Fundamentals of Operational Risk Management Understanding and Implementing Effective Tools, Policies and Frameworks (Simon Ashby)
Fundamentals of Operational Risk Management Understanding and Implementing Effective Tools, Policies and Frameworks (Simon Ashby)
‘Simon Ashby is very well placed, through his long association with the Institute of
Operational Risk, to write what will prove to be the definitive book on operational risk.
He challenges us to expand our understanding of operational risk to encompass
“unpredictable outcomes of the efficiency and effectiveness of operations.”. Using a series
of compelling case studies, he brings the subject alive. It is sobering to see how many of
the selected case studies had underlying cultural drivers. I found the section on risk
culture particularly practical in its insights on monitoring and taking action. The approach
to operational risk event data establishes the benefits of learning from past events and
ensuring recurrence is prevented, which surely is the essence of any robust approach to
operational risk.’
Alex Hindson, Chief Risk & Sustainability Officer, Argo Group
‘This is an excellent book, serving as an effective, pragmatic tool for risk practitioners
working in all three lines across the world, as well as a good guide for academics in
operational risk.’
Dominic Wu, Director, Risk Management, BCT Group
‘Simon Ashby presents a very well structured, research-based and informative guide to
operational risk management. This excellent book covers every key topic, from
embedding risk culture to conducting scenario analysis. A remarkably rewarding resource
for practitioners.’
Elena Pykhova, Director and Founder, The OpRisk Company
‘It is becoming more and more clear that operational risk models are of limited use,
while taking behavioural elements into account in risk culture, governance etc is of
tremendous importance. This book sets absolutely the right focus – and numerous case
studies confirm that Simon Ashby is not just a seasoned academic, but very familiar with
the important details of practical implementation as well. Really worthwhile reading!’
Thomas Kaiser, Founder, Professor Kaiser Risk Management Consulting
and Honorary Professor, Goethe University
ii
Fundamentals
of Operational
Risk Management
Understanding and implementing
effective tools, policies and frameworks
Simon Ashby
iv
Publisher’s note
Every possible effort has been made to ensure that the information contained in this book is accurate
at the time of going to press, and the publishers and author cannot accept responsibility for any errors
or omissions, however caused. No responsibility for loss or damage occasioned to any person acting,
or refraining from action, as a result of the material in this publication can be accepted by the editor, the
publisher or the author.
First published in Great Britain and the United States in 2022 by Kogan Page Limited
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted
under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or trans-
mitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of
reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning
reproduction outside these terms should be sent to the publishers at the undermentioned addresses:
2nd Floor, 45 Gee Street 8 W 38th Street, Suite 902 4737/23 Ansari Road
London New York, NY 10018 Daryaganj
EC1V 3RS USA New Delhi 110002
United Kingdom India
www.koganpage.com
The right of Simon Ashby to be identified as the author of this work has been asserted by him in accordance
with the Copyright, Designs and Patents Act 1988.
ISBNs
Hardback 978 1 3986 0504 6
Paperback 978 1 3986 0502 2
Ebook 978 1 3986 0503 9
CONTENTS
04 Risk culture 64
Introduction 64
Understanding risk culture 65
Assessing risk culture 68
Monitoring risk culture: risk-culture metrics 74
Influencing risk culture: potential interventions 76
Conclusions 82
Appendix A 83
References 88
05 Risk appetite 89
Introduction 89
Key terms and definitions 90
Determining operational risk appetite and tolerance 94
Expressing operational risk appetite and tolerance: qualitative versus
quantitative 101
Deciding on the appropriate level of operational risk appetite and related
tolerances 105
Implementing an operational risk appetite framework 107
Conclusions 111
Appendix B 113
References 115
11 Organizational resilience 253
Introduction 253
Understanding organizational resilience: key concepts 254
Building capabilities for organizational resilience 261
Conclusion 269
References 271
viii Contents
Index 297
ix
FOREWORD
This book demonstrates that operational risk management has reached maturity and
shines a light on how organizations will operate in the future.
In the chapters that follow you will find not only closely argued statements about
what operational risk management is, supported by relevant and topical case studies,
but above all you will also find a sensible handbook of how operational risk man-
agement should be practised today – in our new post-Covid era.
As a direct product of the Institute of Operational Risk (IOR) joining forces with
the Institute of Risk Management (IRM) in 2019, this book illustrates the value of
our combined approach. As Chair of the IRM I am proud that we could play our
part in bringing together the various strands that make up Fundamentals of
Operational Risk Management into the coherent and robust study that you have
before you.
We are privileged to have Simon Ashby provide the fruit of his many years of
study and practice in the field. He was there at the first meeting of what became the
IOR at the Bank of England in 1999 and has been both a regulator and a practi-
tioner as well as the leading academic in the field. As you read it will become clear
that you are acquiring true value from his years of experience.
Importantly, this book will help you to bring a firm conceptual foundation to
your inquiries. It will show you how operational risk management is about adding
value rather than adding cost, how it contributes directly to an organization’s objec-
tives and how it can encompass opportunities and not just ‘downside’ risks.
I was particularly pleased to see the frequent use of case studies taken not only
from the field of financial services but also organizations that operate in the ‘real’
economy. These real-life examples range from the original failures that formed the
catalyst for operational risk management to those arising from the recent changes in
the way we work as a result of the Covid-19 pandemic. They vividly illustrate the
concepts Simon has so cogently highlighted here.
As we move into the 2020s, the techniques, rules and guidelines of operational
risk management are all becoming increasingly recognized as ways for professionals
to raise their skills and performance to the next level, all while preparing for an even
more digital future. The time is now, so enjoy Simon’s book!
Stephen Sidebottom
Chair, Institute of Risk Management
xii
PREFACE
In the early days, research and practice in the field of operational risk was like the
Wild West. Lots of tools and techniques existed, each coming from a different cate-
gory of operational risk (e.g. health and safety, fraud, IT security, etc), as well as from
different professional disciplines such as insurance, finance and accounting. It seemed
that everyone had a different view on how best to manage operational risk. This
made for an exciting and creative time, but one where practices differed extensively.
Since then, the practice of operational risk has matured and there is significantly
less difference in approach between organizations. In part, lessons have been learnt
from major loss events such as the global financial crisis of 2007–08, the roots of
which were operational risk in nature. In addition, practitioners have learnt from
each other what works and what does not. Institutes like the IOR and IRM played
an important part in this sharing of good practice. Without them it would have been
much more difficult for practitioners to share their insights and develop the field.
Though the term ‘operational risk’ emerged from the banking sector, many other
industry sectors have since embraced the term and adopted the tools and techniques
developed by banks, though it is fair to say that some of these tools and techniques
were originally borrowed and adapted from practices that originated outside the
banking sector. What goes around, comes around, though through this iteration
much of this practice is vastly improved from before.
Is operational risk fully mature as a field of professional practice? Probably not.
That said, all professions benefit from continuous improvement. Perhaps full matu-
rity is an impossible goal. Nevertheless, the practice of operational risk is sufficiently
grown-up to merit the development and dissemination of sound practice – practice
developed by practitioners for their peers and rooted in what has been shown to
work, time and time again.
The purpose of this book is to share the sound practice for operational risk man-
agement that has evolved over the last 20 or more years, practice that I have both
implemented during my time as an operational risk professional and observed
through my research, consultancy and training work. In this regard my aim is to act
as the conduit through which the fundamentals of effective operational risk manage-
ment can be communicated, both to existing professionals looking to improve their
practice and to those looking to pursue a career in operational risk. In this regard the
content that follows builds on the Sound Practice Guidance Papers for operational
risk, published by the IOR and IRM (https://www.ior-institute.org/sound-practice-
guidance), papers that have been refined and updated over the last decade to reflect
improvements in professional practice. Though I have further developed this work,
adding numerous cases, examples and insights based on my own experience, the
content of this book very much relies on the progress made by numerous profes-
sional giants in the field of operational risk, professionals who have contributed to
the various Sound Practice Guidance Papers and taught me much about the manage-
ment of operational risk. My thanks to you all!
xv
ACKNOWLEDGEMENTS
I would like to thank Ian Livsey, CEO of the Institute of Risk Management, for giv-
ing me the opportunity to write this book and for the support of Tony Chidwick and
the wider Advisory Committee of the Institute of Operational Risk (IOR). Tony, your
insights were much appreciated, as were those of other Advisory Committee mem-
bers.
To the many giants of operational risk management practice that I have had the
privilege of working with and learning from over the decades thank you for your
support. Special thanks go to Professor Brendon Young for inviting me onto the
Operational Risk Research Forum (ORRF) back in 1999 and for creating the IOR,
which I hold very dear to my heart. Thanks also to Helmut Bauer and Jeremy Quick
for hiring an opinionated, young upstart with little practical knowledge. Without
your faith in me I would never have become an operational risk professional. The
many others that I have had the privilege to learn from and work with are too nu-
merous to mention in full. However, I would like to express my sincere thanks to
Dick Baker, Arianne Chapelle of Chapelle Consulting, Mike Finlay of Risk Business,
Philip Martin and Brian Rowlands – each of whom played a major role in the devel-
opment of the IOR’s Sound Practice Guidance Papers, on which this book is based.
Last and by no means least, my love and thanks to my amazing wife Alison. My
professional career in operational risk has at times been a stressful one, especially my
tenure as Chair of the IOR. Her love, patience and support has been unwavering.
And from a professional perspective her experience in factory operations and supply
chains has taught me much about the management of operations outside the finan-
cial services sector.
xvi
1
Understanding 01
operational risk:
key concepts
and management
objectives
L E A R N I N G O U TCOM E S
●● Define key concepts such as risk, operational risk and uncertainty.
●● Describe how operational risk fits within a wider enterprise risk management
context.
●● Explain how real-world operational risk events have impacted on the ability of
organizations to create value through the achievement of their strategic
objectives.
1. Introduction
The purpose of this chapter is to explain what operational risk is and how the man-
agement of operational risk fits within a wider ‘enterprise’ risk management context.
Experienced operational risk practitioners may decide to skim through this chapter.
Those with less experience of operational risk will find that a careful review of the
material contained here will support their understanding of subsequent chapters.
In the course of this chapter, a number of myths that relate to operational risk
management will be dispelled. Such as the myths that operational risks are exclu-
sively downside risks, and that operational risk management is predominantly a cost
centre that does not contribute directly to the achievement of an organization’s stra-
tegic objectives. On the contrary, operational risk management is as important, and
2 Fundamentals of Operational Risk Management
value adding, as any other type of risk management, potentially more so. In addition,
different perspectives on some established ideas will be provided, such as the defini-
tion of operational risk. It will be argued that, as the discipline of operational risk
management matures, there is a need to rethink these ideas, to help cement the dis-
cipline on firmer conceptual foundations.
The chapter starts with a brief history of operational risk, explaining how the term
emerged and how the discipline of operational risk management was formed. We will
then move to discussing some important foundation concepts such as risk, uncertainty
and, of course, operational risk. We will then explore the links between operational
risk and the wider context of enterprise risk management. Here it will be argued that
effective operational risk management should protect and create value for organiza-
tions, helping them to improve their efficiency and effectiveness while reducing the
potential for financial, reputational, physical or any other form of damage. Finally,
case studies of some real-world operational risk events will be used to help illustrate
the value of effective operational risk management in a range of organizations.
revised Orange Book (HM Treasury, 2020) guidance on risk management for organi-
zations includes operational risk in its taxonomy of major risks (more on this tax-
onomy in Chapter 3, on risk categorization). The International Organization for
Standardization (ISO) stops short of providing such a taxonomy but does suggest that
risk management should be applied at the ‘strategic, operational, programme or pro-
ject levels’ (ISO 31000:2018, section 6.1, author’s emphasis). In contrast, the updated
COSO guidance on enterprise risk management makes no mention of operations or
operational risk, though it does say that risks are present in ‘day-to-day operational
decisions’ (COSO, 2017, p1).
