{"id":5968,"date":"2021-09-29T04:36:00","date_gmt":"2021-09-29T04:36:00","guid":{"rendered":"https:\/\/www.spoclearn.com\/blog\/?p=5968"},"modified":"2024-03-25T06:42:33","modified_gmt":"2024-03-25T06:42:33","slug":"how-are-program-risk-that-have-been-identified-during-pi-planning","status":"publish","type":"post","link":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/","title":{"rendered":"How are the program risks, that have been identified during PI Planning, categorized?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-left ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor:pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#The_Correct_Answer_is\" >The Correct Answer is<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#Why_this_is_correct\" >Why this is correct<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#Why_the_others_are_not_as_correct\" >Why the others are not as correct<\/a><\/li><\/ul><\/nav><\/div>\n\n<p><strong>A.<\/strong> Resolved, Owned, Accepted, Mitigated<\/p>\n\n\n\n<p><strong>B. <\/strong>Removed, Owned, Accepted, Managed<\/p>\n\n\n\n<p><strong>C. <\/strong>Resolved, Owned, Acknowledged, Managed<\/p>\n\n\n\n<p><strong>D. <\/strong>Removed, Owned, Acknowledged, Mitigated<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:22px;font-style:normal;font-weight:700\"><span class=\"ez-toc-section\" id=\"The_Correct_Answer_is\"><\/span><span style=\"text-decoration: underline;\">The Correct Answer is<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:700\">A. Resolved, Owned, Accepted, Mitigated<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The program risks that have been identified during PI Planning are categorized as <strong>ROAM<\/strong>, which stands for <strong>Resolved, Owned, Accepted, Mitigated.<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:700\"><span class=\"ez-toc-section\" id=\"Why_this_is_correct\"><\/span>Why this is correct<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Resolved:<\/strong> Risks that can be immediately addressed or have already been addressed during the PI Planning event itself are marked as resolved.<\/li><br>\n\n\n\n<li><strong>Owned:<\/strong> Risks that cannot be resolved immediately are assigned an owner. This person is responsible for managing the risk, including monitoring its status and taking necessary actions.<\/li><br>\n\n\n\n<li><strong>Accepted:<\/strong> Some risks may be deemed acceptable as they are. This means that the cost or effort to mitigate the risk outweighs the potential impact, so the decision is made to simply accept the risk and its potential consequences.<\/li><br>\n\n\n\n<li><strong>Mitigated:<\/strong> For risks that are neither resolved immediately nor accepted, strategies are developed to reduce their impact or likelihood. These risks are actively managed with mitigation plans.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:700\"><span class=\"ez-toc-section\" id=\"Why_the_others_are_not_as_correct\"><\/span>Why the others are not as correct<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Removed, Owned, Accepted, Managed:<\/strong> While &#8220;Owned&#8221; and &#8220;Accepted&#8221; are correct, &#8220;Removed&#8221; and &#8220;Managed&#8221; are not part of the standard ROAM categorization. &#8220;Resolved&#8221; is the correct term, not &#8220;Removed,&#8221; and while all risks need to be managed in some form, &#8220;Mitigated&#8221; specifically refers to actions taken to lessen the risk&#8217;s impact.<\/li><br>\n\n\n\n<li><strong>Resolved, Owned, Acknowledged, Managed:<\/strong> &#8220;Acknowledged&#8221; is not part of the ROAM acronym. Instead, &#8220;Accepted&#8221; is used to indicate risks that the team has decided to accept without immediate plans for mitigation. &#8220;Managed&#8221; is also not part of the acronym; &#8220;Mitigated&#8221; is the correct term.<\/li><br>\n\n\n\n<li><strong>Removed, Owned, Acknowledged, Mitigated:<\/strong> This option incorrectly includes &#8220;Removed&#8221; and &#8220;Acknowledged.&#8221; The correct terms, as per the ROAM categorization used in PI Planning within the Scaled Agile Framework (SAFe), are &#8220;Resolved&#8221; and &#8220;Accepted.&#8221;<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><br>Other SAFe Scrum Master Question \u2013<\/strong> <a href=\"https:\/\/www.spoclearn.com\/blog\/what-is-a-product-owner-anti-pattern-in-iteration-planning\/\">What is a Product Owner (PO) anti-pattern in Iteration planning?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.