SlideShare ist ein Scribd-Unternehmen logo
1 von 25
RISK MANAGEMENT
WHAT IS RISK MANAGEMENT
Risk management is
the identification, assessment, and prioritization of risks
followed by coordinated and economical application of resources
to minimize, monitor, and control the probability and/or impact of unfortunate events
or to maximize the realization of opportunities.
TYPICAL BUSINESS RISKS
Risk categories I. STRATEGIC II. OPERATIONAL III. COMPLIANCE IV. FINANCIAL
Risk classes 1. Macroeconomic 5. Innovation 9. Regulatory 13. Treasury
2. Industry / market changes 6. People 10. Litigation 14. Tax
3. M&A / restructuring 7. IT 11. Business Conduct 15. Pensions
4. Reputation 8. Supply Chain 12. Environmental 16. Reporting
Risks 1.0 Macroeconomic 5.0 Innovation 9.0 Regulatory 13.0 Treasury
1.1 Economy 5.1 Business / product portfolio 9.1 Permits 13.1 Liquidity risk
1.2 Political risk 5.2 Corporate / product branding 9.2 Sanctions 13.2 Currency risk
1.3 Disaster 5.3 Product quality and liability 13.3 Interest rate risk
5.4 Sales
10.0 Litigation 13.4 Commodity price risk
2.0 Industry / market
changes
5.5 Services 13.5 Credit rating risk
2.1 Market action 11.0 Business Conduct 13.6 Insurance risk
2.2 Capacity expansion 6.0 People 11.1 ABC, AML, CTF 13.7 Counter party risk
2.3 New Entrants 6.1 Skilled talent 11.2 FCD
2.4 Imports 6.2 Labor relations 14.0 Tax
2.5 Complementors 6.3 Productivity / projects 12.0 Environmental
12.1 Emissions 15.0 Pensions
3.0 M&A / restructuring 7.0 IT
3.1 M&A / JV / divestments 7.1 Cybersecurity 16.0 Reporting
3.2 Restructuring /
integration
7.2 Outsourcing 16.1 Use of estimates
3.3 Competitor M&A 16.2 Loss exposures
8.0 Supply Chain
4.0 Reputation 8.1 Own capacity
4.1 Health & Safety 8.2 Sourcing suppliers
4.2 Sustainable
Development
8.3 Raw materials
4.3 Corporate Governance 8.4 Energy
8.5 Procurement
8.6 Logistics
8.7 Business interruption
Note: Mergers & Acquisitions (M&A), Anti-Bribery & Corruption (ABC), Anti-Money Laundering (AML), Counter Terrorism
Financing (CTF), Fair Competition Directive (FCD)
INTANGIBLE RISK MANAGEMENT
īƒ’ Intangible risk management identifies a new type of a risk that has a 100%
probability of occurring but is ignored by the organization due to a lack of
identification ability. For example,
īƒ‰ When deficient knowledge is applied to a situation, a knowledge risk materializes.
īƒ‰ Relationship risk appears when ineffective collaboration occurs.
īƒ’ Process-engagement risk may be an issue when ineffective operational procedures
are applied. These risks
īƒ‰ directly reduce the productivity of knowledge workers,
īƒ‰ decrease cost effectiveness,
īƒ‰ profitability,
īƒ‰ service,
īƒ‰ quality,
īƒ‰ reputation,
īƒ‰ brand value,
īƒ‰ and earnings quality.
īƒ’ Intangible risk management allows risk management to create immediate value
from the identification and reduction of risks that reduce productivity.
INTERNAL CONTROL
Internal control is a process effected by an entity’s board of directors, management
and other personnel designed to provide reasonable assurance regarding the
achievement of objectives in the following categories:
īƒ’ Efficiency and effectiveness of operations
īƒ’ Reliability of reporting
īƒ’ Compliance with laws and regulations
The five pillars of internal control are:
īƒ’ Control environment
īƒ’ Risk Assessment
īƒ’ Control Activities
īƒ’ Monitoring
īƒ’ Information and Communication
ENTERPRISE RISK MANAGEMENT
COSO Framework of Enterprise Risk Management
Enterprise risk management is:
īƒ’ a process effected by an entity’s board of directors, management and other
personnel,
īƒ’ applied in strategy setting
īƒ’ and across the enterprise,
īƒ’ designed to identify potential events that may affect the entity and manage risks to
be within its risk appetite,
īƒ’ to provide reasonable assurance
īƒ’ regarding the achievement of entity objectives.
The COSO framework consists of eight interrelated components:
īƒ’ Internal or control environment
īƒ’ Objective setting
īƒ’ Event identification
īƒ’ Risk assessment
īƒ’ Risk response
īƒ’ Control activities or procedures
īƒ’ Information and communication
īƒ’ Monitoring
UNCERTAINTY
Knight introduced a technical distinction between risk and uncertainty
īƒ’ Risk is a quantification of the potential variability in a value based on past data
(e.g. how many life assurance policy holders will live beyond the age of 65)
īƒ’ Uncertainty on the other hand is non-quantifiable (whether a key customer will
be retained for the next two years)
Strictly speaking risk should therefore be defined as a measure of the variability in
the value of a factor that is capable of statistical or mathematical evaluation.
īƒ’ In practice, the distinction between risk and uncertainty is blurred. Huge losses
by insurance underwriting syndicates show that assessments of risk used in
insurance have been compromised by unanticipated events such as flooding
and hurricanes from climate change and claims for industrial injury resulting form
asbestos and stress.
īƒ’ Despite using terms like risk, many business strategies are actually taking
place in situations of uncertainty. A management team that only undertakes
strategies in which the likelihood of success or failures can be precisely
quantified would launch no products, enter no new markets and research no
new technologies.
PROCESS
īƒ’ According to the standard ISO 31000 "Risk management -- Principles and
guidelines on implementation," the process of risk management consists of
several steps as follows:
īƒ’ Establishing the context
īƒ’ Identification
īƒ’ Assessment
īƒ’ Risk Strategies
īƒ’ Risk Management Plan
īƒ’ Implementation
īƒ’ Review and evaluation of plan
īƒ’ Communication
ESTABLISHING THE CONTEXT
īƒ’ Establish the internal context
īƒ’ Risk is essentially the chance that an event will occur that will prevent the company from meeting its objectives.
Therefore in order to understand the risks, you must first identify the objectives.
īƒ’ Establish the external context
īƒ’ The external context is the overall environment in which the business operates, including an understanding of the
perceptions that clients or customers have of the business. This could take the form of a SWOT analysis. It should also
cover such issues as external regulations that the business must comply with.
īƒ’ Establish the risk management context
īƒ’ In order to correctly identify risks associated with a project, you must first define the project limits objectives and scope.
This may include identifying:
īƒ‰ The timeframe of the project
īƒ‰ Additional resources and expertise required
īƒ‰ Team members’ roles and responsibilities
īƒ‰ Documentation required
īƒ’ Develop risk criteria
īƒ’ This step allows the business to identify unacceptable levels of risk, or, looking at it in another way, to define
acceptable level of risk for a particular project. These risk levels can be more closely defined as the process
progresses.
īƒ’ Once acceptable or unacceptable risks have been identified for each activity, these can be used to assess different risks
associated with the project to determine whether these risks need to be controlled.
īƒ’ Any risk that results in any or all of the project’s objectives not being met will be deemed unacceptable and a
strategy for controlling such risks must be developed.
īƒ’ Define the structure for risk analysis
īƒ’ The final step in the establishment of context is to define the structure for risk analysis. This involves isolating the risk
categories that need to be managed, which can then be assessed individually.
īƒ’ Risk categories vary according to the project but may include such areas as:
īƒ’ Security (such as the security of company installations)
īƒ’ Finance (the project must come in on budget)
īƒ’ Transport (what happens if the vehicle carrying computer equipment and general documentation breaks down)?
