sabotage of data Threats to Company's Competitive Edge Industrial Espionage Defamation Rising costs due to security losses Threats to Staff Property Theft Malicious Damage Vandalism DUE DILIGENCE ENGINEERS Threats Threats to Company Reputation Contamination Pollution (eg, false whistle blowing) Scandal (eg, frauds, business or political) Threats to Treasury & Finance Credit squeezes Liquidity issues Customer payment defaults Exchange fluctuations Funding sources failure Interest rate fluctuations Military Threats Sniper fire Small arms fire Machine gun fire RPG or mortar attack Artillery attack Missile attack Biological / Chemical Thermonuclear Project 1. • Office building demolition and construction in Melbourne CBD • Footprint overlays three Melbourne Underground Rail Loop (MURL) tunnels • Basement carparks being constructed • VicTrack (MURL owner) asked for risk assessment of proposed construction method Why are we confident that we’ve identified all credible, critical safety issues? • Context • Systematic • Top-down • Completeness check • Identify points of loss of control • Emphasis on communicating findings Phase Threat scenarios Loss of control Consequence Scenarios Unloading of existing loads in vicinity of MURL Ground failure due to existing retention removal from existing basement Investigations Planned borehole/test pit location coincides with MURL location Undertaking borehole/test pit in location that could impact MURL Borehole/ test pit impacts on MURL Unloading of existing loads in vicinity of MURL Installation of piles in vicinity of MURL Alteration of groundwater conditions in vicinity of MURL Planned excavation/ pile location coincides with MURL location Undertaking excavation/ pile in location that could impact MURL Excavation/ pile impacts on MURL Excavation/ piling works in vicinity of MURL Excavation/ piling vibrations impact MURL Instability in MURL tunnel lining Settling of ground in vicinity of MURL due to new loads Transient loading in vicinity of MURL Large/heavy object falls over base slab in vicinity of MURL Large heavy object impact on base slab in vicinity of MURL Instability in MURL tunnel lining Super-structure construction in vicinity of MURL Ground-borne super-structure construction vibrations impact MURL Instability in MURL tunnel lining Changed stress in ground surrounding MURL tunnel lining Instability in MURL tunnel lining Construction Changed stress in ground surrounding MURL tunnel lining Demolition Instability in MURL tunnel lining Changed stress in ground surrounding MURL tunnel lining Instability in MURL tunnel lining Excavation and piling Phase Threat scenarios Loss of control Consequence Scenarios Ground failure due to existing retention removal from existing basement Unloading of existing loads in vicinity of MURL Unloading of existing loads in vicinity of MURL Installation of piles in vicinity of MURL Alteration of groundwater conditions in vicinity of MURL Settling of ground in vicinity of MURL due to new loads Transient loading in vicinity of MURL Investigations Planned borehole/test pit location coincides with MURL location Excavation and piling Planned excavation/ pile location coincides with MURL location Excavation and piling Excavation/ piling works in vicinity of MURL Construction Super-structure construction in vicinity of MURL Demolition Construction Instability in MURL tunnel lining Large heavy object impact on base slab in vicinity of MURL Large/heavy object falls over base slab in vicinity of MURL Instability in MURL tunnel lining Vibrations associated with CWPC impact MURL Excavation and piling Construction Instability in MURL tunnel lining Changed stress in ground surrounding MURL tunnel lining Direct physical impact on MURL Undertaking intrusive works in location that could impact MURL Demolition Undertaking intrusive works in location that could impact MURL Direct physical impact on MURL Pre-LOC Barriers Post-LOC Barriers Time Direct physical impact on MURL Threat Scenarios Loss of Control Consequence Scenario Work methods to monitor and identify potential impacts on services/MURL while undertaking intrusive works Notes: (1) Excavation and piling works are considered to include early works. Potential future barrier Existing barrier Planned excavation/ pile/ anchor location coincides with MURL location Investigations Excavation & Piling (1) Raft slab design and location planning minimises intrusive works Location planning of intrusive work avoids MURL area Planned borehole/test pit location coincides with MURL location Designated “no-go” areas on site for intrusive works DUE DILIGENCE ENGINEERS One of the most successful methods of obtaining