From a financial services perspective the term ‘operational risk’ has been labelled an
invention (Power, 2005) – a negotiating device used by regulators and financial services
executives to reorganize and reposition their respective viewpoints on a variety of well-
established risks (fraud, system and process failures, damage to physical assets, etc).
Regulators use the term to increase the capital requirements of banks, bank executives to
reduce these requirements. This may well have been the base in the late 1990s; however,
the discipline of operational risk management has matured much since. The creation of
the IOR in 2004, by the irrepressible Professor Brendon Young, the instigator of the
ORRF, did much to further the cause and help cement operational risk management as
a profession – a cause strengthened when the IOR merged with the Institute of Risk
Management (IRM). Practice in areas such as risk culture, risk and control self-assess-
ments and risk indicators, have benefited much from the discipline and the hard work of
its practitioners to develop new risk management tools and techniques – work reflected
in the IOR’s Sound Practice Guidance Papers for Operational Risk, on which this book
is based, as well as the IOR’s Certificate in Operational Risk (www.ior-institute.org/edu
cation/certificate-in-operational-risk-management).
As the 21st century progresses there remains much to do. Consider the standard
definition of operational risk, for example – the definition remains a dumping ground
for a wide variety of seemingly disconnected non-financial risks. In addition, the
definition remains shackled to the myths that operational risk events can only result
in losses, and that operational risk management is an administrative activity and a
cost centre that does little to enhance the revenue of organizations. It is to these
definitional issues and associated myths that we now turn.
That said, such definitions should not be created and used lightly. A poorly
worded, imprecise or misleading definition can disrupt the focus of management at-
tention. At best this will result in an inefficient use of resources; at worst it may cause
key risks or management concerns to be overlooked, threatening the survival of the
organization or the lives and financial wellbeing of its stakeholders.
Though there are poor definitions for all of the concepts addressed here, there are
often several good ones. It is not the intention to cover them all, not least because an
entire book could be written on the subject of defining risk and operational risk in
particular. Instead, some of the more salient points that operational risk profession-
als need to consider will be highlighted.
3.1 Risk
The ISO defines risk as: ‘the effect of uncertainty on objectives’ (ISO 31000:2018,
section 3.1). It further notes that an ‘effect’ reflects any kind of deviation from the
expected, and that such deviations may be either positive or negative (i.e. a threat or
an opportunity).
A strength of the ISO approach is its recognition that risk arises whenever deci-
sions are made, and activities are performed that result in two or more outcomes –
outcomes that are not certain at the time the decision is made or when the activity is
performed. In this regard, risk is the antithesis of certainty.
A further strength is the recognition that risk is associated with outcomes that
may be positive or negative. Such risks are sometimes termed ‘speculative’ risks and
contrasted with ‘pure’ risks that only have negative consequences. However, the con-
struction of so-called pure risks often requires risks to be framed in a very specific
and limited way. True, the risk of physical injury only has a downside. But an injury
outcome is often part of a wider risk context, such as driving a vehicle or operating
machinery, activities that can have positive and negative outcomes.
A potential problem with the ISO 31000 definition is the use of the word ‘uncer-
tainty’. In 1921, a respected economist, Frank Knight, distinguished risk from uncer-
tainty. For Knight, uncertainty is something that cannot be quantified in terms of
probability or impact, while risk can be quantified (Knight, 1921). Hence gambling in
a casino is a risk, while the effects of global warming remain uncertain. We know that
the Earth is warming, and that this is our fault, but we still cannot quantify, accurately,
the positive and negative effects of this on people, businesses, economies or nature.
Taking account of Knight, an alternative definition of risk, used in this book is:
roll a dice you know that there are six outcomes and you have a 1 in 6 chance of each,
but you can never predict the actual outcome. This outcome is simple random chance.
3.2 Uncertainty
Knight’s distinction between risk and uncertainty is a useful one in the context of
operational risk. Risk can be quantified in terms of its probability and impact, uncer-
tainty cannot. When dealing with operational risks, an absence of reliable, statistical
data is commonplace. This means that organizations must frequently attempt to
manage operational uncertainties, opposed to operational risks. Understanding this
can help a lot when applying the tools of operational risk management, such as risk
and control self-assessments or risk indicators. Never assume that the output from
such tools is 100 per cent objective. Instead, experienced operational risk profession-
als know to adopt a healthy degree of scepticism when reviewing and using these
outputs.
Because of its usefulness in an operational risk context this book adopts Knight’s
perspective on risk and uncertainty. Hence uncertainty is defined as:
constructed. This means that people, usually groups of people, determine what
operational risk exposures are, why they matter and whether an exposure is good
or bad.
It is tempting to think of operational risk management as a science. Certainly in
the early days of operational risk, this was the focus, as practitioners and academics
all proposed different ways to model (quantify) operational risk exposures. However,
given the uncertain nature of many operational ‘risks’, they found that even scientific
estimates of exposure are, at best, approximate.
In the absence of scientific data, and sometimes even when it is present (often
people do not accept the data as reliable or accurate), most estimates of operational
risk exposure are socially constructed. This means that it is the values and beliefs of
a social group (e.g. an organization or its respective departments and functions) that
determine exposure. These values and beliefs can even influence whether an expo-
sure is viewed in a positive (opportunity) or negative (threat) light, meaning that one
organization may perceive an operational risk to be a major threat, whereas another
may perceive the same risk to be an opportunity (see Bednarek, Chalkias and
Jarzabkowski, 2021).
Given that risks are socially constructed estimates of operational risk, exposure
should always be viewed as approximate, never objective or reliable. The point of
estimating operational risk exposure is not to arrive at a perfect priority order of
exposures. Rather it is to stimulate discussions about operational risk, which risks
matter right now and how best to alter these exposures where necessary. Granted,
putting operational risk exposures into a priority order can help stimulate discus-
sion, but never assume that this is an accurate reflection of reality, whatever reality
might be!
In the light of this discussion risk exposure is defined as:
financial risks as a necessary part of achieving their objectives, including their finan-
cial objectives (e.g. to generate a profit). So, it is not only market, credit and liquidity
risks that are taken to generate financial returns.
A better distinction might be financial market versus non-financial market risks
for financial organizations, or financing versus non-financing risks for non-financial
organizations. Alternatively, such arbitrary distinctions could be removed, especially
when they do little to support effective enterprise risk management (more on this
below).
In April 2018, the TSB bank in the UK implemented a major core systems migration. The
aim of the migration was to improve the TSB’s online banking systems (e.g. to speed up
mortgage applications, offer digital identity verification on the banking app, improve fraud
prevention, etc), making the bank more competitive. Unfortunately, the migration failed,
and 1.9 million customers were unable to access their accounts, some for several weeks.
The cost of the failure resulted in an annual loss of £105 million for the bank and
resulted in a major regulatory investigation. The cause of the failure was identified as
inadequate testing of the new system. The system was only tested offline, never in the live
environment before the migration.
Of the £330 million in extra costs reported by the bank in its 2018 annual report, around
£125 million was for customer compensation and sorting out their problems, £49 million
was due to fraud and other transaction processing errors, £122 million for extra help and
advice to sort out the IT problems, and £33 million in lost income from waived fees and
charges (TSB, 2018). An independent report into the event concluded that the final costs
exceeded £350 million (Slaughter and May, 2019).
The case highlights the financial consequences of non-financial events, the costs of
which can far exceed most market, credit or liquidity losses outside of major systemic
events such as the 2007 global financial crisis. The case also illustrates that operational
risks are often taken to achieve strategic objectives, in this case a core systems
migration, designed to improve customer service and attract new customers. Had the TSB
managed effectively the non-financial, operational risks associated with the migration, it
would have been able to exploit the opportunities offered by the migration sooner, while
mitigating the associated threats.
8 Fundamentals of Operational Risk Management
Operational risk is defined as the risk of loss resulting from inadequate or failed internal
processes, people and systems or from external events. This definition includes legal risk,
but excludes strategic and reputational risk. (BCBS, 2006, p144)
However, there are several fundamental problems with this definition that arguably
means it is no longer fit for purpose. Firstly, it is assumed that operational risk can
only result in loss outcomes, a conclusion that is at odds with modern perspectives
on risk, as contained within ISO 31000:2018, perspectives that should include op-
erational risk.
Secondly, the causal factors used to demarcate operational risk are equally appli-
cable to other types of risk, including market, credit and liquidity risk. Take for ex-
ample the Covid-19 pandemic. As an external event, this is very much an operational
risk. However, the pandemic also caused turmoil in financial markets, increased
credit insolvency and impacted on market liquidity.
Thirdly, why the focus on inadequate or failed processes? What about inefficient
processes? Or processes that have variable levels of effectiveness? Such concerns are
central in the discipline of operations management, why not the discipline of opera-
tional risk?
Finally, the definition does not explain why strategic and reputation risks are ex-
cluded, an exclusion that is at odds with the latest research on risk management. The
research identifies three types of risk management decision (Aven and Aven, 2015):
1 strategic;
2 tactical;
3 personal (primarily by employees).
All organizations have operations. These operations require people, processes, sys-
tems and equipment (e.g. machinery). Sometimes these operations work well, poten-
tially even exceeding expectations in terms of effectiveness or efficiency. Equally
there may be times when things go wrong and the effectiveness and efficiency of
these operations decline, potentially disastrously so, threating the survival of the
organization.
Efficiency relates to the level of output (e.g. products for sale, return on invest-
ment, revenue) that can be gained from a given set of inputs (e.g. labour, materials,
information). Effectiveness relates to things like the cost of the raw inputs and the
cost associated with processing these inputs into outputs, costs that might include
things like legal and compliance costs. Both efficiency and effectiveness will impact
on operating margins, such as profit, interest and non-interest margins.
Management disciplines like Total Quality Management (TQM) and Six Sigma
also address the efficiency and effectiveness of operations (Oakland, Oakland and
Turner, 2020). The difference is that TQM and Six Sigma focus on quality control
and the minimization of operational defects, while the above definition of opera-
tional risk addresses any type of outcome (whether positive or negative) that could
impact on efficiency and effectiveness, including outcomes outside the control of an
10 Fundamentals of Operational Risk Management
The culture, capabilities and practices integrated with strategy setting and
performance, that organizations rely on to manage risk in creating, preserving and
realizing value.
●● a holistic focus;
●● an emphasis on value added risk management;
●● the blending of formal and informal risk management tools and activities.
12 Fundamentals of Operational Risk Management
Control Identify
exposure risks
Assess
Monitor
level of
exposure
exposure
4.1.1 Holistic
ERM embraces all types of risk in every part of an organization, recognizing that
different risks, functions, business lines and processes are interconnected and to-
gether they influence strategy setting and performance.
When organizations began using organized risk management process in the mid-
20th century, they adopted what is now called a silo approach to risk management.
This meant that different categories of risk were managed individually, often by dif-
ferent people or functions across the organization. The problem with such an ap-
proach is that gaps and overlaps between risk categories may be ignored. In terms of
gaps, important risks may go undetected and unmanaged because they do not fall
within the responsibilities of the different individuals or functions tasked with man-
aging specific categories of risk. New risks, as in the case of technology risk during
the latter part of the 20th century and climate risks in the early part of the 21st
century, may be ignored because no individual or function has been assigned respon-
sibility for their management. In terms of overlaps, correlations between risk types
may be ignored. For example, in order to help manage business risk the sales and
marketing function may decide to launch a new product. However, this could create
new operational risks, which the sales and marketing function might ignore as they
do not fall within its area of responsibility.