<\/p>\n","protected":false},"author":9,"featured_media":5973,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-5968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agile-and-scrum"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How are the program risks, that have been identified during PI Planning, categorized? | Spoclearn<\/title>\n<meta name=\"description\" content=\"During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How are the program risks, that have been identified during PI Planning, categorized? | Spoclearn\" \/>\n<meta property=\"og:description\" content=\"During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/\" \/>\n<meta property=\"og:site_name\" content=\"Spoclearn\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/spoclearn\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-29T04:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-25T06:42:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2021\/09\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mangesh Shahi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mangesh Shahi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/\"},\"author\":{\"name\":\"Mangesh Shahi\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#\\\/schema\\\/person\\\/96187c145676322f6c79fd54cb69c3ec\"},\"headline\":\"How are the program risks, that have been identified during PI Planning, categorized?\",\"datePublished\":\"2021-09-29T04:36:00+00:00\",\"dateModified\":\"2024-03-25T06:42:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/\"},\"wordCount\":332,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg\",\"articleSection\":[\"Agile and Scrum\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/\",\"url\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/\",\"name\":\"How are the program risks, that have been identified during PI Planning, categorized? | Spoclearn\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg\",\"datePublished\":\"2021-09-29T04:36:00+00:00\",\"dateModified\":\"2024-03-25T06:42:33+00:00\",\"description\":\"During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg\",\"width\":1200,\"height\":800,\"caption\":\"how-are-program-risk-that-have-been-identified-during-pi-planning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/how-are-program-risk-that-have-been-identified-during-pi-planning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How are the program risks, that have been identified during PI Planning, categorized?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/\",\"name\":\"Spoclearn\",\"description\":\"Spoclearn A single point of contact\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#organization\",\"name\":\"SPOCLEARN\",\"url\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/spockleran.svg\",\"contentUrl\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/spockleran.svg\",\"width\":398,\"height\":63,\"caption\":\"SPOCLEARN\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/spoclearn\",\"https:\\\/\\\/www.instagram.com\\\/spoclearn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/spoclearn\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/#\\\/schema\\\/person\\\/96187c145676322f6c79fd54cb69c3ec\",\"name\":\"Mangesh Shahi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/161bba4a8bf7fb5a23f29e7a7e577ce66c39eb5bf3f55f6f3787e88d743e635d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/161bba4a8bf7fb5a23f29e7a7e577ce66c39eb5bf3f55f6f3787e88d743e635d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/161bba4a8bf7fb5a23f29e7a7e577ce66c39eb5bf3f55f6f3787e88d743e635d?s=96&d=mm&r=g\",\"caption\":\"Mangesh Shahi\"},\"description\":\"Mangesh Shahi is an Agile, Scrum, ITSM, &amp; Digital Marketing pro with 15 years' expertise. Driving efficient strategies at the intersection of technology and marketing.\",\"sameAs\":[\"https:\\\/\\\/www.spoclearn.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/shahimangesh\\\/\"],\"url\":\"https:\\\/\\\/www.spoclearn.com\\\/blog\\\/author\\\/mangesh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How are the program risks, that have been identified during PI Planning, categorized? | Spoclearn","description":"During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/","og_locale":"en_US","og_type":"article","og_title":"How are the program risks, that have been identified during PI Planning, categorized? | Spoclearn","og_description":"During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.","og_url":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/","og_site_name":"Spoclearn","article_publisher":"https:\/\/www.facebook.com\/spoclearn","article_published_time":"2021-09-29T04:36:00+00:00","article_modified_time":"2024-03-25T06:42:33+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2021\/09\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg","type":"image\/jpeg"}],"author":"Mangesh Shahi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mangesh Shahi","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#article","isPartOf":{"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/"},"author":{"name":"Mangesh Shahi","@id":"https:\/\/www.spoclearn.com\/blog\/#\/schema\/person\/96187c145676322f6c79fd54cb69c3ec"},"headline":"How are the program risks, that have been identified during PI Planning, categorized?","datePublished":"2021-09-29T04:36:00+00:00","dateModified":"2024-03-25T06:42:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/"},"wordCount":332,"commentCount":0,"publisher":{"@id":"https:\/\/www.spoclearn.