SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Risk Methodologies
Why are there so many?
       1st June 2011
Presenter



Jeremy Kaye, VP GRC Strategy
+44 20 7903 5139
jeremy.kaye@easy2comply.com




     Confidential
Housekeeping



• The slides for this event will be distributed
  afterwards
• The webinar recording will be archived on
  easy2comply website
• Q&A at the end




                       Confidential
Webinar Focus



•   Purpose of Assessing Risks
•   Different Methodologies
•   Strengths and Weaknesses
•   How to Choose?




                       Confidential
Risk: A Definition

• Possibility of loss or
  injury
• Someone or something
  that creates a hazard
• Chance of loss to the subject matter of an insurance
  contract
• Chance that an investment will lose value
• Potential that a chosen action will lead to an
  undesirable outcome

                         Confidential
Risk versus Uncertainty

• Uncertainty is where there are different outcomes
• Risk is your potential exposure to those outcomes
• We can be uncertain about the winner of a contest,
  but unless we have some personal stake in it, we
  have no risk
• Risk Assessment is
  therefore subjective


                               November 2008: Viewed and Bauer came right down to the line in the Melbourne Cup




                        Confidential
Types of Risks


                             Examples of
•   Market Risk              Financial Risks
•   Credit Risk                           Note: We’re not referring to
                                              financial assessment

•   Liquidity Risk                       methodologies but to types of
                                         risk whose nature is financial

•   Strategic Risk           Examples of Non-
                             Financial Risks
•   Operational Risk
•   Business Risk
•   IT Risk


                       Confidential
Purpose of Risk Assessment



• To gain a sense of the “size” of the risks
• To prioritise based on our analysis
• To determine a course of action (controls) as
  needed




                      Confidential
Webinar Focus



•   Purpose of Assessing Risks
•   Different Assessment Methodologies
•   Strengths and Weaknesses
•   How to Choose?




                      Confidential
Examples of Methodologies and Techniques



• Methodology Examples: CRAMM, ISO31000,
  27005
• Techniques:
  – Scorecards
  – Questionnaires
  – Risk Squares
  – Financial Valuation
  – Scenario


                          Confidential
Scorecards



• Purpose is to attain an overall score for the
  risk
  – Questions broken into sections
  – Each question has a score
  – Each section has an overall score

                                                 Score: 1




                                                 Score: 3




                                                 Score: 2


                                       Overall Score: 6

                        Confidential
Questionnaires



• Purpose is to attain a set of descriptive
  information about the risk
• Questions and Answers
• Don’t necessarily generate a score; yield
  information




                      Confidential
Risk Squares

• Impact and Likelihood
  1. What is the impact of this risk to
     the ________?
  2. How likely is this risk to occur?
• Risk score generated by
  multiplying two values
• Variables:
  – The scale
  – The values
  – Odd vs. Even

                            Confidential
Risk Squares




   Confidential
Risk Cubes



         “Velocity”




Impact




         Likelihood



                        Confidential
Financial Valuation

• How do we get to a $ value instead of “just” a
  number?
• Need to understand purpose of valuation
  – Prioritisation
  – “Real” valuation
• What’s the difference?
• Parameters we could use:
  – Direct history
  – Insurance data
  – Management insight
                       Confidential
Don’t Kid Yourself

• History is history; the future is something else
• Financial valuations are generally no less
  reliable than other measures
• How do we aggregate them?
• Do the numbers make sense?




                       Confidential
Scenario Analysis

• Top-down approach to identify major risk
  scenarios
• Will use heavy combination of subjective and
  objective data
• Incorporates many people into the process
• Single scenario:
  –   Real history
  –   Insurance coverage
  –   Overall control environment
  –   Ownership
  –   Potential loss expression
  –   “Other” impacts         Confidential
Top-Down vs. Bottom-Up

• Different purposes
• Scenarios at top level are generally strategic
• Risks at lower level are generally for business
  management
• Need to find a way to link them




