Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Identifying, prioritizing and deciding how to deal with risks (Part I)

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Identifying, prioritizing and deciding how to deal with risks (Part I)

  • February 19, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 1: The Risk Management Process Identifying, prioritizing and deciding how to deal with risks (Part I)

In this video, you will:

  • Learn about the first two steps of an effective risk assessment process: what to protect and what to protect it from
  • Learn how to identify and prioritize the main risks or problems you might be facing
  • Be able to understand and specify what assets need to protected, such as key people, processes, systems and data
  • Get familiar with the threat modelling process, allowing you identify the unwanted events that can threaten your assets
Main takeaways:
  • First stage of the risk management process is called the risk assessment, which guides you through identification and prioritization of the main risks and problems you might be facing.
  • It is important to understand and specify WHAT needs to be protected. The identified elements are called assets, and the process of identifying them is known as asset enumeration. These assets can include people, processes, systems, data, or anything else that needs to be protected. After identifying all relevant elements, you can collect them in a list of assets.
  • During the identification process, it is good to establish a security perimeter by defining what’s “inside” and “outside” the organization’s responsibility to protect, ensuring key people, processes, systems, and data stay within the perimeter. By doing so, critical assets can be better protected and the security measures simplified.
  • After identifying the assets, it is important to understand WHO can do WHAT to the assets. The potential unwanted events that could impact the assets are called threats, and the process of identifying them is known as threat modelling. It is important to conduct the modelling in a collaborative way, as the perception of threats is not the same for everyone. After identifying all relevant threats, they can be collected in a list of threats.

Mandatory Resources:

Handout: The risk management process
Handout Thumbnail
Handout: The risk matrix
Handout Thumbnail
Handout: Risk response strategies
Handout Thumbnail
Exercise template: The risk management process
Exercise Thumbnail

Recommended Resources:

📄
Starlight Stadium: Episode 2, Scene 2
📄
Workbook on Security: Practical Steps for Human Rights Defenders at Risk, Front Line Defenders
📄
The Security Risk Assessment Tool, Open Briefing

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Previous Topic
Back to Lesson
Next Topic
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account