SlideShare ist ein Scribd-Unternehmen logo
1 von 33
How to Create a Risk Profile for
Your Organization: 10 Essential Steps
Pat Poitevin, CACM, TASA
Marc Y. Tassé, CPA, CA, CFF, CICA
Canadian Centre of Excellence for Anti-Corruption
Pat Poitevin, CACM, TASA
Patrice Poitevin is co-founder and Managing Director of the
Canadian Center of Excellence for Combating Corruption
(CCEAC)
Mr. Poitevin is a 35-year veteran of the Royal Canadian Mounted
Police (RCMP). He retired in October 2017 where he was an anti-
corruption and compliance expert for the RCMP. He is an
internationally recognized expert in the fight against corruption,
ethics and compliance. He is in demand as an expert, speaker
and trainer
Mr. Poitevin was part of the Canadian project committee (PC278)
involved in the development of the anti-corruption management
system standard ISO 37001 and of the United Nations Global
Compact Global Network working group that created the
electronic book anti Corruption.
He is also a member of Transparency International Canada, a
certified anti-corruption official (CACM - USA), an accredited
Trace Anti-Bribery specialist (TASA) and a member of the
Transparency International expert network.
Marc Tassé, MBA, CPA, CA, CFF
Marc Tassé is a forensic accountant and is recognized worldwide
as an authority in the fight against corruption, money laundering
and the financing of terrorist activities.
Seasoned and award-winning MBA lecturer and ISO 37001
teaching expert, Mr. Tassé is frequently invited by the media as a
commentator, and he often gives lectures on subjects related to
his areas of expertise . He has published extensively on these
topics in Canada and abroad, and is cited in various prestigious
publications, including the Wall Street Journal.
Mr. Tassé holds the title of Chartered Professional Accountant
(CPA auditor, CA), as well as the American titles of Forensic
Certified Public Accountant (FCPA), Certified Internal Controls
Auditor (CICA), Certified in Financial Forensics (CFF) and
Certified Anti-Corruption Manager (CACM). He holds a Masters of
Business Administration and an Honors Bachelor of Commerce
from the Telfer School of Management at the University of Ottawa.
Marc is also a senior manager and instructor at the Canadian
Centre of Excellence for Anti-Corruption (CCEAC).
The adoption of ERM & GRC
processes & standards
Governance, Risk management
& Compliance (GRC)
Risk management processes
and capability
What is a risk profile
A risk profile is a summary that lists estimates for all the risks
associated with a strategy, program, project or activity. Risk profiles are
documented and visualized using different methods but are typically
based on estimates for the probability and impact of a list of identified
risks.
Why do you need a risk profile
1. Better informed decision making and corporate planning
• A key purpose of a risk profile is to support effective decision
making in circumstances of uncertainty. By clearly highlighting
where key risk exposures exist, senior decision makers can
work to manage these and avoid action which would drive the
risk outside of acceptable tolerances.
2. Improved ability to anticipate change, emerging risk and
disruption to operations
• A risk profile can support the consideration of emerging and
future risk as well as current exposures so that contingency
plans can be developed where required.
Step 1 - Profiling approach and
process
A disciplined approach to risk profile maintenance includes an ongoing
process to identify new or emerging risks and analyze the threats and
opportunities they may represent. This process helps the entity to:
• understand the likely effectiveness of existing strategies and
controls in mitigating emerging risk and optimizing opportunity
• understand how new risk changes the overall exposure of the
entity
• understand the impact that the changed risk profile could have
on stakeholders and shared risks
• anticipate change and disruption to operations
Step 2 - Understanding risk
exposure compared to risk
appetiteA good representation of an entity’s risk profile will support senior
officials to understand whether the entity is holding too much, too little,
or just enough risk. Where an entity has a well-defined risk appetite,
this can be represented within the risk profile. The risk profile can be
used to clearly highlight where activities, programs or business units
are operating outside defined risk tolerance thresholds.
Step 3 - Organisational
requirements for risk profiling
Departments and agencies are increasingly seeing the benefits of
implementing an integrated risk management approach. A first step in
pursuing integrated risk management is to develop an organization-