                       Confidential
Linking the Data Together

• Generate the risk                     S1    S2    S3    S4    S5
  scenarios
• Use them as part of
  the risk classification
• Allow business to                     R1    R2    R3    R4    R5

  identify their own risks              R6    R7    R8    R9    R10


• Map low-level risks to                R11   R12   R13   R14   R15

  the higher-level
  scenarios

                         Confidential
Linking the Data Together

• Ensures that business               S1    S2    S3    S4    S5
  has freedom to think
  out of the box
• Gives executive
  management a view on                R1    R2    R3    R4    R5

  how risk scenarios are              R6    R7    R8    R9    R10

  expressed throughout                R11   R12   R13   R14   R15
  the business



                       Confidential
Risk Surveys


• Collaborative approach
• Sit round a table, or via teleconference, and
  everyone has an opinion
• Lots of input




                      Confidential
Webinar Focus



•   Purpose of Assessing Risks
•   Different Assessment Methodologies
•   Strengths and Weaknesses
•   How to Choose?




                      Confidential
Common Factors

• All approaches have a fundamental common
  theme


 Identify          Assess           Respond



• Methodology choice is very personal


                     Confidential
How do we Identify Risks?

• Do we let them tell us what their risks are?
• Do we tell people what their risks are?
• How do we stop “the lost pencil” effect?
        Blank Sheet                     Templates




                         Confidential
The Blank Sheet Approach

• Business identifies their own
  risks
• Based on their own
  knowledge and
  understanding
• Accountability and
  responsibility for the
  process
• Submit the data back to
  central team
                         Confidential
The Template Approach

• Risk department build
  template
• Pre-defined risks
• Business asked to assess
  the risks
• Submit the data back to
  the risk team
• Allows for standardization


                        Confidential
Strengths and Weaknesses

• Template Approach
  • We never create the opportunity for creativity
  • We never reinforce ownership (“not my risks”)


• Blank Sheet Approach
  • Too much creativity / lacks balance
  • Difficult to compare and aggregate
  • Too much work (“I don’t have time for this”)




                             Confidential
Which is the “Worst” Risk?




 Risk
Impact




         R1   R2   R3   R4        R5   R6   R7   R8   R9


                        Confidential
Webinar Focus



•   Purpose of Assessing Risks
•   Different Assessment Methodologies
•   Strengths and Weaknesses
•   How to Choose?




                      Confidential
Remember the Purpose

• To gain a sense of the “size” of the risks
• To prioritise based on our analysis

• Most important thing is to have a
  standardised approach and the ability to
  compare
• Don’t spend months choosing a methodology
  – get something that is sensible and is
  practical
• Don’t be nervous to amend it over time
                       Confidential
How do we Respond to Risks?



• Risk Assessment gives us our opportunity to
  respond accordingly
  – Accept / Tolerate
  – Mitigate / Add Controls
  – Insure
  – Review




                       Confidential
Example from easy2comply




Risk


Controls




                    Confidential
Risk Score vs. Residual Risk




• The risk score together with the control
  effectiveness generates the Residual Risk
                       Confidential
Questions and Answers



   Jeremy Kaye, VP GRC Strategy
   +44 20 7903 5139
   jeremy.kaye@easy2comply.com




        Confidential

Weitere ähnliche Inhalte

Ähnlich wie Webinar - Risk Methodologies - Why are there so many?

Agile and the nature of decision making
Agile and the nature of decision makingAgile and the nature of decision making
Agile and the nature of decision making
drewz lin
 
Risk management automation
Risk management automationRisk management automation
Risk management automation
sheyam selvaraj
 
Wayne.brantley
Wayne.brantleyWayne.brantley
Wayne.brantley
NASAPMC
 
Risk managemet made easy
Risk managemet made easyRisk managemet made easy
Risk managemet made easy
sheyam selvaraj
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
s. Akhlaque
 
Business Resilience Brochure
Business Resilience BrochureBusiness Resilience Brochure
Business Resilience Brochure
Liam_Usher
 
Business Resilience Brochure
Business Resilience BrochureBusiness Resilience Brochure
Business Resilience Brochure
Liam_Usher
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
Alexei Sidorenko, CRMP
 

Ähnlich wie Webinar - Risk Methodologies - Why are there so many? (20)

Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testing
 
Agile and the nature of decision making
Agile and the nature of decision makingAgile and the nature of decision making
Agile and the nature of decision making
 
Agile and the nature of decision making
Agile and the nature of decision makingAgile and the nature of decision making
Agile and the nature of decision making
 
