II.
Responsibility overview
Reference · liveresponsibility:risk-assessment
Risk Assessment overview
Identifying, quantifying, and prioritizing technical and operational risks across projects and infrastructure. Developing mitigation strategies and tracking their implementation to reduce exposure over time.
Attributes
displayName
Risk Assessment
description
Identifying, quantifying, and prioritizing technical and operational risks across
projects and infrastructure. Developing mitigation strategies and tracking their
implementation to reduce exposure over time.
cadence
sprint
Outgoing edges
None.
Incoming edges
holds_responsibility29
- role:compliance-engineer·RoleCompliance Engineer
- role:financial-analyst·RoleFinancial Analyst
- role:supply-chain-analyst·RoleSupply Chain Analyst
- role:legal-advisor·RoleLegal Advisor
- role:project-manager·RoleProject Manager
- role:business-analyst·RoleBusiness Analyst
- role:compliance-officer·RoleCompliance Officer
- role:privacy-engineer·RolePrivacy Engineer
- role:legal-counsel·RoleLegal Counsel
- role:audit-analyst·RoleAudit Analyst
- role:security-engineer·RoleSecurity Engineer
- role:qa-engineer·RoleQA Engineer
- role:embedded-engineer·RoleEmbedded Engineer
- role:engineering-manager·RoleEngineering Manager
- role:tech-lead·RoleTech Lead
- role:vp-engineering·RoleVP of Engineering
- role:cto·RoleChief Technology Officer
- role:architect·RoleArchitect
- role:release-manager·RoleRelease Manager
- role:change-manager·RoleChange Manager
- role:solutions-architect·RoleSolutions Architect
- role:biomedical-engineer·RoleBiomedical Engineer
- role:systems-integration-engineer·RoleSystems Integration Engineer
- role:technical-program-manager·RoleTechnical Program Manager
- role:management-consultant·RoleManagement Consultant
- role:license-auditor·RoleLicense Auditor
- role:threat-analyst·RoleThreat Analyst
- role:chief-security-officer·RoleChief Security Officer
- role:vulnerability-scanner·RoleVulnerability Scanner
triggers_responsibility23
- workflow:strategic-planning·WorkflowStrategic Planning
- workflow:financial-planning·WorkflowFinancial Planning
- workflow:contract-lifecycle·WorkflowContract Lifecycle
- workflow:data-pipeline-deployment·WorkflowData Pipeline Deployment
- workflow:ml-model-lifecycle·WorkflowML Model Lifecycle
- workflow:dependency-update·Workflow
- workflow:compliance-audit·WorkflowCompliance Audit
- workflow:data-governance-review·WorkflowData Governance Review
- workflow:vendor-evaluation·WorkflowVendor Evaluation
- workflow:budget-planning·WorkflowBudget Planning
- workflow:project-kickoff·WorkflowProject Kickoff
- workflow:capacity-planning·WorkflowCapacity Planning
- workflow:change-management·Workflow
- workflow:post-mortem-review·WorkflowPost-Mortem Review
- workflow:feature-flag-rollout·WorkflowFeature Flag Rollout
- workflow:canary-deployment·Workflow
- workflow:experiment-design·WorkflowExperiment Design
- workflow:lab-safety-audit·WorkflowLab Safety Audit
- workflow:vulnerability-management·Workflow
- workflow:access-review·WorkflowAccess Review
- workflow:security-audit·Workflow
- workflow:penetration-testing-cycle·WorkflowPenetration Testing Cycle
- workflow:penetration-testing·WorkflowPenetration Testing Engagement