IDENTIFICATION
After establishing the context, the next step in the process of managing risk is to
identify potential risks. Risks are about events that, when triggered, cause
problems.
Hence, risk identification can start with the source of problems, or with the problem
itself.
īƒ’ Source analysis Risk sources may be internal or external to the system that is
the target of risk management.
īƒ’ Examples of risk sources are: stakeholders of a project, employees of a
company, the weather over an airport or customers.
īƒ’ Problem analysis Risks are related to identified threats. For example: the threat
of losing money, the threat of abuse of privacy information or the threat of
accidents and casualties. The threats may exist with various entities, most
important with shareholders, customers and legislative bodies such as the
government.
When either source or problem is known, the events that a source may trigger or
the events that can lead to a problem can be investigated. For example:
īƒ’ Customers may default causing loss to the company
īƒ’ privacy information may be stolen by employees even within a closed network;
RISK IDENTIFICATION TECHNIQUES
The chosen method of identifying risks may depend on culture, industry practice and
compliance. The identification methods are formed by templates or the development of
templates for identifying source, problem or event. Common risk identification methods
are:
īƒ’ Objectives-based risk identification Organizations and project teams have
objectives. Any event that may endanger achieving an objective partly or completely
is identified as risk.
īƒ’ Scenario-based risk identification In scenario analysis different scenarios are
created. The scenarios may be the alternative ways to achieve an objective, or an
analysis of the interaction of forces in, for example, a market or battle. Any event that
triggers an undesired scenario alternative is identified as risk.
īƒ’ Taxonomy-based risk identification The taxonomy in taxonomy-based risk
identification is a breakdown of possible risk sources. Based on the taxonomy and
knowledge of best practices, a questionnaire is compiled. The answers to the
questions reveal risks.
īƒ’ Common-risk checking In several industries, lists with known risks are available.
Each risk in the list can be checked for application to a particular situation.
īƒ’ Risk charting This method combines the above approaches by listing resources at
risk, threats to those resources, modifying factors which may increase or decrease
the risk and consequences it is wished to avoid. Creating a matrix under these
headings enables a variety of approaches. One can begin with resources and
consider the threats they are exposed to and the consequences of each.
Alternatively one can start with the threats and examine which resources they would
affect, or one can begin with the consequences and determine which combination of
ASSESSMENT
īƒ’ A risk assessment is a process to identify potential hazards and analyze what could
happen if a hazard occurs. A business impact analysis (BIA) is the process for
determining the potential impacts resulting from the interruption of time sensitive or
critical business processes.
īƒ’ There are numerous hazards to consider. For each hazard there are many possible
scenarios that could unfold depending on timing, magnitude and location of the
hazard.
īƒ’ There are many “assets” at risk from hazards. First and foremost, injuries to people
should be the first consideration of the risk assessment.
īƒ’ Hazard scenarios that could cause significant injuries should be highlighted to ensure
that appropriate emergency plans are in place.
īƒ’ Many other physical assets may be at risk. These include buildings, information
technology, utility systems, machinery, raw materials and finished goods. The
potential for environmental impact should also be considered.
īƒ’ Consider the impact an incident could have on your relationships with customers, the
surrounding community and other stakeholders. Consider situations that would cause
customers to lose confidence in your organization and its products or services.
īƒ’ As you conduct the risk assessment, look for vulnerabilities—weaknesses—that
would make an asset more susceptible to damage from a hazard. Vulnerabilities
include deficiencies in building construction, process systems, security, protection
systems and loss prevention programs. They contribute to the severity of damage
when an incident occurs.
īƒ’ For example, a building without a fire sprinkler system could burn to the ground while
a building with a properly designed, installed and maintained fire sprinkler system
would suffer limited fire damage.
WHAT IS RISKIER?
COMPOSITE RISK INDEX
īƒ’ The above formula can also be re-written in terms of a Composite Risk Index, as follows:
īƒ’ Composite Risk Index = Impact of Risk event x Probability of Occurrence
īƒ’ The impact of the risk event is commonly assessed on a scale of 1 to 5, where 1 and 5
represent the minimum and maximum possible impact of an occurrence of a risk (usually in
terms of financial losses). However, the 1 to 5 scale can be arbitrary and need not be on a linear
scale.
īƒ’ The probability of occurrence is likewise commonly assessed on a scale from 1 to 5, where 1
represents a very low probability of the risk event actually occurring while 5 represents a very
high probability of occurrence. This axis may be expressed in either mathematical terms (event
occurs once a year, once in ten years, once in 100 years etc.) or may be expressed in "plain
english" - event has occurred here very often; event has been known to occur here; event has
been known to occur in the industry etc.). Again, the 1 to 5 scale can be arbitrary or non-linear
depending on decisions by subject-matter experts.
īƒ’ The Composite Index thus can take values ranging (typically) from 1 through 25, and this
range is usually arbitrarily divided into three sub-ranges. The overall risk assessment is then
Low, Medium or High, depending on the sub-range containing the calculated value of the
Composite Index. For instance, the three sub-ranges could be defined as 1 to 8, 9 to 16 and 17
to 25.
īƒ’ Note that the probability of risk occurrence is difficult to estimate, since the past data on
frequencies are not readily available, as mentioned above. After all, probability does not imply
certainty.
īƒ’ Likewise, the impact of the risk is not easy to estimate since it is often difficult to estimate
the potential loss in the event of risk occurrence.
īƒ’ Further, both the above factors can change in magnitude depending on the adequacy of risk
avoidance and prevention measures taken and due to changes in the external business
environment.
īƒ’ Hence it is absolutely necessary to periodically re-assess risks and intensify/relax mitigation
RISK IMPACT / PROBABILITY CHART
īƒ’ Low impact/Low probability – Risks in the bottom left corner are low level, and you can often ignore
them.
īƒ’ Low impact/High probability – Risks in the top left corner are of moderate importance – if these things
happen, you can cope with them and move on. However, you should try to reduce the likelihood that
they'll occur.
īƒ’ High impact/Low probability – Risks in the bottom right corner are of high importance if they do occur,
but they're very unlikely to happen. For these, however, you should do what you can to reduce the
impact they'll have if they do occur, and you should have contingency plans in place just in case they
do.
īƒ’ High impact/High probability – Risks towards the top right corner are of critical importance. These are
RISK STRATEGIES
īƒ’ Once risks have been identified and assessed, all techniques to manage the risk
fall into one or more of these four major categories:
īƒ’ Transfer (transfer - outsource or insure)
īƒ’ Avoidance (eliminate, withdraw from or not become involved)
īƒ’ Reduction (optimize - mitigate)
īƒ’ Accept (accept and budget)
Transfer
īƒ’ Risks can be transferred through insurance or outsourcing. Financial risks can
be transferred by hedging
Avoidance
īƒ’ Avoidance may seem the answer to all risks, but avoiding risks also means
losing out on the potential gain that accepting (retaining) the risk may have
allowed.
īƒ’ Hazard prevention refers to the prevention of risks in an emergency. The first
and most effective stage of hazard prevention is the elimination of hazards.
If this takes too long, is too costly, or is otherwise impractical, the second stage
is mitigation.
RISK STRATEGIES
Risk Reduction
īƒ’ Risk reduction or "optimization" involves reducing the severity of the loss or the
likelihood of the loss from occurring. For example,
īƒ‰ sprinklers are designed to put out a fire to reduce the risk of loss by fire. This method
may cause a greater loss by water damage and therefore may not be suitable.
īƒ‰ Halon fire suppression systems may mitigate that risk, but the cost may be
prohibitive as a strategy.
īƒ‰ By an offshore drilling contractor effectively applying HSE Management in its
organization, it can optimize risk to achieve levels of residual risk that are tolerable.
īƒ’ Modern software development methodologies reduce risk by developing and
delivering software incrementally.
Risk reduction controls generally fall into the following categories:
īƒ’ Prevention – SOD, Authorizations, Security of assets
īƒ’ Detection – Review of perfomance, reconciliations, physical checks, audits
īƒ’ Directive – corporate policies, spending limits,
īƒ’ Corrective – corrective journal entries, controls after cyber attacks or virus
attacks
īƒ’ Manual or system based
CREATE A RISK MANAGEMENT PLAN
īƒ’ Select appropriate controls or countermeasures to measure each risk.
īƒ’ Risk mitigation needs to be approved by the appropriate level of
management. For instance
īƒ‰ a risk concerning the image of the organization should have top
management decision behind it
īƒ‰ whereas IT management would have the authority to decide on computer
virus risks.
īƒ’ The risk management plan should propose applicable and effective security
controls for managing the risks. For example, an observed high risk of
computer viruses could be mitigated by acquiring and implementing
antivirus software.
īƒ’ A good risk management plan should contain a schedule for control
implementation and responsible persons for those actions.
īƒ’ According to ISO/IEC 27001, the stage immediately after completion of the risk
assessment phase consists of preparing a Risk Treatment Plan, which should
document the decisions about how each of the identified risks should be
handled.
IMPLEMENTATION OF PLAN
Implementation follows all of the planned methods for mitigating the effect of the
risks.
īƒ’ Purchase insurance policies for the risks that have been decided to be
transferred to an insurer,
īƒ’ avoid all risks that can be avoided without sacrificing the entity's goals,
īƒ’ reduce others,
īƒ’ and retain the rest.
REVIEW AND EVALUATION OF THE PLAN
īƒ’ All risk management plans must be monitored to ensure that
īƒ‰ they are achieving the desired results and
īƒ‰ that changes to the project’s risk profile are reflected.
īƒ’ As with any process, evaluation of risk management plan is essential to ensure
that they are performing to expectations. Managers and stakeholders in the
risk management process should consider such areas as:
īƒ‰ How successful was the plan and were the benefits and costs at the predicted levels
īƒ‰ In the light fo the above, are any changes needed to improve the plan?
īƒ‰ Would the plan have benefitted from the availability of additional information?
īƒ’ You can think of risk monitoring as being similar to an audit of the risk
management process. Various tests will be carried out to determine whether
individual controls are working properly and recommendations made in the
light of results.
īƒ’ However, unlike auditing, risk management monitoring does not take place
only on an annual basis. Risk management is a continuous process.
īƒ’ The environment in which organization work changes constantly and with
those changes come different risks, all of which should be analyzed and
incorporated into the process.
EXAMPLES OF RISK MONITORING PROCESSES INCLUDE:
īƒ’ Regular review of projects against specific costs and compliance milestones
īƒ’ Systems of notification of incidents (e.g. accidents at work, near misses of aircrafts)
īƒ’ Internal audit functions (e.g. financial, systems security, compliance with heath and
safety)
īƒ’ Employment of compliance monitoring staff
īƒ’ Skills assessment and medical examinations of staff and managers to assure
compliance with fitness to work
īƒ’ Practices and drills to confirm readiness (e.g. fire drills, evacuations, disruptions to
operations)
īƒ’ Intelligence gathering on occurrences elsewhere (e.g. experience of frauds,
equipment failures, outcome of legal cases)
īƒ’ Monitoring of the regulatory framework of the industry to ensure compliance
The monitoring and review process should also establish whether:
īƒ’ The controls adopted achieved the desired results
īƒ’ The procedures adopted and information gathered for undertaking the assessment
were appropriate
īƒ’ Improved knowledge would have helped to reach better decisions, identifying what
lessons could be learnt for future assessments.
RISK COMMUNICATION
Internal communication and learning
Effective and efficient communication is vital for the business as it is essential that:
īƒ’ Everyone in the risk management process is fully familiar with its importance
to the business, the risk priorities of the business and their role within the
process.
īƒ’ Knowledge gleaned from any new risk identified by one area of the
business or any lessons learnt from risk events its transferred to all other
areas of the business in a considered and consistent manner, so that it can be
correctly incorporated into the business-wide risk management strategy.
īƒ’ All levels of management are regularly updated about the management of
risk in their areas of responsibility, to enable them to monitor the adequacy
and completeness of any risk plans and controls.
īƒ’ There are procedures in place for escalation of any issues arising.
External communication and learning
īƒ’ No organization operates in isolation; they all have trading partners/ customers/
suppliers. Management must gain assurance that its major partners have
implemented an adequate and appropriate risk management strategy.
INFORMATION TECHNOLOGY RISKS
The major risks from IT systems could arise from:
īƒ’ Natural threats – fire, flood etc
īƒ’ Human threats – individuals with grudge against the organisation
īƒ’ Data systems integrity – incorrect entry of data, loss of data through lack of
backup
īƒ’ Fraud – dishonest use of computer system
īƒ’ Deliberate sabotage – industrial espionage
īƒ’ Viruses and other corruption including hacking
īƒ’ Denial of Service attack – attempt by attackers to prevent computer use
īƒ’ Non compliance with regulations – normally subject to internal and external
compliance
COMBATING IT RISKS AND IT SECURITY
īƒ’ The ISO Code of practice for information security management recommends the
following be examined during a risk assessment:
īƒ‰ security policy
īƒ‰ Organization of information security,
īƒ‰ asset management
īƒ‰ human resources security,
īƒ‰ Physical and environmental security
īƒ‰ communications and operations management,
īƒ‰ access control,
īƒ‰ information systems acquisition, development and maintenance,
īƒ‰ information security incident management
īƒ‰ business continuity management, and
īƒ‰ regulatory compliance