A classic case study of the problems of a silo approach to risk management is the Perrier
benzene scandal. In 1990, high levels of the toxic substance benzene were discovered in
bottles of Perrier. The company took steps to recall the product and within a week Perrier
withdrew 160 million bottles worldwide.
Understanding Operational Risk 13
When the media first found out about the problem, Perrier did not know how to
respond. For a brand whose whole identity was based around the idea of ‘natural purity’
the benzene incident was a major disaster. Perrier’s failure to recognize and manage the
growing reputation risk, as well as how it had managed the recall, led to an information
vacuum that provoked much more consumer anxiety than there should have been.
The Perrier brand survived the scandal. However, Groupe Perrier was taken over by
Nestlé in 1992, and the brand has never regained its pre-1990 sales volume.
One way in which the holistic characteristic of ERM can be implemented is through
the creation of an integrated risk function, often under the control of a chief risk of-
ficer (CRO). The role of the integrated risk function is to look at all risks across all
levels of the organization in order to build a comprehensive picture of where risk lies
within the organization – particularly risks that may affect the strategic objectives
and value of an organization. Risks that can affect the strategic objectives and value
of an organization may come from anywhere, not just from top-level decision mak-
ing and activities. One operational risk example is IT-related risks: although IT risks
may be viewed as the responsibility of IT professionals they can have far-reaching
implications, particularly if systems are disrupted for a prolonged period or sensitive
data is lost.
Barings Bank had a long and distinguished history as a British merchant bank, with many
important clients, including the British monarchy. However, the bank threw all of this away
in 1995, when rogue trader Nick Leeson lost £827 million in unauthorized derivatives
trading.
Research into the failure of the bank (Stein, 2000) revealed a complex array of related
causal factors, all of which fall within the realms of operational risk. For example,
weaknesses in the bank’s recruitment processes meant that Leeson’s county court
judgements were not identified. Nor was his competency to trade derivatives assessed.
Then when Leeson was employed his work was not sufficiently scrutinized, allowing him
to maintain a false set of accounts and to make large derivative trades that exposed the
bank to a high risk of insolvency.
The collapse of Barings illustrates that weaknesses in operational risk management
can result in the failure of an organization, destroying all of the franchise value it had
created over the years (e.g. brand value). Many of the errors made by the bank were
relatively minor, taken in isolation, but combined they helped to cause a major event, one
that shook the banking sector and banking regulators internationally. The BCBS used the
case, among several other high-profile banking failures, to help justify the inclusion of
operational risk in the Basel II rules. So, while the case was a disaster for Barings and its
stakeholders, it helped to create the discipline of operational risk management that is in
practice today.
16 Fundamentals of Operational Risk Management
In May 2021, the fitness technology group Peloton voluntarily recalled its treadmills after
reports of injuries and one death associated with use of the machines. The announcement
sent the value of the company’s shares to a seven-month low (Rocco and McGee, 2021).
The decision came two weeks after the US Consumer Safety Commission asked people
with young children or pets to stop using the treadmills, following an investigation into the
death of a child. Initially Peloton criticized the recommendation, but subsequently
admitted that this had been a mistake and apologized.
Understanding Operational Risk 17
Peloton faced criticisms on two sides. Criticism from politicians for delaying the recall
and social media anger from customers who did not want to send their product back for a
full refund, despite the potential faults.
Peloton was a company that grew fast during the height of the Covid-19 pandemic,
with people forced to stay home and gyms closed. This put pressure on the company’s
operations to meet the high level of demand for its products. The recall is a great example
of how strategic success can create operational risks – risks that must be considered at
the strategy-setting phase, not after. When production processes are overloaded errors
can occur. In turn, the financial and reputational consequences of these errors can
impact on the future strategic success of the organization.
Whenever organizations make strategic decisions it is essential that they consider the
operational opportunities and threats associated with these decisions. Many textbooks
state that organizations should consider the operational risks associated with the
achievement of their strategic objectives. But they forget that operational risk should be
considered when selecting these objectives in the first place. Only by integrating
discussions about operational risk into strategy-setting decisions can organizations like
Peloton avoid becoming victims of their own success. In so doing they can plan how to
meet the operational challenges associated with higher-than-expected demand, while
mitigating the threats associated with these challenges, such as increased levels of
product defects.
6. Conclusion
In this chapter we have explored the conceptual foundations of the discipline of
operational risk management, a discipline that has matured much in the last 20
years, but which has not quite come of age.
One of the barriers to the maturity of operational risk management is the definition of
operational risk. In this chapter the flaws inherent in the commonly accepted definition
have been shown, and a new one more aligned to the field of operations management was
proposed. Practitioners of operational risk management and the academics that study
their work would do well to pay more attention to this field. It provides a more coherent
basis for the discipline of operational risk management than is currently in place.
Another barrier is a lack of clear alignment between operational risk management
and ERM. Though they are not the same, the practice of operational risk manage-
ment must not be divorced from the tenets of ERM. Notably operational risk man-
agement activity must be value adding, helping to protect and create value. In a ddition,
we must distance ourselves from the notion that operational risks can only have a
downside. Exposure to operational risk can confer both opportunities and threats for
an organization. Effective operational risk management must consider both.
18 Fundamentals of Operational Risk Management
At the end of each chapter, a number of points for reflection, drawing on the themes
presented within, will be available. Practitioners and students of this practice are
encouraged to reflect on these questions based on their own experiences and
research.
References
Ashby, S, Sharma, P and McDonnell, W (2003) Lessons about risk: Analysing the causal
chain of insurance company failure, Insurance Research and Practice, 18 (2), 4–15
Aven, E and Aven, T (2015) On the need for rethinking current practice that highlights goal
achievement risk in an enterprise context, Risk Analysis, 35 (9), 1706–16
BCBS (2006) International Convergence of Capital Measurement and Capital Standards: A
revised framework comprehensive version, Bank for International Settlements, Basel
Bednarek, R, Chalkias, K and Jarzabkowski, P (2021) Managing risk as a duality of harm
and benefit: A study of organizational risk objects in the global insurance industry, British
Journal of Management, 32 (1), 235–54
Campbell, P (2016) Diesel sales fall to lowest in seven years after VW scandal, Financial
Times, 24 October, www.ft.com/content/f3e59748-978f-11e6-a80e-bcd69f323a8b =
(archived at https://perma.cc/7KMY-X4H9)
COSO (1991) Internal Control: Integrated framework, Committee of Sponsoring
Organizations of the Treadway Commission
COSO, 2017, Enterprise risk management: Integrating with strategy and performance,
Committee of Sponsoring Organizations of the Treadway Commission
Understanding Operational Risk 19
Hardy, C and Maguire, S (2016) Organizing risk: Discourse, power, and ‘riskification’,
Academy of Management Review, 41 (1), 80–108
HM Treasury (2020) Orange Book, HM Government, London
ISO 31000:2018 (2018) Risk management: guidelines, International Organization for
Standardization, https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-2:v1:en (archived at
https://perma.cc/KM2M-3WYZ)
Knight, F H (1921) Risk, Uncertainty and Profit, Houghton Mifflin, Boston, MA
Maguire, S and Hardy, C (2013) Organizing processes and the construction of risk: A
discursive approach, Academy of Management Journal, 56 (1), 231–55
Oakland, J S, Oakland, R J and Turner, M A (2020) Total Quality Management and
Operational Excellence: Text with cases, Routledge, London
Palermo, T, Power, M and Ashby, S (2017) Navigating institutional complexity: The produc-
tion of risk culture in the financial sector, Journal of Management Studies, 54 (2), 154–81
Power, M (2005) The invention of operational risk, Review of International Political
Economy, 12 (4), 577–99
Rocco, M and McGee, P (2021) Peloton recalls treadmills after injuries and a child’s death,
Financial Times, 5 May
Sharman, A and Brunsden, J (2015) Volkswagen scandal spills beyond diesel, Financial
Times, 4 November, www.ft.com/content/15cb2940-8305-11e5-8095-ed1a37d1e096
(archived at https://perma.cc/MZ8A-PGL5)
Slaughter and May (2019) An independent review following TSB’s migration onto a new IT
platform in April 2018, www.tsb.co.uk/news-releases/slaughter-and-may (archived at
https://perma.cc/TPA4-C9KP)
Stein, M (2000) The risk taker as shadow: A psychoanalytic view of the collapse of Barings
Bank, Journal of Management Studies, 37 (8), 1215–30
TSB (2018) Annual Report, TSB Banking Group, https://www.tsb.co.uk/investors/tsb-
banking-group-annual-report-and-account.pdf (archived at https://perma.cc/6RQS-
Z5YD)
20
Embedding 02
operational risk
management
L E A R N I N G O U TCOM E S
●● Describe the components of an effective operational risk framework.
●● Explain the formal and informal factors that influence the embeddedness of an
operational risk management framework.
●● Understand how real-world organizations have embedded operational risk
management frameworks. Learn from their successes and failures.
1. Introduction
In this chapter we explore how to embed an operational risk management frame-
work (ORMF) in an organization. Though the design can vary, most organizations
have in place some form of framework for the management of operational risks. This
will typically include formal tools for the identification, assessment, monitoring and
control of operational risks. Often these tools will be documented in policies and
procedure manuals and supported by a formal governance infrastructure, as well as
informal elements like the organization’s risk culture.
The presence of an ORMF is a necessary part of effective operational risk man-
agement, but it is rarely adequate in isolation. Organizations must ensure that the
ORMF is embedded in day-to-day business activities and decisions. The aim is to
implement an ORMF that brings benefits to the organization, benefits that the users
of the framework recognize as valuable, both to the organization and to themselves
in the performance of their duties.
The term ‘embedding’ is open to interpretation and can mean different things to
different people. This chapter also explores what this means from an operational risk
Embedding Operational Risk Management 21
Framework
Risk governance
Infrastructure
Appetite/ Tolerance Risk categorization Culture
s part of a recent research project for the Association of Certified Chartered Accountants
A
(Ashby, Bryce and Ring, 2019) a number of organizations were visited to investigate their
ORMFs. This investigation revealed a range of design and implementation approaches,
though the basic structure of each organization’s ORMF was essentially the same.
Two of these organizations were implementing new operational risk assessment and
risk appetite tools. Both organizations were resource constrained and hoped that the new
tools would reduce bureaucracy and help management to focus on the most significant
operational risks. This included operational risks that were significant at the enterprise-
wide and business unit/function level.
Embedding Operational Risk Management 23
A further shared risk management objective was to enhance the control of risk by
first-line management. In each case the pressures of the ‘day job’ were a problem. In the
first case study this manifested as a ‘non-accountability culture’ where managers were
reluctant to take responsibility for certain risks or controls. Resource pressures meant
that managers did not want to take responsibility for risk and control problems because
this might mean more work:
‘I have seen the behaviours in the first line that people don’t like to be open when
things aren’t working well. People don’t like the colour red; they don’t like having events.
And they don’t like raising events because: a) it acknowledges that something has gone
wrong; and b) it means they’ve got admin work to do. So, there’s a real culture of people
trying to avoid managing risk or identifying risk’ (Risk Manager).
In the second case study, first-line management were willing to take responsibility for
managing risks but did not always complete the actions required. Here the culture was
described as ‘can do’ and ‘just go and do it’. First-line management were quick to accept
potential risk or control problems, but this enthusiasm could soon wane because of the
complexity of a problem. Problems were not always addressed in a permanent manner.
