SlideShare a Scribd company logo
1 of 49
Applying COSO’s
Enterprise Risk Management —
Integrated Framework
Today’s organizations are
concerned about:
• Risk Management
• Governance
• Control
• Assurance (and Consulting)
ERM Defined:
“… a process, effected by an entity's
board of directors, management and
other personnel, applied in strategy
setting and across the enterprise,
designed to identify potential events that
may affect the entity, and manage risks
to be within its risk appetite, to provide
reasonable assurance regarding the
achievement of entity objectives.”
Source: COSO Enterprise Risk Management – Integrated Framework. 2004.
COSO.
Why ERM Is Important
Underlying principles:
• Every entity, whether for-profit
or not, exists to realize value for
its stakeholders.
• Value is created, preserved, or
eroded by management decisions in
all activities, from setting strategy to
operating the enterprise day-to-day.
Why ERM Is Important
ERM supports value creation by enabling
management to:
• Deal effectively with potential future
events that create uncertainty.
• Respond in a manner that reduces
the likelihood of downside outcomes
and increases the upside.
This COSO ERM framework defines
essential components, suggests a
common language, and provides clear
direction and guidance for enterprise risk
management.
Enterprise Risk Management —
Integrated Framework
The ERM Framework
Entity objectives can be viewed in the
context of four categories:
• Strategic
• Operations
• Reporting
• Compliance
The ERM Framework
ERM considers activities at all levels
of the organization:
• Enterprise-level
• Division or
subsidiary
• Business unit
processes
Enterprise risk management
requires an entity to take a
portfolio view of risk.
The ERM Framework
• Management considers how
individual risks interrelate.
• Management develops a portfolio
view from two perspectives:
- Business unit level
- Entity level
The ERM Framework
The eight components
of the framework
are interrelated …
The ERM Framework
Internal Environment
• Establishes a philosophy regarding risk
management. It recognizes that
unexpected as well as expected events
may occur.
• Establishes the entity’s risk culture.
• Considers all other aspects of how the
organization’s actions may affect its risk
culture.
Objective Setting
• Is applied when management considers
risks strategy in the setting of
objectives.
• Forms the risk appetite of the entity —
a high-level view of how much risk
management and the board are willing
to accept.
• Risk tolerance, the acceptable level of
variation around objectives, is aligned
with risk appetite.
Event Identification
• Differentiates risks and opportunities.
• Events that may have a negative impact
represent risks.
• Events that may have a positive impact
represent natural offsets
(opportunities), which management
channels back to strategy setting.
Event Identification
• Involves identifying those incidents,
occurring internally or externally, that
could affect strategy and achievement
of objectives.
• Addresses how internal and external
factors combine and interact to
influence the risk profile.
Risk Assessment
• Allows an entity to understand the
extent to which potential events might
impact objectives.
• Assesses risks from two perspectives:
- Likelihood
- Impact
• Is used to assess risks and is normally
also used to measure the related
objectives.
Risk Assessment
• Employs a combination of both
qualitative and quantitative risk
assessment methodologies.
• Relates time horizons to objective
horizons.
• Assesses risk on both an inherent and a
residual basis.
Risk Response
• Identifies and evaluates possible
responses to risk.
• Evaluates options in relation to entity’s
risk appetite, cost vs. benefit of
potential risk responses, and degree to
which a response will reduce impact
and/or likelihood.
• Selects and executes response based on
evaluation of the portfolio of risks and
responses.
Control Activities
• Policies and procedures that help ensure
that the risk responses, as well as other
entity directives, are carried out.
• Occur throughout the organization, at
all levels and in all functions.
• Include application and general
information technology controls.
• Management identifies, captures, and
communicates pertinent information in
a form and timeframe that enables
people to carry out their responsibilities.
• Communication occurs in a broader
sense, flowing down, across, and up
the organization.
Information & Communication
Monitoring
Effectiveness of the other ERM
components is monitored through:
• Ongoing monitoring activities.
• Separate evaluations.
• A combination of the two.
Internal Control
A strong system of internal
control is essential to effective
enterprise risk management.
• Expands and elaborates on elements
of internal control as set out in COSO’s
“control framework.”
• Includes objective setting as a separate
component. Objectives are a “prerequisite” for
internal control.
• Expands the control framework’s “Financial
Reporting” and “Risk Assessment.”
Relationship to Internal Control —
Integrated Framework
ERM Roles & Responsibilities
• Management
• The board of directors
• Risk officers
• Internal auditors
Internal Auditors
• Play an important role in monitoring
ERM, but do NOT have primary
responsibility for its implementation
or maintenance.
• Assist management and the board or
audit committee in the process by:
- Monitoring - Evaluating
- Examining - Reporting
- Recommending improvements
Visit the guidance section of
The IIA’s Web site for The IIA’s
position paper, “Role of Internal
Auditing’s in Enterprise Risk
Management.”
Internal Auditors
• 2010.A1 – The internal audit activity’s plan
of engagements should be based on a risk
assessment, undertaken at least annually.
• 2120.A1 – Based on the results of the risk
assessment, the internal audit activity
should evaluate the adequacy and
effectiveness of controls encompassing the