Weitere ähnliche Inhalte

Was ist angesagt?

Risk management
Risk managementRisk management
Risk managementBabasab Patil
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management OverviewJIGNESH PADIA
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Risk management process
Risk management processRisk management process
Risk management processClinosolIndia
 
Enterprise Risk Management (ERM); From theory to practice
Enterprise Risk Management (ERM); From theory to practiceEnterprise Risk Management (ERM); From theory to practice
Enterprise Risk Management (ERM); From theory to practiceSegun Ogunwale
 
Advanced program management risk mitigation and management
Advanced program management   risk mitigation and managementAdvanced program management   risk mitigation and management
Advanced program management risk mitigation and managementMarcus Vannini
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk managementSubhendu Datta
 
Enterprise Risk Management Framework
Enterprise Risk Management FrameworkEnterprise Risk Management Framework
Enterprise Risk Management FrameworkNigel Tebbutt
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management FrameworkAnand Subramaniam
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONOPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONFrackson Kathibula-Nyoni
 
2. types of risks
2. types of risks2. types of risks
2. types of riskssartaj hussain
 
How to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential StepsHow to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential StepsCase IQ
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
 

Was ist angesagt? (20)

Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk management process
Risk management processRisk management process
Risk management process
 
Enterprise Risk Management (ERM); From theory to practice
Enterprise Risk Management (ERM); From theory to practiceEnterprise Risk Management (ERM); From theory to practice
Enterprise Risk Management (ERM); From theory to practice
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
Risk appetite
Risk appetite Risk appetite
Risk appetite
 
Advanced program management risk mitigation and management
Advanced program management   risk mitigation and managementAdvanced program management   risk mitigation and management
Advanced program management risk mitigation and management
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 
Enterprise Risk Management Framework
Enterprise Risk Management FrameworkEnterprise Risk Management Framework
Enterprise Risk Management Framework
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Risk management
Risk managementRisk management
Risk management
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONOPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
 
2. types of risks
2. types of risks2. types of risks
2. types of risks
 
How to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential StepsHow to Create a Risk Profile for Your Organization: 10 Essential Steps
How to Create a Risk Profile for Your Organization: 10 Essential Steps
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 

Ähnlich wie Risk Management Essentials

51_operational_risk
51_operational_risk51_operational_risk
51_operational_riskHafeez Farooq
 
project risk management
project risk managementproject risk management
project risk managementAshima Thakur
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1Paul Hunt
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to financeRobert Reed
 
Operational risk: the new frontier
Operational risk: the new frontierOperational risk: the new frontier
Operational risk: the new frontierMichel Rochette
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementAnu Damodaran
 
Risk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docxRisk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docxjoellemurphey
 
Table of ContentsIntroduction3P.docx
Table of ContentsIntroduction3P.docxTable of ContentsIntroduction3P.docx
Table of ContentsIntroduction3P.docxmattinsonjanel
 
Business Risk
Business RiskBusiness Risk
Business RiskMark Garratt
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk managementAnu Damodaran
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Businesspaperpublications3
 
Introduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewIntroduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewTatianaMajor22
 
Business Continuity Management-The Case for Return on Investment-white paper
Business Continuity Management-The Case for Return on  Investment-white paperBusiness Continuity Management-The Case for Return on  Investment-white paper
Business Continuity Management-The Case for Return on Investment-white paperGreg Cybulski, CBCP, ARM
 
ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
ASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESS
ASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESSASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESS
ASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESSRobin Beregovska
 
Risk management standard 030820
Risk management standard 030820 Risk management standard 030820
Risk management standard 030820 Alberto Garcia Romera
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesIRJET Journal
 

Ähnlich wie Risk Management Essentials (20)

51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
project risk management
project risk managementproject risk management
project risk management
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 
Icab lectures chapter 5 & 6, Business and Finance, ICAB
Icab lectures chapter 5 & 6, Business and Finance, ICABIcab lectures chapter 5 & 6, Business and Finance, ICAB
Icab lectures chapter 5 & 6, Business and Finance, ICAB
 
Operational risk: the new frontier
Operational risk: the new frontierOperational risk: the new frontier
Operational risk: the new frontier
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Risk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docxRisk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docx
 
Table of ContentsIntroduction3P.docx
Table of ContentsIntroduction3P.docxTable of ContentsIntroduction3P.docx
Table of ContentsIntroduction3P.docx
 
Business Risk
Business RiskBusiness Risk
Business Risk
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Business
 
Introduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewIntroduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330Overview
 
Business Continuity Management-The Case for Return on Investment-white paper
Business Continuity Management-The Case for Return on  Investment-white paperBusiness Continuity Management-The Case for Return on  Investment-white paper
Business Continuity Management-The Case for Return on Investment-white paper
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
ASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESS
ASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESSASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESS
ASSESSING THE RELATIONSHIP EFFECTIVE RISK ANALYSIS HAVE ON BUSINESS SUCCESS
 
Risk management standard 030820
Risk management standard 030820 Risk management standard 030820
Risk management standard 030820
 
Essay On Risk Management
Essay On Risk ManagementEssay On Risk Management
Essay On Risk Management
 
Risk Management Essay
Risk Management EssayRisk Management Essay
Risk Management Essay
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 

