{"id":151321,"date":"2026-02-21T16:33:39","date_gmt":"2026-02-21T19:33:39","guid":{"rendered":"https:\/\/sandbox2.institutopmg.com\/?p=151321"},"modified":"2026-02-21T16:33:41","modified_gmt":"2026-02-21T19:33:41","slug":"risk-in-itil-5-how-to-protect-and-maximize-value-delivery","status":"publish","type":"post","link":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/","title":{"rendered":"Risk in ITIL 5: How to Protect and Maximize Value Delivery"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In today\u2019s fast-moving technology landscape, uncertainty is the only constant. <a href=\"https:\/\/sandbox2.institutopmg.com\/en\/itil-version-5-launch-official-information-pmg-academy\/\">With the release of ITIL 5<\/a>, the way we deal with threats has evolved to ensure organizations don\u2019t just survive, but thrive in the era of Artificial Intelligence and digital products. Understanding the concept of <\/span><b>risk in ITIL 5<\/b><span style=\"font-weight: 400;\"> is essential for any professional who wants to strengthen the resilience of their <\/span><b>Value System<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we\u2019ll break down how the framework defines risk, what the responsibilities of providers and consumers are, and how this perspective protects value co-creation in day-to-day business operations.<\/span><\/p>\n<p><strong>Read also:<a href=\"https:\/\/sandbox2.institutopmg.com\/en\/articles\/itil\/the-definitive-guide-to-itil-version-5-foundation\/\"> The Definitive Guide to ITIL 5<\/a><\/strong><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Navegue por t\u00f3picos de interesse:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#What_Is_Risk_in_ITIL_5\" >What Is Risk in ITIL 5?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#The_Dual_Nature_of_Risk_The_Consumer_Perspective\" >The Dual Nature of Risk: The Consumer Perspective<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#1_Risks_reduced_or_removed_by_the_service\" >1) Risks reduced or removed by the service<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#2_Risks_imposed_by_the_service_consumption_risks\" >2) Risks imposed by the service (consumption risks)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#The_Providers_Duty_and_the_Value_System\" >The Provider\u2019s Duty and the Value System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#How_Does_This_Help_Your_Career_and_Your_Organization\" >How Does This Help Your Career and Your Organization?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#Conclusion_Turn_Uncertainty_into_Opportunity\" >Conclusion: Turn Uncertainty into Opportunity<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_Is_Risk_in_ITIL_5\"><\/span><b>What Is Risk in ITIL 5?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">According to the official ITIL 5 Foundation material, <\/span><b>risk<\/b><span style=\"font-weight: 400;\"> is defined as a possible event that may cause harm or loss, or make it more difficult to achieve objectives. In practical terms, risk is a measure of uncertainty about the success of an initiative or an operation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike purely negative views, ITIL 5 teaches that managing risk isn\u2019t only about \u201cavoiding problems,\u201d but about ensuring the path to value remains clear. If your organization uses a <\/span><b>Value Chain<\/b><span style=\"font-weight: 400;\"> to develop new software, risk is present at every step\u2014from <\/span><b>Discover<\/b><span style=\"font-weight: 400;\"> to <\/span><b>Support<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Dual_Nature_of_Risk_The_Consumer_Perspective\"><\/span><b>The Dual Nature of Risk: The Consumer Perspective<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">One of the most innovative aspects of risk management in ITIL 5 is how it splits the concerns of digital service and product consumers into two distinct groups. To make strategic decisions, you need to weigh both sides:<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Risks_reduced_or_removed_by_the_service\"><\/span><b>1) Risks reduced or removed by the service<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This is one of the main reasons a company contracts a service. The provider takes on risks that the consumer doesn\u2019t want\u2014or can\u2019t\u2014manage. Common examples include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Hardware failure:<\/b><span style=\"font-weight: 400;\"> The customer doesn\u2019t need to worry about a server burning out, because the provider ensures availability.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Lack of skilled staff:<\/b><span style=\"font-weight: 400;\"> The risk of not having AI specialists is mitigated by contracting a partner that already has that talent.<\/span><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"2_Risks_imposed_by_the_service_consumption_risks\"><\/span><b>2) Risks imposed by the service (consumption risks)<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">By adopting a service, new risks are introduced into the consumer\u2019s operation. It\u2019s the \u201ccost of dependency.\u201d Examples include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Provider outage:<\/b><span style=\"font-weight: 400;\"> If your cloud provider goes down, your business stops.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security breaches:<\/b><span style=\"font-weight: 400;\"> A vulnerability in the supplier\u2019s software can expose your company\u2019s data.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For the relationship to be valuable, the risk reduction from the first group must be significantly greater than the new risks introduced by the second.