organization’s governance, operations, and
information systems.
• 2210.A1 – When planning the engagement,
the internal auditor should identify and
assess risks relevant to the activity under
review. The engagement objectives should
reflect the results of the risk assessment.
Standards
1. Organizational design of business
2. Establishing an ERM organization
3. Performing risk assessments
4. Determining overall risk appetite
5. Identifying risk responses
6. Communication of risk results
7. Monitoring
8. Oversight & periodic review
by management
Key Implementation Factors
Organizational Design
• Strategies of the business
• Key business objectives
• Related objectives that cascade
down the organization from key
business objectives
• Assignment of responsibilities to
organizational elements and leaders
(linkage)
Example: Linkage
• Mission – To provide high-quality
accessible and affordable community-
based health care
• Strategic Objective – To be the first
or second largest, full-service health
care provider in mid-size metropolitan
markets
• Related Objective – To initiate
dialogue with leadership of 10 top under-
performing hospitals and negotiate
agreements with two this year
Establish ERM
• Determine a risk philosophy
• Survey risk culture
• Consider organizational integrity
and ethical values
• Decide roles and responsibilities
Example: ERM Organization
ERM
Director
ERM
Director
Vice President and
Chief Risk Officer
Vice President and
Chief Risk Officer
Corporate Credit
Risk Manager
Corporate Credit
Risk Manager
Insurance
Risk Manager
Insurance
Risk Manager
ERM
Manager
ERM
Manager
ERM
Manager
ERM
Manager
StaffStaff StaffStaffStaffStaff
FES
Commodity
Risk Mg.
Director
FES
Commodity
Risk Mg.
Director
Risk assessment is the
identification and analysis of
risks to the achievement of
business objectives. It forms a
basis for determining how risks
should be managed.
Assess Risk
Environmental Risks
• Capital Availability
• Regulatory, Political, and Legal
• Financial Markets and Shareholder Relations
Process Risks
• Operations Risk
• Empowerment Risk
• Information Processing / Technology Risk
• Integrity Risk
• Financial Risk
Information for Decision Making
• Operational Risk
• Financial Risk
• Strategic Risk
Example: Risk Model
Source: Business Risk Assessment. 1998 – The Institute of Internal Auditors
Control It
Share or
Transfer It
Diversify or
Avoid It
Risk
Management
Process
Level
Activity
Level
Entity Level
Risk
Monitoring
Identification
Measurement
Prioritization
Risk
Assessment
Risk Analysis
DETERMINE RISK APPETITE
• Risk appetite is the amount of risk — on
a broad level — an entity is willing to
accept in pursuit of value.
• Use quantitative or qualitative terms
(e.g. earnings at risk vs. reputation
risk), and consider risk tolerance (range
of acceptable variation).
Key questions:
• What risks will the organization not
accept?
(e.g. environmental or quality compromises)
• What risks will the organization take
on new initiatives?
(e.g. new product lines)
• What risks will the organization
accept for competing objectives?
(e.g. gross profit vs. market share?)
DETERMINE RISK APPETITE
• Quantification of risk exposure
• Options available:
- Accept = monitor
- Avoid = eliminate (get out of situation)
- Reduce = institute controls
- Share = partner with someone
(e.g. insurance)
• Residual risk (unmitigated risk – e.g. shrinkage)
IDENTIFY RISK RESPONSES
Impact vs. Probability
Control
Share Mitigate & Control
Accept
High Risk
Medium Risk
Medium Risk
Low Risk
Low
High
High
I
M
P
A
C
T
PROBABILITY
Low
High
High
I
M
P
A
C
T
PROBABILITY
High Risk
Medium Risk
Medium Risk
Low Risk
Example: Call Center Risk
Assessment
• Loss of phones
• Loss of computers
• Credit risk
• Customer has a long wait
• Customer can’t get through
• Customer can’t get answers
• Entry errors
• Equipment obsolescence
• Repeat calls for same problem
• Fraud
• Lost transactions
• Employee morale
Control Risk Control
Objective Activity
Completeness Material Accrual of
transaction open liabilities
not recorded
Invoices accrued
after closing
Issue: Invoices go to field and AP is not aware of liability.
Example: Accounts Payable
Process
• Dashboard of risks and related responses
(visual status of where key risks stand relative
to risk tolerances)
• Flowcharts of processes with key controls
noted
• Narratives of business objectives linked to
operational risks and responses
• List of key risks to be monitored or used
• Management understanding of key business
risk responsibility and communication of
assignments
Communicate Results
Monitor
• Collect and display information
• Perform analysis
- Risks are being properly addressed
- Controls are working to mitigate risks
• Accountability for risks
• Ownership
• Updates
- Changes in business objectives
- Changes in systems
- Changes in processes
Management Oversight &
Periodic Review
Internal auditors can add value
by:
• Reviewing critical control systems and
risk management processes.
• Performing an effectiveness review of
management's risk assessments and
the internal controls.
• Providing advice in the design and
improvement of control systems and
risk mitigation strategies.
• Implementing a risk-based approach to
planning and executing the internal
audit process.
• Ensuring that internal auditing’s
resources are directed at those areas
most important to the organization.
• Challenging the basis of management’s
risk assessments and evaluating the
adequacy and effectiveness of risk
treatment strategies.
Internal auditors can add value
by:
• Facilitating ERM workshops.
• Defining risk tolerances where none
have been identified, based on internal
auditing's experience, judgment, and
consultation with management.
Internal auditors can add value
by:
For more information
On COSO’s
Enterprise Risk Management
— Integrated Framework,
visit
www.coso.org
or
www.theiia.org
This presentation
was produced
by
Applying COSO’s
Enterprise Risk Management —
Integrated Framework

