Risk ManagementProject ManagementRisk Register

Project Risk Management: the complete guide

Every project carries risk. The question is whether you manage it or let it manage you. Most risk frameworks cover the technical threats well — cost overruns, schedule slips, vendor failures. What they miss are the soft risks: the politics, the hidden agendas, and the people who turn problems into weapons. This guide covers both.

HC
Inspired by Henning Christiansen
Project Management: The Red Pill — Ch. 12–13
16 min read
Updated May 2026

This article references Monkey Poker — the political game that runs beneath the surface of every project — and the six stakeholder types that play it.

Full guide: Stakeholder Management and Monkey Poker →

What is project risk management?

Project risk management is the systematic process of identifying, assessing, prioritising, and responding to potential threats and opportunities that could affect a project's objectives. A well-run risk management process doesn't eliminate uncertainty — no process can. It ensures that the project team is never surprised by something they could have anticipated, and never unprepared for something they did anticipate.

Traditional risk management frameworks — PMI's PMBOK, PRINCE2, ISO 31000 — provide rigorous methodologies for cataloguing, scoring, and responding to risk. They are structured around identifying what might go wrong, assessing the probability and impact of each risk, and planning specific responses. This is necessary, useful work.

But as Henning Christiansen argues in Project Management: The Red Pill, it covers only the hard risks — the technical, logistical, and financial threats that appear in risk registers and Gantt charts. There is a second category of risk that most frameworks barely acknowledge: the soft risks that come from human nature, political dynamics, and the social games that run beneath the surface of every project.

70%
of projects fail to meet original objectives — most failures were foreseeable
56%
of failed projects cite poor risk management as a contributing factor
50%
of remaining failures originate from human and political dynamics, not technical problems

Bugs, issues, and risks: why the distinction matters

Not all problems are the same kind of problem, and treating them the same way is one of the most common sources of wasted effort in project management. Christiansen draws a sharp distinction between three categories that too many teams conflate:

🐛
Bug
A known defect that has already occurred. Something in the system is behaving incorrectly. Bugs need to be fixed — they are not risks, they are facts.
Ex: A button on a website does not work when clicked. A calculation gives the wrong result.
⚠️
Issue
A current problem affecting the project — not just technical. Delays, miscommunications, resource shortages, scope confusion. Issues are active and blocking progress right now.
Ex: A key team member is out sick. There is confusion about project scope. A stakeholder is unresponsive.
🔮
Risk
A potential future problem — something that might happen and could affect project success. Risks are not yet real, but they need to be tracked and planned for.
Ex: A vendor might deliver late. A key dependency may not be ready. A stakeholder may withdraw support.

The distinction is not semantic. A bug needs a fix. An issue needs immediate resolution and transparent communication. A risk needs a documented response plan — before it becomes an issue. Mixing these categories leads to wasted effort on the wrong type of response and, critically, to the delays and political chaos that occur when problems are escalated with the wrong framing.

Hard risks and soft risks: the two dimensions of project risk

Christiansen's most important contribution to risk management thinking is his insistence that problem-solving must operate on two tracks simultaneously — what he calls hardcore problem-solving and softcore stakeholder management. Both are equally important. Neglecting either one creates a different kind of failure.

Hard risks — the technical dimension

Hard risks are the ones that live in risk registers: schedule slippage, budget overrun, technical dependencies, vendor failures, resource unavailability, regulatory changes, infrastructure failures. These are managed through structured, process-driven approaches — risk identification workshops, probability/impact matrices, response planning, contingency budgets, and regular review cycles.

Soft risks — the human dimension

Soft risks are the ones most frameworks barely mention. They include political maneuvering, blame-shifting, hidden agendas, stakeholder resistance, and the deliberate exploitation of problems by individuals looking to advance their personal interests. Christiansen is explicit: when problems arise, Chameleons and Roosters find favourable conditions to engage in Monkey Poker. Problems become opportunities for individuals to shift blame, gain visibility, or undermine others for personal gain.

"Bugs, issues, and risks are opportunities for Chameleons and Roosters to play Monkey Poker. The project manager is not just solving technical or logistical problems. The manager must also be alert to soft risks like political manoeuvring, blame-shifting, and hidden agendas."

— Henning Christiansen, Project Management: The Red Pill
🃏
The "hornet's nest" move

When Chameleons or Roosters want to force a change they know won't pass formal review, they artificially escalate urgency — creating a false sense of crisis that pressures the team into acceptance. "We're going to lose the client." "This violates industry standards." The project manager's defence is clear: validate the claim with facts. If the platform isn't actually burning, demonstrating that stability destroys the move and damages the attacker's credibility.

Step 1 — Risk identification

Risk identification is the foundation of the entire risk management process. A risk that isn't identified can't be managed. The goal is to surface every plausible threat — technical, financial, organisational, external, and human — before the project starts.

