Risk heatmap
Click any cell to focus the register. Counts follow the active filters.
TripTrapRisk and Troll Management
Projects, BAU teams, service change and operational work
Capture risks quickly, score likelihood and impact, track actions, keep dated notes, and produce a clear management view.
Click any cell to focus the register. Counts follow the active filters.
Average risk pressure across the strongest categories. Click a label to filter.
Likelihood, impact and volume by category. Click a bubble to filter.
Automated word cloud from risk text. Click a word to search.
Click a row to filter the register.
Risk changes, notes, imports and data actions recorded by this browser.
Editable register
Edit directly in the table, add dated notes, or open the full form for risk wording, scoring guidance and history.
Hidden by default to keep the register focused. Open when you need a more specific view.
0 risks shown.
Changes save after you leave a field, choose a score, add a note, or change a status.
| Notes | Actions |
|---|
Treatment work
Manage treatment actions as their own work items, with owner, due date, status and completion date.
Actions are shown separately from risks so follow-up work is easier to manage. Edit action owner, due date, status and completion date directly in this page.
Weekly risk review
Work through due, stale, ownerless, actionless, overdue and escalation risks. Each review decision is written into the risk history.
Start with escalation and overdue items, then confirm stale risks, missing owners and missing actions. A short review note is enough.
Guided capture
Build a clear IF, THEN, RESULTING IN risk statement and score it with visible guidance.
Management view
A plain-English summary of the current filtered view, grouped by project and designed for copying into reports.
Use interactive mode inside TripTrap, or copy-ready mode for documents and status reports.
Administration
Adjust scoring labels, guidance, projects, categories, local data, and restore demo data.
Edit the five labels and guidance messages used in the form, table, heatmap and report.
Edit the five labels and guidance messages used when scoring seriousness.
Manage up to 25 projects or work areas. Projects behave like a simple category in the register, but the report groups risks by project.
Project count will appear here.
Adjust the category list used in forms, filters, dashboard breakdowns and the editable register. You can keep up to 25 categories.
Category count will appear here.
Storage status will appear here.
TripTrap field guide
A practical guide for using TripTrap in real project, BAU, service, cyber, data, vendor and operational change work. Start with quick instructions, then use the deeper reference sections when you need better questions, better judgement, or stronger reporting.
Success is a useful discussion and a captured risk. Something visible today is better than a perfect risk statement written too late.
TripTrap is for making risk conversations easier. It is not meant to create a perfect audit document. Use it to capture what the team is worried about, agree what will happen next, and keep the risk visible until it is closed, accepted, escalated, or becomes an issue.
Record the thing that might go wrong. A rough title is enough to begin.
Choose likelihood and impact using the guidance in the form. Do not debate the score for too long.
Name the person who will keep the risk live and bring updates back to the team.
Write the next useful action, owner, due date and status.
Add a dated note, update the score, and decide whether to watch, treat, escalate, accept or close.
Use the dashboard to start the conversation. Click the summary cards, heatmap cells, bubbles, word cloud terms, top risks, overdue actions and breakdown rows to focus the register.
Use the register as the working list. Edit common fields directly in the table. Open the full form when you need better wording, more notes, action detail, history, or a related link.
Use the action workbench to follow up treatment work. Filter by overdue, due soon, blocked, open, completed, owner or project. Update action owner, due date, status and completion date here.
Use weekly review mode to work through due, stale, no owner, no action, overdue and escalation queues. Each review decision writes history back to the risk.
Use interactive mode inside TripTrap. Use copy-ready mode when pasting into a steering group pack, status report, board paper, sponsor update, email, or meeting notes.
Use settings to adjust likelihood, impact, project names and categories. Export a backup before changing lists if the data matters.
Many delivery teams mix these together. That is normal, but it helps to name the item correctly so the right action follows.
| Item | What it means | Typical TripTrap treatment |
|---|---|---|
| Risk | Something uncertain that could affect the work if it happens. | Score it, assign an owner, add actions, review until closed or accepted. |
| Issue | Something already happening. | Move it to the issue process if there is one. Keep a note if it still affects risk exposure. |
| Dependency | Something the team needs from another person, team, supplier, environment, decision or system. | Capture as a risk if the dependency may not arrive in time or may not be good enough. |
| Assumption | Something believed to be true for planning purposes. | Capture as a risk if the assumption could be wrong and would affect delivery or service. |
| Decision | A choice needed from an owner, sponsor, governance group, vendor or technical authority. | Capture as a risk if delay or the wrong choice could affect the work. |
A useful risk statement makes the cause, event and impact clear enough for someone to decide what to do. TripTrap uses this pattern:
Testing might be a problem.