More Related Content

What's hot

PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB
 
A Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingA Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingAmar Deep Ghimire
 
Enterprise risk management-Yashvanth G Nayak
Enterprise risk management-Yashvanth G NayakEnterprise risk management-Yashvanth G Nayak
Enterprise risk management-Yashvanth G NayakYashavanth Nayak
 
ISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final VersionISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final VersionDuncan O. Ogutu; CPA, CFE
 
Operational Risk Management & Strategic Planning
Operational Risk Management & Strategic PlanningOperational Risk Management & Strategic Planning
Operational Risk Management & Strategic PlanningEneni Oduwole
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1Paul Hunt
 
Super Strategies 2014 Risk Strategy Presentation
Super Strategies 2014  Risk Strategy PresentationSuper Strategies 2014  Risk Strategy Presentation
Super Strategies 2014 Risk Strategy PresentationDavid Fernandes
 
Everything You Need To Know About Internal Control Reviews
Everything You Need To Know About Internal Control ReviewsEverything You Need To Know About Internal Control Reviews
Everything You Need To Know About Internal Control ReviewsAdriana Sklencar
 
Risk management process
Risk management processRisk management process
Risk management processeduCBA
 
Enterprise risk management summary approach guide
Enterprise risk management summary approach guideEnterprise risk management summary approach guide
Enterprise risk management summary approach guideAstalapulosListestos
 
ThinkGRC justifying the transition to an Enterprise Risk Management (ERM) model
ThinkGRC justifying the transition to an Enterprise Risk Management (ERM) modelThinkGRC justifying the transition to an Enterprise Risk Management (ERM) model
ThinkGRC justifying the transition to an Enterprise Risk Management (ERM) modelThinkGRC
 
Fundamentals of-risk-management
Fundamentals of-risk-managementFundamentals of-risk-management
Fundamentals of-risk-managementMajd Ghanem,MBA
 