wide risk profile (often referred to as a corporate risk profile)
• Key risk areas (e.g., strategic, operational, project)
• Strengths and weaknesses of the department/agency
• Major opportunities and threats
• Risk tolerance levels
• Capacity to manage risks
• Learning needs and tools
• The organization’s risk tolerance, priority setting and ability to mitigate
risks
• Linkages between different levels of risks (e.g., operational and overall
departmental priorities, business and program risks, sector specific
and department-wide)
• Linkages with management processes of the department
Step 4 - Risk profile should address
Scope of profiling activity
A corporate risk profile can be prepared for a specific department,
agency, or sector/branch, depending on the scope of its mandate and
operations. The challenge is to ensure that risk management is aligned
at the various levels of the organization.
Examples of risks (1)
Examples of risks (2)
L
A practical approach to developing,
maintaining and improving a risk
profile
Step 5 - Develop the Risk profile
• Assess risk with both a short and long-term focus. This enables the
subsequent risk profile to inform both immediate action and longer-
term planning
• Seek input from stakeholders and relevant subject matter experts
who best understand the risks
• Develop the risk profile in accordance with the relevant risk
management framework and ensure consistent and correct use of
risk terminology and categories.
Step 6 - Analyse the risk profile for
common themes and systemic
issues• Patterns in the difference between inherent vs residual risk. The
extent and consistency of difference will give an indication of the
effectiveness of the entity’s control framework
• Common causal factors, where a small number of contributing
issues are relevant to a larger number of risks. These may suggest
priority opportunities for treatment
• Linkages between risks in different profiles. This can help
understand interdependencies, relationships and the opportunity for
cascading failures
• Concentrations of severe risk in certain categories may indicate
areas of particular vulnerability for review. For example, if an
otherwise robust entity is managing a number of severe risks within
one category it may indicate attention needs to be paid to this area.
Step 7 - Reviewing the risk
profile can assist in ensuring
that• Assumptions about risks remain valid and the external and internal
context in which the risks were assessed remain valid
• Results of risk assessment are in line with actual experience
• Risk controls are being maintained and assured, and that proposed
treatments are being implemented as required
• Assumptions around the interrelationships and linkages between
risks at all levels at the organisation and the impact of change in one
risk on another, remains valid.
• Having a relevant risk owner or steward present an analysis of a small
number of risks with a focus on key changes or concerns. Over time, this
will result in a rolling program of review of the risk profile.
• Periodically recreate the risk profile from a ‘clean sheet’. Occasionally
starting from scratch and performing a fresh risk assessment and then
reconciling the results with the existing profile.
• Establish escalation mechanisms to ensure that risks in the entity risk
profile are being managed at the right level.
• Ensure those responsible for designing or implementing new policies or
programs first review relevant elements of the risk profile to ensure that
they understand whether risks will be created or modified and that
control strategies remain appropriate and effective.
• Consider risk monitoring information already available such as audit
reports, quality assurance activities, and the results of key performance
Practical strategies to guide
review of profile
Step 8 - Communicate the risk
profile
• Seeking feedback from executive reviewers and stakeholders on
how often and to whom risks are to be reported
• Establishing well understood risk escalation and aggregation
protocols so that unacceptable risks can be quickly conveyed to the
appropriate level of management and that the nature of the risk is
clear
• Tailoring the presentation of the risk profile to its audience and
consider their risk management maturity
• Using colour to highlight key issues and areas of concern, or focus
the audience’s attention on the risks or concerns that most warrant
discussion.
Example – Traditional Risk
Register• Risk ID or unique identifier
• Description of the risk – its cause, the risk event, and key outcome should it be realized
• A risk category or group or family
• Sources or causal factors relevant to the risk
• The likelihood of the risk occurring