consensus on the relative importance of vulnerabilities, characterising risk, establishing control options and creating an action list is to use an asset and threat matrix in a workshop with relevant managers. There are various possibilities but a common approach is a two-stage workshop. Vulnerability Assessment DUE DILIGENCE ENGINEERS Two+ Stage Workshop DUE DILIGENCE ENGINEERS One of the simplest ways to address this is to undertake a preliminary criticality analysis. Prior to the Stage 2 workshop, the assets and threats of concern to the organisation are developed into a matrix form. Criticality Assessment DUE DILIGENCE ENGINEERS A preliminary criticality determination is made using the values in the table below. Criticality Scoring System xxx xx x - va Critical potential vulnerability that must be (seen to be) addressed Moderate potential vulnerability Minor potential vulnerability No detectable change in risk Possible value adding DUE DILIGENCE ENGINEERS If this is well done then around 10% or so of the cells will have three x’s. This is the Pareto principle. Typically 80% to 90% of the risk comes from 10% to 20% of the vulnerabilities. Dealing with these 10 to 20% is the primary purpose of the analysis. Criticality Assessment DUE DILIGENCE ENGINEERS Sample Vulnerability Matrix ASSETS > THREATS Technical Failure Community Issues Political (change of government) Credit Squeeze Flood Reputation xx - x xxx x Operability xx - x xxx xxx Staff xx xx x xx xx Project 2. • Operations of a heritage listed public building • Regular public events with large number of patrons • Board concern about how to show that continued operation was a reasonable business decision following technical engineering assessments Safety Vulnerability Matrix Patrons Service personnel Maintenance personnel Structure issues 1 Handrail failure xxx xxx xxx 2 Building/component structural failure xxx xxx xxx 3 Falling debris/plant/services/fixtures xxx xxx xxx Maintenance-specific 4 Fall from height - - xxx 5 Confined space impact - - xxx 6 Exposure to hazardous materials - - xx XXX Critical vulnerability (ie potential fatality) XX Moderate vulnerability X Minor vulnerability - No perceived vulnerability CRITICAL EXPOSED GROUPS >>>>> CREDIBLE THREAT SCENARIOS Earthquake loading structural reinforcement Operational procedures to limit point loading Operational procedures to limit loading conditions Load testing Loading greater than design loading/ confirmed capacity Pre-LOC Barriers Post-LOC Barriers Time Threat-barrier diagram: Initiating event: Excessive loading Threat Scenarios Loss of Control Overloading Consequence Scenario Earthquake To Structural instability TBD Live (distributed) loading Point loading New/significantly improved barrier Existing barrier DUE DILIGENCE ENGINEERS Criticality vs risk assessment DUE DILIGENCE ENGINEERS Risk Scoring DUE DILIGENCE ENGINEERS Risk Scoring DUE DILIGENCE ENGINEERS A risk characterisation matrix framework is a very common approach. It is described in Guidelines to the Risk Management standard (AS/NZS 4360:2004), now superseded. This appears to have been adapted from earlier military work (U.K. Ministry of Defence,1996 and U. S. Department of Defence, 2000, both revised versions of earlier standards). Risk Characterisation DUE DILIGENCE ENGINEERS Risk Scoring Systems DUE DILIGENCE ENGINEERS Use this slide for a main topic with yellow accents for important points 1984 US military standard MIL–STD–882B Appendix A 1984 DUE DILIGENCE ENGINEERS Use this slide for a main topic with yellow accents for important points Risk Charts Linear model Hyperbolic Logarithmic DUE DILIGENCE ENGINEERS Such a matrix can be greater or less than 5x5 on either scale. 7x5 is common for very large organisations and 4x3 or 2x2 for small projects. Other systems use a 1 to 5 category for both likelihood and consequence. Risk Presentation DUE DILIGENCE ENGINEERS 3 x 3 Consequences Likelihood Major Moderate Minor Likely Red Red Amber Possible Red Amber Green Unlikely Amber Green Green DUE DILIGENCE ENGINEERS 4 x 6 EN 50126:1999 Probability Description Insignificant Marginal Critical Catastrophic Frequent Likely to occur frequently, The hazard will be continually experienced Frequent Undesirable Intolerable Intolerable Intolerable Probable Will occur several times. The hazard can be expected to occur often Probable Tolerable Undesirable Intolerable Intolerable Occasional Likely to occur several times. The hazard can be expected to occur several times Occasional Tolerable Undesirable Undesirable Intolerable Remote Likely to occur sometime in the system life cycle. The hazard can reasonably expected to occur Remote Negligible