Is there sufficient commitment from senior management or users?
Has all the technology been seen working somewhere?
his list is worth reviewing, but it needs to be supplemented with more specific issues relating to the project technologies and specific goals.
10.5.3 Example of a Risk Assessment
Table 10.4 is a risk assessment from an actual project (names have been changed). Each risk is given an ID number and a description. Each is assigned a probability and severity. In this case, they were multiplied to gen- erate a priority by which the table was sorted.
Each risk has an owner and mitigation and/or contingency actions. t is important to honestly identify risks in this shared document; but as this example shows, it may be necessary to be diplomatic