Risk Management

Risk Analysis vs Risk Evaluation: What's the Difference?

Risk management terminology confuses many. Here we clarify risk identification, analysis, evaluation and treatment concepts.

  1. ISO
    ISO 31000 is the international standard for risk management
    ISO
  2. NIS2
    NIS2 requires risk assessment for network and information systems
    NIS2 Article 21
  3. 70%
    of organisations lack formal risk management processes
    Industry report

Terminology Confusion in Practice

Risk management is central to security work — required by ISO 27001, NIS2, GDPR and virtually all frameworks. But terminology varies and creates confusion.

Are risk analysis and risk evaluation the same thing? What’s the difference from risk management? And where does risk identification fit in?

Core principle: Names vary, but the process is the same. What matters is doing the work — not fighting over terminology. This guide helps you understand the concepts so you can communicate clearly.

ISO 31000 Definitions

Risk Management Process according to ISO 31000:

ConceptDefinitionIn Practice
Risk IdentificationFind, recognise and describe risksList potential threats and vulnerabilities
Risk AnalysisUnderstand risk nature and determine risk levelAssess likelihood × impact
Risk EvaluationCompare risk analysis results with risk criteria to prioritiseIs this risk acceptable? Which risks are greatest?
Risk TreatmentSelect and implement measures to manage riskReduce, avoid, share or accept

The entire process (identification → analysis → evaluation → treatment) is called risk management.

Visual Overview

┌─────────────────────────────────────────────────────────────┐
│                     RISK MANAGEMENT                         │
│  ┌──────────────┐  ┌──────────────┐  ┌──────────────┐      │
│  │  IDENTIFY    │→ │   ANALYSE    │→ │   EVALUATE   │      │
│  │  Find risks  │  │  Likelihood  │  │  Prioritise  │      │
│  │              │  │  Impact      │  │  Compare to  │      │
│  │              │  │  Risk level  │  │  criteria    │      │
│  └──────────────┘  └──────────────┘  └──────────────┘      │
│                                              ↓              │
│                                      ┌──────────────┐      │
│                                      │    TREAT     │      │
│                                      │  Implement   │      │
│                                      │  measures    │      │
│                                      └──────────────┘      │
└─────────────────────────────────────────────────────────────┘

Risk Identification in Detail

What do you do? Systematically find and describe risks that could affect organisational objectives.

Typical activities:

  • Inventory assets and their value
  • Identify threat actors and threat scenarios
  • Map vulnerabilities
  • Analyse historical incidents
  • Conduct workshops with business units

Output: A list of identified risks, each risk described with:

  • Threat actor (who/what)
  • Vulnerability (weakness that can be exploited)
  • Asset (what is affected)
  • Potential impact (what could happen)

Example: “The risk that external attackers (threat actor) exploit unpatched systems (vulnerability) to compromise customer data (asset), leading to data breach and GDPR fines (impact).”

Risk Analysis in Detail

What do you do? Understand the nature of risk by assessing likelihood and impact to determine risk level.

Likelihood Assessment:

LevelDescriptionFrequency
Very LowUnlikely<1 time per 10 years
LowCould occur1 time per 1-10 years
MediumLikely1 time per year
HighExpectedSeveral times per year
Very HighAlmost certainMonthly or more often

Impact Assessment:

LevelFinancialReputationLegal
Negligible<£5kNo impactNone
Low£5k-50kLocal impactWarning
Medium£50k-500kNational attentionFines
High£500k-5MLasting damageSerious fines
Catastrophic>£5MBusiness threatenedProsecution

Risk Level = Likelihood × Impact

Risk Evaluation in Detail

What do you do? Compare risk analysis results against organisational risk criteria to determine if risk is acceptable and prioritise actions.

Risk criteria define:

  • Which risk level is acceptable without action
  • Which risk level requires immediate action
  • Who makes decisions at different levels

Typical risk matrix:

NegligibleLowMediumHighCatastrophic
Very HighMediumHighHighCriticalCritical
HighLowMediumHighHighCritical
MediumLowMediumMediumHighHigh
LowNegligibleLowMediumMediumHigh
Very LowNegligibleNegligibleLowMediumMedium

Decisions based on evaluation:

  • Critical: Escalate to management, immediate action
  • High: Plan action within short timeframe
  • Medium: Address within reasonable time, monitor
  • Low: Acceptable with monitoring
  • Negligible: Accept without action

Risk Treatment in Detail

  1. Avoid the risk Remove the activity or asset creating the risk. Example: Stop storing data you don't need. Suitable when risk cost exceeds activity benefit.
  2. Reduce the risk Implement controls that reduce likelihood or impact. Most common. Example: Firewall, training, backup, encryption.
  3. Share the risk Transfer all or part of risk to another party. Example: Cyber insurance, outsourcing to specialist. Legal responsibility often remains.
  4. Accept the risk Conscious decision not to take action. Documented with justification and approval at appropriate level. Suitable for low risks where action costs more than the risk.