Tolerable Undesirable Undesirable Improbable Unlikely to occur but possible. It can be assumed that the hazard may exceptionally occur Improbable Negligible Negligible Tolerable Tolerable Incredible Extremely unlikely to occur. It can be assumed that the hazard may not occur Incredible Negligible Negligible Negligible Negligible Severity Description Catastrophic Fatalities and/or multiple severe injuries and/or major damage to the environment Intolerable Critical Single fatality and/or severe injury and/or significant damage to the environment Undesirable Marginal Minor injury and/or significant threat to the environment Tolerable Insignificant Possible minor injury Negligible Shall be eliminated Shall only be accepted when risk reduction is impracticable Acceptable with adequate control Acceptable as is DUE DILIGENCE ENGINEERS 5 X 7 Characterisation for Government M H H VH VH M M H H VH L M H H H L L M M H L L M M H VH VH VH H H VH VH VH VH H Agency Department Cabinet CONSEQUENCE LIKELIHOOD DUE DILIGENCE ENGINEERS AS 4360:2004 Guideline DUE DILIGENCE ENGINEERS Ultimately there must be an enterprise view of how identified risk issues should be characterised. This is necessary when there are competing risk agendas and limited resources available. Enterprise Risk Profiling DUE DILIGENCE ENGINEERS For example, underwriting requirements, environmental issues, RCM requirements and OH&S issues can compete for scarce capital. How can an organisation come to grips with such issues without an overall top down risk framework? Silos DUE DILIGENCE ENGINEERS Silos Project Programmes Enterprise Risk Management Framework Confidently escalate credible, critical risk issues Confidently bury risk dross Lack of confidence region Organisational Confidence Engine Environmental Programme OH&S Programme Particular items incl aquisitions DUE DILIGENCE ENGINEERS Risk Presentation Systems DUE DILIGENCE ENGINEERS One simple method for developing the consequence values of the matrix is to consider a loss that would prove catastrophic to the organisation and stepping back in order of magnitude changes from catastrophic to noticeable. The table should reflect the full range of loss values, not just directly measurable items. Determining Risk Matrix Values DUE DILIGENCE ENGINEERS An example of a consequence table is shown the table below. The loss values can vary for different organisations. The critical aspect is the range of the consequences. This is different for different organisations. Determining Risk Matrix Values DUE DILIGENCE ENGINEERS Consequence Values DUE DILIGENCE ENGINEERS Typical Organisational Likelihood Values Almost Certain Once per year Likely Once in 10 years Some Chance Once in 100 years Unlikely Once in 1,000 years Rare Once in 10,000 years The use of combined logarithmic values for each scale provides for lines of constant risk. DUE DILIGENCE ENGINEERS Sample Risk Profile DUE DILIGENCE ENGINEERS Sample Residual Risk Profile Project 3. • Operation of a heritage listed road and pedestrian bridge in Fremantle • Essential road crossing for the river • Essential river passage • Very complex physical constraints Bridge 916—Navigation spans and Fender System Ship Channel Map Why are we confident that all reasonable measures are in place for all identified issues? • What are the practicable options? • Of these, what are the reasonable measures? Includes both initial and ongoing implementation Context • Vessel impact scenarios and related construction activities • Project phases • Geographic areas • Receptors of consequence scenarios • Also to be considered: • Bridge heritage requirements • Good practice requirements • Codes and standards • Similar structures Pier piles unable to bear load Loss of Control Threat-barrier diagram: Fremantle Traffic Bridge Time Pier piles unable to bear load Loss of Control Partial bridge collapse, loss of containment of utilities & impact on rail bridge Consequence Scenario Bridge structural instability (no collapse) Threat-barrier diagram: Fremantle Traffic Bridge Time Pier piles unable to bear load Loss of Control Partial bridge collapse, loss of containment of utilities & impact on rail bridge Consequence Scenario Bridge structural instability (no collapse) Threat-barrier diagram: Fremantle Traffic Bridge Threat Scenarios Vessel collision – direct impact Vessel collision – glancing blow Substructure deterioration (eg pile degradation due to Teredo) Vessel collision leading to oil leak and fire / gas leak and explosion Time Pier piles strength and redundancy incl ties Pier piles unable to bear load Loss of Control Partial bridge collapse, loss of containment of utilities & impact on