• The potential impact or consequence should the risk be realized
• Control measures currently in place and an assessment of their effectiveness
• An assessment of how the risk is changing or trending and how quickly it could be
realized
• An assessment of risk tolerability, or how the risk compares to relevant elements of the
entity’s risk appetite
• Treatments (proposed controls) to be implemented to improve the management of the
risk, if required
• Owner or steward of the risk.
Example – Traditional Risk
Register
Risk Severity Matrix or HeatMap
Inherent risk severity vs control
effectiveness
Control critical risks - are inherently severe, but currently well controlled. Require active monitoring and
management.
Insufficiently controlled risks – are inherently severe and are assessed as being inadequately controlled.
Likely require additional treatment.
Inherently low risks - require active monitoring to ensure changes do not make the risk more severe.
Potentially over controlled risks - are inherently mild with high levels of control. Need to be monitored.
Represent potential opportunities for efficiency gains.
Risk exposure compared to risk
appetite
Can be useful to explicitly compare the level of risk exposure represented in a risk profile
against the risk appetite of the entity. This helps decision makers understand if they are
carrying too much, too little, or just enough risk. This can occur at an individual risk, risk
category, or whole of profile level.
Risk tolerance
The table presents a risk profile of six risks, comparing the current exposure against
the risk tolerance for that category of risk. The rightmost column clearly illustrates to
a senior decision maker where risk is above, below or in line with the relevant
tolerance and the direction the risk needs to be driven.
Step 9 - Risk profile exercise
should include (1)
• Key risk areas (e.g., strategic, operational, project), including major
opportunities and threats
• Categorization of risks (e.g., human health, environment, trade, legal,
human resources)
• Description of the risks
• Probability of risk (low, med, high)
• Impact of risk
• Risk timeframe (e.g., short: 2 years or less, medium: 3-4 years, long
term: 5 years or more)
• Relative priority of the risks
• Ways of measuring the risk (qualitative and quantitative)
Step 9 - Risk profile exercise
should include (2)
• Risk tolerance levels (to the extent that these can be identified and/or
measured)
• Mitigation measures that are currently in place, including strengths and
weaknesses of the department
• Linkages between different levels of risks (e.g., operational and overall
departmental priorities, business and program risks, sector specific and
department-wide)
• Linkages with management processes of the organization
• Capacity of the organization to do risk management
• Learning needs and tools
Step 10 - Factors to consider to
improve Risk profiling process
• Develop an overall integrated risk profile that covers the full range of risks
(program and internal business risks)
• Maintain and update an overall profile of the internal/ external risks facing the
organization (in the short and long term), and linkages with measures that are
in place to mitigate these risks
• Be more explicit about the acceptable level of risk tolerance in each program/
functional area, and review these with all stakeholders
• Establish more formal process for prioritizing risks and organization-wide
priorities with senior management and the board
• Enhance communications of organization-wide risks to staff and external
stakeholders
• Continue to develop quantitative approaches to assess levels of hazards, risks
and probabilities
Key messages to engage
stakeholders in the process
• The close relationships that do exist between organization-wide business risks
and program/commodity risks
• The benefits of collecting intelligence and sharing knowledge on risks at an
organization wide level, and using this information to keep senior management
informed of emerging risks
• The benefits of applying the same rigorous risk management approach that is
used to assess operational risks to assess organization-wide business risks
• The merits of having an ongoing process to identify new emerging risks at an
organization wide level, and continuously reviewing the relative priorities of
these risks to help with resource allocation decisions
• How integrated risk management can help program managers in their day-
today business decisions.
• How integrated risk management can help drive the planning and decision-
making processes of the organisation.
Contact Information
Marc Tassé – mtasse@uottawa.ca
Pat Poitevin – pat.poitevin@uottawa.ca
www.cceac.ca