Mehr von Sazzad Hossain, ITP, MBA, CSCAâ„ĸ

āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē
āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē
āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē Sazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š)
āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š) āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š)
āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š) Sazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡
āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡ āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡
āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡ Sazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969
Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969
Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969Sazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
TDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š
TDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§ŠTDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š
TDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§ŠSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§ŠSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§ŠSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§ŠSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§ŠSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§Š
āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§ŠāĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§Š
āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§ŠSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
Govt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdf
Govt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdfGovt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdf
Govt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdfSazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š
TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š
TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š Sazzad Hossain, ITP, MBA, CSCAâ„ĸ
 
ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°
ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°
ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°Sazzad Hossain, ITP, MBA, CSCAâ„ĸ
 

Mehr von Sazzad Hossain, ITP, MBA, CSCAâ„ĸ (20)

ITP CIRCULAR 2017 Income Tax Bangladesh - NBR
ITP CIRCULAR 2017 Income Tax Bangladesh - NBRITP CIRCULAR 2017 Income Tax Bangladesh - NBR
ITP CIRCULAR 2017 Income Tax Bangladesh - NBR
 
Auditors Tor for Cash incentive audit of BB
Auditors Tor for Cash incentive audit of BBAuditors Tor for Cash incentive audit of BB
Auditors Tor for Cash incentive audit of BB
 
Tax year 2024 Advance Taxation book by Khalid Petiwala
Tax year 2024 Advance Taxation book by Khalid PetiwalaTax year 2024 Advance Taxation book by Khalid Petiwala
Tax year 2024 Advance Taxation book by Khalid Petiwala
 
All CA Firms 23 October 2023
All CA Firms 23 October 2023All CA Firms 23 October 2023
All CA Firms 23 October 2023
 
āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē
āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē
āĻ†ā§ŸāĻ•āĻ° āĻĒāĻ°āĻŋāĻĒāĻ¤ā§āĻ° ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē
 
āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š)
āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š) āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š)
āĻ¸āĻ°ā§āĻŦāĻœāĻ¨ā§€āĻ¨ āĻĒā§‡āĻ¨āĻļāĻ¨ āĻ¸ā§āĻ•ā§€āĻŽ āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž āĻ¸āĻ‚āĻ•ā§āĻ°āĻžāĻ¨ā§āĻ¤ āĻ—ā§‡āĻœā§‡āĻŸ (āĻ†āĻ—āĻ¸ā§āĻŸ ā§¨ā§Ļā§¨ā§Š)
 
VAT Deduction at Source
VAT Deduction at SourceVAT Deduction at Source
VAT Deduction at Source
 
āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡
āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡ āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡
āĻœā§€āĻŦāĻ¨āĻ•ā§‡ āĻ•ā§Ÿā§‡āĻ• āĻ§āĻžāĻĒ āĻāĻ—āĻŋā§Ÿā§‡ āĻ¨āĻŋāĻ¤ā§‡ āĻšāĻžāĻ‡āĻ˛ā§‡
 
Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969
Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969
Jun-2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚- ā§§ā§¯ā§Ģ-ā§¨ā§Ļā§§-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š Customs Act 1969
 
TDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š
TDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§ŠTDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š
TDS Tax Deducted at Source Rule 2023 āĻāĻ¸.āĻ†āĻ°.āĻ“. āĻ¨āĻ‚ ā§¨ā§Ļā§Ŧ-ā§¨ā§§ā§Ļ-āĻ†āĻ‡āĻ¨-ā§¨ā§Ļā§¨ā§Š
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§Š āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦā§āĻ¯āĻžāĻ‚āĻ•- āĻ•ā§‹āĻŽā§āĻĒāĻžāĻ¨āĻŋ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§¨ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻļāĻŋāĻ˛ā§āĻĒ-āĻ¨āĻ•āĻļāĻž āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§¨ā§Ļ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻāĻœā§‡āĻ¨ā§āĻ¸āĻŋ āĻŸā§ āĻ‡āĻ¨ā§‹āĻ­ā§‡āĻŸ (āĻāĻŸā§āĻ†āĻ‡) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
 
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Šā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
ā§¨ā§Ļā§¨ā§Š āĻ¸āĻ¨ā§‡āĻ° ā§§ā§¯ āĻ¨āĻ‚ āĻ†āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļ āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ-āĻŦā§‡āĻ¸āĻ°āĻ•āĻžāĻ°āĻŋ āĻ…āĻ‚āĻļā§€āĻĻāĻžāĻ°āĻŋāĻ¤ā§āĻŦ (āĻ¸āĻ‚āĻļā§‹āĻ§āĻ¨) āĻ†āĻ‡āĻ¨, ā§¨ā§Ļā§¨ā§Š
 
āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§Š
āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§ŠāĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§Š
āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§ĒāĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§¨ā§Ļā§¨ā§Š
 
Govt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdf
Govt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdfGovt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdf
Govt Employee Taxation Rules āĻāĻ¸.āĻ†āĻ°.āĻ“ āĻ¨āĻ‚ ā§¨ā§¨ā§Ģ-āĻ†āĻ‡āĻ¨-āĻ†ā§ŸāĻ•āĻ°-ā§­-ā§¨ā§Ļā§¨ā§Š.pdf
 
TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š
TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š
TDS Rules, 2023 āĻ‰ā§ŽāĻ¸ā§‡ āĻ•āĻ° āĻŦāĻŋāĻ§āĻŋāĻŽāĻžāĻ˛āĻž, ā§¨ā§Ļā§¨ā§Š
 
ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°
ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°
ā§¨ā§Ļā§¨ā§Š-ā§¨ā§Ē āĻ…āĻ°ā§āĻĨāĻŦāĻ›āĻ°ā§‡ āĻ­ā§āĻ¯āĻžāĻŸ āĻšāĻžāĻ°
 
TDS on ITA 2023
TDS on ITA 2023  TDS on ITA 2023
TDS on ITA 2023
 
Mapping of ITA 2023 with ITO 1984
Mapping of ITA 2023 with ITO 1984Mapping of ITA 2023 with ITO 1984
Mapping of ITA 2023 with ITO 1984
 

KÃŧrzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

KÃŧrzlich hochgeladen (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

Risk Management Essentials

  • 2. WHAT IS RISK MANAGEMENT Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.
  • 3. TYPICAL BUSINESS RISKS Risk categories I. STRATEGIC II. OPERATIONAL III. COMPLIANCE IV. FINANCIAL Risk classes 1. Macroeconomic 5. Innovation 9. Regulatory 13. Treasury 2. Industry / market changes 6. People 10. Litigation 14. Tax 3. M&A / restructuring 7. IT 11. Business Conduct 15. Pensions 4. Reputation 8. Supply Chain 12. Environmental 16. Reporting Risks 1.0 Macroeconomic 5.0 Innovation 9.0 Regulatory 13.0 Treasury 1.1 Economy 5.1 Business / product portfolio 9.1 Permits 13.1 Liquidity risk 1.2 Political risk 5.2 Corporate / product branding 9.2 Sanctions 13.2 Currency risk 1.3 Disaster 5.3 Product quality and liability 13.3 Interest rate risk 5.4 Sales 10.0 Litigation 13.4 Commodity price risk 2.0 Industry / market changes 5.5 Services 13.5 Credit rating risk 2.1 Market action 11.0 Business Conduct 13.6 Insurance risk 2.2 Capacity expansion 6.0 People 11.1 ABC, AML, CTF 13.7 Counter party risk 2.3 New Entrants 6.1 Skilled talent 11.2 FCD 2.4 Imports 6.2 Labor relations 14.0 Tax 2.5 Complementors 6.3 Productivity / projects 12.0 Environmental 12.1 Emissions 15.0 Pensions 3.0 M&A / restructuring 7.0 IT 3.1 M&A / JV / divestments 7.1 Cybersecurity 16.0 Reporting 3.2 Restructuring / integration 7.2 Outsourcing 16.1 Use of estimates 3.3 Competitor M&A 16.2 Loss exposures 8.0 Supply Chain 4.0 Reputation 8.1 Own capacity 4.1 Health & Safety 8.2 Sourcing suppliers 4.2 Sustainable Development 8.3 Raw materials 4.3 Corporate Governance 8.4 Energy 8.5 Procurement 8.6 Logistics 8.7 Business interruption Note: Mergers & Acquisitions (M&A), Anti-Bribery & Corruption (ABC), Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Fair Competition Directive (FCD)
  • 4. INTANGIBLE RISK MANAGEMENT īƒ’ Intangible risk management identifies a new type of a risk that has a 100% probability of occurring but is ignored by the organization due to a lack of identification ability. For example, īƒ‰ When deficient knowledge is applied to a situation, a knowledge risk materializes. īƒ‰ Relationship risk appears when ineffective collaboration occurs. īƒ’ Process-engagement risk may be an issue when ineffective operational procedures are applied. These risks īƒ‰ directly reduce the productivity of knowledge workers, īƒ‰ decrease cost effectiveness, īƒ‰ profitability, īƒ‰ service, īƒ‰ quality, īƒ‰ reputation, īƒ‰ brand value, īƒ‰ and earnings quality. īƒ’ Intangible risk management allows risk management to create immediate value from the identification and reduction of risks that reduce productivity.
  • 5. INTERNAL CONTROL Internal control is a process effected by an entity’s board of directors, management and other personnel designed to provide reasonable assurance regarding the achievement of objectives in the following categories: īƒ’ Efficiency and effectiveness of operations īƒ’ Reliability of reporting īƒ’ Compliance with laws and regulations The five pillars of internal control are: īƒ’ Control environment īƒ’ Risk Assessment īƒ’ Control Activities īƒ’ Monitoring īƒ’ Information and Communication
  • 6. ENTERPRISE RISK MANAGEMENT COSO Framework of Enterprise Risk Management Enterprise risk management is: īƒ’ a process effected by an entity’s board of directors, management and other personnel, īƒ’ applied in strategy setting īƒ’ and across the enterprise, īƒ’ designed to identify potential events that may affect the entity and manage risks to be within its risk appetite, īƒ’ to provide reasonable assurance īƒ’ regarding the achievement of entity objectives. The COSO framework consists of eight interrelated components: īƒ’ Internal or control environment īƒ’ Objective setting īƒ’ Event identification īƒ’ Risk assessment īƒ’ Risk response īƒ’ Control activities or procedures īƒ’ Information and communication īƒ’ Monitoring
  • 7. UNCERTAINTY Knight introduced a technical distinction between risk and uncertainty īƒ’ Risk is a quantification of the potential variability in a value based on past data (e.g. how many life assurance policy holders will live beyond the age of 65) īƒ’ Uncertainty on the other hand is non-quantifiable (whether a key customer will be retained for the next two years) Strictly speaking risk should therefore be defined as a measure of the variability in the value of a factor that is capable of statistical or mathematical evaluation. īƒ’ In practice, the distinction between risk and uncertainty is blurred. Huge losses by insurance underwriting syndicates show that assessments of risk used in insurance have been compromised by unanticipated events such as flooding and hurricanes from climate change and claims for industrial injury resulting form asbestos and stress. īƒ’ Despite using terms like risk, many business strategies are actually taking place in situations of uncertainty. A management team that only undertakes strategies in which the likelihood of success or failures can be precisely quantified would launch no products, enter no new markets and research no new technologies.
  • 8. PROCESS īƒ’ According to the standard ISO 31000 "Risk management -- Principles and guidelines on implementation," the process of risk management consists of several steps as follows: īƒ’ Establishing the context īƒ’ Identification īƒ’ Assessment īƒ’ Risk Strategies īƒ’ Risk Management Plan īƒ’ Implementation īƒ’ Review and evaluation of plan īƒ’ Communication
  • 9. ESTABLISHING THE CONTEXT īƒ’ Establish the internal context īƒ’ Risk is essentially the chance that an event will occur that will prevent the company from meeting its objectives. Therefore in order to understand the risks, you must first identify the objectives. īƒ’ Establish the external context īƒ’ The external context is the overall environment in which the business operates, including an understanding of the perceptions that clients or customers have of the business. This could take the form of a SWOT analysis. It should also cover such issues as external regulations that the business must comply with. īƒ’ Establish the risk management context īƒ’ In order to correctly identify risks associated with a project, you must first define the project limits objectives and scope. This may include identifying: īƒ‰ The timeframe of the project īƒ‰ Additional resources and expertise required īƒ‰ Team members’ roles and responsibilities īƒ‰ Documentation required īƒ’ Develop risk criteria īƒ’ This step allows the business to identify unacceptable levels of risk, or, looking at it in another way, to define acceptable level of risk for a particular project. These risk levels can be more closely defined as the process progresses. īƒ’ Once acceptable or unacceptable risks have been identified for each activity, these can be used to assess different risks associated with the project to determine whether these risks need to be controlled. īƒ’ Any risk that results in any or all of the project’s objectives not being met will be deemed unacceptable and a strategy for controlling such risks must be developed. īƒ’ Define the structure for risk analysis īƒ’ The final step in the establishment of context is to define the structure for risk analysis. This involves isolating the risk categories that need to be managed, which can then be assessed individually. īƒ’ Risk categories vary according to the project but may include such areas as: īƒ’ Security (such as the security of company installations) īƒ’ Finance (the project must come in on budget) īƒ’ Transport (what happens if the vehicle carrying computer equipment and general documentation breaks down)?