1
Map the project model and identify dependencies
Every risk lives in a task or a relationship between tasks. When a problem is identified, the affected parts of the project model and its sub-models should be determined as quickly as possible. The model reveals all other potentially affected components — giving you the first map of risk propagation before you've even written a single risk statement.
Dependency mapping in the project model is your fastest path to understanding risk cascades
2
Run structured risk identification sessions
Involve the team, key stakeholders, and relevant experts. Use structured prompts: what assumptions are we making that could be wrong? What dependencies do we not control? What has failed in similar projects before? What external events could change our context? Every assumption is a potential risk.
Key technique: FMEA (Failure Modes and Effects Analysis)A proactive tool that helps anticipate what might go wrong (failure modes), what the consequences would be (effects), and how likely, severe, and detectable the issue is. Also consider: Fault Tree Analysis, 5 Whys, the Fishbone Diagram, and DRBFM.
3
Identify stakeholder-level soft risks explicitly
For every key stakeholder, assess: Do they have a personal interest that could conflict with the project's goals? Are they a Chameleon (career-driven, likely to exploit visibility opportunities)? A Rooster (expert-identity, likely to resist constraints)? A Monkey King (senior power, dangerous when activated)? Document these as explicit risks in your register — not just technical and schedule risks.
Use your stakeholder map from the vision board exercise — MoSCoW disagreements predict political risk points
4
Check historical data and past project records
What risks materialised in previous similar projects? What was their actual impact? What did the response cost? Historical data is the most reliable input to both risk identification and probability assessment. Project templates that carry risk data forward from previous projects are an enormous advantage here.

Step 2 — Risk assessment: the probability/impact matrix

Once risks are identified, they need to be assessed: how likely is each risk to occur, and how severe would the impact be? The standard tool for this is the probability/impact matrix — a 5×5 or simplified 3×3 grid that scores each risk and determines its priority level.

Probability ↓ / Impact →Low impactMedium impactHigh impactCritical impact
High probabilityMediumHighCriticalCritical
Medium probabilityLowMediumHighCritical
Low probabilityLowLowMediumHigh

The matrix gives you a triage system: Critical and High risks need active response plans and regular review. Medium risks need monitoring and contingency thinking. Low risks are documented and watched but don't require dedicated response planning unless their status changes.

📌
Score soft risks too

Political and stakeholder risks are real risks and should be scored on the same matrix. A Chameleon in a senior position who has already shown signs of using the project as a career vehicle is a high-probability, potentially high-impact risk. Leaving it off the register doesn't make it less real — it just leaves you unprepared when it materialises.

The risk register: your single source of truth

A risk register is the living document that captures every identified risk, its assessment, its owner, and the planned response. It is not a one-time output — it is updated throughout the project lifecycle as new risks emerge, existing risks change in probability or impact, and planned responses are executed or revised.

#Risk descriptionCategoryProbabilityImpactPriorityOwnerResponse
R-01Key vendor delivers API integration 3+ weeks lateTechnicalMediumHighHighPMParallel track with fallback vendor identified
R-02Senior stakeholder (Chameleon profile) pushes scope additions during delivery phasePoliticalHighMediumHighPMMoSCoW scope locked; change request process enforced; credit-sharing strategy active
R-03Lead developer leaves before feature completionResourceLowCriticalHighTech LeadKnowledge documented; pair programming on critical modules
R-04Regulatory approval takes longer than 6 weeksExternalMediumMediumMediumPMSubmit 8 weeks early; identify parallel workstreams not blocked by approval
R-05Infrastructure costs 20% above estimate due to scaling needsFinancialLowMediumLowFinance leadContingency reserved; reviewed at phase gate

Every risk in the register should have a clearly assigned owner — the person responsible for monitoring the risk and executing the response if it materialises. The project manager owns the register itself and the overall risk management process. Individual risks are owned by the person best positioned to detect early warning signs and execute the response.

FMEA and analytical risk tools

For projects with complex technical components, structured analytical methods add rigour to risk identification and assessment. FMEA (Failure Modes and Effects Analysis) is one of the most widely used.

🔍
Failure Mode
What could go wrong?
Identify every way a component, process, or task could fail to perform its intended function. Be specific — "vendor delay" is too broad; "vendor delivers API specification 3+ weeks late due to internal resource reallocation" is actionable.
💥
Effects Analysis
What are the consequences?
For each failure mode, trace the cascade of effects through the project model. Which downstream tasks are blocked? What is the cost and schedule impact? Which stakeholders are affected? Understanding the effect is what determines the response priority.
📊
RPN Score
How critical is it?
FMEA calculates a Risk Priority Number (RPN) = Severity × Occurrence × Detectability. High RPN scores identify the risks requiring the most urgent attention and the largest response investment. Scores are relative — use them for prioritisation, not absolute thresholds.

