[et_pb_section fb_built=”1″ _builder_version=”4.9.4″ _module_preset=”default” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-85px|||0px|false|false” memberpress_rule=”17929″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” background_enable_color=”off” custom_padding=”30px|50px|300px|50px|false|false” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.4″ _module_preset=”default” header_font=”poppins-regular|700|||||||” header_text_color=”#231f20″ header_font_size=”38px” header_line_height=”1.5em” custom_margin=”32px||||false|false” global_colors_info=”{}”]
[/et_pb_text][et_pb_button button_url=”/wp-login.php?action=logout” button_text=”Save & Close” _builder_version=”4.10.8″ _module_preset=”e4686aa7-9514-4d15-8c7e-3a3ffcf0f073″ button_text_size=”15px” button_border_width=”1.5px” button_font=”|700|||||||” custom_margin=”-80px|-180px|||false|false” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][/et_pb_button][et_pb_text _builder_version=”4.9.6″ _module_preset=”default” header_text_color=”#231f20″ header_font_size=”38px” header_line_height=”1.5em” custom_margin=”64px||||false|false” global_colors_info=”{}”]
[/et_pb_text][et_pb_text _builder_version=”4.9.5″ _module_preset=”default” text_font=”OpenSans-Regular|700|||||||” text_font_size=”20px” custom_margin=”|-300px||||” global_colors_info=”{}”]Tools to Manage Threat and Risk[/et_pb_text][et_pb_text _builder_version=”4.9.5″ _module_preset=”default” text_font=”OpenSans-Regular||||||||” text_font_size=”16px” custom_margin=”|-300px||||” global_colors_info=”{}”]As we discuss gender security and gain more understanding of the complex issues at stake, it helps to be able to frame the discussion in a simple way. Regardless of whether we are discussing cyber threats, armed violence, extreme weather or other type of threat, we start by framing the discussion the same way using the risk mitigation formula:[/et_pb_text][et_pb_text _builder_version=”4.9.5″ _module_preset=”default” text_font=”OpenSans-Regular|700|||||||” text_font_size=”20px” custom_margin=”|-300px||||” global_colors_info=”{}”]Risk Mitigation Formula[/et_pb_text][et_pb_text _builder_version=”4.9.5″ _module_preset=”default” text_font=”OpenSans-Regular|700|||||||” text_font_size=”20px” text_orientation=”center” custom_margin=”|-300px||||” global_colors_info=”{}”]RISK= PROBABILITY + IMPACT[/et_pb_text][et_pb_button button_url=”/courses/gender-security-course/lessons/section-4/” button_text=”Complete section” button_alignment=”center” _builder_version=”4.10.8″ _module_preset=”e4686aa7-9514-4d15-8c7e-3a3ffcf0f073″ button_text_color=”#FFFFFF” button_bg_color=”#4b5c5a” button_border_width=”0px” custom_margin=”|-277px|||false|false” custom_padding=”10px|40px|10px|40px|false|false” hover_enabled=”0″ custom_css_main_element=”width: auto;||height: 44px;” global_colors_info=”{}” button_bg_color__hover=”#394645″ sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]