What's hot (20)

Board Skills for Sport – risk
Board Skills for Sport – riskBoard Skills for Sport – risk
Board Skills for Sport – risk
 
Coso erm frmwrk
Coso erm frmwrkCoso erm frmwrk
Coso erm frmwrk
 
Risk Management1
Risk Management1Risk Management1
Risk Management1
 
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
 
A Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingA Presentation on Risk Based Auditing
A Presentation on Risk Based Auditing
 
Risk based auditing
Risk based auditingRisk based auditing
Risk based auditing
 
Enterprise risk management-Yashvanth G Nayak
Enterprise risk management-Yashvanth G NayakEnterprise risk management-Yashvanth G Nayak
Enterprise risk management-Yashvanth G Nayak
 
ISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final VersionISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final Version
 
COSO ERM 2017
COSO ERM 2017COSO ERM 2017
COSO ERM 2017
 
COSO ERM Topology
COSO ERM TopologyCOSO ERM Topology
COSO ERM Topology
 
Operational Risk Management & Strategic Planning
Operational Risk Management & Strategic PlanningOperational Risk Management & Strategic Planning
Operational Risk Management & Strategic Planning
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
Super Strategies 2014 Risk Strategy Presentation
Super Strategies 2014  Risk Strategy PresentationSuper Strategies 2014  Risk Strategy Presentation
Super Strategies 2014 Risk Strategy Presentation
 
Everything You Need To Know About Internal Control Reviews
Everything You Need To Know About Internal Control ReviewsEverything You Need To Know About Internal Control Reviews
Everything You Need To Know About Internal Control Reviews
 
Erm tm 10
Erm tm 10Erm tm 10
Erm tm 10
 
Risk management process
Risk management processRisk management process
Risk management process
 
Enterprise risk management summary approach guide
Enterprise risk management summary approach guideEnterprise risk management summary approach guide
Enterprise risk management summary approach guide
 
ThinkGRC justifying the transition to an Enterprise Risk Management (ERM) model
ThinkGRC justifying the transition to an Enterprise Risk Management (ERM) modelThinkGRC justifying the transition to an Enterprise Risk Management (ERM) model
ThinkGRC justifying the transition to an Enterprise Risk Management (ERM) model
 
Fundamentals of-risk-management
Fundamentals of-risk-managementFundamentals of-risk-management
Fundamentals of-risk-management
 
Beyond Compliance
Beyond ComplianceBeyond Compliance
Beyond Compliance
 

Similar to COSO Vs ERM - NMIMS INDORE

COSO ERM Framework
COSO ERM FrameworkCOSO ERM Framework
COSO ERM Frameworkssuser6ea258
 
Coso Erm(2)
Coso Erm(2)Coso Erm(2)
Coso Erm(2)deeptica
 
Risk management ppt 111p (training module)
Risk management ppt 111p (training module)Risk management ppt 111p (training module)
Risk management ppt 111p (training module)Sadia Razzaq
 
COSO_2013_Framework_on_Internal_Control.pdf
COSO_2013_Framework_on_Internal_Control.pdfCOSO_2013_Framework_on_Internal_Control.pdf
COSO_2013_Framework_on_Internal_Control.pdfAliehaDhea
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk managementComplianceOnline
 
Sun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdf
Sun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdfSun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdf
Sun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdfabdo badr
 
Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditManoj Agarwal
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditorsminkhollow
 
Strategic Management Process SMA.pptx
Strategic Management Process SMA.pptxStrategic Management Process SMA.pptx
Strategic Management Process SMA.pptxAhmedMinhas3
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityJeff B
 
The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...
The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...
The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...International Federation of Accountants
 

Similar to COSO Vs ERM - NMIMS INDORE (20)

COSO_ERM.ppt
COSO_ERM.pptCOSO_ERM.ppt
COSO_ERM.ppt
 
COSO ERM Framework
COSO ERM FrameworkCOSO ERM Framework
COSO ERM Framework
 
Coso Erm(2)
Coso Erm(2)Coso Erm(2)
Coso Erm(2)
 
Presentation_20110802213554
Presentation_20110802213554Presentation_20110802213554
Presentation_20110802213554
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
HIRimsISO311KandERMFINAL
HIRimsISO311KandERMFINALHIRimsISO311KandERMFINAL
HIRimsISO311KandERMFINAL
 