The risk manager comments:
‘We do a lot of things in our organization where, just go and do it and see if it works,
and then we kind of say, well, that was really, really good but we don’t really know it’s
really, really good because we didn’t actually put the correct infrastructure before we
actually try something out. So, we get lots of good ideas and we’re in a very dynamic
environment, so people say, we’ve got a really good idea, we’re going to go and tackle a
problem here and then we’re going to have really good outcomes from that, but they don’t
really think about what they wanted. They don’t know how they’re really going to measure
and capture before they actually go out there and do it. So, it’s almost like we’re on a bit of
a back foot and we have to say, okay, before you go and try something new, you need to
capture how you’re going to do it, why you’re doing it. What’s the outcome from that?
What will it affect?’
While the cases shared similar objectives, the external and internal environmental
factors that drove the changes to their risk management activities were different. The first
case study chose to implement a significantly more formal risk assessment/risk appetite
approach, with detailed process mapping, evidence-based control testing, risk appetite
metrics and a new IT system. In contrast, the second case study was implementing a
much less formal risk register/risk appetite matrix approach that relied on management
judgement and was recorded on spreadsheets.
Key internal factors that influenced the formal/informal mix of both case studies were
the personalities and past experiences of the senior risk management team. In the first
case study a new chief risk officer (CRO) was a key driver. The CRO had come from an
organization that worked within a heavily regulated jurisdiction where rigorous and formal
24 Fundamentals of Operational Risk Management
control testing was perceived as important. The other members of the senior team also
came from organizations that had emphasized formal risk management. In contrast, the
senior risk team in the second case study placed much more weight on informal
mechanisms.
In terms of external factors, though both cases were subject to significant external
scrutiny, only the first case study talked about regulators driving a relatively formal risk
management approach: ‘we’re regulated, and we have got to do things right. So, you’ve
got to have governance in place, and it’s got to be strict’ (Risk Manager).
Both cases used a range of informal mechanisms to help reinforce the risk assessment
and appetite approaches that they had designed. However, the second case study gave
much more emphasis to these mechanisms and was more involved in the work of the first
line. Its risk function acted as a risk facilitator and helped the first line to identify, assess
and control significant risks. This included help implementing action plans and acting as a
‘critical friend’ where necessary. It also required a lot of ‘hand holding’. In contrast, the
first case study was not as close to the first line and gave more emphasis to a formal
second-line risk oversight role.
3.3 Categorization
Categorization helps to determine the scope of operational risk management and to
demarcate exposures by cause, event and effect. The categorization of operational
risks provides a common frame of reference to help organize operational risk assess-
ments, monitor reports and control responses. Please refer to Chapter 3 for further
information on how to categorize operational risks.
3.4 Culture
An organization’s risk culture is a sub-component of its overall culture, which in
turn is influenced by the macro-cultures that an organization operates within. In this
context the term ‘culture’ refers to the social processes and structures that affect how
people perceive the world around them and make decisions. A culture is reflected in
the customs, beliefs, common experiences and behaviours of the people within it.
Please refer to Chapter 4 for a discussion of how to assess and influence the risk
culture of an organization.
26 Fundamentals of Operational Risk Management
Hence an embedded ORMF from an organizational perspective should not only add
tangible value, but also be perceived as adding value by its employees. Typically, both
are necessary – an ORMF that adds tangible value, but which employees do not
believe in, is not truly embedded. Equally, employees are less likely to believe in the
value of an ORMF if it does not yield some form of measurable benefit.
28 Fundamentals of Operational Risk Management
Halifax Bank of Scotland (HBOS) was a successful retail bank prior to the global financial
crisis of 2007–08. It was also recognized as a leader in operational risk management with
a best-in-class ORMF. However, an enquiry into the failure of the bank, in October 2008,
revealed a range of weaknesses in the management, governance and culture of HBOS
(FCA and PRA, 2015). A key problem was that staff, management and the bank’s board did
not value risk management.
The FCA and PRA report into the failure of HBOS concludes that the bank pursued a
high growth strategy without properly considering the operational, credit and liquidity
risks involved. Effective risk management is essential when implementing a high-risk
strategy, but in HBOS a number of serious weaknesses were identified, many of which
related to the management of its operational risks. This included the lack of a clearly
defined group risk appetite statement, ineffective internal controls and a risk culture that
prioritized business growth. Crucially risk management, especially operational risk
management, was perceived as a constraint on business rather than an enabler. Plus,
discussions about risk and risk management were not given sufficient time or priority by
the board, and internal controls were overridden when it was felt necessary (e.g. to
achieve aggressive growth targets).
The failure of HBOS highlights the importance of embedding effective risk
management, especially operational risk management. Though HBOS appeared to have
an effective risk management framework, including a best-in-class ORMF, it was not
embedded effectively. The main problem was the failure on the part of management and
the board to understand the value of risk management as a business enabler, especially
when pursuing a risky, high-growth strategy.
Table 2.1 Cultural elements that can help or hinder an effectively embedded ORMF
Operational risk is not perceived as a risk Operational risks are perceived as risks that
that is an inherent part of business are an essential part of achieving an
activities organization’s objectives
Operational risk is not considered in routine Employees are operational risk aware and
activities and decisions consider its management as part of their
activities and decisions
The operational risk function is segregated The operational risk function plays an active
or disengaged from the wider organization part in the organization’s activities and
decisions
●● the formal structure of the risk governance arrangements, in terms of the efficiency
of its communication network and the ability of senior management/directors to
exercise their authority; and
●● relations between the various groups that work within the arrangements, especially
business management, the operational risk function, and internal audit.
It is important that the formal governance structure for operational risk is not too
complicated. A complicated structure can hinder effective reporting. Structures with
multiple reporting lines and committees can be slow to pick up potential embedding
issues, either because reports take too long to reach the relevant decision makers or
because of gaps and overlaps in responsibilities. It is recommended that the govern-
ance structure is kept as simple as possible. This means keeping the number of risk
committees to a minimum (e.g. avoiding separate committees for different risk types
or organizational divisions) as well as allocating clear and unambiguous responsibili-
ties for operational risk management.
In terms of personal relations, the key factor is how the operational risk function
balances oversight of the ORMF with providing operational risk insight to both
business managers and internal audit. Within the three lines of defence approach to
operational risk governance (see Chapter 6) it is common to separate the implemen-
tation of the ORMF with its design/oversight and assurance activities. This means
that front-line managers are tasked with its implementation, the operational risk
function for ensuring that managers implement it correctly, while internal audit pro-
vide assurance that the ORMF is operating effectively and compliantly with any
relevant laws or regulations.
Problems can arise with embedding when these three roles are kept completely
separate. For example, an operational risk function may decide that in order to
maintain independent oversight it should not support implementation of the ORMF
by business managers and only engage where challenge is required. Equally, internal
audit may not work with the risk function at the design stage of the ORMF to main-
tain ‘independence’. The net effect of such strict segregation is mistrust and some-
times hostility. Hence, while business managers, risk functions and internal auditors
may have different accountabilities, this does not mean that they should not work
together to ensure the ORMF is implemented effectively.
The importance of cooperation between the three lines is reflected in the Institute
of Internal Auditors (IIA) 2020 revision of the three lines of defence approach, which
they term the ‘Three Lines Model’ (IIA, 2020). The IIA emphasizes the importance
of close cooperation between the first and second lines (business management and
Embedding Operational Risk Management 31
the risk function). This is to ensure that good relationships are maintained and that
the skills and experience within each line are combined effectively. The IIA’s ap-
proach still recommends that the third-line audit function must remain independent,
but that does not mean this function need be divorced from the wider organization.
Close working and cooperation with the first and second lines remains essential.
Various strategies can be used to help build trust and prevent hostility between
business management, the operational risk function and auditors. Below are some
example strategies:
It cannot be emphasized enough that the more the operational risk function works
to build good personal relations across the organization the more embedded will be
the ORMF. People are much more likely to believe in the value of operational risk
management if they know and respect those responsible for its design and oversight.
of how long it takes for the most recent data to reach its audience. The more historic
the data and the longer the reports take to compile and submit, the less appropriate
and effective may be the management responses by way of decisions and actions.
Operational risk managers should spend time ensuring that the reports produced
using the ORMF are as timely, accurate and complete as possible. One way to achieve
this is by consulting with the intended recipients to understand their business needs.
Before a report is designed they should be asked for their requirements, and once a
draft report is ready they should be able to suggest changes. Reports should also be
regularly reviewed and updated to ensure that management continue to be satisfied
with their quality.
Another solution is to use an IT system for reporting. A good-quality system
should be able to reduce the time it takes to produce a report and prevent data pro-
cessing errors. Plus, as indicated previously, it may allow managers to generate their
own customized reports.
●● Are concise. Managers have many responsibilities and are time limited. This
means that they will engage more in shorter, focused reports. Hence, operational
risk reports are more likely to help embed an ORMF when they are one to two
pages long. Instead of length, the focus should be on providing a mechanism for
discussion and debate. Reports should be viewed as the start of an operational
risk management conversation (e.g. what are the key current risk and control
priorities), not the end point.
●● Focus on the real issues. Excessive amounts of data can prevent managers from
seeing the ‘big picture’ in terms of their overall operational risk profile and how
this is impacting on their objectives. One solution is to adopt the principle of
‘exception reporting’. This means that reports focus on the most current or
significant operational risk exposures or control issues rather than trying to cover
every single risk or issue.
●● Are easy to absorb. Sometimes diagrammatic representations of data can be
helpful, but complex and sophisticated graphics may not be the answer. Clarity
and simplicity are key to getting beyond awareness to understanding.
34 Fundamentals of Operational Risk Management
●● providing locally relevant advice and training on the operation of the ORMF;.
●● helping local managers to make operational risk management decisions (e.g.
whether or not to implement a new control or remove an old one);
●● providing a consistent point of contact for the central risk function;
●● explaining the benefits of the ORMF to management in their area.
Operational risk managers can build better relationships with risk owners and
champions when they invest time to support them in their role. This might include
regular one-to-one meetings, specialist training and the creation of a risk forum,
where risk owners and/or champions are invited to share ideas and concerns.
One of the case studies examined by Ashby, Bryce and Ring (2019) had a network of
first-line operational risk specialists working as local risk champions. Each operational
division and head office function had one or more operational risk specialists. These
specialists supported the completion of RCSAs and provided local subject-matter
expertise in areas including human resource (HR) risk management, cyber risk, data
protection and finance. Building a strong working relationship between the first-line
specialists with the second-line operational risk function created synergies for the
Embedding Operational Risk Management 35
organization. The second line brought the conceptual operational risk management
expertise to complement the first line’s local risk knowledge:
I think sometimes, it’s a genuine discovery on both sides, so the (operational) risk
team don’t necessarily know what they’re trying to ask, but we’ll apply our expertise
and come up with what we think the right answer is. (Risk Champion)
6.5.6 Communication
Messages about the management of operational risk should ideally be integrated
within routine business communications, rather than issued as separate announce-
ments from the risk function.
Description/
Approach Source What is Assessed
(continued )
Embedding Operational Risk Management 39
Table 2.2 (Continued)
Description/
Approach Source What is Assessed
1 Establish a target state against which to measure current status. This will illustrate
‘what good looks like’ and represent the position to which the organization
aspires.
2 Measure current status as the baseline starting point. This can be achieved through
structured interviews with key stakeholders or a desk-based review of evidence,
or both. The former provides informed but subjective opinion, whereas the latter
can be more objective and for this reason it may be preferable to deploy both.