Weitere ähnliche Inhalte

Was ist angesagt?

Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Andrew Smart
 
Risk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation SlidesRisk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation SlidesSlideTeam
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides SlideTeam
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides SlideTeam
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementPYA, P.C.
 
Risk Management Fundamentals
Risk Management FundamentalsRisk Management Fundamentals
Risk Management Fundamentalsmikaelastafrace
 
Introducing KRI model know your customers
Introducing KRI model   know your customersIntroducing KRI model   know your customers
Introducing KRI model know your customersBaby Sirota
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Goutama Bachtiar
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management OverviewJIGNESH PADIA
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides SlideTeam
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Ahmad Azwang Aisram Omar
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 

Was ist angesagt? (20)

Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard
 
Risk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation SlidesRisk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation Slides
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
 
Risk assessment tools and techniques
Risk assessment tools and techniquesRisk assessment tools and techniques
Risk assessment tools and techniques
 
Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides Risk Management Lifecycle PowerPoint Presentation Slides
Risk Management Lifecycle PowerPoint Presentation Slides
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Risk Management Fundamentals
Risk Management FundamentalsRisk Management Fundamentals
Risk Management Fundamentals
 
Introducing KRI model know your customers
Introducing KRI model   know your customersIntroducing KRI model   know your customers
Introducing KRI model know your customers
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009Introduction to Risk Management ISO31000:2009
Introduction to Risk Management ISO31000:2009
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 

Ähnlich wie How to Create a Risk Profile for Your Organization: 10 Essential Steps

Five Lines of Assurance A New ERM and IA Paradigm
Five Lines of Assurance  A New ERM and IA ParadigmFive Lines of Assurance  A New ERM and IA Paradigm
Five Lines of Assurance A New ERM and IA ParadigmTim Leech
 
A to Z of Risk Management
A to Z of Risk ManagementA to Z of Risk Management
A to Z of Risk ManagementMark Conway
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1Paul Hunt
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to financeRobert Reed
 
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)Keith Darcy
 
Risk Management Toolkit
Risk Management ToolkitRisk Management Toolkit
Risk Management ToolkitPeterFranz6
 
#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana Budishevskaya#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana BudishevskayaAlexei Sidorenko, CRMP
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption RiskDr Darren O'Connell AGIA
 
Risk Management - A Journey
Risk Management - A JourneyRisk Management - A Journey
Risk Management - A JourneyDebashis Gupta
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.pptUday Nayakwadi
 

Ähnlich wie How to Create a Risk Profile for Your Organization: 10 Essential Steps (20)

Five lines of assurance a new paradigm in internal audit & erm
Five lines of assurance a new paradigm in internal audit & ermFive lines of assurance a new paradigm in internal audit & erm
Five lines of assurance a new paradigm in internal audit & erm
 
Five Lines of Assurance A New ERM and IA Paradigm
Five Lines of Assurance  A New ERM and IA ParadigmFive Lines of Assurance  A New ERM and IA Paradigm
Five Lines of Assurance A New ERM and IA Paradigm
 
A to Z of Risk Management
A to Z of Risk ManagementA to Z of Risk Management
A to Z of Risk Management
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
WSJ-Compliance Risks What You Don’t Contain Can Hurt You - Deloitte Risk (1)
 
Risk Management Toolkit
Risk Management ToolkitRisk Management Toolkit
Risk Management Toolkit
 
Chapter 3-4.pdf
Chapter 3-4.pdfChapter 3-4.pdf
Chapter 3-4.pdf
 
#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana Budishevskaya#Corpriskforum2016 - Tatiana Budishevskaya
#Corpriskforum2016 - Tatiana Budishevskaya
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk
 
Risk Management - A Journey
Risk Management - A JourneyRisk Management - A Journey
Risk Management - A Journey
 
Presentation_20110802213554
Presentation_20110802213554Presentation_20110802213554
Presentation_20110802213554
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
Dealing with Operational and Ecosystem Risk
Dealing with Operational and Ecosystem RiskDealing with Operational and Ecosystem Risk
Dealing with Operational and Ecosystem Risk
 
Iso 31000 presentation
Iso 31000 presentationIso 31000 presentation
Iso 31000 presentation
 
Rmp
RmpRmp
Rmp
 
Trustee Conference AM4: Effectively managing risk
Trustee Conference AM4: Effectively managing riskTrustee Conference AM4: Effectively managing risk
Trustee Conference AM4: Effectively managing risk
 

Mehr von Case IQ

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskCase IQ
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...Case IQ
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Case IQ
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsCase IQ
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxCase IQ
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work CultureCase IQ
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceCase IQ
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Case IQ
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Case IQ
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Case IQ
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...Case IQ
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?Case IQ
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Case IQ
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingCase IQ
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceCase IQ
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsCase IQ
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Case IQ
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk Case IQ
 