COSO ERM
COSO ERMCOSO ERM
COSO ERM
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
Risk management ppt 111p (training module)
Risk management ppt 111p (training module)Risk management ppt 111p (training module)
Risk management ppt 111p (training module)
 
COSO_2013_Framework_on_Internal_Control.pdf
COSO_2013_Framework_on_Internal_Control.pdfCOSO_2013_Framework_on_Internal_Control.pdf
COSO_2013_Framework_on_Internal_Control.pdf
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
Sun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdf
Sun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdfSun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdf
Sun-Pharma-Risk-Management-Policy-Synopsis-May-2022.pdf
 
Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal Audit
 
Hoover.2016 Texas Bankers CFO Conference
Hoover.2016 Texas Bankers CFO ConferenceHoover.2016 Texas Bankers CFO Conference
Hoover.2016 Texas Bankers CFO Conference
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditors
 
Strategic Management Process SMA.pptx
Strategic Management Process SMA.pptxStrategic Management Process SMA.pptx
Strategic Management Process SMA.pptx
 
Erm whitepaper (2)
Erm whitepaper (2)Erm whitepaper (2)
Erm whitepaper (2)
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and Sustainability
 
The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...
The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...
The Essential Experience for CAEs: Risk Management is Dead, Long Live Risk Ma...
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

