.
Resilient Support: Implementing Business Continuity Management at Ministry of Manpower (Singapore)
BB TAL Assessing Risks and Threats

[BCM] [MOM] [E3] [RAR] [T3] Risk Impact and Likelihood Assessment

In Part 3, we move from identifying and listing the threat scenarios (in Part 1) to analysing their impacts and likelihoods.

The objective is to quantify (or qualitatively score) the potential impact of each threat on the Ministry of Manpower across a range of impact areas, and then calculate a risk rating (impact × likelihood).

This allows us to prioritize which threats demand more urgent attention, mitigation, or contingency planning, given limited resources.

Using the BCM Planning Methodology (RAR 3-1), each threat is assessed against seven impact areas (Finance; Operations; Legal & Regulatory; Reputation & Image; Social Responsibility; People; and Assets/IT/Information)

The highest individual impact score becomes the “Risk Impact Area (Highest Numeric Score)”, which is then multiplied by the “Risk Likelihood” to derive the “Risk Rating” and thereby assign a “Risk Level” (e.g. Very Low, Low, Medium, High, Very High). Finally, we estimate how long the disruption is likely to last under that threat.

Dr Goh Moh Heng
Business Continuity Management Certified Planner-Specialist-Expert
MOM Legal Disclaimer Banner

Bann_BCM_RAR_Risk Impact and Likelihood Assessment

Part 3: RAR - Risk Impact and Likelihood Assessment

Part 3: Risk Impact and Likelihood Assessment

Introduction

[BCM] [MOM] [E3] [RAR] [T3] Risk Impact and Likelihood Assessmen

In Part 3, we move from identifying and listing the threat scenarios (in Part 1) to analysing their impacts and likelihoods.

The objective is to quantify (or qualitatively score) the potential impact of each threat on the Ministry of Manpower across a range of impact areas, and then calculate a risk rating (impact × likelihood).

This allows us to prioritize which threats demand more urgent attention,  mitigation, or contingency planning, given limited resources.

Using the BCM Planning Methodology (RAR 3-1), each threat is assessed against seven impact areas (Finance; Operations; Legal & Regulatory; Reputation & Image; Social Responsibility; People; and Assets/IT/Information)

The highest individual impact score becomes the “Risk Impact Area (Highest Numeric Score)”, which is then multiplied by the “Risk Likelihood” to derive the “Risk Rating” and thereby assign a “Risk Level” (e.g., Very Low, Low, Medium, High, Very High). Finally, we estimate how long the disruption is likely to last under that threat.

This structured tabulation guides decision-makers in selecting which threats to treat (e.g., through mitigation, transfer, acceptance, or avoidance) and informs the development of continuity plans.

Risk Impact and Likelihood Table (MOM)

Below is a template table with sample threat rows. Replace or expand with your actual threats and scoring.

Threat

Impact Area – Finance

Impact Area – Operations

Impact Area – Legal & Regulatory

Impact Area – Reputation & Image

Impact Area – Social Responsibility

Impact Area – People

Impact Area – Assets / IT Systems / Information

Risk Impact Area (Highest Numeric Score)

Risk Likelihood

Risk Rating

Risk Level

Expected Period of Disruption

Cyberattack / data breach

4

4

5

5

2

3

5

5

3

15

High

2 days

Major system outage (IT infrastructure)

3

5

2

4

1

2

5

5

4

20

Very High

1 day

Regulatory non-compliance / policy violation

2

3

5

4

1

2

1

5

2

10

Medium

3 days

Natural disaster disrupting offices

2

4

1

3

2

3

3

4

1

4

Low

3 days

Critical staff shortage / pandemic

1

4

2

3

2

5

1

5

3

15

High

5 days

Fraud / financial misappropriation

5

2

4

4

1

1

1

5

2

10

Medium

1 day

Notes/guidance on use:
  • The numeric scales (for impact and likelihood) are typically from 1 to 5, where 5 = highest.
  • The “Risk Impact Area (Highest Numeric Score)” is simply the maximum of the seven impact columns for that threat.
  • Risk Rating = (Highest Impact) × (Likelihood)
  • The “Risk Level” is then mapped (e.g. 1-5 = Very Low, 6-10 = Low, 11-15 = Medium, 16-20 = High, etc.) depending on your risk matrix.
  • The “Expected Period of Disruption” is a qualitative/estimated duration (in hours or days) that the disruption might persist if the threat materializes.

Once you have filled in all the threats from Part 1, sort or highlight the highest-rated risks so that mitigation resources can be focused on them.