Mehr von Case IQ (20)

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate Investigators
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptx
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of Compliance
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and Training
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplace
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 

Kürzlich hochgeladen

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 

Kürzlich hochgeladen (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 

How to Create a Risk Profile for Your Organization: 10 Essential Steps

  • 1. How to Create a Risk Profile for Your Organization: 10 Essential Steps Pat Poitevin, CACM, TASA Marc Y. Tassé, CPA, CA, CFF, CICA Canadian Centre of Excellence for Anti-Corruption
  • 2. Pat Poitevin, CACM, TASA Patrice Poitevin is co-founder and Managing Director of the Canadian Center of Excellence for Combating Corruption (CCEAC) Mr. Poitevin is a 35-year veteran of the Royal Canadian Mounted Police (RCMP). He retired in October 2017 where he was an anti- corruption and compliance expert for the RCMP. He is an internationally recognized expert in the fight against corruption, ethics and compliance. He is in demand as an expert, speaker and trainer Mr. Poitevin was part of the Canadian project committee (PC278) involved in the development of the anti-corruption management system standard ISO 37001 and of the United Nations Global Compact Global Network working group that created the electronic book anti Corruption. He is also a member of Transparency International Canada, a certified anti-corruption official (CACM - USA), an accredited Trace Anti-Bribery specialist (TASA) and a member of the Transparency International expert network.
  • 3. Marc Tassé, MBA, CPA, CA, CFF Marc Tassé is a forensic accountant and is recognized worldwide as an authority in the fight against corruption, money laundering and the financing of terrorist activities. Seasoned and award-winning MBA lecturer and ISO 37001 teaching expert, Mr. Tassé is frequently invited by the media as a commentator, and he often gives lectures on subjects related to his areas of expertise . He has published extensively on these topics in Canada and abroad, and is cited in various prestigious publications, including the Wall Street Journal. Mr. Tassé holds the title of Chartered Professional Accountant (CPA auditor, CA), as well as the American titles of Forensic Certified Public Accountant (FCPA), Certified Internal Controls Auditor (CICA), Certified in Financial Forensics (CFF) and Certified Anti-Corruption Manager (CACM). He holds a Masters of Business Administration and an Honors Bachelor of Commerce from the Telfer School of Management at the University of Ottawa. Marc is also a senior manager and instructor at the Canadian Centre of Excellence for Anti-Corruption (CCEAC).
  • 4. The adoption of ERM & GRC processes & standards
  • 5. Governance, Risk management & Compliance (GRC)
  • 7. What is a risk profile A risk profile is a summary that lists estimates for all the risks associated with a strategy, program, project or activity. Risk profiles are documented and visualized using different methods but are typically based on estimates for the probability and impact of a list of identified risks.
  • 8. Why do you need a risk profile 1. Better informed decision making and corporate planning • A key purpose of a risk profile is to support effective decision making in circumstances of uncertainty. By clearly highlighting where key risk exposures exist, senior decision makers can work to manage these and avoid action which would drive the risk outside of acceptable tolerances. 2. Improved ability to anticipate change, emerging risk and disruption to operations • A risk profile can support the consideration of emerging and future risk as well as current exposures so that contingency plans can be developed where required.
  • 9. Step 1 - Profiling approach and process A disciplined approach to risk profile maintenance includes an ongoing process to identify new or emerging risks and analyze the threats and opportunities they may represent. This process helps the entity to: • understand the likely effectiveness of existing strategies and controls in mitigating emerging risk and optimizing opportunity • understand how new risk changes the overall exposure of the entity • understand the impact that the changed risk profile could have on stakeholders and shared risks • anticipate change and disruption to operations
  • 10. Step 2 - Understanding risk exposure compared to risk appetiteA good representation of an entity’s risk profile will support senior officials to understand whether the entity is holding too much, too little, or just enough risk. Where an entity has a well-defined risk appetite, this can be represented within the risk profile. The risk profile can be used to clearly highlight where activities, programs or business units are operating outside defined risk tolerance thresholds.
  • 11. Step 3 - Organisational requirements for risk profiling Departments and agencies are increasingly seeing the benefits of implementing an integrated risk management approach. A first step in pursuing integrated risk management is to develop an organization- wide risk profile (often referred to as a corporate risk profile)
