Discuss the framework for risk management and control within a company
Discuss the application of the risk management control cycle
Discuss how to identify risks and their causes and implication
Explain what is meant by risk and uncertainty and discuss different definitions and concepts of risk
ERM involves all risks faced by an organization
First step: To determine and understand what risks the org. face
Process of risk identification
Incl. considerations of why each risk arises and an initial assessment of the impact it could have on the org.
Module focus on the first part of the risk management control cycle
Business analysis:
Need to understand and know the specific characteristics of the org. and its operating environment before risk can be identified comprehensively
Risk identification:
Systematic process to identify the risks to which the org. is exposed
Initial assessment of risk:
Initial evaluation of the risks (quant. & qual.) to facilitate prioritization of appropriate risk management actions
Key discussion:
Implementation
Methods and outputs of the process
Issues involved in identifying emerging risks (the problem of bias)
(Again, this only covers up-to the initial assessment)
Note: language on identification, assessment, evaluation, quantification can be use as being distinct or overlap in meaning
6 steps of a comprehensive risk identification and initial assessment process
Business analysis
Ensure that the company has clear business objectives
(Or else difficult to establish what risks can impact on their achievement)
Analyse its operation and its wider environment
Business plan
Company’s structure and system of internal controls
Current and projected accounts and accounting ratios
Market information (e.g. competitors actions and market share)
Resources available to the company
Legislative and regulatory constraints
General economic environment
Identify up & down side risk structurally
Start with a review of the findings of the business analysis to identify any areas or risk
, uncertainty
or opportunity
See next section for risk identification methods
Obtain agreement
Obtain agreement (with other stakeholders?) on the risks faced, relationships between them, and identify individuals who will be responsible for each risk and its management
Evaluate the risks
Evaluate in terms of likelihood and severity over a given time frame
Can be done for both gross and net of existing controls
Enable risks to be prioritized for further implementation of controls
Produce a risk register
Record the results of this process in one place
Next section will further discuss elements of the register
Review the risk register regularly
Especially in times of change to ensure that it remains up to date and reflects the current risks faced by the company
Important first step in the RM process:
Enhances awareness and transparency of risks
Helps transfer knowledge and improve understanding across the org.
Acts as a firm base for subsequent risk analysis, quantification and prioritization
Enhances the quality of reporting to the Board and senior management
\(\therefore\) Helps improves business decision making
Requirements to gain the benefits above:
Need senior sponsorship of the RM program
Be consistent on the standards used overtime
Ensure quantitative and qualitative data is used so as to develop a comprehensive risk profile for the whole org.
Integrate risk identification with the entire RM process
Demonstrate added value (on top of meeting regulatory requirements)
4 stage risk identification and assessment process (expansion of step 2 above)
Foundation setting
Get executive sponsorship
Organize and plan for resources
(e.g accountabilities and deadlines)
Define a risk taxonomy
Build a customized risk identification and assessment tool
Educate and train project teams and management
Potential pitfall:
Lack of senior management buy-in and participation
Bad resources planning and allocation
Insufficient preparation lead to an inefficient or ineffective process
Risk identification, assessment and prioritization
Understand business objective
, risk appetite
, regulatory
and policy requirements
Undertake risk assessments
Top down (e.g. interviews)
Bottom-up (e.g. workshops)
Produce risk reports and risk maps
Prioritize risk
Potential pitfall:
Lack of clear business objectives or risk appetite
Focusing on consequences rather than causes of risk
Inconsistent estimate of frequency and severity
Deep dives, risk quantification and managment
Detailed assessments of of the top risks (prioritized from step 2.)
Produce risk tolerance statements and track KRIs
Determine risk management strategies and the total cost of risk (for pricing purpose)
Potential pitfall:
Lack of prioritization of key risk
Insufficient risk quantification
Risk assessment not translated into value adding action
Business and EMR integration
Link risk assessment with both strategic planning
and business review processes
Integrate risk assessment into everyday business operations
(e.g. pricing and capital allocation)
Conduct scenario analysis and stress testing
Report on risk
Creating and maintaining loss/events databases
Establish appropriate risk-escalation policies
Potential pitfall:
Restricting integration to low level reports
Failure to fundamentally change the business attitude to risk management
See Lam App to Ch.23 with the risk assessment self evalulation checklist
How well developed and mature is the copany’s risk identification and assessment
Degree of integration of RM across the org.
