[et_pb_section fb_built=”1″ _builder_version=”4.9.4″ _module_preset=”default” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-85px|||0px|false|false” memberpress_rule=”17929″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” background_enable_color=”off” custom_padding=”30px|50px|300px|50px|false|false” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.4″ _module_preset=”default” header_font=”poppins-regular|700|||||||” header_text_color=”#231f20″ header_font_size=”38px” header_line_height=”1.5em” custom_margin=”32px||||false|false” global_colors_info=”{}”]
[/et_pb_text][et_pb_button button_url=”/wp-login.php?action=logout” button_text=”Save & Close” _builder_version=”4.10.8″ _module_preset=”e4686aa7-9514-4d15-8c7e-3a3ffcf0f073″ button_text_size=”15px” button_border_width=”1.5px” button_font=”|700|||||||” custom_margin=”-80px|-180px|||false|false” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][/et_pb_button][et_pb_text _builder_version=”4.9.6″ _module_preset=”default” header_text_color=”#231f20″ header_font_size=”38px” header_line_height=”1.5em” custom_margin=”64px||||false|false” global_colors_info=”{}”]
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”default” text_font=”OpenSans-Regular||||||||” text_font_size=”16px” custom_margin=”|-300px||||” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]
Risk Mitigation Process
[/et_pb_text][et_pb_toggle title=”Step One: Identify the Threats” _builder_version=”4.10.8″ _module_preset=”a01127a0-aac0-440b-97e0-fe07d274e379″ title_font=”OpenSans-Regular|700|||||||” title_font_size=”20px” closed_title_font=”poppins-regular||||||||” custom_margin=”|-220px||-20px|false|false” hover_enabled=”0″ custom_css_toggle_content=”padding: 10px 20px 10px 20px;||margin-top: 20px;||background: #ffffff;||border: 1.5px solid #dbdede;||text-align:left;” border_color_all=”RGBA(0,0,0,0)” global_colors_info=”{}” closed_toggle_background_color__hover=”RGBA(0,0,0,0)” sticky_enabled=”0″]
List all the threats each gender might face in your context. Do some research, talk to each gender, explore statistics. Be open minded as you do.
[/et_pb_toggle][et_pb_toggle title=”Step Two: Rate the Threats” _builder_version=”4.10.8″ _module_preset=”a01127a0-aac0-440b-97e0-fe07d274e379″ title_font=”OpenSans-Regular|700|||||||” title_font_size=”20px” closed_title_font=”poppins-regular||||||||” custom_margin=”|-220px||-20px|false|false” hover_enabled=”0″ custom_css_toggle_content=”padding: 10px 20px 10px 20px;||margin-top: 20px;||background: #ffffff;||border: 1.5px solid #dbdede;||text-align:left;” border_color_all=”RGBA(0,0,0,0)” global_colors_info=”{}” closed_toggle_background_color__hover=”RGBA(0,0,0,0)” sticky_enabled=”0″]
Examine the threats and determine which are most likely to occur and the most serious. Prioritize those…but do not forget the others.
[/et_pb_toggle][et_pb_toggle title=”Step Three: Apply the Formula” _builder_version=”4.10.8″ _module_preset=”a01127a0-aac0-440b-97e0-fe07d274e379″ title_font=”OpenSans-Regular|700|||||||” title_font_size=”20px” closed_title_font=”poppins-regular||||||||” custom_margin=”0px|-220px||-20px|false|false” hover_enabled=”0″ custom_css_toggle_content=”padding: 10px 20px 10px 20px;||margin-top: 20px;||background: #ffffff;||border: 1.5px solid #dbdede;||text-align:left;” border_color_all=”RGBA(0,0,0,0)” global_colors_info=”{}” closed_toggle_background_color__hover=”RGBA(0,0,0,0)” closed_toggle_background_color__hover_enabled=”off|desktop” sticky_enabled=”0″]
With each threat identify ways to reduce the probability of an incident and minimize the impact if they do occur. This then creates a risk mitigation strategy that is based on your own context and suitable for all genders.With each threat identify ways to reduce the probability of an incident and minimize the impact if they do occur. This then creates a risk mitigation strategy that is based on your own context and suitable for all genders.
[/et_pb_toggle][et_pb_button button_url=”/courses/gender-security-course/lessons/section-6/” button_text=”Complete section” button_alignment=”center” _builder_version=”4.10.8″ _module_preset=”e4686aa7-9514-4d15-8c7e-3a3ffcf0f073″ button_text_color=”#FFFFFF” button_bg_color=”#4b5c5a” button_border_width=”0px” custom_margin=”|-277px|||false|false” custom_padding=”10px|40px|10px|40px|false|false” hover_enabled=”0″ custom_css_main_element=”width: auto;||height: 46px;” global_colors_info=”{}” button_bg_color__hover=”#394645″ sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]