rail bridge Consequence Scenario Bridge structural instability (no collapse) Threat-barrier diagram: Fremantle Traffic Bridge Threat Scenarios Vessel collision – direct impact Vessel collision – glancing blow Substructure deterioration (eg pile degradation due to Teredo) Vessel collision leading to oil leak and fire / gas leak and explosion Piles sleeves Proactive monitoring & maintenance program to identify and address degradation Pre-LOC Barriers Fender system Emergency repairs Emergency management procedures Time Marine operations procedures Potential barriers • Good practice – international review • Not just “engineering” structural reinforcement/ realignment measures • Elimination of all or some of the issues eg replacement of bridge or spans • Management measures for marine vessels to prevent impact eg vessel traffic service • Engineering options to mitigate vessel impact on bridge piers eg fender upgrade or replacement • Emergency response measures eg early warning system to detect bridge structural instability • Consequence mitigation measures eg road traffic restrictions, relocation of utilities Pier piles strength and redundancy incl ties Pier piles unable to bear load Loss of Control Partial bridge collapse, loss of containment of utilities & impact on rail bridge Consequence Scenario Bridge structural instability (no collapse) Threat-barrier diagram: Fremantle Traffic Bridge Threat Scenarios Vessel collision – direct impact Vessel collision – glancing blow Substructure deterioration (eg pile degradation due to Teredo) Vessel collision leading to oil leak and fire / gas leak and explosion Piles sleeves Proactive monitoring & maintenance program to identify and address degradation Pre-LOC Barriers Fender system Emergency repairs Emergency management procedures Time Marine operations procedures Pier piles strength and redundancy incl ties (and upgrade) Relocation of utilities Replace bridge or spans Piles sleeves Emergency repairs Emergency management procedures (and early warning system and response plan) Utilities fixings/ piping design flexibility Proactive monitoring & maintenance program to identify and address degradation(1) Pier piles unable to bear load Partial bridge collapse, loss of containment of utilities & impact on rail bridge(3) Pre-LOC Barriers Post-LOC Barriers Time Threat-barrier diagram: Fremantle Traffic Bridge Threat Scenarios Loss of Control Consequence Scenario Notes: (1) Including pile condition monitoring, bolt condition monitoring etc. (2) Fender upgrade options include pontoons, monopiles, fender strengthening and refurbishment, fender replacement, independent protective structures (piled dolphins, concrete caissons etc), cofferdam islands, island bunds around piers, and vessel guide systems. (3) With subsequent downstream utilities, marine, road and rail network impacts. Vessel collision – direct impact Bridge structural instability (no collapse)(3) Vessel collision – glancing blow Substructure deterioration (eg pile degradation due to Teredo) New/significantly improved barrier Existing barrier Vessel collision leading to oil leak and fire / gas leak and explosion Fender system (and upgrade)(2) Navigational aids Permanent road traffic restrictions Marine operations procedures Reasonable barriers • Review each identified option to develop suite of reasonable measures to take forward • Comprehensive stakeholder workshop to narrow options – road, rail and marine authorities, marine and rail operators, heritage authority, • Followed by final decision in project leadership group workshop Key points • Focus on implementation and maintenance of barriers • Ensure all decisions are made within the assessment framework, and all actions are tracked • Monitor and review, communicate and consult • Document Input Process Output Inspection and Maintenance Framework Record Issue Notification Form (maintenance and operation personnel) Engineering Observation Form Inspection and Maintenance Database (eg spreadsheet) Reporting (to management & Board) Maintenance system Trigger and Response Plan Work order (to maintenance personnel) Exis%ng Maintenance Program Training (maintenance and operations personnel) Material/Load Testing (one-off or periodic) Operations procedures (eg load limits) DUE DILIGENCE ENGINEERS Projects have an interesting conceptual risk profile. The upside risk position is assumed in the proposal. The risk analysis generally focuses on those issues which will prevent the assumed upside benefits from being achieved. That is, it is a downside risk assessment process from an assumed upside risk position. Again the vulnerability approach can be used as shown below. Project