?
Solved

risk assessment / impact to the business analysis

Posted on 2011-10-19
6
Medium Priority
?
670 Views
Last Modified: 2012-05-12
Can I ask what are the main difference between a risk assessment and a BI (business impact) analysis. WHat is the outcome of one as opposed the other?

Would much prefer some comments and dialogues as opposed to links.

For example what would a risk assessment of a new mobile technology such as ipads include - and what would a business impact assessment include for the same issue?

What kind of issues do you include in BIA and what dont you have to bother about?
0
Comment
Question by:pma111
  • 3
  • 3
6 Comments
 
LVL 9

Accepted Solution

by:
Red-King earned 2000 total points
ID: 36991786
My take on this is that a Risk Assessment is documenting the risks and issues related to a project and the effort required to mitigate those. For me this would be used to determine whether a project is feasible from a technical point of view regardless of the financial investment.

A Business Impact Analysis documents how a project will effect the day to day running of the business. This can include both positive and negative impacts. I would also think this type of analysis would be more likely to include financials e.g. cost of implementation versus productivity gains. The BI is also something that could be done after the project once the real detail has been collected to show the expected versus the actual results.

Rory

0
 
LVL 3

Author Comment

by:pma111
ID: 36991877
Ok thanks  - so for example what negatives would there be in for example enforcing every user to use encrypted USB drives, or to implement a 2 factor authentication projects for VPN or citrix? If it focuses on both positive and negative it would be useful to get some examples on negatives for seemingly good practice security.
0
 
LVL 9

Expert Comment

by:Red-King
ID: 36991955
The kind of things I would include as negatives in such cases would be things that decrease productivity e.g. A user may have to undergo an extra step or 2 to achive the same result without the security features. Another would be that users may need to under training which requires time and cost.

Essentially a negative would be something that would require extra time or expenditure compared to the current procedure.
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
LVL 3

Author Comment

by:pma111
ID: 36992027
Ok many thanks
0
 
LVL 3

Author Comment

by:pma111
ID: 36992122
SHould the BIA come out with a decision, yes this project is a goer - no this project doesnt offer enough benefits.

Or is it smply a case of listing the pros and cons to the business in some sort of table? ANd then giving it management and saying here you decide?  
0
 
LVL 9

Expert Comment

by:Red-King
ID: 36992223
That's something you'd need to ask your management I think. A quick email to ask whether or not they want your recommendation included or just the facts will clear up their expectations.
My own opinion is that it should present the details and go so far as to summarise them into a short overview. I'd then leave the decision making to the management unless asked. If I was included in a meeting that reviewed the analysis I'd give any opinions or recommendations then

0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Spectre and Meltdown, how it affects me and my clients?
This blog will spread awareness about Dropbox. We have given the statements based upon our experience. Along with this, there is a section of some new plans that should be added in Dropbox this year. This will make the storage service enhanced from …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

616 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question