COSO Vs ERM - NMIMS INDORE

  • 1. Applying COSO’s Enterprise Risk Management — Integrated Framework
  • 2. Today’s organizations are concerned about: • Risk Management • Governance • Control • Assurance (and Consulting)
  • 3. ERM Defined: “… a process, effected by an entity's board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risks to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.” Source: COSO Enterprise Risk Management – Integrated Framework. 2004. COSO.
  • 4. Why ERM Is Important Underlying principles: • Every entity, whether for-profit or not, exists to realize value for its stakeholders. • Value is created, preserved, or eroded by management decisions in all activities, from setting strategy to operating the enterprise day-to-day.
  • 5. Why ERM Is Important ERM supports value creation by enabling management to: • Deal effectively with potential future events that create uncertainty. • Respond in a manner that reduces the likelihood of downside outcomes and increases the upside.
  • 6. This COSO ERM framework defines essential components, suggests a common language, and provides clear direction and guidance for enterprise risk management. Enterprise Risk Management — Integrated Framework
  • 7. The ERM Framework Entity objectives can be viewed in the context of four categories: • Strategic • Operations • Reporting • Compliance
  • 8. The ERM Framework ERM considers activities at all levels of the organization: • Enterprise-level • Division or subsidiary • Business unit processes
  • 9. Enterprise risk management requires an entity to take a portfolio view of risk. The ERM Framework
  • 10. • Management considers how individual risks interrelate. • Management develops a portfolio view from two perspectives: - Business unit level - Entity level The ERM Framework
  • 11. The eight components of the framework are interrelated … The ERM Framework
  • 12. Internal Environment • Establishes a philosophy regarding risk management. It recognizes that unexpected as well as expected events may occur. • Establishes the entity’s risk culture. • Considers all other aspects of how the organization’s actions may affect its risk culture.
  • 13. Objective Setting • Is applied when management considers risks strategy in the setting of objectives. • Forms the risk appetite of the entity — a high-level view of how much risk management and the board are willing to accept. • Risk tolerance, the acceptable level of variation around objectives, is aligned with risk appetite.
  • 14. Event Identification • Differentiates risks and opportunities. • Events that may have a negative impact represent risks. • Events that may have a positive impact represent natural offsets (opportunities), which management channels back to strategy setting.
  • 15. Event Identification • Involves identifying those incidents, occurring internally or externally, that could affect strategy and achievement of objectives. • Addresses how internal and external factors combine and interact to influence the risk profile.
  • 16. Risk Assessment • Allows an entity to understand the extent to which potential events might impact objectives. • Assesses risks from two perspectives: - Likelihood - Impact • Is used to assess risks and is normally also used to measure the related objectives.
  • 17. Risk Assessment • Employs a combination of both qualitative and quantitative risk assessment methodologies. • Relates time horizons to objective horizons. • Assesses risk on both an inherent and a residual basis.
  • 18. Risk Response • Identifies and evaluates possible responses to risk. • Evaluates options in relation to entity’s risk appetite, cost vs. benefit of potential risk responses, and degree to which a response will reduce impact and/or likelihood. • Selects and executes response based on evaluation of the portfolio of risks and responses.
  • 19. Control Activities • Policies and procedures that help ensure that the risk responses, as well as other entity directives, are carried out. • Occur throughout the organization, at all levels and in all functions. • Include application and general information technology controls.
  • 20. • Management identifies, captures, and communicates pertinent information in a form and timeframe that enables people to carry out their responsibilities. • Communication occurs in a broader sense, flowing down, across, and up the organization. Information & Communication
  • 21. Monitoring Effectiveness of the other ERM components is monitored through: • Ongoing monitoring activities. • Separate evaluations. • A combination of the two.
  • 22. Internal Control A strong system of internal control is essential to effective enterprise risk management.
  • 23. • Expands and elaborates on elements of internal control as set out in COSO’s “control framework.” • Includes objective setting as a separate component. Objectives are a “prerequisite” for internal control. • Expands the control framework’s “Financial Reporting” and “Risk Assessment.” Relationship to Internal Control — Integrated Framework
  • 24. ERM Roles & Responsibilities • Management • The board of directors • Risk officers • Internal auditors
  • 25. Internal Auditors • Play an important role in monitoring ERM, but do NOT have primary responsibility for its implementation or maintenance. • Assist management and the board or audit committee in the process by: - Monitoring - Evaluating - Examining - Reporting - Recommending improvements
  • 26. Visit the guidance section of The IIA’s Web site for The IIA’s position paper, “Role of Internal Auditing’s in Enterprise Risk Management.” Internal Auditors
  • 27. • 2010.A1 – The internal audit activity’s plan of engagements should be based on a risk assessment, undertaken at least annually. • 2120.A1 – Based on the results of the risk assessment, the internal audit activity should evaluate the adequacy and effectiveness of controls encompassing the organization’s governance, operations, and information systems. • 2210.A1 – When planning the engagement, the internal auditor should identify and assess risks relevant to the activity under review. The engagement objectives should reflect the results of the risk assessment. Standards