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Providers_Duty_and_the_Value_System\"><\/span><b>The Provider\u2019s Duty and the Value System<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In ITIL 5, it is the provider\u2019s explicit duty to manage service-specific risks on behalf of the consumer. This responsibility isn\u2019t just technical\u2014it\u2019s governance-related.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Risk management must be integrated into the organization\u2019s <\/span><b>Value System<\/b><span style=\"font-weight: 400;\">. That means senior leadership must define risk appetite and ensure management practices provide the controls needed to keep operations safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Within the <\/span><b>Value Chain<\/b><span style=\"font-weight: 400;\">, risk management acts as a protective layer that runs through all activities. For example, in the <\/span><b>Design<\/b><span style=\"font-weight: 400;\"> activity, risk analysis helps ensure the digital product is built with <\/span><b>security by design<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Does_This_Help_Your_Career_and_Your_Organization\"><\/span><b>How Does This Help Your Career and Your Organization?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Mastering risk management in ITIL 5 turns the IT professional into a strategic leader. Instead of only reacting to crises, you begin anticipating scenarios\u2014protecting business investments and ensuring continuity.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>For the organization:<\/b><span style=\"font-weight: 400;\"> It reduces financial losses, protects reputation, and increases investor and customer trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>For the professional:<\/b><span style=\"font-weight: 400;\"> It builds an executive-level view of IT\u2014essential for those pursuing management, leadership, or governance consulting roles.<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion_Turn_Uncertainty_into_Opportunity\"><\/span><b>Conclusion: Turn Uncertainty into Opportunity<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Managing risk in ITIL 5 is the art of balancing innovation with security. In a world where AI accelerates change, knowing how to protect value is what separates market leaders from everyone else.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Want to become a specialist in Governance and Risk Management?<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">At <a href=\"https:\/\/sandbox2.institutopmg.com\/en\/itil-version-5-launch-official-information-pmg-academy\/\">PMG Academy<\/a>, our courses focus on practical application of the world\u2019s most respected frameworks. Get ready for official ITIL certifications with experts in high-impact corporate education.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Have you already mapped the risks your current services impose on your customers? Share your experience in the comments below\u2014let\u2019s enrich this conversation!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s fast-moving technology landscape, uncertainty is the only constant. With the release of ITIL 5, the way we deal with threats has evolved to ensure organizations don\u2019t just survive, but thrive in the era of Artificial Intelligence and digital products. Understanding the concept of risk in ITIL 5 is essential for any professional who [&hellip;]<\/p>\n","protected":false},"author":85233,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8074],"tags":[],"class_list":["post-151321","post","type-post","status-publish","format-standard","hentry","category-itil"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risk in ITIL 5: How to Protect and Maximize Value Delivery - PMG Academy<\/title>\n<meta name=\"description\" content=\"In the current scenario, uncertainty is the only constant. With the launch of ITIL 5, the approach to how we deal with threats has evolved.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk in ITIL 5: How to Protect and Maximize Value Delivery\" \/>\n<meta property=\"og:description\" content=\"In the current scenario, uncertainty is the only constant. With the launch of ITIL 5, the approach to how we deal with threats has evolved.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\" \/>\n<meta property=\"og:site_name\" content=\"PMG Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/adriano.martinsantonio\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-21T19:33:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-21T19:33:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2021\/02\/23190406\/cropped-Asset-1%40azul-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adriano Martins Antonio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adriano Martins Antonio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\"},\"author\":{\"name\":\"Adriano Martins Antonio\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\"},\"headline\":\"Risk in ITIL 5: How to Protect and Maximize Value Delivery\",\"datePublished\":\"2026-02-21T19:33:39+00:00\",\"dateModified\":\"2026-02-21T19:33:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\"},\"wordCount\":684,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"articleSection\":[\"ITIL\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\",\"name\":\"Risk in ITIL 5: How to Protect and Maximize Value Delivery - PMG Academy\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\"},\"datePublished\":\"2026-02-21T19:33:39+00:00\",\"dateModified\":\"2026-02-21T19:33:41+00:00\",\"description\":\"In the current scenario, uncertainty is the only constant. With the launch of ITIL 5, the approach to how we deal with threats has evolved.