  • 12. • Key risk areas (e.g., strategic, operational, project) • Strengths and weaknesses of the department/agency • Major opportunities and threats • Risk tolerance levels • Capacity to manage risks • Learning needs and tools • The organization’s risk tolerance, priority setting and ability to mitigate risks • Linkages between different levels of risks (e.g., operational and overall departmental priorities, business and program risks, sector specific and department-wide) • Linkages with management processes of the department Step 4 - Risk profile should address
  • 13. Scope of profiling activity A corporate risk profile can be prepared for a specific department, agency, or sector/branch, depending on the scope of its mandate and operations. The challenge is to ensure that risk management is aligned at the various levels of the organization.
  • 16. A practical approach to developing, maintaining and improving a risk profile
  • 17. Step 5 - Develop the Risk profile • Assess risk with both a short and long-term focus. This enables the subsequent risk profile to inform both immediate action and longer- term planning • Seek input from stakeholders and relevant subject matter experts who best understand the risks • Develop the risk profile in accordance with the relevant risk management framework and ensure consistent and correct use of risk terminology and categories.
  • 18. Step 6 - Analyse the risk profile for common themes and systemic issues• Patterns in the difference between inherent vs residual risk. The extent and consistency of difference will give an indication of the effectiveness of the entity’s control framework • Common causal factors, where a small number of contributing issues are relevant to a larger number of risks. These may suggest priority opportunities for treatment • Linkages between risks in different profiles. This can help understand interdependencies, relationships and the opportunity for cascading failures • Concentrations of severe risk in certain categories may indicate areas of particular vulnerability for review. For example, if an otherwise robust entity is managing a number of severe risks within one category it may indicate attention needs to be paid to this area.
  • 19. Step 7 - Reviewing the risk profile can assist in ensuring that• Assumptions about risks remain valid and the external and internal context in which the risks were assessed remain valid • Results of risk assessment are in line with actual experience • Risk controls are being maintained and assured, and that proposed treatments are being implemented as required • Assumptions around the interrelationships and linkages between risks at all levels at the organisation and the impact of change in one risk on another, remains valid.
  • 20. • Having a relevant risk owner or steward present an analysis of a small number of risks with a focus on key changes or concerns. Over time, this will result in a rolling program of review of the risk profile. • Periodically recreate the risk profile from a ‘clean sheet’. Occasionally starting from scratch and performing a fresh risk assessment and then reconciling the results with the existing profile. • Establish escalation mechanisms to ensure that risks in the entity risk profile are being managed at the right level. • Ensure those responsible for designing or implementing new policies or programs first review relevant elements of the risk profile to ensure that they understand whether risks will be created or modified and that control strategies remain appropriate and effective. • Consider risk monitoring information already available such as audit reports, quality assurance activities, and the results of key performance Practical strategies to guide review of profile
  • 21. Step 8 - Communicate the risk profile • Seeking feedback from executive reviewers and stakeholders on how often and to whom risks are to be reported • Establishing well understood risk escalation and aggregation protocols so that unacceptable risks can be quickly conveyed to the appropriate level of management and that the nature of the risk is clear • Tailoring the presentation of the risk profile to its audience and consider their risk management maturity • Using colour to highlight key issues and areas of concern, or focus the audience’s attention on the risks or concerns that most warrant discussion.
  • 22. Example – Traditional Risk Register• Risk ID or unique identifier • Description of the risk – its cause, the risk event, and key outcome should it be realized • A risk category or group or family • Sources or causal factors relevant to the risk • The likelihood of the risk occurring • The potential impact or consequence should the risk be realized • Control measures currently in place and an assessment of their effectiveness • An assessment of how the risk is changing or trending and how quickly it could be realized • An assessment of risk tolerability, or how the risk compares to relevant elements of the entity’s risk appetite • Treatments (proposed controls) to be implemented to improve the management of the risk, if required • Owner or steward of the risk.