Depending on which approach is adopted, ratings can be on a scale representing
the degree to which framework components are being used effectively and this
can be demonstrated, or the level of maturity. In either case the ratings can be
converted to a percentage for aggregation and reporting.
3 Identify gaps. Any difference between the target and current positions represents
a gap for attention. Each gap will need a recommended action with details of who
should own/lead the action and the expected delivery date.
40 Fundamentals of Operational Risk Management
In 2007, Margaret Woods, a respected risk management academic, conducted a study into
the balanced scorecard approach that Tesco used to assess the effectiveness and
embeddedness of its ERM framework (Woods, 2007). Many of the elements assessed were
also components of Tesco’s ORMF (e.g. effectiveness of internal controls, alignment of
operational activities with the corporate strategy, potential for process errors, etc).
Woods concluded that the use of a balanced scorecard approach can significantly
increase the embeddedness of risk management, including operational risk management.
The benefit of such an approach is that risk management objectives are aligned with other
performance objectives, including customer satisfaction, the effectiveness and efficiency of
operational processes and the financial performance of an organization.
Tesco achieved the integration of risk management and other organization objectives
through the use of a multi-spoked ‘wheel’ that highlighted a range of performance metrics
grouped into five categories:
Some of these metrics were qualitative. For example, the community metrics of ‘being
responsible, fair and honest’ and ‘being a good neighbour’. Others were quantitative such
as the customer metric of queuing length and the financial metric of maximizing profits.
Woods found that staff at all levels of the organization were aware of the wheel, and
the performance of their area in relation to the various metrics. They were also able to
Embedding Operational Risk Management 41
articulate the board’s expectations in relation to the management of risk and the role that
they played in meeting these expectations through the achievement of the performance
targets assigned to each metric.
●● ‘Pulling versus pushing’ indicators that assess the relationship between front-line
management and the operational risk function. For example:
●● the frequency with which front-line managers contact the risk function for
advice and guidance, rather than the risk function initiating the interaction (a
pulling indicator);
●● the number of risk assessments that have to be chased up because they are not
up to date (a pushing indicator);
●● non-compliance with the operational risk policy identified by the risk function
(pushing) versus non-compliance reported by front-line management (pulling); and
●● the number and duration of overdue operational risk management actions
(pushing).
●● Whether there is more focus on preventative controls (as opposed to detective/
recovery) and leading (versus lagging) key risk indicators – demonstrating a shift
from reactive to proactive management of operational risks (see Chapter 9).
●● Whether discussions at risk governance committees (e.g. the audit and risk committee)
are properly informed by the operational risk reports presented to them.
●● Whether the operational risk profile is kept within agreed risk appetite or tolerance
thresholds (Chapter 5).
●● Evidence that front-line management are considering operational risk when
making operational decisions (e.g. process changes, IT systems implementation or
new product development).
●● The perceived value of the ORMF, using opinion/satisfaction surveys.
●● Comments from regulators, rating agencies or other external institutions regarding
the embeddedness of the ORMF.
42 Fundamentals of Operational Risk Management
8. Conclusion
In this chapter we have discussed the components of an ORMF and the factors that
can influence the embeddedness of such a framework. An organization’s ORMF will
not be effective if it is not embedded. Even a technically perfect ORMF will fail if it
is not valued by its users, or is viewed as overly complex and bureaucratic.
Operational risk managers must ensure that they combine high levels of technical
expertise with people management, influencing and negotiation skills. Significant effort
must be devoted to building relations and promoting the benefits of an effective ORMF.
That said, even the most skilled and experienced operational risk managers cannot suc-
ceed on their own. An organization’s senior management and governing body must
demonstrate that they are committed to the effective management of operational risk.
1 Does your organization’s ORMF contain all of the infrastructure elements and tools
presented in Figure 2.1? If not, is there an explanation for the absence of an element or
tool?
2 Does your operational risk management function combine technical expertise in
areas like RCSA and soft (people) skills? Is the function valued by the wider
organization?
3 Does the operational risk function work effectively with front-line management
and the audit function? What could be done to build trust and further improve the
working relationship?
4 Do you have risk champions in front-line functions? If yes, what are the benefits? If
no, how might the implementation of risk champions improve the embeddedness of
the ORMF?
5 Is the output from the ORMF (e.g. operational risk reports) used to support
organizational decision making?
6 Have you assessed the embeddedness of your ORMF? If yes, what technique did
you use? Was it effective? If no, when might you schedule such a review and
what assessment technique would be best for your organization?
Embedding Operational Risk Management 43
References
Ashby, S, Bryce, C and Ring, P (2019) Risk and performance: embedding risk management,
ACCA Professional Insight Report, www.accaglobal.com/content/dam/ACCA_Global/
professional-insights/embedding-risk/pi-embedding-risk-management.pdf (archived at
https://perma.cc/Y2QL-3VEZ)
FCA and PRA (2015) The failure of HBOS plc (HBOS): A report by the Financial Conduct
Authority and the Prudential Regulatory Authority, Bank of England, https://www.
bankofengland.co.uk/-/media/boe/files/prudential-regulation/publication/hbos-complete-
report (archived at https://perma.cc/JFN2-7YD2)
IIA (2020) Three Lines Model: An update of the three lines of defence, The Institute of
Internal Auditors, https://na.theiia.org/about-ia/PublicDocuments/Three-Lines-Model-
Updated.pdf (archived at https://perma.cc/4UTL-735Y)
Woods, M (2007) Linking risk management to strategic controls: A case study of Tesco plc,
International Journal of Risk Assessment and Management, 7 (8), 1074–88
44
Categorizing 03
operational risks
L E A R N I N G O U TCOM E S
●● Explain why operational risks should be categorized.
●● Know how to design and implement a categorization approach for operational
risks that is customized to the needs of an organization.
●● Compare some common approaches to categorizing operational risks.
1. Introduction
Operational risks are diverse. The effectiveness and efficiency of an organization’s
operations can be impacted by a wide range of possibilities. Some are human in ori-
gin (e.g. criminal activity, mistakes, design flaws, etc), others are natural events
(weather, pandemics, etc). Many are a combination of the two.
Given the diversity of operational risk events, having an agreed approach to
categorization is essential. Such an approach will help everyone in an organiza-
tion to understand the scope of operational risk. In addition, it provides struc-
ture to activities such as risk assessments and reporting. It would be difficult to
coordinate and consolidate these activities if there was no operational risk cate-
gorization approach or if each department or function within an organization
used its own approach.
This chapter explores how to design and implement an effective approach to the
categorization of operational risks. As ever there is no one ‘best’ approach to categori-
zation. How an organization categorizes its operational risks is a personal choice. But
there is sound practice that should be followed when selecting and using a p articular
approach to categorization.
Categorizing Operational Risks 45
Credit The risk that a counterparty may default of their obligations (a given
financial claim is not paid in full) or have their credit rating downgraded.
Liquidity The risk that an organization is unable to meet its financial liabilities as
they fall due.
Market The risks that arise due to fluctuations in the value of, or income from, the
assets of an organization.
Operational The effect of unpredictable outcomes on the efficiency and effectiveness
of operations.
Reputation Threats to the public perception of an organization and goodwill exhibited
by its stakeholders.
Strategic Risks that are created or affected by the chosen strategy of an
organization.
Table 3.2 Risk types used by non-financial organizations (HM Treasury, 2020)
Table 3.2 (Continued)
Event Type
Category
(Level 1) Definition Categories (Level 2) Activity Examples (Level 3)
Internal Fraud Losses due to acts of a type intended to defraud, Unauthorized Activity ●● Transactions not reported (intentional)
misappropriate property or circumvent regulations, the law ●● Transaction type unauthorized (with
or company policy, excluding diversity/ discrimination events, monetary loss)
which involves at least one internal party ●● Mismarking of position (intentional)
Theft and Fraud ●● Fraud / credit fraud / worthless deposits
●● Theft / extortion / embezzlement / robbery
●● Misappropriation of assets
●● Malicious destruction of assets
●● Forgery
●● Check kiting
●● Smuggling Account takeover /
impersonation etc
●● Tax non-compliance / evasion (wilful)
●● Bribes / kickbacks
●● Insider trading (not on firm’s account)
External Fraud Losses due to acts of a type intended to defraud, Theft and Fraud ●● Theft / robbery
misappropriate property or circumvent the law, ●● Forgery
by a third party ●● Check kiting
Systems Security ●● Hacking damage
●● Theft of information (with monetary loss)
Employment Losses arising from acts inconsistent with employment, Employee Relations ●● Compensation, benefit, termination
practices and health or safety laws or agreements, from payment of issues
workplace personal injury claims, or from diversity / discrimination events ●● Organized labour activity
safety
Safe Environment ●● General liability (slip and fall etc)
●● Employee health and safety rules events
●● Workers compensation
Diversity and Discrimination ●● All discrimination types
Clients, Losses arising from an unintentional or negligent failure to Suitability, disclosure and ●● Fiduciary breaches / guideline violations
products and meet a professional obligation to specific clients (including fiduciary ●● Suitability / disclosure issues (know-your-
business fiduciary and suitability requirements), or from the nature customer etc)
practices or design of a product ●● Retail customer disclosure violations
●● Breach of privacy
●● Aggressive sales
●● Account churning
●● Misuse of confidential information
●● Lender liability
Improper business or ●● Antitrust Improper trade / market practices
market practices ●● Market manipulation
●● Insider trading (on firm’s account)
●● Unlicensed activity
●● Money laundering
(continued )
51
52
Table 3.3 (Continued)
Event Type
Category
(Level 1) Definition Categories (Level 2) Activity Examples (Level 3)
53
54 Fundamentals of Operational Risk Management
Like many local authorities in the UK, Truro City Council publishes its risk management
strategy online (Truro City Council, 2020). This strategy includes the council’s approach to
risk categorization.
For operational risk Truro City Council lists seven risk types, summarized in Table 3.4.
Table 3.4 Operational risk categorization of Truro City Council
Professional Risks associated with specific professions (accounting, social care, etc)
Financial Risks associated with financial planning and control; plus, the adequacy
of insurance cover
Physical Health and safety incidents affecting employees, residents and third
parties; plus, damage caused by fires, floods, wind, etc
Contractual Failure of contractors to deliver goods and services at the agreed cost
or specification
Environmental All forms of environmental pollution (chemical, noise, etc); plus, energy
efficiency of the council’s operations
Some of the operational risk categories chosen by Truro City Council are the same as
those in the Orange Book (Table 3.2). Others are different. These differences can be
explained by the nature of the work performed by the council. As stated in the strategy,
the seven risk types were selected because these are the ones that managers and staff
encounter in their day-to-day work.
of the categorization (e.g. risk owners, governing body, internal audit, compliance,
etc) to ensure that they understand the terms and descriptions used. They could also
be invited to suggest omitted categories that may be relevant for the organization, but
which are not captured by an external categorization. However, where this is done,
care should be taken to check whether any additional categories are simply a reword-
ing of an existing category, as well as whether they can be mapped back to one of the
categories within the external approach used as a basis for the categorization.
People Resources
Processes
Human
Systems
External Reputation
events
The Basel II definition of operational risk (see Chapter 1) demarcates operational risk
on the basis of its causes: people, processes and systems, and external events. These
causes may result in a wide range of operational risk events (fires, floods, theft, errors
and omissions, etc). In turn these events have multiple effects (financial loss, physical
injuries, etc). A categorization may be based on any one of these three facets of opera-
tional risk. However, it is not recommended to build a categorization based on all
three – this could result in user confusion and result in many categorization gaps or
overlaps.
