Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Identifying, prioritizing and deciding how to deal with risks (Part II)

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Identifying, prioritizing and deciding how to deal with risks (Part II)

  • February 19, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 1: The Risk Management Process Identifying, prioritizing and deciding how to deal with risks (Part II)

In this video, you will:

  • Acknowledge the evaluation of probability and impact of risks as part of the risk assessment process   
  • Learn how to assess the probability and impact of each identified threat by using the risk matrix
  • Learn about the different risk treatment options which may exist and how to use them
  • Understand the guiding principles behind the decision-making in risk treatment
Main takeaways:
  • As the final step of the risk assessment process, it is important to think which of the unwanted events are most likely to happen and which would have the most severe consequences. This process is called an analysis of the probability and impact of each threat. An unwanted event (threat), evaluated in light of its probability and impact, is actually a risk.
  • To assess the probability and impact of the threat, it is highly recommended to create a ranked list of risks and use the risk matrix. For more information on the risk matrix see additional materials.
  • When assessing the probability of a threat, past experiences of the organizations or individuals in the field need to be considered. For example, if a certain unwanted event happened very recently, you may consider the probability as high.
  • When assessing the impact of a threat, both the duration and intensity of the consequences need to be considered. For example, if a certain unwanted event causes only discomfort, the impact might be considered low, but if it prevents the organization from continuing to operate in the field, the impact may be considered high.
  • After the risk assessment, you are entering the second stage of the risk management process, called the risk treatment. In this stage, you are focusing on decisions or actions that can be made on each risk.
  • This course presents the four most common risk response strategies:
    • Avoid the risk completely by not doing the activity that would cause it.
    • Mitigate or Reduce the risk by developing and implementing security measures that reduce the magnate of the risk to an acceptable level.
    • Share or Transfer the risk by partially or fully sharing it with someone else, who might already have appropriate security measures in place.
    • Accept the risk by acknowledging it and deciding to “do nothing” about it.
  • When deciding on how to treat different risks, what strategy to use, it is good to: know your context, understand your resources, own the process, evaluate your progress, and seek support if needed.
Exercise
Tailor the risk management process to your context

Please take a moment to reflect, and use your own organization (or your personal situation) as an example to complete the Step 1 – Identify and Prioritize the Main Risks of the risk management process.

This exercise will help you clearly identify the most critical risks and challenges you may face, prioritize them based on their potential impact, and explore possible solutions to address them.

Please note that this exercise is for your personal practice and self-assessment only, and your responses will not be evaluated as part of the course.

Click here to start the exercise

Before moving on to the quiz, we recommend you to review the main takeaways of this module, and to check the additional resources provided under the “Materials” tab above.

Mandatory Resources:

Handout: The risk management process
Handout Thumbnail
Handout: The risk matrix
Handout Thumbnail
Handout: Risk response strategies
Handout Thumbnail
Exercise template: The risk management process
Exercise Thumbnail

Recommended Resources:

📄
Starlight Stadium: Episode 2, Scene 2
📄
Workbook on Security: Practical Steps for Human Rights Defenders at Risk, Front Line Defenders
📄
The Security Risk Assessment Tool, Open Briefing

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Quizzes
Module 1 Quiz: The Risk Management Process
Previous Topic
Back to Lesson
Next Lesson
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account