Exciting news! Thirdera has been acquired by Cognizant.

Contact Us
Jose with laptop 2022-07-2 Jose with laptop 2022-07-2

Risk Management Implementation

Accelerate risk-based decisions while monitoring and identifying high-impact risks.

Blueprint Overview

3 WEEKS
arrow

Initiate & Plan

5 WEEKS
arrow

Execute

2 WEEKS
arrow

Deliver

2 WEEKS
arrow

Go-Live & Beyond

Initiate & Plan

3 WEEKS
arrow

Demo Risk Management, collect requirements, and deliver stories for acceptance.

8 HRS Product Owner
9 HRS Scrum Master
32 HRS Development Team
6 HRS Customer Stakeholders
6 HRS Acceptance Testers
Weekly hours by role

Execute

5 WEEKS
arrow

Configure Risk Management as per best practice and customer requirements; continually show progress back to the customer and collect new requirements.

4 HRS Product Owner
8 HRS Scrum Master
38 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Deliver

2 WEEKS
arrow

Provide functional and technical knowledge transfer and support customer acceptance testers

12 HRS Product Owner
13 HRS Scrum Master
46 HRS Development Team
10 HRS Customer Stakeholders
8 HRS Acceptance Testers
Weekly hours by role

Go-Live & Beyond

2 WEEKS
arrow

Promote code to production and provide support.

4 HRS Product Owner
8 HRS Scrum Master
22 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Thirdera Staffing

role icon

Engagement Manager

Responsible for providing leadership and direction to achieve growth and transformation.

role icon

Functional Lead

Analyzes business requirements and provides system design while implementing system solutions.

role icon

Technical Lead

Ensures the smooth functioning of technical operations, monitors and evaluates staff progress, and ensures overall client satisfaction.

Mei, young asian woman jumping with headphones 2022-10 Mei, young asian woman jumping with headphones 2022-10

Project Scope

Thirdera's Risk Management Blueprint includes a robust list of deliverables to set your Risk program on course for long-term success. Guided by proven best practices, our team of advisory and technical experts configures and implements a solution best fit for your unique needs while establishing a foundation of knowledge to promote ongoing Risk maturation. Key deliverables include:

 

  • Loading core data including Risk Frameworks, Risk Statements, and Risk based on customer provided data
  • Configure risk lifecycle including ownership, workflow, and notifications
  • Define initial values for risk scoring
  • Configure tasks for the handling of risk response
  • Set entity types and generate entities, which will be used for risk generation
  • Configure process for issue creation, issue life cycle, and remediation of issues
  • Configure risk lifecycle (including ownership, workflow, and notifications)
  • Configure notifications, reports, and dashboards from templates
  • Activation of a risk management workspace
  • Provide Functional Overview, Technical Knowledge transfer, and UAT Support

Outcomes

 

Streamlined Ownership

Clear ownership of risks, issues, and entities within the organization.
Icon-Approval

Consolidated View

Single searchable risk register.
Icon-Approval

Risk Posture

Complete view into risk posture by an entity, risk statement, and risk framework.
Icon-Approval

Risk Scoring

Defined risk assessment to facilitate risk scoring.
Icon-Approval

Risk Response Process

Defined and reportable risk response process.
Icon-Approval

Dashboards & Reporting

Dedicated dashboards and reporting to increase visibility and simplify program management.

Let's get started

 

Connect with our Security Operations experts for a detailed look at what an assessment would look like at your organization and how to improve your cyber resilience and risk management. 

 

Get in touch