  • 28. 1. Organizational design of business 2. Establishing an ERM organization 3. Performing risk assessments 4. Determining overall risk appetite 5. Identifying risk responses 6. Communication of risk results 7. Monitoring 8. Oversight & periodic review by management Key Implementation Factors
  • 29. Organizational Design • Strategies of the business • Key business objectives • Related objectives that cascade down the organization from key business objectives • Assignment of responsibilities to organizational elements and leaders (linkage)
  • 30. Example: Linkage • Mission – To provide high-quality accessible and affordable community- based health care • Strategic Objective – To be the first or second largest, full-service health care provider in mid-size metropolitan markets • Related Objective – To initiate dialogue with leadership of 10 top under- performing hospitals and negotiate agreements with two this year
  • 31. Establish ERM • Determine a risk philosophy • Survey risk culture • Consider organizational integrity and ethical values • Decide roles and responsibilities
  • 32. Example: ERM Organization ERM Director ERM Director Vice President and Chief Risk Officer Vice President and Chief Risk Officer Corporate Credit Risk Manager Corporate Credit Risk Manager Insurance Risk Manager Insurance Risk Manager ERM Manager ERM Manager ERM Manager ERM Manager StaffStaff StaffStaffStaffStaff FES Commodity Risk Mg. Director FES Commodity Risk Mg. Director
  • 33. Risk assessment is the identification and analysis of risks to the achievement of business objectives. It forms a basis for determining how risks should be managed. Assess Risk
  • 34. Environmental Risks • Capital Availability • Regulatory, Political, and Legal • Financial Markets and Shareholder Relations Process Risks • Operations Risk • Empowerment Risk • Information Processing / Technology Risk • Integrity Risk • Financial Risk Information for Decision Making • Operational Risk • Financial Risk • Strategic Risk Example: Risk Model
  • 35. Source: Business Risk Assessment. 1998 – The Institute of Internal Auditors Control It Share or Transfer It Diversify or Avoid It Risk Management Process Level Activity Level Entity Level Risk Monitoring Identification Measurement Prioritization Risk Assessment Risk Analysis
  • 36. DETERMINE RISK APPETITE • Risk appetite is the amount of risk — on a broad level — an entity is willing to accept in pursuit of value. • Use quantitative or qualitative terms (e.g. earnings at risk vs. reputation risk), and consider risk tolerance (range of acceptable variation).
  • 37. Key questions: • What risks will the organization not accept? (e.g. environmental or quality compromises) • What risks will the organization take on new initiatives? (e.g. new product lines) • What risks will the organization accept for competing objectives? (e.g. gross profit vs. market share?) DETERMINE RISK APPETITE
  • 38. • Quantification of risk exposure • Options available: - Accept = monitor - Avoid = eliminate (get out of situation) - Reduce = institute controls - Share = partner with someone (e.g. insurance) • Residual risk (unmitigated risk – e.g. shrinkage) IDENTIFY RISK RESPONSES
  • 39. Impact vs. Probability Control Share Mitigate & Control Accept High Risk Medium Risk Medium Risk Low Risk Low High High I M P A C T PROBABILITY
  • 40. Low High High I M P A C T PROBABILITY High Risk Medium Risk Medium Risk Low Risk Example: Call Center Risk Assessment • Loss of phones • Loss of computers • Credit risk • Customer has a long wait • Customer can’t get through • Customer can’t get answers • Entry errors • Equipment obsolescence • Repeat calls for same problem • Fraud • Lost transactions • Employee morale
  • 41. Control Risk Control Objective Activity Completeness Material Accrual of transaction open liabilities not recorded Invoices accrued after closing Issue: Invoices go to field and AP is not aware of liability. Example: Accounts Payable Process
  • 42. • Dashboard of risks and related responses (visual status of where key risks stand relative to risk tolerances) • Flowcharts of processes with key controls noted • Narratives of business objectives linked to operational risks and responses • List of key risks to be monitored or used • Management understanding of key business risk responsibility and communication of assignments Communicate Results
  • 43. Monitor • Collect and display information • Perform analysis - Risks are being properly addressed - Controls are working to mitigate risks
  • 44. • Accountability for risks • Ownership • Updates - Changes in business objectives - Changes in systems - Changes in processes Management Oversight & Periodic Review
  • 45. Internal auditors can add value by: • Reviewing critical control systems and risk management processes. • Performing an effectiveness review of management's risk assessments and the internal controls. • Providing advice in the design and improvement of control systems and risk mitigation strategies.
  • 46. • Implementing a risk-based approach to planning and executing the internal audit process. • Ensuring that internal auditing’s resources are directed at those areas most important to the organization. • Challenging the basis of management’s risk assessments and evaluating the adequacy and effectiveness of risk treatment strategies. Internal auditors can add value by:
  • 47. • Facilitating ERM workshops. • Defining risk tolerances where none have been identified, based on internal auditing's experience, judgment, and consultation with management. Internal auditors can add value by:
  • 48. For more information On COSO’s Enterprise Risk Management — Integrated Framework, visit www.coso.org or www.theiia.org
  • 49. This presentation was produced by Applying COSO’s Enterprise Risk Management — Integrated Framework