Integration Of Prince2® And M O R® 1 John Fisher
Integration Of Prince2® And M O R® 1 John FisherIntegration Of Prince2® And M O R® 1 John Fisher
Integration Of Prince2® And M O R® 1 John Fisher
 
Risk management automation
Risk management automationRisk management automation
Risk management automation
 
Wayne.brantley
Wayne.brantleyWayne.brantley
Wayne.brantley
 
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
 
Risk managemet made easy
Risk managemet made easyRisk managemet made easy
Risk managemet made easy
 
#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
 
Business Resilience Brochure
Business Resilience BrochureBusiness Resilience Brochure
Business Resilience Brochure
 
Business Resilience Brochure
Business Resilience BrochureBusiness Resilience Brochure
Business Resilience Brochure
 
Rims 2016 Global supply chain risk and resiliency
Rims 2016 Global supply chain risk and resiliencyRims 2016 Global supply chain risk and resiliency
Rims 2016 Global supply chain risk and resiliency
 
Taking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to PracticalTaking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to Practical
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
 

Mehr von easy2comply

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbook
easy2comply
 
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
easy2comply
 

Mehr von easy2comply (10)

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbook
 
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
 
Webinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMWebinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCM
 
Online Training Solvency II
Online Training Solvency IIOnline Training Solvency II
Online Training Solvency II
 
Online Training Sarbanes-Oxley
Online Training Sarbanes-OxleyOnline Training Sarbanes-Oxley
Online Training Sarbanes-Oxley
 
Online Training Internal Control Management
Online Training Internal Control ManagementOnline Training Internal Control Management
Online Training Internal Control Management
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
Online Training Basel II
Online Training Basel IIOnline Training Basel II
Online Training Basel II
 
Compliance Management Software
Compliance Management SoftwareCompliance Management Software
Compliance Management Software
 
Risk Management Software
Risk Management SoftwareRisk Management Software
Risk Management Software
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Webinar - Risk Methodologies - Why are there so many?