Categorizations based on operational risk events are most common. The Basel cate-
gorization in Table 3.3 is event based, so financial institutions are often required to re-
port their operational losses using this categorization, and therefore decide to use it
elsewhere to ensure consistency. In addition, operational risk data is usually collected on
a per-event basis (see Chapter 8). This is because reported operational risk events are the
most visible manifestation of the presence of operational risk in an organization.
One of the advantages of an event-based approach is that it does not preclude the
further sub-division of events into their constituent causes and effects. This allows an
organization to better picture the relationships between causes, events and effects,
highlighting potential correlations or concentrations of risk.
However, a downside of an event-based approach is that the associated categori-
zation approach can become very detailed, in an attempt to reflect the totality of
events that may occur. This requires careful consideration of the issue of granularity
(see section 5.3, below).
Causal-based categorizations have an intuitive appeal because they represent the
starting point for operational risk exposures and so may help make operational risk
management more leading and proactive. However, effective classifications are hard to
achieve in practice. Though the broad categories of causes are small, specific causes are
Categorizing Operational Risks 57
numerous, often more numerous than potential events. The absence of established exter-
nal approaches for categorizing operational risks according to their causes also makes
them more challenging. The same arguments apply to effect-based categorizations (nu-
merous sub-effects, especially non-financial effects, and no external categorization).
In most cases operational risks are best categorized on an event basis. However,
where possible high-level sub-categorizations for their causes and effects should be
used to complement an event-based categorization. This will allow an organization
to better link causes, events and effects, and to identify and mitigate potentially dan-
gerous patterns in these causes and effects.
The Covid-19 pandemic is an event that illustrates how complex the causes and effects of
an operational event may be. The underlying cause was external, the natural emergence
of a new zoonotic virus (transmitted from animals to humans), but the spread of the virus
is linked to a range of system, process and human failures (The Independent Panel, 2021).
Pandemic preparedness was inconsistent and underfunded in many countries and the
global pandemic alert system was too slow.
The net result was a fast-spreading global pandemic and government responses that all but
stopped global travel and forced citizens to remain in their homes. For many organizations,
these responses caused significant disruption to their operations, as they struggled to cope
with things such as site closures, supply chain disruption and home working.
Hence the emergence of Covid-19 and the global failure to control its spread caused a
large number of organizations to experience a major business disruption event. In
addition, the preparedness of these organizations and their ability to adapt to the fast-
changing implications of the pandemic also caused differences in the level and type of
disruption that they experienced.
In terms of the effects of the pandemic on organizations these have been far-reaching
also. There have been human, resource and reputation effects. Reputations have
worsened or improved depending on the ability of organizations to maintain their
operations (see Chapter 11 for more on operational resilience). Plus, from a financial
perspective there have been winners and losers. Online and essential retailers such as
supermarkets have profited, while the travel, tourism and hospitality sectors have
suffered large losses. Then there are the human effects, both the loss of life from the virus
and the mental health consequences of the various lockdowns and quarantine
requirements – effects that impact on organizations through the loss of key staff, general
staff shortages and reduced morale/productivity.
58 Fundamentals of Operational Risk Management
5.3 Granularity
Determining the level of detail in any operational risk categorization is an essential
decision. Less granularity will make the categorization easier to manage and aggregate
data for assessment and reporting purposes, but more detail will assist the focus of
management and support mitigation. Some organizations adopt a compromise solu-
tion, which involves adding more granularity for critical categories but accepting less
detail for categories of lower significance (in terms of volume and/or value). This
avoids the trap of too few risks spread across too many categories, resulting in an in-
ability to aggregate.
Various layers of granularity are possible. Table 3.5 summarizes the most common.
The Basel operational risk categorization in Table 3.3 illustrates the first three
levels of granularity.
Not all organizations may elect to have granularity levels 2 or 3 in Table 3.5. But
most will have level 4. This is to allow specific departments, functions, etc to custom-
ize the categorization to meet their specific needs, while ensuring that all risks can be
mapped back to a level 1 category.
The advantage of levels 2 and 3 is that they add extra detail. This detail can help
users to ensure that risks are categorized in a consistent manner. In addition, it can
reduce the potential for risks being overlooked, because users have not considered a
specific aspect of a risk event (e.g. internal as well as external hacking attacks).
Categorizing Operational Risks 59
Level Explanation
5.4 Language
Getting the language right is essential to ensure consistency of use. This means pro-
viding clear and unambiguous definitions and descriptions for each category of risk.
Non-technical language (so-called plain English) is recommended, as this will reduce
the potential for any misunderstanding.
6. Implementation
This section outlines the factors that should be considered when implementing an
operational risk categorization, along with some common challenges and how these
challenges may be overcome.
Role Responsibilities
Governing body and senior The governing body supported by senior management
managers have responsibility for ensuring that a sound system of
operational risk management is in place. This includes
ensuring that an appropriate risk categorization is in
place and working as intended.
Risk owners and other staff Risk owners are business managers with responsibility
with operational risk for the management of some or all operational risks in
management their area. Risk owners should ensure that they and
responsibilities their staff understand the operational risk categorization
and that it is used correctly to support risk identification,
reporting, etc. All other staff with operational risk
management responsibilities must ensure that they
understand the categorization and use it correctly.
Operational risk function The operational risk function is responsible for the
design of the operational risk management
categorization and for ensuring that it is used
consistently. To support the implementation of the
categorization the operational risk function should
ensure that it is clearly documented and that an
appropriate description of each category is provided.
Mechanisms for dealing with any boundary issues (see
section 6.4) should also be explained. This
documentation could be supported by training and
awareness activities, to help ensure that all relevant
staff understand the categorization and can use it
effectively.
Internal audit Internal audit is responsible for providing assurance to
the governing body and supporting senior management
that an operational risk categorization approach is fit for
purpose and working as intended. Internal audit may
choose to use the operational risk classification to
support audit planning and to structure management
actions in audit reports, linking each action to one or
more category of operational risk. Where possible this
approach is recommended, as it can help to embed the
categorization approach and ensure a consistent
approach to operational risk.
Categorizing Operational Risks 61
6.3 Reporting
The structure of operational risk reports should reflect, where possible, the agreed
operational risk categorization. This should ensure the accurate aggregation of op-
erational risk data and help embed the categorization across the organization.
An operational risk categorization should also be used to adjust the level of detail
provided in reports. As a general rule the governing body will require reports that
summarize any significant exposures or loss events in relation to an organization’s
level-1 (see Table 3.5) operational risk categories; senior management significant
exposures/loss events in relation to the level-2 categories and for departmental/func-
tional managers’ exposure to their local level 2 or 3, if used.
7. Conclusion
Given the variety of operational risks it is important that they are organized in a
consistent way. Well designed and implemented operational risk categorizations help
Categorizing Operational Risks 63
to ensure consistency, prevent risks from being overlooked and reduce the potential
for wasteful overlaps in management effort.
Though there is no one best way to categorize operational risks, designing and
implementing an approach suited to the nature, scale and complexity of an organiza-
tion’s activities is essential. A sound operational risk categorization is the skeleton
that supports the entire operational risk management framework. A weak approach
to categorization will mean a weak framework, however effective the other elements
are believed to be.
References
Note: Some of the sources included in this chapter have been listed previously. Only new
sources are listed below.
The Independent Panel (2021) Covid-19: Make it the last pandemic, The Independent Panel
for Pandemic Preparedness & Response, https://theindependentpanel.org/mainreport/
(archived at https://perma.cc/F9HH-F9GZ)
Truro City Council (2020) Risk management strategy revision 12, March, https://www.
truro.gov.uk/_UserFiles/Files/Risk%20Management%20Strategy%20March%202020.
pdf (archived at https://perma.cc/3WQZ-B8Y9)
64
Risk culture 04
L E A R N I N G O U TCOM E S
●● Explain what risk culture is and why it matters from an operational risk
perspective.
●● Compare different approaches to assessing and monitoring risk culture.
●● Know how to influence an organization’s risk culture.
1. Introduction
Organizations contain people who work together to achieve common objectives.
Wherever there are people there is culture, a social mechanism that helps them to
collaborate and coordinate their activities. An organization’s culture, and by exten-
sion its risk culture, are both a source of strength and weakness when it comes to the
management of operational risk. An appropriate risk culture will ensure that staff
accept the importance of effective operational risk management and behave in a
manner consistent with the organization’s operational risk policies, procedures and
appetite. An inappropriate risk culture can both cause adverse operational risk
events and intensify their impact.
This chapter explains how risk culture may be identified, assessed and influenced
to help reduce the probability and impact of adverse operational risk events. It must
be emphasized that there is no one optimal risk culture, nor are there universal char-
acteristics for a ‘strong’ or ‘weak’ risk culture. However, it is important that organi-
zations work to understand the operational risk management implications of their
risk cultures and influence these cultures where appropriate.
CASE STUDY 4.1 The Barclays London Interbank Offer Rate (LIBOR) scandal
Corporate lawyer and investment banking expert Antony Salz was asked to complete
an independent review into LIBOR rigging by Barclays’ investment banking division
Risk Culture 65
(then known as Barclays Capital) between 2005 and 2009 (Salz, 2013). The review
concluded that the underlying cause of the scandal was the inappropriate risk culture
of Barclays Capital. In contrast, the review concluded that the risk cultures of
Barclays’ retail bank and credit card businesses were entirely appropriate for the
activities they performed.
At the core of the inappropriate risk culture for Barclays Capital was a drive to win.
The division looked to recruit people who were ‘winners’ and rewarded winning. Pay and
bonuses were linked to short-term performance measures and money making was
prioritized over serving the needs of clients and customers. In addition, the report noted
that senior management in Barclays Capital did not want to hear bad news and
encouraged staff to solve problems on their own.
As a result of this inappropriate risk culture, certain staff members within Barclays
Capital took it upon themselves to report false rates on the interbank loans they had
negotiated with other banks, a cheat-to-win strategy. Lower rates were reported in order
to make Barclays appear stronger financially than it was, and so avoid regulatory
intervention. For larger clearing banks like Barclays, interbank rates are individually
negotiated ‘over the counter’ rates and the rate of interest paid is in part linked to the
financial strength of a bank. The lower this financial strength, the higher the rate of
interest, to reflect increased default risk. In turn, this false reporting skewed the headline
LIBOR rate, Barclays being a large bank and a major player in the interbank lending
market.
As the Salz report noted, the LIBOR scandal damaged the reputation of Barclays and
the UK banking sector more generally. Barclays also faced fines of £290 million from UK
and US regulators.
The Barclays LIBOR scandal highlights the consequences of an inappropriate risk
culture. It also shows that it is wrong to blame such scandals solely on the actions of the
immediate perpetrators. People work within risk cultures and their actions are heavily
influenced by them. Ultimately it was the senior managers and directors in position at that
time who failed to ensure that an appropriate risk culture was in place.
particularly important that senior management and the board understand what is in
and out of scope, both to help manage their expectations and to minimize gaps and
overlaps with other areas of work.
The Institute of Risk Management (IRM, 2021) defines risk culture as follows:
A term describing the values, beliefs, knowledge, attitudes and understanding about risk
shared by a group of people with a common purpose. This applies to all organizations –
including private companies, public bodies, governments and not-for-profits.
This is as good a definition as any. One key strength is its inclusiveness, reflected in
the range of terms used to describe risk culture (values, beliefs, etc). Another is the
Values The values of the organization and how they may relate to and
influence the management of operational risk. Many organizations
state several values (e.g. putting the customer first or emphasizing
sustainability over short-term profit) that they believe complement their
mission and objective. These values may influence how staff perceive
risk and risk management. Groups of people in different parts of the
organization may also develop their own values, which may either
reinforce or contradict group management activities, including
operational risk management.