SWOT Analysis
Framework for generating ideas in a structured and comprehensive ways
Consider strengths
, weakness
, opportunities
, and threats
Establish what risks the company faces
Risk Checklist
List of risk identified in the past or from external source
Need to make sure the information is relevant and up to date
Risk Prompt List
List of different categories of risk to consider and examples of each
List situations
and events
that have previously emerged and that should be considered
Similar to risk trigger questions
e.g. PEST(ELI) analysis that covers:
Political
, economic
, social
, technology
(environmental
, legal
and industry
) risks
Risk Taxonomy
Structured way of classifying risks and breaking them down into components
Help to ensure that those involved in the process have a common understanding of the terms used in risk identification
Less project specific than a checklist
and less industry specific than an industry prompt list
Case Studies
Process Analysis
Build flow charts that detail business process and links between them
Help identify the risks that arise at each stage
Particularly suited to op-risk
Advantages of the tools above:
Provide a clear structure for the risk identification process
Improve the quality of the output (vs a less structured process)
Disadvantage of the tools above:
Activities must be well planned and supported by a positive risk culture
Factors to consider on techniques:
Who
Input is needed from all areas of the business to identify all risks and dependencies
Select a diverse mix of people (role, experience and seniority)
How
Workshop, questionnaires
Workshop types e.g. brainstorming
External help in facilitation of workshops or design of questionnaires
Risk identification techniques
Brainstorming
Group of people generating ideas in a free form way
Facilitated by an external consultant
Requires all participants to be in the same location at the same time
Potential disadvantage:
If poorly run, can lead to group think
Uneven participation can lead to an incomplete or biased identification of risks
Mitigation:
Participants should come from various departments across the org. and have different backgrounds
Outsiders can bring fresh ideas even in specialist areas
Independent group analysis
Each risk is presented by a member of the group and is then **discussed* by the group
Each member then rank each of the risk independently (to avoid group think)
Results are combined to form an overall ranking
Potential disadvantage:
Surveys
Use online surveys to generate a wide range of responses cheaply and without collusion between participants
Potential disadvantage:
Problem of framing
Poor response rates
Quality of the survey is only as good as both the design and analysis of the response
e.g MC is easier to analyze but limit the range of possible responses
Gap analysis
Type of questionnaire designed to identify the company’s current and desired risk exposures
Line manager
might be best to identify the current risk while the Board
is best to identify desired risk
Potential disadvantage:
Delphi technique
A structured communication technique where the participants answer questionnaires in 2 or more rounds
After each round, a facilitator provides an anonymous summary of the output from the previous round as well as the reasons they provided for their judgement
Participants then revise their earlier answers in light of the replies of other members of the panel
Intention:
During the revise process the range of answers will decrease and the group will converge towards a consensus
Potential disadvantage:
Interviews
Individuals are interviewed and the results collated by an independent external reviewer
Potential disadvantage:
Time consuming and expensive
\(\hookrightarrow\) Restrictions on the number of interviews
Having multiple interviewers can lead to inconsistencies
Working groups
Small numbers of interested individuals are tasked with considering a specific risk (or group of risk)
Members are normally specialists
Scope can extend to analysis of the risk identified, esp. if they are unquantifiable
Potential disadvantage:
Identification will be narrow rather than comprehensive (As they are all specialist)
Specialist might want to work at a higher level of precision than the cost is justified
Risk should be collated in a risk register once identified
Key elements of risk register
Labeling or numbering system to risk can be identify easily
Category of risk
Description of each risk (that is clear and understandable to all)
Initial assessment of the likelihood and impact over an applicable time frame
Risk response action
(retain, remove, reduce, or transfer)
Its cost and expected residual/secondary risk
Individual involved in monitoring and managing the risk
(Risk owner)
Document control information
(e.g. when was the last update and by whom)
Exposure:
Volatility
Probability
Severity
Time horizon
Correlations
Capital
Capital is held for:
Manage cash flow (working capital)
Facilitate growth (development capital)
Cover unexpected losses arising from exposure to risk (risk capital)
Purpose of risk capital
Financial strength is judged by reference to the relative levels of risk and risk capital
For debt holders:
Provides protection against unexpected events
Determines credit rating
For equity holders:
Risk adjusted returns: Returns should be judged relative to the level of risk capital (to adjust for risk)
Allocation of risk capital to operational units enables risk adjusted profitability to be determined and creates and “internal capital market” within the org.
Simple techniques for initial assessment
Categorization
See if the probability (or severity) of the risk event falls within some pre-set categories
Number of categories depend on the level of accuracy required from the exercise + extent the probabilities (severity) can be accurately estimated
Can use different probability distribution depending on the data available
Example
Score frequency and severity:
0-25%, 25%-50%, etc
low/mid/high, etc
Multiply together for a risk rating
Plots each risk on the risk map
Axes are the frequency and severity
Technique is used to illustrate the effect that each risk might have on an org.
Need to include all risks faced by the org.