  • 10. IDENTIFICATION After establishing the context, the next step in the process of managing risk is to identify potential risks. Risks are about events that, when triggered, cause problems. Hence, risk identification can start with the source of problems, or with the problem itself. īƒ’ Source analysis Risk sources may be internal or external to the system that is the target of risk management. īƒ’ Examples of risk sources are: stakeholders of a project, employees of a company, the weather over an airport or customers. īƒ’ Problem analysis Risks are related to identified threats. For example: the threat of losing money, the threat of abuse of privacy information or the threat of accidents and casualties. The threats may exist with various entities, most important with shareholders, customers and legislative bodies such as the government. When either source or problem is known, the events that a source may trigger or the events that can lead to a problem can be investigated. For example: īƒ’ Customers may default causing loss to the company īƒ’ privacy information may be stolen by employees even within a closed network;
  • 11. RISK IDENTIFICATION TECHNIQUES The chosen method of identifying risks may depend on culture, industry practice and compliance. The identification methods are formed by templates or the development of templates for identifying source, problem or event. Common risk identification methods are: īƒ’ Objectives-based risk identification Organizations and project teams have objectives. Any event that may endanger achieving an objective partly or completely is identified as risk. īƒ’ Scenario-based risk identification In scenario analysis different scenarios are created. The scenarios may be the alternative ways to achieve an objective, or an analysis of the interaction of forces in, for example, a market or battle. Any event that triggers an undesired scenario alternative is identified as risk. īƒ’ Taxonomy-based risk identification The taxonomy in taxonomy-based risk identification is a breakdown of possible risk sources. Based on the taxonomy and knowledge of best practices, a questionnaire is compiled. The answers to the questions reveal risks. īƒ’ Common-risk checking In several industries, lists with known risks are available. Each risk in the list can be checked for application to a particular situation. īƒ’ Risk charting This method combines the above approaches by listing resources at risk, threats to those resources, modifying factors which may increase or decrease the risk and consequences it is wished to avoid. Creating a matrix under these headings enables a variety of approaches. One can begin with resources and consider the threats they are exposed to and the consequences of each. Alternatively one can start with the threats and examine which resources they would affect, or one can begin with the consequences and determine which combination of
  • 12. ASSESSMENT īƒ’ A risk assessment is a process to identify potential hazards and analyze what could happen if a hazard occurs. A business impact analysis (BIA) is the process for determining the potential impacts resulting from the interruption of time sensitive or critical business processes. īƒ’ There are numerous hazards to consider. For each hazard there are many possible scenarios that could unfold depending on timing, magnitude and location of the hazard. īƒ’ There are many “assets” at risk from hazards. First and foremost, injuries to people should be the first consideration of the risk assessment. īƒ’ Hazard scenarios that could cause significant injuries should be highlighted to ensure that appropriate emergency plans are in place. īƒ’ Many other physical assets may be at risk. These include buildings, information technology, utility systems, machinery, raw materials and finished goods. The potential for environmental impact should also be considered. īƒ’ Consider the impact an incident could have on your relationships with customers, the surrounding community and other stakeholders. Consider situations that would cause customers to lose confidence in your organization and its products or services. īƒ’ As you conduct the risk assessment, look for vulnerabilities—weaknesses—that would make an asset more susceptible to damage from a hazard. Vulnerabilities include deficiencies in building construction, process systems, security, protection systems and loss prevention programs. They contribute to the severity of damage when an incident occurs. īƒ’ For example, a building without a fire sprinkler system could burn to the ground while a building with a properly designed, installed and maintained fire sprinkler system would suffer limited fire damage.
  • 14. COMPOSITE RISK INDEX īƒ’ The above formula can also be re-written in terms of a Composite Risk Index, as follows: īƒ’ Composite Risk Index = Impact of Risk event x Probability of Occurrence īƒ’ The impact of the risk event is commonly assessed on a scale of 1 to 5, where 1 and 5 represent the minimum and maximum possible impact of an occurrence of a risk (usually in terms of financial losses). However, the 1 to 5 scale can be arbitrary and need not be on a linear scale. īƒ’ The probability of occurrence is likewise commonly assessed on a scale from 1 to 5, where 1 represents a very low probability of the risk event actually occurring while 5 represents a very high probability of occurrence. This axis may be expressed in either mathematical terms (event occurs once a year, once in ten years, once in 100 years etc.) or may be expressed in "plain english" - event has occurred here very often; event has been known to occur here; event has been known to occur in the industry etc.). Again, the 1 to 5 scale can be arbitrary or non-linear depending on decisions by subject-matter experts. īƒ’ The Composite Index thus can take values ranging (typically) from 1 through 25, and this range is usually arbitrarily divided into three sub-ranges. The overall risk assessment is then Low, Medium or High, depending on the sub-range containing the calculated value of the Composite Index. For instance, the three sub-ranges could be defined as 1 to 8, 9 to 16 and 17 to 25. īƒ’ Note that the probability of risk occurrence is difficult to estimate, since the past data on frequencies are not readily available, as mentioned above. After all, probability does not imply certainty. īƒ’ Likewise, the impact of the risk is not easy to estimate since it is often difficult to estimate the potential loss in the event of risk occurrence. īƒ’ Further, both the above factors can change in magnitude depending on the adequacy of risk avoidance and prevention measures taken and due to changes in the external business environment. īƒ’ Hence it is absolutely necessary to periodically re-assess risks and intensify/relax mitigation
  • 15.
  • 16. RISK IMPACT / PROBABILITY CHART īƒ’ Low impact/Low probability – Risks in the bottom left corner are low level, and you can often ignore them. īƒ’ Low impact/High probability – Risks in the top left corner are of moderate importance – if these things happen, you can cope with them and move on. However, you should try to reduce the likelihood that they'll occur. īƒ’ High impact/Low probability – Risks in the bottom right corner are of high importance if they do occur, but they're very unlikely to happen. For these, however, you should do what you can to reduce the impact they'll have if they do occur, and you should have contingency plans in place just in case they do. īƒ’ High impact/High probability – Risks towards the top right corner are of critical importance. These are