Beliefs What people believe about the importance of operational risk and
the benefits and costs of operational risk management. Some
people may share positive, others negative, beliefs.
Knowledge What people know about operational risk and how to manage it, in
effect their competence for operational risk management. Some
people may have a good knowledge of the range of operational risk
events their area is exposed to and how to manage them, others may
be less knowledgeable.
Attitudes Most individuals have an attitude or preference towards specific
types of risk, like operational risk. Some may be very risk averse,
others risk preferring. In an organizational context, research shows
that risk attitudes tend to align, at least within specific social groups.
Attitudes can differ for certain types of risk, for example, people may
be more averse to risks where they perceive a large potential
downside (threats). In contrast they may be less averse to risks that
are associated with opportunities, such as the potential for
generating a profit.
Understanding Knowledge is gained through education and training (learning),
understanding comes with experience. Some people may have a better
understanding of operational risk management because they are actively
and regularly involved in the identification, assessment and control of
operational risks.
Risk Culture 67
emphasis on the human–social aspect of risk culture. Table 4.1 provides further
detail, from an operational risk context, on the key terms used in this definition.
Building on Table 4.1, three elements require further emphasis:
●● Risk culture is concerned with risk taking as well as risk control. All organizations
must take risks to achieve their objectives, and this may include having to accept
a degree of operational risk exposure. An organization’s risk culture will influence
whether people perceive an operational risk to be beneficial (e.g. associated with
the pursuit of a potential opportunity) or a threat. It may also influence whether
they perceive operational risk management activities to be a benefit or cost.
●● Each of the characteristics within Table 4.1 exist on three levels (Figure 4.1):
Physical
artefacts
Spoken
word
Unspoken
underlying
assumptions
●● The top level relates to the structures (e.g. reporting and governance) and
documentation that exists on operational risk management. For example,
policies, procedures, terms of reference, minutes and reports. This level is the
most visible and easiest to analyse. However, it represents only the tip of the
risk-culture iceberg.
●● The middle level relates to what is said about operational risk and its management
by people across the organization. One key element of this is ‘tone from the top’,
but it includes the ‘tune in the middle’, meaning what staff below top management
are saying and whether they are receptive to the top management ‘tone’.
68 Fundamentals of Operational Risk Management
●● The bottom level relates to assumptions and perceptions that are taken for
granted, so much so that they are rarely verbalized. For example, people may
have deep-seated and mutually reinforced views on specific operational risks or
operational risk management activities. For example, they may refuse to accept
the importance of certain risks (e.g. cyber or pandemic risks) or they may
innately assume that operational risk management is a bureaucratic exercise
that has limited business benefit.
●● While organizations may wish to implement a consistent, enterprise-wide risk
culture, they must recognize that sub-cultures often exist (as in the case of Barclays
Capital and the LIBOR scandal, see Case Study 4.1). Sub-cultures emerge because
people are most influenced, culturally, by those in proximity. Even in smaller
organizations sub-cultures can exist, for example people in a specific department or
geographic location. Sub-cultures are not necessarily a problem, especially where
people have different roles, accountabilities and objectives. However, they can
become dangerous where a specific group develops values, beliefs or attitudes that
are contrary to those of the wider organization and the needs of its stakeholders. The
assessment of risk cultures, including sub-cultures, is explained in the next section.
Power, Ashby and Palermo (2013) investigated the activities taken to assess and influence
the risk cultures of a wide range of financial organizations. As part of this research, they
developed a risk-culture questionnaire (see Appendix A) and offered this to financial
organizations so that they could assess their risk culture. They then observed how these
organizations completed the assessments and interpreted the results.
Risk Culture 69
Reflecting the complexity of risk culture there are various assessment approaches
that can be adopted, each with their own strengths and weaknesses. Organizations
should choose an assessment approach with care, to ensure that it is appropriate for
their unique situation. They may also choose to combine two or more approaches to
build a more complete picture of their risk culture.
Whatever the approach, or approaches, chosen organizations should remember
that risk-culture assessments are never 100 per cent accurate. All they can do is pro-
vide a rough snapshot of an organization’s risk culture at a particular point in time.
This is analogous to the current ‘mood’ of the organization in relation to operational
risk and its management, sometimes referred to as the risk climate (Sheedy, Griffin
and Barbour 2017). Referring back to Figure 3.1 such assessments should provide a
good picture of the current physical artefacts that can be observed at the surface of
a risk culture, along with a reasonable, though less clear, indication of the spoken
word. However, the unspoken, underlying assumptions of a risk culture are often too
deeply embedded to be assessed and interpreted accurately.
3.1 Questionnaires
Questionnaires are a research instrument that use a specific set of questions to gather
information from respondents. In the context of risk culture, questionnaires are used
to gather information on the values, beliefs, attitudes and understanding of respond-
ents in relation to risk and its management – information that is then aggregated and
possibly subject to statistical analysis to arrive at an overall perspective on an or-
ganization’s risk culture and potential risk sub-cultures. An example questionnaire is
provided in Appendix A. This is the questionnaire used by Power, Ashby and Palermo
(2013), as part of their risk-culture research project.
Care should be taken when designing a questionnaire. All the usual principles of
good questionnaire design apply, for example, avoid leading questions, do not make
the questionnaire too long, and ensure you collect a representative sample. In a ddition,
70 Fundamentals of Operational Risk Management
think carefully about the specific aspects of an organization’s risk culture that you
wish to investigate. Most risk cultures are too multifaceted and complex to assess in
one simple questionnaire. However, specific aspects of the risk culture may be tar-
geted. For example:
●● whether people share the aims and objectives for operational risk management
outlined in the operational risk management policy;
●● attitudes towards the operational risk function or specific operational risk tools
and procedures (e.g. risk and control self-assessments);
●● the presence of sub-cultures, by looking for differences in response between
different functions, locations or levels of seniority;
●● whether people believe that the organization is taking too much or too little
operational risk; and
●● whether people have adequate knowledge and understanding of operational risk
(so-called risk awareness).
The advantages of questionnaires are that they can reach a significant number of
people across the organization. Plus, the basic results are easy to compile, especially
if using an online survey tool. However, questionnaires are time-consuming to con-
struct and to complete. As a result, many organizations choose to complete them on
a one-off basis or at best infrequently (every two to three years, for example). This
limits their usefulness. Ideally, repeat surveys should be completed at least once a
year. This allows the organization to see how its risk culture is evolving and analyse
the effectiveness of any control measures.
When using a questionnaire to assess risk culture it is important to obtain a
statistically representative sample of respondents. This means circulating to a sig-
nificant number of people across the organization, in terms of geographic location,
department, role function (e.g. first, second and third lines of defence) and seniority.
This will help to stratify differences in responses and identify indications of counter
sub-cultures. Alternatively, questionnaires could be targeted at specific locations,
departments or role functions, especially where concerns exist about the nature of
their sub-cultures. For example, where there is excessive operational risk taking, or
evidence of ineffective control.
Finally, there is the potential for respondents to fill in questionnaires incorrectly,
either because they are disengaged and in a rush to complete or because they delib-
erately enter false information to protest against a particular issue. The use of experts
in questionnaire design can help to mitigate this problem. Trained experts can design
questions to check the internal consistency (also known as the reliability) of
responses. See Krosnick (2018) for some of the latest research on questionnaire
design. For research in relation to risk-culture questionnaires see Sheedy, Griffin and
Barbour (2017).
Risk Culture 71
3.2 Interviews
Interviews should normally be conducted on a semi-structured basis. This means
asking high-level, but non-leading questions that allow the interviewee freedom to
highlight the information that they perceive to be important. Examples include:
●● In the conduct of your role, what does operational risk mean to you?
●● How would you explain the value of operational risk management to someone
outside the organization?
●● In your opinion what are the most important objectives for operational risk
management?
is that focus groups allow for a group discussion, helping to highlight common
themes or issues regarding an organization’s risk culture.
Ideally, two people should facilitate a focus group. One to take the lead on asking
the questions and the other to observe and interject if they feel that an important
point has not been discussed adequately, or to clarify meaning.
Focus groups can help to clarify the findings of a questionnaire or series of inter-
views. The agenda for such a focus group would include a presentation of the ques-
tionnaire or interview results, followed by an open discussion on the significance and
meaning of these findings.
Using focus groups to discuss the results of other assessment tools can help miti-
gate the potential for interpretation bias. However, the composition and facilitation
of such a focus group requires extreme care. It is important that such focus groups
comprise a diverse cross-section of people (different departments, experience, age,
gender, etc), to ensure that any local social biases are challenged. In addition, the
facilitator must ensure that focus-group discussions are not dominated by particular
individuals, such as the most senior manager or director.
See Krueger and Casey (2001) for more information on running focus groups.
A focus group is presented with the results of a risk-culture questionnaire. The Head of
Customer Services concludes that the results indicate that staff are too averse to
operational risk and devote an excessive amount of time to control activities. As a
result, she believes that the risk culture is not sufficiently agile and customer focused,
because of excessive bureaucracy. Several others agree, including the Chief Executive
Officer (CEO).
The Head of Finance provides the opposite perspective. A debate ensues, chaired
by the lead facilitator, who ensures that all attendees contribute equally. Following
this debate, it is agreed that staff are excessively averse to certain types of
operational risk, but that they do not appreciate the importance of others (e.g. internal
fraud).
The benefit of this debate, and the presence of diverse views, is that a
misinterpretation of the results of the questionnaire is avoided. Focus groups can be an
excellent complement to risk-culture questionnaires, helping to add detail to
questionnaire results and avoiding their misinterpretation.
Risk Culture 73
●● the tool should, in theory, have been developed by experienced professionals who
know how to assess risk culture;
●● they are outside the organization’s risk culture, which should help prevent
interpretation bias; and
●● they can compare the results of an assessment with other, similar organizations
and help to share good practice.
●● they will only have limited exposure to an organization’s risk culture, and will not
understand it as deeply as in-house risk professionals;
●● questionnaires may be generic, not customized for the organization;
74 Fundamentals of Operational Risk Management
When using a third party to assess risk culture it is recommended that both question-
naires and focus groups should be performed, at a minimum. Plus, the questionnaire
should be customized to meet the unique circumstances of the organization. Never
accept a pre-prepared questionnaire, always ask how it has been adapted to suit your
organization.
Finally, care should be taken where a third party offers a risk-culture ‘score’ as an
indication of the ‘strength’ of an organization’s risk culture. Such scores are based on
the false notion that there is an optimal approach to risk culture. There is no such
optimal approach. Scores also reinforce the false notion that risk culture can be
measured. Remember that risk-culture assessments are inherently subjective and
provide only a rough snapshot of an organization’s risk culture.
Staff Turnover High levels of staff turnover mean that significant numbers of new
people are joining the organization, which will change the social
mix and hence risk culture. High levels of turnover may also be a
warning of moral issues, which may have a risk-culture element.
In contrast, low levels of staff turnover increases the potential for
‘group-think’. Group-think is a problem because false and
inaccurate perceptions about risk and risk management will go
unchallenged.
Staff Conduct A fall or rise in staff grievances and disciplinaries may indicate a
change in risk culture (negative or positive).
Policy Compliance An increase in compliance is a positive risk-culture indicator,
suggesting that attitudes and behaviours are improving and
vice-versa.
Internal Audit High or low levels of audit actions are not necessarily risk-culture
indicators; even areas with an appropriate risk culture may have
controls that need improving. However, long delays in the
completion of audit actions may indicate behavioural issues or a
lack of knowledge and understanding about the need for effective
operational risk management.