Concluding Remarks (for Part 3)

By the end of this Part 3 exercise, the Ministry of Manpower will have a clear, tabulated view of which threats pose the most significant risk (i.e., combining severity of impact and probability).

The Risk Rating and Risk Level provide a structured and objective basis to rank threats, rather than relying purely on intuition.

This sets the stage for Part 4 (Risk Treatment / Mitigation / Continuity Planning): the highest-rated threats are candidates for stronger controls, redundancies, fallback plans, or even risk transfer (e.g. insurance).

Lower-risk threats might be accepted, monitored, or addressed via low-cost safeguards. In the next chapter, we will take each high-priority threat from this table and propose mitigation strategies, action plans, resource allocation, and metrics to monitor residual risk over time.

Notes
  • Scoring Scale (1–5):
    • 1 = Very Low
    • 2 = Low
    • 3 = Medium
    • 4 = High
    • 5 = Very High
  • Likelihood Scale:
    • 1 = Very Low
    • 2 = Low
    • 3 = Medium
    • 4 = High
    • 5 = Very High
  • Risk Rating: Calculated as Impact x Likelihood
  • Risk Level:
    • 1–5: Low
    • 6–14: Medium
    • 15–25: High

Summing Up …

The results of the Risk Impact and Likelihood Assessment provide critical insights into the Judiciary’s exposure to various internal and external threats.

Risks such as cyberattacks, pandemics, and data breaches are assessed as having high impact and significant likelihood, highlighting the urgent need for robust controls, incident response protocols, and business continuity strategies in these areas.

This assessment also reveals that while some threats have a lower probability of occurrence (e.g., natural disasters or terrorist threats), their potential impact remains considerable and cannot be ignored.

Therefore, a balanced risk treatment approach—addressing both high-probability and high-impact scenarios—is essential.

In conclusion, this chapter equips stakeholders with a prioritised risk profile that supports informed decision-making and resource allocation.

It ensures that the Judiciary of Singapore and the State Courts can continue delivering justice effectively and efficiently, even in the face of adversity.

 

Resilient Support: Implementing Business Continuity Management at Ministry of Manpower (Singapore)
eBook 3: Starting Your BCM Implementation
MBCO P&S RAR T1 RAR T2 RAR T3 BCS T1  CBF
[BCM] [MOM] [E3] [BIA] MBCO Corporate MBCO [BCM] [MOM] [E3] [BIA] [P&S] Key Product and Services [BCM] [MOM] [E3] [RAR] [T1] List of Threats [BCM] [MOM] [E3] [RAR] [T2] Treatment and Control [BCM] [MOM] [E3] [RAR] [T3] Risk Impact and Likelihood Assessmen [BCM] [MOM] [E3] [BCS] [T1]  Mitigation Strategies and Justification [BCM] [MOM] [E1] [C10] Identifying Critical Business Functions
CBF 1: Labour Market Regulation and Enforcement
DP BIAQ T1 BIAQ T2 BIAQ T3 BCS T2 BCS T3 PD
[BCM] [MOM] [E3] [BIA] [DP] [CBF] [1] Labour Market Regulation and Enforcement [BCM] [MOM] [E3] [BIA] [T1] [CBF] [1] Labour Market Regulation and Enforcement [BCM] [MOM] [E3] [BIA] [T2] [CBF] [1] Labour Market Regulation and Enforcement [BCM] [MOM] [E3] [BIA] [T3] [CBF] [1] Labour Market Regulation and Enforcement [BCM] [MOM] [E3] [BCS] [T2] [CBF] [1] Recovery Strategies [BCM] [MOM] [E3] [BCS] [T3] [CBF] [1] Minimum Resources Required during a Disaster [BCM] [MOM] [E3] [PD] [CBF] [1] Labour Market Regulation and Enforcement

 

More Information About Business Continuity Management Courses

To learn more about the course and schedule, click the buttons below for the  BCM-300 Business Continuity Management Implementer [BCM-3] and the BCM-5000 Business Continuity Management Expert Implementer [BCM-5].

New call-to-action  New call-to-action Register [BL-B-3]*
New call-to-action New call-to-action New call-to-action
FAQ [BL-B-3]

Please feel free to send us a note if you have any questions.

Email to Sales Team [BCM Institute]

 FAQ BL-B-5 BCM-5000
New call-to-action New call-to-action New call-to-action

 

 
 

Your Comments Here:

 

More Posts

New Call-to-action