\",\"breadcrumb\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Articles\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITIL\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/articles\/itil\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Risk in ITIL 5: How to Protect and Maximize Value Delivery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"name\":\"PMG Academy\",\"description\":\"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis\",\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\",\"name\":\"PMG Academy\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"width\":6964,\"height\":2938,\"caption\":\"PMG Academy\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\",\"name\":\"Adriano Martins Antonio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"url\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"contentUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"caption\":\"Adriano Martins Antonio\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adriano.martinsantonio\"],\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/author\/adrianopmgacademy-coms\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk in ITIL 5: How to Protect and Maximize Value Delivery - PMG Academy","description":"In the current scenario, uncertainty is the only constant. With the launch of ITIL 5, the approach to how we deal with threats has evolved.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/","og_locale":"en_US","og_type":"article","og_title":"Risk in ITIL 5: How to Protect and Maximize Value Delivery","og_description":"In the current scenario, uncertainty is the only constant. With the launch of ITIL 5, the approach to how we deal with threats has evolved.","og_url":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/","og_site_name":"PMG Academy","article_publisher":"https:\/\/www.facebook.com\/PMG.Academy.Brasil","article_author":"https:\/\/www.facebook.com\/adriano.martinsantonio","article_published_time":"2026-02-21T19:33:39+00:00","article_modified_time":"2026-02-21T19:33:41+00:00","og_image":[{"width":2560,"height":1080,"url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2021\/02\/23190406\/cropped-Asset-1%40azul-1.png","type":"image\/png"}],"author":"Adriano Martins Antonio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adriano Martins Antonio","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#article","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/"},"author":{"name":"Adriano Martins Antonio","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7"},"headline":"Risk in ITIL 5: How to Protect and Maximize Value Delivery","datePublished":"2026-02-21T19:33:39+00:00","dateModified":"2026-02-21T19:33:41+00:00","mainEntityOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/"},"wordCount":684,"commentCount":0,"publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"articleSection":["ITIL"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/","url":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/","name":"Risk in ITIL 5: How to Protect and Maximize Value Delivery - PMG Academy","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website"},"datePublished":"2026-02-21T19:33:39+00:00","dateModified":"2026-02-21T19:33:41+00:00","description":"In the current scenario, uncertainty is the only constant. With the launch of ITIL 5, the approach to how we deal with threats has evolved.","breadcrumb":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sandbox2.institutopmg.com\/en\/risk-in-itil-5-how-to-protect-and-maximize-value-delivery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Articles","item":"https:\/\/sandbox2.institutopmg.com\/en\/articles\/"},{"@type":"ListItem","position":2,"name":"ITIL","item":"https:\/\/sandbox2.institutopmg.com\/en\/articles\/itil\/"},{"@type":"ListItem","position":3,"name":"Risk in ITIL 5: How to Protect and Maximize Value Delivery"}]},{"@type":"WebSite","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website","url":"https:\/\/sandbox2.institutopmg.com\/en\/","name":"PMG Academy","description":"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis","publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization","name":"PMG Academy","url":"https:\/\/sandbox2.institutopmg.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","width":6964,"height":2938,"caption":"PMG Academy"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PMG.Academy.Brasil"]},{"@type":"Person","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7","name":"Adriano Martins Antonio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","contentUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","caption":"Adriano Martins Antonio"},"sameAs":["https:\/\/www.facebook.com\/adriano.martinsantonio"],"url":"https:\/\/sandbox2.institutopmg.com\/en\/author\/adrianopmgacademy-coms\/"}]}},"_links":{"self":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/151321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/users\/85233"}],"replies":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/comments?post=151321"}],"version-history":[{"count":1,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/151321\/revisions"}],"predecessor-version":[{"id":151322,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/151321\/revisions\/151322"}],"wp:attachment":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media?parent=151321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/categories?post=151321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/tags?post=151321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}