  • 1. Risk Methodologies Why are there so many? 1st June 2011
  • 2. Presenter Jeremy Kaye, VP GRC Strategy +44 20 7903 5139 jeremy.kaye@easy2comply.com Confidential
  • 3. Housekeeping • The slides for this event will be distributed afterwards • The webinar recording will be archived on easy2comply website • Q&A at the end Confidential
  • 4. Webinar Focus • Purpose of Assessing Risks • Different Methodologies • Strengths and Weaknesses • How to Choose? Confidential
  • 5. Risk: A Definition • Possibility of loss or injury • Someone or something that creates a hazard • Chance of loss to the subject matter of an insurance contract • Chance that an investment will lose value • Potential that a chosen action will lead to an undesirable outcome Confidential
  • 6. Risk versus Uncertainty • Uncertainty is where there are different outcomes • Risk is your potential exposure to those outcomes • We can be uncertain about the winner of a contest, but unless we have some personal stake in it, we have no risk • Risk Assessment is therefore subjective November 2008: Viewed and Bauer came right down to the line in the Melbourne Cup Confidential
  • 7. Types of Risks Examples of • Market Risk Financial Risks • Credit Risk Note: We’re not referring to financial assessment • Liquidity Risk methodologies but to types of risk whose nature is financial • Strategic Risk Examples of Non- Financial Risks • Operational Risk • Business Risk • IT Risk Confidential
  • 8. Purpose of Risk Assessment • To gain a sense of the “size” of the risks • To prioritise based on our analysis • To determine a course of action (controls) as needed Confidential
  • 9. Webinar Focus • Purpose of Assessing Risks • Different Assessment Methodologies • Strengths and Weaknesses • How to Choose? Confidential
  • 10. Examples of Methodologies and Techniques • Methodology Examples: CRAMM, ISO31000, 27005 • Techniques: – Scorecards – Questionnaires – Risk Squares – Financial Valuation – Scenario Confidential
  • 11. Scorecards • Purpose is to attain an overall score for the risk – Questions broken into sections – Each question has a score – Each section has an overall score Score: 1 Score: 3 Score: 2 Overall Score: 6 Confidential
  • 12. Questionnaires • Purpose is to attain a set of descriptive information about the risk • Questions and Answers • Don’t necessarily generate a score; yield information Confidential
  • 13. Risk Squares • Impact and Likelihood 1. What is the impact of this risk to the ________? 2. How likely is this risk to occur? • Risk score generated by multiplying two values • Variables: – The scale – The values – Odd vs. Even Confidential
  • 14. Risk Squares Confidential
  • 15. Risk Cubes “Velocity” Impact Likelihood Confidential
  • 16. Financial Valuation • How do we get to a $ value instead of “just” a number? • Need to understand purpose of valuation – Prioritisation – “Real” valuation • What’s the difference? • Parameters we could use: – Direct history – Insurance data – Management insight Confidential
  • 17. Don’t Kid Yourself • History is history; the future is something else • Financial valuations are generally no less reliable than other measures • How do we aggregate them? • Do the numbers make sense? Confidential
  • 18. Scenario Analysis • Top-down approach to identify major risk scenarios • Will use heavy combination of subjective and objective data • Incorporates many people into the process • Single scenario: – Real history – Insurance coverage – Overall control environment – Ownership – Potential loss expression – “Other” impacts Confidential
  • 19. Top-Down vs. Bottom-Up • Different purposes • Scenarios at top level are generally strategic • Risks at lower level are generally for business management • Need to find a way to link them Confidential
  • 20. Linking the Data Together • Generate the risk S1 S2 S3 S4 S5 scenarios • Use them as part of the risk classification • Allow business to R1 R2 R3 R4 R5 identify their own risks R6 R7 R8 R9 R10 • Map low-level risks to R11 R12 R13 R14 R15 the higher-level scenarios Confidential
  • 21. Linking the Data Together • Ensures that business S1 S2 S3 S4 S5 has freedom to think out of the box • Gives executive management a view on R1 R2 R3 R4 R5 how risk scenarios are R6 R7 R8 R9 R10 expressed throughout R11 R12 R13 R14 R15 the business Confidential
  • 22. Risk Surveys • Collaborative approach • Sit round a table, or via teleconference, and everyone has an opinion • Lots of input Confidential
  • 23. Webinar Focus • Purpose of Assessing Risks • Different Assessment Methodologies • Strengths and Weaknesses • How to Choose? Confidential
  • 24. Common Factors • All approaches have a fundamental common theme Identify Assess Respond • Methodology choice is very personal Confidential
  • 25. How do we Identify Risks? • Do we let them tell us what their risks are? • Do we tell people what their risks are? • How do we stop “the lost pencil” effect? Blank Sheet Templates Confidential
  • 26. The Blank Sheet Approach • Business identifies their own risks • Based on their own knowledge and understanding • Accountability and responsibility for the process • Submit the data back to central team Confidential
  • 27. The Template Approach • Risk department build template • Pre-defined risks • Business asked to assess the risks • Submit the data back to the risk team • Allows for standardization Confidential
  • 28. Strengths and Weaknesses • Template Approach • We never create the opportunity for creativity • We never reinforce ownership (“not my risks”) • Blank Sheet Approach • Too much creativity / lacks balance • Difficult to compare and aggregate • Too much work (“I don’t have time for this”) Confidential
  • 29. Which is the “Worst” Risk? Risk Impact R1 R2 R3 R4 R5 R6 R7 R8 R9 Confidential
  • 30. Webinar Focus • Purpose of Assessing Risks • Different Assessment Methodologies • Strengths and Weaknesses • How to Choose? Confidential
  • 31. Remember the Purpose • To gain a sense of the “size” of the risks • To prioritise based on our analysis • Most important thing is to have a standardised approach and the ability to compare • Don’t spend months choosing a methodology – get something that is sensible and is practical • Don’t be nervous to amend it over time Confidential
  • 32. How do we Respond to Risks? • Risk Assessment gives us our opportunity to respond accordingly – Accept / Tolerate – Mitigate / Add Controls – Insure – Review Confidential
  • 34. Risk Score vs. Residual Risk • The risk score together with the control effectiveness generates the Residual Risk Confidential
  • 35. Questions and Answers Jeremy Kaye, VP GRC Strategy +44 20 7903 5139 jeremy.kaye@easy2comply.com Confidential