Other useful analytical methods include Fault Tree Analysis (working backwards from a failure to its root causes), the 5 Whys (iterative root cause analysis), the Fishbone Diagram (cause-and-effect mapping), and DRBFM (Design Review Based on Failure Mode — useful when a change introduces new risk into a previously stable system).

Step 3 — Risk response strategies

Identifying and assessing a risk without planning a response is administrative theatre. Every risk above the "monitor" threshold needs an explicit, documented response strategy. There are four standard approaches:

Avoid
Eliminate the risk entirely
Change the project plan to remove the threat. If a technology is unproven and its failure would be critical, choose a proven alternative. Avoidance is expensive — it may mean descoping features or replacing vendors — but for critical risks with no reliable mitigation, it is the right choice.
Ex: Switch from a new, untested payment gateway to an established one to eliminate integration failure risk.
Reduce (Mitigate)
Lower probability or impact
Take actions that make the risk less likely to occur or less damaging if it does. Prototyping validates assumptions early. Documentation reduces knowledge loss from staff turnover. Early user testing catches requirement misunderstandings before they become expensive fixes.
Ex: Run parallel vendor tracks so that a delay from one vendor doesn't block the entire delivery stream.
Transfer
Shift the risk to another party
Insurance, fixed-price contracts, and outsourcing are all forms of risk transfer. Transfer doesn't eliminate the risk — it changes who bears the financial consequence if it materialises. Be careful: transferred risks can return as relationship and quality risks.
Ex: Include penalty clauses in vendor contracts for late delivery to transfer schedule risk.
Accept
Acknowledge and absorb
For low-priority risks where the cost of response exceeds the expected cost of the risk materialising, acceptance is the rational choice. Document the decision explicitly — passive acceptance (ignoring the risk) is not the same as active acceptance (making a considered decision to absorb it).
Ex: Accept the risk of minor delays from public holidays, with a small buffer in the schedule as the only response.

Case study: Heathrow Terminal 5 — when the hard risk succeeds and the soft risk is ignored

📚 Case Study — Risk management failure in a "successful" project

Heathrow Terminal 5 opening day (2008)

Heathrow Terminal 5 is one of the most instructive risk management cases in modern project history — precisely because it succeeded on the hard metrics and failed catastrophically on the soft ones.

£4.3B
Total project cost — delivered on budget
42,000+
Bags misrouted on opening day
500+
Flights cancelled in first days

The terminal was delivered on time and within budget. The construction was flawless. Every hard metric was hit. But the project team severely underestimated the complexity of getting the terminal operational — particularly staff readiness and the integration testing of the automated baggage handling system.

On opening day, the system failed almost immediately. Staff were unfamiliar with the layout. The baggage system experienced glitches that caused over 42,000 bags to go missing and hundreds of flights to be cancelled in the first days. The damage to British Airways' reputation cost far more than any construction overrun could have.

The lesson Christiansen draws: flawless construction means little if operational systems and end-user readiness are not treated as risks. The soft risks — human readiness, process integration, real-world testing — were not in the risk register, so no one responded to them.

  • Operational readiness was treated as an implementation task, not a risk domain
  • Staff training was not tested under realistic load conditions before go-live
  • The baggage system had never been run at full scale before opening day
  • No hard risk framework can catch what it hasn't been asked to look for

Step 4 — Ongoing monitoring and control

Risk management is not a planning-phase activity. It is a continuous discipline that runs for the entire project lifecycle. Risks that were low probability at the start may become high probability as the project progresses. New risks emerge as scope evolves, team dynamics shift, or the external environment changes.

The project manager's monitoring responsibilities include: reviewing the risk register at every milestone and phase gate, updating probability and impact scores as information changes, tracking early warning indicators for high-priority risks, and escalating promptly when a risk materialises or its status changes significantly.

Stabilise the external environment first

Christiansen's priority framework is clear: external stakeholder noise creates more disruption than internal uncertainty. When problems arise, the project manager's first priority is to stabilise the external environment — managing stakeholder expectations, client concerns, and visible outputs. Internal challenges can usually be addressed more effectively once external pressures are contained.

Early warning indicators

For each high-priority risk, document specific observable indicators that would signal the risk is becoming more likely. These might include: a vendor missing an intermediate milestone, a stakeholder becoming unresponsive to update requests, a technical test producing unexpected results, or a budget line trending above its threshold. Monitoring indicators is far more effective than waiting for a risk to fully materialise before responding.

Managing soft risks: the political dimension

When a problem materialises — whether a bug, an issue, or a risk event — it creates conditions that political actors within the project will immediately try to exploit. The project manager's response must operate on two tracks simultaneously.