  • 17. RISK STRATEGIES īƒ’ Once risks have been identified and assessed, all techniques to manage the risk fall into one or more of these four major categories: īƒ’ Transfer (transfer - outsource or insure) īƒ’ Avoidance (eliminate, withdraw from or not become involved) īƒ’ Reduction (optimize - mitigate) īƒ’ Accept (accept and budget) Transfer īƒ’ Risks can be transferred through insurance or outsourcing. Financial risks can be transferred by hedging Avoidance īƒ’ Avoidance may seem the answer to all risks, but avoiding risks also means losing out on the potential gain that accepting (retaining) the risk may have allowed. īƒ’ Hazard prevention refers to the prevention of risks in an emergency. The first and most effective stage of hazard prevention is the elimination of hazards. If this takes too long, is too costly, or is otherwise impractical, the second stage is mitigation.
  • 18. RISK STRATEGIES Risk Reduction īƒ’ Risk reduction or "optimization" involves reducing the severity of the loss or the likelihood of the loss from occurring. For example, īƒ‰ sprinklers are designed to put out a fire to reduce the risk of loss by fire. This method may cause a greater loss by water damage and therefore may not be suitable. īƒ‰ Halon fire suppression systems may mitigate that risk, but the cost may be prohibitive as a strategy. īƒ‰ By an offshore drilling contractor effectively applying HSE Management in its organization, it can optimize risk to achieve levels of residual risk that are tolerable. īƒ’ Modern software development methodologies reduce risk by developing and delivering software incrementally. Risk reduction controls generally fall into the following categories: īƒ’ Prevention – SOD, Authorizations, Security of assets īƒ’ Detection – Review of perfomance, reconciliations, physical checks, audits īƒ’ Directive – corporate policies, spending limits, īƒ’ Corrective – corrective journal entries, controls after cyber attacks or virus attacks īƒ’ Manual or system based
  • 19. CREATE A RISK MANAGEMENT PLAN īƒ’ Select appropriate controls or countermeasures to measure each risk. īƒ’ Risk mitigation needs to be approved by the appropriate level of management. For instance īƒ‰ a risk concerning the image of the organization should have top management decision behind it īƒ‰ whereas IT management would have the authority to decide on computer virus risks. īƒ’ The risk management plan should propose applicable and effective security controls for managing the risks. For example, an observed high risk of computer viruses could be mitigated by acquiring and implementing antivirus software. īƒ’ A good risk management plan should contain a schedule for control implementation and responsible persons for those actions. īƒ’ According to ISO/IEC 27001, the stage immediately after completion of the risk assessment phase consists of preparing a Risk Treatment Plan, which should document the decisions about how each of the identified risks should be handled.
  • 20. IMPLEMENTATION OF PLAN Implementation follows all of the planned methods for mitigating the effect of the risks. īƒ’ Purchase insurance policies for the risks that have been decided to be transferred to an insurer, īƒ’ avoid all risks that can be avoided without sacrificing the entity's goals, īƒ’ reduce others, īƒ’ and retain the rest.
  • 21. REVIEW AND EVALUATION OF THE PLAN īƒ’ All risk management plans must be monitored to ensure that īƒ‰ they are achieving the desired results and īƒ‰ that changes to the project’s risk profile are reflected. īƒ’ As with any process, evaluation of risk management plan is essential to ensure that they are performing to expectations. Managers and stakeholders in the risk management process should consider such areas as: īƒ‰ How successful was the plan and were the benefits and costs at the predicted levels īƒ‰ In the light fo the above, are any changes needed to improve the plan? īƒ‰ Would the plan have benefitted from the availability of additional information? īƒ’ You can think of risk monitoring as being similar to an audit of the risk management process. Various tests will be carried out to determine whether individual controls are working properly and recommendations made in the light of results. īƒ’ However, unlike auditing, risk management monitoring does not take place only on an annual basis. Risk management is a continuous process. īƒ’ The environment in which organization work changes constantly and with those changes come different risks, all of which should be analyzed and incorporated into the process.
  • 22. EXAMPLES OF RISK MONITORING PROCESSES INCLUDE: īƒ’ Regular review of projects against specific costs and compliance milestones īƒ’ Systems of notification of incidents (e.g. accidents at work, near misses of aircrafts) īƒ’ Internal audit functions (e.g. financial, systems security, compliance with heath and safety) īƒ’ Employment of compliance monitoring staff īƒ’ Skills assessment and medical examinations of staff and managers to assure compliance with fitness to work īƒ’ Practices and drills to confirm readiness (e.g. fire drills, evacuations, disruptions to operations) īƒ’ Intelligence gathering on occurrences elsewhere (e.g. experience of frauds, equipment failures, outcome of legal cases) īƒ’ Monitoring of the regulatory framework of the industry to ensure compliance The monitoring and review process should also establish whether: īƒ’ The controls adopted achieved the desired results īƒ’ The procedures adopted and information gathered for undertaking the assessment were appropriate īƒ’ Improved knowledge would have helped to reach better decisions, identifying what lessons could be learnt for future assessments.
  • 23. RISK COMMUNICATION Internal communication and learning Effective and efficient communication is vital for the business as it is essential that: īƒ’ Everyone in the risk management process is fully familiar with its importance to the business, the risk priorities of the business and their role within the process. īƒ’ Knowledge gleaned from any new risk identified by one area of the business or any lessons learnt from risk events its transferred to all other areas of the business in a considered and consistent manner, so that it can be correctly incorporated into the business-wide risk management strategy. īƒ’ All levels of management are regularly updated about the management of risk in their areas of responsibility, to enable them to monitor the adequacy and completeness of any risk plans and controls. īƒ’ There are procedures in place for escalation of any issues arising. External communication and learning īƒ’ No organization operates in isolation; they all have trading partners/ customers/ suppliers. Management must gain assurance that its major partners have implemented an adequate and appropriate risk management strategy.
  • 24. INFORMATION TECHNOLOGY RISKS The major risks from IT systems could arise from: īƒ’ Natural threats – fire, flood etc īƒ’ Human threats – individuals with grudge against the organisation īƒ’ Data systems integrity – incorrect entry of data, loss of data through lack of backup īƒ’ Fraud – dishonest use of computer system īƒ’ Deliberate sabotage – industrial espionage īƒ’ Viruses and other corruption including hacking īƒ’ Denial of Service attack – attempt by attackers to prevent computer use īƒ’ Non compliance with regulations – normally subject to internal and external compliance
  • 25. COMBATING IT RISKS AND IT SECURITY īƒ’ The ISO Code of practice for information security management recommends the following be examined during a risk assessment: īƒ‰ security policy īƒ‰ Organization of information security, īƒ‰ asset management īƒ‰ human resources security, īƒ‰ Physical and environmental security īƒ‰ communications and operations management, īƒ‰ access control, īƒ‰ information systems acquisition, development and maintenance, īƒ‰ information security incident management īƒ‰ business continuity management, and īƒ‰ regulatory compliance