  • 23. Example – Traditional Risk Register
  • 24. Risk Severity Matrix or HeatMap
  • 25. Inherent risk severity vs control effectiveness Control critical risks - are inherently severe, but currently well controlled. Require active monitoring and management. Insufficiently controlled risks – are inherently severe and are assessed as being inadequately controlled. Likely require additional treatment. Inherently low risks - require active monitoring to ensure changes do not make the risk more severe. Potentially over controlled risks - are inherently mild with high levels of control. Need to be monitored. Represent potential opportunities for efficiency gains.
  • 26. Risk exposure compared to risk appetite Can be useful to explicitly compare the level of risk exposure represented in a risk profile against the risk appetite of the entity. This helps decision makers understand if they are carrying too much, too little, or just enough risk. This can occur at an individual risk, risk category, or whole of profile level.
  • 27. Risk tolerance The table presents a risk profile of six risks, comparing the current exposure against the risk tolerance for that category of risk. The rightmost column clearly illustrates to a senior decision maker where risk is above, below or in line with the relevant tolerance and the direction the risk needs to be driven.
  • 28. Step 9 - Risk profile exercise should include (1) • Key risk areas (e.g., strategic, operational, project), including major opportunities and threats • Categorization of risks (e.g., human health, environment, trade, legal, human resources) • Description of the risks • Probability of risk (low, med, high) • Impact of risk • Risk timeframe (e.g., short: 2 years or less, medium: 3-4 years, long term: 5 years or more) • Relative priority of the risks • Ways of measuring the risk (qualitative and quantitative)
  • 29. Step 9 - Risk profile exercise should include (2) • Risk tolerance levels (to the extent that these can be identified and/or measured) • Mitigation measures that are currently in place, including strengths and weaknesses of the department • Linkages between different levels of risks (e.g., operational and overall departmental priorities, business and program risks, sector specific and department-wide) • Linkages with management processes of the organization • Capacity of the organization to do risk management • Learning needs and tools
  • 30. Step 10 - Factors to consider to improve Risk profiling process • Develop an overall integrated risk profile that covers the full range of risks (program and internal business risks) • Maintain and update an overall profile of the internal/ external risks facing the organization (in the short and long term), and linkages with measures that are in place to mitigate these risks • Be more explicit about the acceptable level of risk tolerance in each program/ functional area, and review these with all stakeholders • Establish more formal process for prioritizing risks and organization-wide priorities with senior management and the board • Enhance communications of organization-wide risks to staff and external stakeholders • Continue to develop quantitative approaches to assess levels of hazards, risks and probabilities
  • 31. Key messages to engage stakeholders in the process • The close relationships that do exist between organization-wide business risks and program/commodity risks • The benefits of collecting intelligence and sharing knowledge on risks at an organization wide level, and using this information to keep senior management informed of emerging risks • The benefits of applying the same rigorous risk management approach that is used to assess operational risks to assess organization-wide business risks • The merits of having an ongoing process to identify new emerging risks at an organization wide level, and continuously reviewing the relative priorities of these risks to help with resource allocation decisions • How integrated risk management can help program managers in their day- today business decisions. • How integrated risk management can help drive the planning and decision- making processes of the organisation.
  • 32.
  • 33. Contact Information Marc Tassé – mtasse@uottawa.ca Pat Poitevin – pat.poitevin@uottawa.ca www.cceac.ca

Hinweis der Redaktion

  1. Control critical risks - are inherently severe, but currently well controlled. They may represent a low level of residual risk but only because of the effectiveness of current controls. These risks require active monitoring and management and an assurance strategy to ensure the risks do not increase in severity. Insufficiently controlled risks – are inherently severe and are assessed as being inadequately controlled. They may represent high residual risks. Insufficiently controlled risks likely require additional treatment. Inherently low risks - require active monitoring to ensure that any changes in the internal and external context do not make the risk more severe. Potentially over controlled risks - are inherently mild with high levels of control. These risks need to be monitored to ensure they do not become more severe over time, but also represent potential opportunities for efficiency gains if redundant or excessive controls are found.