Christiansen's two-track response model

Track 1: Hardcore problem-solving

Identify which parts of the project model are affected. Assess the scope of the problem — what is it, what are the effects, how can it be resolved. Communicate the status and scope clearly to the team. Focus technical resources on resolution without external interference.

  • Determine the affected models and sub-models immediately
  • Use FMEA, 5 Whys, or Fault Tree Analysis to understand root cause
  • Define the resolution clearly before communicating externally
  • Give the team space to solve the problem without stakeholder pressure

Track 2: Softcore stakeholder management

If the problem can be resolved without impacting external stakeholders, manage it internally and say nothing externally. If it cannot, communicate proactively before stakeholders receive information through informal channels. Transparency before they hear it elsewhere builds trust; being informed second destroys it.

  • Identify which stakeholders have a vested interest in the affected components
  • Communicate proactively to affected stakeholders before the rumour mill does
  • Address Chameleon and Rooster escalation tactics with facts, not defensiveness
  • Keep the Monkey King informed and framing aligned with their interests
  • Maintain scope freeze during problem-solving — no new requirements until the current problem is resolved

Risk and scope creep: the connection most frameworks miss

Scope creep — the gradual, uncontrolled expansion of project requirements — is itself a risk, and one that compounds every other risk on the register. But it has a specific mechanism that Christiansen identifies clearly: it intensifies precisely when projects are under stress.

When a risk materialises and creates pressure — schedule slippage, budget variance, a client concern — Chameleons use the distraction to push additional features through under the banner of "client satisfaction". Roosters use the disruption as cover to work on technically interesting enhancements that have nothing to do with the core issue. The formal change control process is bypassed because "this is an emergency" and there's no time for paperwork.

⚠️
The critical rule during risk response

Maintain strict control over project scope during problem-solving phases. Resist any new features or requirements until the current problem is fully resolved. Every addition during a crisis increases the number of variables in an already unstable system — and dramatically reduces the likelihood of a clean resolution.

Risk management in Proglar

Proglar's project management system supports the two-track risk management discipline described throughout this article. The project model structure makes risk cascade analysis immediate: when any component is flagged, the system shows which dependent tasks and models are potentially affected. The risk register is integrated with the project model, so every risk is connected to the specific tasks and milestones it threatens.

Time tracking data feeds risk monitoring: when actual hours on a task consistently exceed estimates, the system surfaces that as an early warning indicator. Change requests are managed within a formal process that maintains scope integrity — preventing the bypass tactics that Chameleons and Roosters favour under pressure.

Risk management built into every project

Proglar connects your risk register to your project model, your time tracking, and your change request process — so every risk is monitored in context, not in isolation. Try free for 30 days.

Frequently asked questions

What is project risk management?
Project risk management is the systematic process of identifying, assessing, prioritising, and responding to potential threats and opportunities that could affect a project's objectives. It includes risk identification, probability/impact assessment, risk register maintenance, response planning (avoid, reduce, transfer, accept), and ongoing monitoring throughout the project lifecycle.
What is a risk register in project management?
A risk register is the living document that captures every identified risk, its probability and impact assessment, its priority level, its assigned owner, and the planned response strategy. It is updated continuously throughout the project — risks are added as they are identified, and existing risks are updated as their status changes. It serves as the project manager's single source of truth for all risk information.
What is the difference between a risk, an issue, and a bug?
A risk is a potential future problem — something that might happen. An issue is a current problem that is actively blocking or impacting progress. A bug is a known defect that has already occurred and needs to be fixed. The three require different responses: risks need monitoring and response planning, issues need immediate resolution and communication, bugs need technical fixes.
What are the four risk response strategies?
The four standard risk response strategies are: Avoid (change the plan to eliminate the risk entirely), Reduce/Mitigate (take actions to lower the probability or impact), Transfer (shift the financial consequence to another party through insurance, contracts, or outsourcing), and Accept (consciously acknowledge the risk and absorb it, typically for low-priority risks where the cost of response exceeds the expected cost of the risk itself).
What is FMEA in project risk management?
FMEA (Failure Modes and Effects Analysis) is a proactive analytical tool that systematically identifies what might go wrong in a system or process (failure modes), what the consequences would be (effects), and how likely, severe, and detectable each failure mode is. It calculates a Risk Priority Number (RPN) = Severity × Occurrence × Detectability. High-RPN items are the risks requiring the most urgent response planning.
How do you manage political risks in a project?
Political risks — stakeholders with hidden agendas, blame-shifting, scope creep driven by personal interests — are managed through a combination of: explicit identification in the risk register (treat them as real risks, not background noise), proactive stakeholder communication that controls the narrative, strict scope management that prevents opportunistic additions, and documented facts that neutralise politically-motivated claims. Christiansen's two-track model (hardcore problem-solving + softcore stakeholder management) is the framework.