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2021\/09\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg","articleSection":["Agile and Scrum"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/","url":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/","name":"How are the program risks, that have been identified during PI Planning, categorized? | Spoclearn","isPartOf":{"@id":"https:\/\/www.spoclearn.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#primaryimage"},"image":{"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2021\/09\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg","datePublished":"2021-09-29T04:36:00+00:00","dateModified":"2024-03-25T06:42:33+00:00","description":"During PI Planning, program risks are categorized into various types such as technical, organizational, market, and dependency risks.","breadcrumb":{"@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#primaryimage","url":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2021\/09\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg","contentUrl":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2021\/09\/how-are-program-risk-that-have-been-identified-during-pi-planning.jpeg","width":1200,"height":800,"caption":"how-are-program-risk-that-have-been-identified-during-pi-planning"},{"@type":"BreadcrumbList","@id":"https:\/\/www.spoclearn.com\/blog\/how-are-program-risk-that-have-been-identified-during-pi-planning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.spoclearn.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How are the program risks, that have been identified during PI Planning, categorized?"}]},{"@type":"WebSite","@id":"https:\/\/www.spoclearn.com\/blog\/#website","url":"https:\/\/www.spoclearn.com\/blog\/","name":"Spoclearn","description":"Spoclearn A single point of contact","publisher":{"@id":"https:\/\/www.spoclearn.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spoclearn.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spoclearn.com\/blog\/#organization","name":"SPOCLEARN","url":"https:\/\/www.spoclearn.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spoclearn.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2025\/09\/spockleran.svg","contentUrl":"https:\/\/www.spoclearn.com\/blog\/wp-content\/uploads\/2025\/09\/spockleran.svg","width":398,"height":63,"caption":"SPOCLEARN"},"image":{"@id":"https:\/\/www.spoclearn.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/spoclearn","https:\/\/www.instagram.com\/spoclearn\/","https:\/\/www.linkedin.com\/company\/spoclearn\/"]},{"@type":"Person","@id":"https:\/\/www.spoclearn.com\/blog\/#\/schema\/person\/96187c145676322f6c79fd54cb69c3ec","name":"Mangesh Shahi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/161bba4a8bf7fb5a23f29e7a7e577ce66c39eb5bf3f55f6f3787e88d743e635d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/161bba4a8bf7fb5a23f29e7a7e577ce66c39eb5bf3f55f6f3787e88d743e635d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/161bba4a8bf7fb5a23f29e7a7e577ce66c39eb5bf3f55f6f3787e88d743e635d?s=96&d=mm&r=g","caption":"Mangesh Shahi"},"description":"Mangesh Shahi is an Agile, Scrum, ITSM, &amp; Digital Marketing pro with 15 years' expertise. Driving efficient strategies at the intersection of technology and marketing.","sameAs":["https:\/\/www.spoclearn.com\/","https:\/\/www.linkedin.com\/in\/shahimangesh\/"],"url":"https:\/\/www.spoclearn.com\/blog\/author\/mangesh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/posts\/5968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/comments?post=5968"}],"version-history":[{"count":0,"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/posts\/5968\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/media\/5973"}],"wp:attachment":[{"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/media?parent=5968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/categories?post=5968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spoclearn.com\/blog\/wp-json\/wp\/v2\/tags?post=5968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}