Due Diligence DUE DILIGENCE ENGINEERS Project Due Diligence Project Planning Construction Operations & MaintenanceConcept Scope refinement Tendering Commissioning Project Risk Management Project Due Diligence Project Critical Success Factors DUE DILIGENCE ENGINEERS Project Due Diligence Construction Operations & MaintenanceConcept Scope refinement Tendering Commissioning Project Risk Management Project Due Diligence Critical Success Factors Vulnerabilities Threats Preliminary costof-risk estimates Cost-of-risk estimates Cost-of-risk review DUE DILIGENCE ENGINEERS Limits to Monte Carlo Project Due Diligence Potential project show stoppers Project Risk Management Likelihood Consequence Promised project upside risk position DUE DILIGENCE ENGINEERS Silos DUE DILIGENCE ENGINEERS Two+ Stage Workshop DUE DILIGENCE ENGINEERS Project Due Diligence Process 2.0 Credible threats 5.2 Risk profile 5.1 Residual risk profile 5.2 Contingency sums 3.0 Credible vulnerabilities 1.0 Project critical success factors 6.0 Action list 5.0 Precautions / protection / controls 4.0 Criticality review 5.1 Risk assessment DUE DILIGENCE ENGINEERS Geographic Zones Water Distribu:on (From Robinson & Anderson (2000)) DUE DILIGENCE ENGINEERS Each of these sub-assets could then be examined for their vulnerability to each of the listed threats. All these approaches assume that the analyst has a clear view of what the business of the organisation actually is, something that is not always easily achieved. It is very difficult to undertake a risk analysis if the organisation concerned cannot clearly state its business at the outset. Geographic Zones DUE DILIGENCE ENGINEERS Gas Plant Dependence Diagram DUE DILIGENCE ENGINEERS Functional Vulnerability Critical Success Factors > Capital Site Technology Design / Builder Market Credible Threats Competitive x - x x Credit Squeeze xxx - - xx xxx Customer Default x - x - x Exchange Fluctuations xx - x - x Fraud xxx - - - x Funding Source Failure xxx - - - x Industrial x - xx - Interest Rate Change xx - - - Liquidity xx - - - Political x - - - Scandal xxx - - - Takeover v/a - xx - War xxx xxx - xxx xxx DUE DILIGENCE ENGINEERS Rock concert Highway projects More Examples DUE DILIGENCE ENGINEERS Spreadsheet Vulnerability Table DUE DILIGENCE ENGINEERS Spreadsheet Risk Register DUE DILIGENCE ENGINEERS Escalation Framework Board and Chief Executive Officer General Manager A B C Corporate Risk Policy and Escalation Protocol consistent with ISO (AS) 31000 Project vulnerability table and risk register (criticality driven) (spreadsheet workbook) Project risk registers (by credible threat, that is, 10s not 100s) Risk Owner Functional (time sequence) and zonal vulnerability assessments Build Operations & MaintenanceConcept / Definition Detailed Design Project Due Diligence Critical Success Factors Vulnerabilities Threats Military Intelligence Threat & Vulnerability Project Risk Assessment Process D DUE DILIGENCE ENGINEERS Project characterisation DUE DILIGENCE ENGINEERS Risk Characterisation Likelihood 100% Show stopper -$3,000,000 -$1,000,000 -$300,000 -$100,000 $100,000 $300,000 $1,000,000 30% Show stopper -$900,000 -$300,000 -$90,000 -$30,000 $30,000 $90,000 $300,000 10% Show stopper -$300,000 -$100,000 -$30,000 -$10,000 $10,000 $30,000 $100,000 3% Show stopper -$90,000 -$30,000 -$9,000 -$3,000 $3,000 $9,000 $30,000 1% Show stopper -$30,000 -$10,000 -$3,000 -$1,000 $1,000 $3,000 $10,000 xxx xx x - -100% -30% -10% -3% -1% 1% 3% 10% Negative Consequences Positive consequences DUE DILIGENCE ENGINEERS If the project delays and costs can be usefully characterised then contingency sums and delays can be estimated. This can be simply done by calculating the loss expectancy of the residual risks and then summing these. Typical Consequence Values for a Project DUE DILIGENCE ENGINEERS For example, wet weather is estimated at a 50% chance of 6 days. The average wet weather loss expectancy is then 3 days for the project. Such an approach assumes that each risk being considered is discrete. That is, the loss events do not overlap. Typical Consequence Values for a Project DUE DILIGENCE ENGINEERS SWOT Characterisation - + + + - - + + + + + x x x x x x o Criticality - - - Vulnerabilities Value Addeds Likelihood Consequence Unviable Ugly Bad Good Outstanding DUE DILIGENCE ENGINEERS Project Risk Stages - + + + - - + + + + + x x x x x x o Criticality - - - Vulnerabilities Value Addeds Likelihood Consequence Unviable Ugly Bad Good Outstanding R2A Due Diligence Engineers R2A Pty Ltd Level 1 55 Hardware Lane Melbourne VIC 3000 Australia P +61 1300 772 333 F +61 3 9670 6360 E [email protected] W www.r2a.com.au ABN 66 115 818 338