A is the current level and A’ is the residual level
Probability axis doesn’t have to be continuous, can be broad like low/mid/high
Benefits
Get people together across org. to talk about risk
Improves the enterprise’s understanding of the risk it faces
Improves the effect of its RM activities
Shows which risk require further attention
Excellent visual tool for reporting to the Board on risk
Can show before (inherent risk) and after (residual risk) to highlight the effectiveness of its risk control
Plot risk severity against control effectiveness to show where action needs to be taken
Factors to rank risk controls according to their perceived effectiveness
Risk exposures are within tolerance levels
Controls are in place
Risks are linked to potential impact on return
Risk metrics/dashboard reporting is established
Emerging risks are important and need to be fed into the overall control cycle along with any other external events and influences
Definition:
Developing of already known risks which are subject to uncertainty and ambiguity and are therefore difficult to quantify using traditional risk assessment techniques
\(\Delta\) nature of an existing or known risk, or
\(\Delta\) underlying effectiveness of risk management approaches of an existing or known risk, or
Development of a new risk
(No explicit allowance in existing framework)
Generally with much higher level of uncertainty
Reasons why emerging risks are importants:
Knowledge of such risks will influence corporate strategy
May affect the profitability of the organization
May yield opportunities for a new product
4 Key inter-related trends that give rise to emerging risk management challenges
Globalization:
Increased interdependence of the world’s economies and market
Technology:
New operational risks from technology driven business
Changing market structures:
As markets are deregulated and privatized
Restructuring:
Effects of M&A and acquisition, joint ventures, outsourcing and business re-engineering
Emerging risks of the past are known risks today
(e.g. cost of guaranteed annuity rates, health damage from asbestos)
Emerging risk could include potential impact of:
Significant shift in power between world economies (and collapse of previously secure nations)
Contagion in asset markets
Claims from unexpected sources
Change in ways information is stored and distributed due to social media
Unexpected behavior of financial guarantees embedded products
Non linear dependencies between current known risks
Due to increase reliance on computers and internet
Cyber security
Cyber crimis rapidly evolving and becoming increasing sophisticated (crime involving the use of a computer over a network)
Financial theft:
e.g. hacker accessing bank accounts to steal money
Data theft:
e.g. accessing customer data, confidential business information or proprietary technology
Attempts to disrupt a business:
e.g. Denial of service attacks
Cloud computing
Use of external computing resources (hardware, software, and data) in order to reduce costs and provide more flexible and efficient computing
Shares similiar risk to outsourcing
Reduce amount of control over the data and increases the reliance on the risk management capabilities of the 3rd party provider
Social media
Rise of social media offers upside opportunities including acting as an early warning indicator of emerging issues
Introduces new risks
May open door for viruses and malware to be easily introduced to corporate network
Reputational risk is increased as brand image can be rapidly destroyed by a careless communication
Productivity maybe impared as employees become distracted by social media
Additional issues arise from emerging risk than the standard process (identification, analysis, etc)
Need a more holistic view to identify emerging risk
Need to consider all possible impacts of the new risk before it can be reduced to the more structured approach like the other risk
Horizon Scanning
Key tool for identifying emerging risk
Systematic search for potential developments over the longer term
Emphasis on changes that are at the edges of current thinking
Requires input from experts that understand the underlying drivers and the tech/science/econ/socioecon aspects
Weighing different underlying evidence
There won’t be definitive study on the emerging risk
\(\therefore\) need to assess from different angles and sources
Need to weight RM decisions according to the credibility and reliability of the underlying evidence
Important to continue monitor developments in relevant research to refresh past decisions
Beware of alarmist media reports
Useful for alerting of potential areas of further investigation
Should not be used as a basis for decision making
Additional source of uncertainty
Added layer of uncertainty for companies impacted by likely future legal approaches to the emerging factors
Active identification and consideration of such emerging risks will ready company to meet and react to such risks
Analysis of trends is important
Monitor regulatory and lobbying activity in the sector by relevant experts
Important to keep dependencies in mind as changes can lead to reduction in diversification
Problem of bias:
Risks not being identified, assessed or reported in a true and honest way
Can be due to lack of supportive risk culture (o rsub optimal culture)
Often in the context of project appraisal
Intentional bias:
e.g. deliberate underestimation of risk to achieve a specific personal goal
Unintentional bias:
e.g. inaccurate assessment of risk due to lack of experience or time
Encountering bias:
Reporting to the Board about the ongoing risks facing the enterprise
Project appraisal where the project champions tend to minimize the risks in hope of getting approval
Ways in which bias are introduced into project appraisal (by accident or design):
Insufficient care to the identification or analysis of risk
Omission of key risks (Accidental or deliberate)
Incorrect assumptions of independence
Underestimate likelihood due to inadequate past experience
Deliberately over optimistic cash flows (or just guessing)
Not accounting for future economic cycle
Inadequate attention to risk with new technologies
Not considering all the effects of the project on the sponsor’s other business
Credit taken for benefits not directly attributable to the project
Assumptions not correspond with sr mgmt’s view of the world in the future
Spreadsheets error lead to failures of logic
Study of unintentional bias in finance
Looks at how a variety of mental biases and decision making errors affect financial decisions
Relates to the psychology that underlies and drives financial decision making behavior
Evidence suggest that investors do not always act rationally contrary to tradtional economic theory assumptions
3 types of behavioral bias
Overconfidence:
People Tend to overestimate their own abilities, knowledge and skills
Anchoring:
People based perceptions on past experience or “expert” opinion
Representative heuristics:
People find more probable those things that they find easier to imagine
Built in checks and balances can prevent the danger above
Key step to minimize the risk of bias:
Validate the appraisal work (esp. cash flow) by competent and independent checking
Reference where possible to the outcomes of similar projects
Build in additional capital cost:
Load in a % to the capital cost based on past experience
Reduce estimated return
Caveat:
If the project is to proceed, it give the PMO a large contingency allowance in the capital cost
\(\therefore\) reducing incentives to keep capital costs to a minimum