English vs Other Language Terms

Common translation confusion:

EnglishISO 31000Often Used
Risk identificationRisk identification-
Risk analysisRisk analysisRisk analysis
Risk evaluationRisk evaluationRisk assessment
Risk assessmentRisk assessment*Risk analysis*
Risk treatmentRisk treatmentRisk management*
Risk managementRisk management-

*“Risk assessment” can refer to different parts of the process depending on context. In ISO 27001, “risk assessment” includes the entire identification → analysis → evaluation process.

Practical rule: Ask what the person means. Terminology varies — the process is the same.

How NIS2 and ISO 27001 Use These Concepts

NIS2

NIS2 Article 21 requires “risk-based measures” and specifically mentions “risk analysis”. The directive doesn’t define exact process but requires organisations to:

  • Identify risks to network and information systems
  • Assess risk severity
  • Implement appropriate measures

ISO 27001

ISO 27001 requires a documented process for “information security risk assessment” that includes:

  • Establishing risk criteria
  • Identifying information security risks
  • Analysing and evaluating risks
  • Selecting risk treatment options

Practical Example: Ransomware Scenario

Identification: Risk: Ransomware attack encrypting business-critical systems and data.

  • Threat actor: Cybercriminals
  • Vulnerability: Poor email security, unpatched systems
  • Asset: ERP system, customer database
  • Impact: Business disruption, ransom payment, reputational damage

Analysis:

  • Likelihood: High (sector is targeted, similar companies affected)
  • Impact: High (1-2 weeks downtime, ~£500k direct costs)
  • Risk level: High (High × High)

Evaluation:

  • Risk criteria state: High risk requires action within 30 days
  • Priority: Top 3 of identified risks
  • Decision: Escalate to management, allocate resources

Treatment:

  • Reduce: Implement email security, patch management, backup
  • Share: Purchase cyber insurance
  • Residual risk: Accept after measures (reduced to Medium)

Common Pitfalls

Confusing the concepts

Using "risk analysis" when meaning the entire process. Unclear communication creates confusion.

Skipping identification

Going directly to assessing risks without systematic identification. Missing risks you haven't thought of.

Missing risk criteria

Evaluating risks without defined criteria. Subjective and inconsistent.

Stopping at evaluation

Doing the analysis but never implementing measures. Paper exercise without value.

Documentation Requirements

What should be documented?

StepDocumentation
IdentificationRisk register with all identified risks
AnalysisAssessment of likelihood and impact per risk
EvaluationRisk criteria, prioritisation, decisions
TreatmentAction plan, responsible person, deadline, status

For audit:

  • Show the process is systematic and repeatable
  • Document who participated and when
  • Save history to show improvement over time
  • Link risks to actions and evidence

How Securapilot Can Help

Securapilot structures the entire risk management process:

  • Risk Register — Identify and document risks
  • Risk Analysis — Assess likelihood and impact
  • Risk Evaluation — Defined criteria and prioritisation
  • Action Management — Track treatment and status
  • Reporting — Overview for management and audit

Book a demo and see how we can support your risk work.


Frequently asked questions

Are risk analysis and risk evaluation the same thing?

No, but they overlap. Risk analysis focuses on understanding likelihood and impact. Risk evaluation includes the analysis but adds comparison against risk criteria and prioritisation.

What comes first — analysis or evaluation?

According to ISO 31000: Risk identification → Risk analysis → Risk evaluation. Analysis provides data, evaluation assesses and prioritises based on that data.

What is risk treatment?

Risk treatment is the step after evaluation — selecting and implementing measures. Options are: avoid, reduce, share (insure/outsource), or accept the risk.

Must I follow ISO 31000?

ISO 31000 is guidance, not certifiable. But the terminology is used in ISO 27001, NIS2 and most frameworks. It helps to speak the same language.


#risk management#risk analysis#risk evaluation#ISO 31000#ISO 27005#NIS2

We use anonymous statistics without cookies to improve the website. Read more