If the shared test environment remains unstable, then regression testing may not complete on time, resulting in delayed release approval and extra support effort.
Vendor risk.
If the vendor does not confirm the integration design this week, then build work may continue on assumptions, resulting in rework and a missed migration checkpoint.
Security finding.
If the critical security finding is not remediated before go-live, then production approval may be withheld, resulting in release delay or higher residual risk acceptance.
Scoring is a judgement tool. It helps the team decide what to discuss first. It is not meant to be mathematically perfect.
Likelihood asks how credible the risk is in the review period. Look at current evidence: backlog, defects, decision delays, staff availability, vendor responsiveness, incidents, unresolved findings and environment stability.
Impact asks how serious the effect would be if the risk happens. Consider delivery date, cost, service stability, security, compliance, user trust, operational load, reputation and leadership attention.
A risk without a next action is usually only a worry. The action does not need to solve the whole risk. It only needs to be the next useful movement.
Change the plan so the risk no longer applies.
Lower likelihood or impact through practical treatment actions.
Move some responsibility, consequence or exposure through a supplier, contract, support arrangement or insurance.
Record that the risk is understood and no further action is planned for now.
Raise the risk to someone who can decide, fund, prioritise, unblock or accept it.
Keep watching when active treatment is not yet justified.
The risk owner is accountable for keeping the risk current. The action owner is responsible for a specific treatment action. They can be the same person, but they do not have to be.
A weekly review should be short, specific and decision focused. The aim is to find movement, not read every field aloud.
A good risk report helps someone decide, support, challenge or unblock. It should not be a copy of the whole register.
If network firewall rule approvals remain queued behind operational work, then migration testing may not start on time, resulting in delayed cutover and longer parallel running.
If source data quality issues are not resolved before migration rehearsal, then records may fail validation, resulting in manual remediation and loss of business confidence.
If the critical vulnerability remains open at go-live, then release approval may be delayed or residual risk may need formal acceptance.
If service desk demand rises during rollout without extra support capacity, then incident response times may worsen, resulting in user frustration and reduced adoption.
If the supplier misses the design approval date, then build work may continue on assumptions, resulting in rework, dispute and schedule pressure.
If support procedures are not agreed before go-live, then BAU teams may not be ready to manage incidents, resulting in slower recovery and unclear accountability.
Frameworks are useful when they sharpen thinking. They are not useful when they make the team avoid the conversation. Use this section as a guide to what each framework is good for.
A broad international risk management standard. Good for principles, governance, context, risk identification, analysis, evaluation, treatment, monitoring and communication. Use it to shape the overall discipline.
A companion risk assessment techniques standard. Good when you need structured tools such as bow tie analysis, scenario analysis, FMEA, business impact analysis, decision trees, checklists or root cause analysis.
Useful for project, programme and portfolio delivery. It supports a managed approach to identifying, assessing and controlling risks in a delivery environment.
Useful for project management discipline, planning, ownership, analysis, response planning, monitoring and reporting across portfolios, programmes and projects.
Useful for security and privacy risk in information systems. Stronger than TripTrap for control selection, implementation, assessment and ongoing authorisation.
Useful for cyber risk conversations across governance, identification, protection, detection, response and recovery. Good for boards, security teams and improvement roadmaps.
Useful for enterprise risk and strategy. Good for senior leadership and organisational risk oversight, less useful for a small weekly delivery meeting.
Useful for quantitative cyber and operational risk. Good when financial loss exposure matters and the organisation has enough data and maturity to model scenarios.
Useful for application security risk discussions. Good for thinking about threat agents, vulnerability factors, technical impact and business impact.
Useful for assessing cyber safeguards against business impact. Good for security teams using CIS Controls.
Useful for New Zealand public sector information security risk. Good for agencies and suppliers working with NZ government security expectations.
Useful for New Zealand public sector risk assessment, information systems risk and digital assurance practice.
These links open official or recognised sources. They are provided for deeper reading and comparison. Use them to support practice, not to make a lightweight risk process heavy.