Editor's Notes

  1. Value is created by informed and inspired management decisions in all spheres of an entity’s activities, from strategy setting to operations. Entities failing to recognize the risks they face, from external or internal sources, and to manage them effectively can destroy value – in absolute or relative terms – for shareholders and other stakeholders, including the community and society at large. For companies, shareholders realize value when they recognize value creation and benefit from share-value growth. For governmental entities, value is realized when constituents recognize receipt of valued services at acceptable cost. Enterprise risk management: Facilitates management’s ability deal effectively with potential future events that create uncertainty. Provides the mechanisms to respond in a manner that reduces the likelihood of downside outcomes and increases the upside Enhances the ability to communicate value creation and preservation programs and goals, communicate with stakeholders, and deliver as planned, with few surprises.
  2. Value is created by informed and inspired management decisions in all spheres of an entity’s activities, from strategy setting to operations. Entities failing to recognize the risks they face, from external or internal sources, and to manage them effectively can destroy value – in absolute or relative terms – for shareholders and other stakeholders, including the community and society at large. For companies, shareholders realize value when they recognize value creation and benefit from share-value growth. For governmental entities, value is realized when constituents recognize receipt of valued services at acceptable cost. Enterprise risk management: Facilitates management’s ability deal effectively with potential future events that create uncertainty. Provides the mechanisms to respond in a manner that reduces the likelihood of downside outcomes and increases the upside Enhances the ability to communicate value creation and preservation programs and goals, communicate with stakeholders, and deliver as planned, with few surprises.
  3. Monitoring helps determine the effectiveness of the processes, technologies and personnel executing enterprise risk management. The entity establishes minimum standards for each component of enterprise risk management. The entity’s performance against these standards can then be monitored objectively. Monitoring can be done in two ways: through ongoing activities or separate evaluations. Enterprise risk management mechanisms usually are structured to monitor themselves on an ongoing basis, at least to some degree. Ongoing monitoring is built into the normal, recurring operating activities of an entity. Ongoing monitoring is performed on a real-time basis, reacts dynamically to changing conditions and is ingrained in the entity. As a result, it is more effective than separate evaluations. The greater the degree and effectiveness of ongoing monitoring, the lesser need for separate evaluations. The frequency of separate evaluations is a matter of management's judgment. In making that determination, consideration is given to the nature and degree of changes occurring, from both internal and external events, and their associated risks; the competence and experience of the personnel implementing risk responses and related controls; and the results of the ongoing monitoring. Usually, some combination of ongoing monitoring and separate evaluations will ensure that enterprise risk management maintains its effectiveness over time. Deficiencies in an entity’s enterprise risk management may surface from many sources, including the entity's ongoing monitoring procedures, separate evaluations and external parties. All enterprise risk management deficiencies that affect the entity’s ability to develop and implement its strategy and to achieve its established objectives should be reported to those who can take necessary action, as discussed in the next section
  4. Risk Assessment - ERM encompasses the need for management to develop an entity-level portfolio view from two perspectives and highlights the notion of inherent and residual risk Risk Response - ERM considers risk responses within categories of avoid, reduce, share and accept. Management considers these responses with the intent of achieving a residual risk level aligned with the entity’s risk tolerances. Having considered responses to risk on individual or group basis, management considers the aggregate effect of its risk responses across the entity. The ERM framework elaborates on other components of IC-IF as they relate to enterprise risk management, most significantly the environment and information and communication Enterprise risk management must also be applied in setting strategy, and there must be an entity level portfolio view.
  5. Some differences include (note not all as time is limited): The choice made by management and its implementation is part of management’s broader role, and are not part of ERM The Internal Control – Integrated Framework specified the three objective categories of operations, external financial reporting and compliance. Enterprise risk management also specifies three objective categories – operations, reporting, and compliance. The reporting category expands the scope of financial reporting as defined in the Internal Control – Integrated Framework to include a broader array of reporting, Event identification – ERM considers potential events, defining an event as an incident, or series of incidents emanating from internal or external sources that could affect the implementation of strategy and achievement objectives. ERM also considers alternatives in setting strategy, identifies events using a combination of techniques that consider both past and potential future events as well as emerging trends, considers what triggers events and groups potential events into risk categories.
  6. The board of directors is responsible for overseeing management’s design and operation of ERM. Knowing the extent to which management has established effective enterprise risk management in the organization; Being aware of and concurring with the entity’s risk appetite; Reviewing the entity’s portfolio view of risk, and considering it against the entity’s risk appetite; and Being apprised of the most significant risks, and whether management is taking appropriate responses. Management: Is responsible for the design of an entity's enterprise risk management framework Promotes the desired risk culture, frames risks in the context of strategy and activities Establishes an entity-level risk appetite Provides a portfolio view of risk Enforces compliance individually and in the aggregate. The risk officer works with managers in establishing and maintaining effective risk management in their areas of responsibility, has the resources to help effect enterprise risk management across subsidiaries, businesses, departments, functions and activities and may have responsibility for monitoring progress and for assisting managers in reporting relevant risk information up, down and across the entity and likely chairs internal risk management committees. We will come back later on the specific role of internal auditors in ERM
  7. Internal auditors contribute to the ongoing effectiveness of the enterprise risk management, normally by their participation in separate evaluations, but they do not have primary responsibility for establishing or maintaining ERM.