Losses and A sudden increase or decrease in losses and near-misses might
Near-Misses be due to a change in risk culture. In addition, evaluations into the
causes of losses and near-misses can include a search for cultural
factors.
Risk One simple but powerful metric is the number of times that
Communication business functions contact the operational risk function for
unsolicited advice. This indicates the perceived value of the
operational risk function.
Where possible, it is good practice to compare metrics from different locations and
departments. This will help to highlight risk sub-cultures. Regular input from rele-
vant professionals, notably HR and audit, can also be used to support the monitor-
ing of risk sub-cultures. In the course of their duties, they may well come across
values, beliefs and attitudes that could be a cause for concern. The operational risk
function should work to build good relations with these professionals to ensure that
they report any concerns.
One way to select an appropriate set of metrics is to complete an initial risk-culture
assessment, using one or more of the tools above. Then the results of this assessment
can be used to help select an appropriate set of risk-culture metrics. The metrics
76 Fundamentals of Operational Risk Management
The use of the term ‘influence’ is deliberate. Talk of managing risk culture implies
a greater level of control than is usually the case. Risk cultures are human–social
phenomena; this means that they will change over time, even without any organized
interventions. Heavy-handed or overly formalized attempts to change a human–social
phenomenon like risk culture will often fail. This is because such attempts interfere
with the natural evolutionary cycle of the risk culture and can have significant unin-
tended consequences, including amplifying the less appropriate aspects of a risk cul-
ture. Values, beliefs and attitudes are very hard to change.
To maximize success, measures should be targeted at specific aspects of the risk
culture that an organization wants to change. Broad, far-reaching risk-culture change
projects do not tend to succeed. Effective risk-culture change is incremental and
takes great skill and time. Staff will resist large-scale, rapid change in most circum-
stances, but they are more likely to accept incremental influence. Such influencing
measures should be complemented with regular monitoring of the risk-culture met-
rics to help track their effectiveness. It may well be that measures have to be refined
several times before they have the desired result.
Organizations employ a range of influencing measures, some of the most common
are explained below.
●● Being visible and consistent in terms of what they say and do – acting in a way
that supports the values of the organization as well as its policies and procedures.
78 Fundamentals of Operational Risk Management
●● Sending out clear messages regarding their expectations about risk management
and decision making, including having a clear operational risk appetite statement
and operational risk management policy.
●● Making it clear that all areas of risk management, including operational risk
management, are important value-adding activities, not simply ‘cost-centres’.
●● Being open to challenge and resistant to problems such as ‘group-think’, whereby
the top leadership become blind to or even actively hostile towards new information
about their risk exposures and risk management strategy. Group-think can also
result in overconfidence – via the belief ‘that it will not happen here’.
conflicting beliefs, values and attitudes), whereby the employees of Northern Rock could
not reconcile the risk-averse, caring-oriented values that they once shared with the new
high-risk/reward strategy chosen by the board and senior management.
One of the recommendations from the Salz review (Salz, 2013) was that Barclays should
implement an organization-wide code of conduct for staff and put in measures to ensure
compliance.
Barclays did this and now has ‘The Barclays Way’ (Barclays, 2021), which outlines the
values of the bank and the behaviours that staff are expected to exhibit. The document
covers things like Barclays’ role in society, along with the treatment of customers and
colleagues. In addition, the code has a section on risk, emphasizing the importance of
good governance, internal control and maintaining high ethical standards.
Staff are expected to sign up to the code on an annual basis and speak up about any
concerns they may have about compliance. A dedicated Raising Concerns Team is
available to talk to staff about these concerns.
●● Ensuring that systems and processes do not become so automated that staff lose
the ability to think for themselves and be creative (within clear boundaries) when
the situation demands it.
●● Designing flexible processes and systems that can adapt to changing risk and
business environments, as necessary. This includes ensuring that the staff operating
these systems and processes are flexible as well. Statements such as ‘we have
always done it like this here’ are not part of effective risk-culture management.
●● Long reporting lines, which can create a ‘hierarchy of waste buckets’ – whereby
operational risk management information may be distorted or even hidden (to
protect local agendas) as it moves up the chain.
●● Complex department and divisional structures, which may facilitate the
development of sub-cultures, especially in areas that are organizationally distant
from the head office.
●● Mergers and acquisitions, which will require especially careful risk-culture
management, to help preserve those aspects of the merged cultures that the
organization wishes to maintain and deal with any culture clashes. One way to
address this is to move people around the new organization – creating secondments
in other parts of the business, including secondments to the operational risk function.
●● Embedding risk assessment and control responsibilities into the business – so that
it is not just seen as the role of ‘risk professionals’. One way to achieve this is to
create risk champions – who act as a network of supporters for risk management
across the business. Risk champions may focus only on operational risk, or a
wider range of risks.
●● Developing greater collaboration between the first and second lines of defence so
that operational risk professionals actively support business decision making.
82 Fundamentals of Operational Risk Management
6. Conclusions
An organization’s risk culture is an important component in its success or failure.
Organizations that have an appropriate culture should be better able to balance risk
and opportunity, achieving their objectives, while avoiding potentially destructive
surprises along the way.
Risk culture is not a given and can be influenced. However, attempts to assess,
monitor or control risk culture in a mechanistic or formulaic way will not succeed.
Judgement and experience is always required, as is patience. Operational risk profes-
sionals need to trust their judgement and experience but remember that they cannot
work alone on risk culture. The maintenance of an appropriate risk culture requires
collaboration between a range of experts, including risk, HR, audit and corporate
governance professionals.
1 Has your organization implemented measures to assess its risk culture? Are these
assessments repeated on an annual basis?
2 Have risk-culture metrics been implemented to support less frequent risk-culture
assessments?
3 What measures have been implemented to prevent interpretation bias, when
reviewing the output from risk-culture assessments or metric reports? For example,
have you made use of facilitated focus groups or external, third-party experts?
4 Does your senior management/board discuss the organization’s risk culture on a
periodic basis? What measures have they implemented to address any concerns
about the appropriateness of specific aspects of your organization’s risk culture?
5 Do staff and management live the organization’s code of conduct? What
measures have been implemented to ensure that the code is taken seriously?
6 Do operational risk professionals work with other relevant experts (HR, audit,
governance) to assess, monitor and influence risk culture?
Risk Culture 83
Please indicate the average percentage of working time spent on the following activities:
Around 90% or
0% 50% more
Please indicate, over the period of a month, how often on average you get in touch by
email or phone with…
Please indicate, over the period of a month, how often on average you communicate
in a one-to-one meeting with…
Please indicate, over the period of a month, how often on average you participate in
group meetings with…
Compared to your prior experience (in your current company or other organiza-
tions), please indicate the extent of change in the following areas during the last two
to three years:
Decreased
to a great Stayed Increased to a
extent the same great extent
Regulatory requirements
Compliance activities
References
Note: Some of the sources included in this chapter have been listed previously. Only new
sources are listed below.
Barclays (2021) The Barclays way, https://home.barclays/citizenship/the-way-we-do-business/
code-of-conduct/ (archived at https://perma.cc/6YJJ-BR2V)
Douglas, M and Wildavsky, A (1983) Risk and Culture: An essay on the selection of
technological and environmental dangers, University of California Press, Berkeley CA
IRM (2021) Risk culture, IRM Thought Leadership, www.theirm.org/what-we-say/thought-
leadership/risk-culture/ (archived at https://perma.cc/LAM6-SZYS)
Krosnick, J A (2018) Questionnaire design, The Palgrave Handbook of Survey, Palgrave
Macmillan, Cham, pp 439–55
Krueger, R A and Casey, M A (2001) Designing and conducting focus group interviews,
Social Analysis, Selected Tools and Techniques, World Bank Social Development Papers,
36, pp 4–23
Linsley, P M and Slack, R E (2013) Crisis management and an ethic of care: The case of
Northern Rock Bank, Journal of Business Ethics, 113 (2), 285–95
Power, M, Ashby, S and Palermo, T (2013) Risk Culture in Financial Organizations: A
research report, CARR-Analysis of Risk and Regulation
Salz, A (2013) Salz review: An independent review of Barclays’ business practices, Barclays
PLC, https://online.wsj.com/public/resources/documents/SalzReview04032013.pdf
(archived at https://perma.cc/3WUA-4HYA)
Sheedy, E A, Griffin, B and Barbour, J P (2017) A framework and measure for examining
risk climate in financial institutions, Journal of Business and Psychology, 32 (1), 101–16
89
Risk appetite 05
L E A R N I N G O U TCOM E S
●● Explain what risk appetite is and why it matters from an operational risk
perspective.
●● Compare different approaches to determining and expressing operational risk
appetite and tolerance.
●● Know how to implement an effective operational risk appetite framework.
1. Introduction
Risk appetite is an area that attracts diverse views among operational risk profes-
sionals. Depending on the sector, scale and risk profile of an organization, opera-
tional risk-appetite approaches range in complexity and scope. Differences also exist
in terminology, with some organizations preferring the term ‘tolerance’ over ‘appe-
tite’ when referring to operational risks. For these reasons, this chapter does not
recommend a one-size-fits-all solution. Rather, it outlines a range of good practices,
from which operational risk professionals may choose what is appropriate for their
organization.
Fundamentally risk appetite, whatever the risk that is focused upon, is about deci-
sion making. Every action or decision within an organization involves an element of
risk. An organization must, therefore, be able to distinguish between risks that are
likely to result in value-creating outcomes (e.g. profit, reputation, improved services,
etc) versus those that may destroy value. By determining an appropriate appetite for
risk and implementing a framework to ensure that this appetite is maintained, or-
ganizations can ensure that decision makers do not expose them to either too much,
or too little, risk.
While the focus of this chapter is on operational risk, an organization’s appetite
for operational risk is part of a broader, enterprise-wide appetite for risk. Operational
risk is important to all organizations, and it is essential that the board and senior
management are engaged in its management. Effective governance and compliance
90 Fundamentals of Operational Risk Management
require the management of risks that are typically operational in nature (e.g. fraud,
health and safety and conduct-related risks). In addition, strategic decisions (e.g. new
product development) often require exposure to operational risk and it is important
that the board and senior management are cognisant of these risks and satisfied that
the organization can take them in the pursuit of its objectives.
Organizations that implement a framework for determining and managing their
operational risk appetite can achieve various benefits:
cepted and understood by its management and board of directors. A useful starting
point is the IRM’s definition of risk appetite from an enterprise-wide context (IRM,
2021): ‘The amount and type of risk that an organization is willing to take in order
to meet their strategic objectives.’
Organizations that take the view that operational risks can only be downside in
nature could replace ‘is willing to take’ with ‘is prepared to accept’, or similar.
However, this is not recommended. As explained in Chapter 1, operational risks are
inherent in organizational activities and both operational risk events, and the meas-
ures taken to mitigate these events, can influence the efficiency and effectiveness of
operations. Control measures taken to reduce operational risk exposures may some-
times have an even greater negative impact on efficiency and effectiveness than the
adverse operational risk outcomes they are seeking to prevent, especially where they
are expensive to implement, prolong operational processes, increase the complexity
of systems or prevent activities from being undertaken. In short, operational risks
must be taken if organizations are to achieve their strategic objectives, just like any
other type of risk. In this context, organizations must be willing to take operational
risks; the only pertinent question is how much and what types of operational risk are
they willing to take?
●● Set tolerance limits and thresholds below the agreed appetite for operational risk.
From a RAG perspective this means setting the appetite at the red level and
tolerance at amber.
Risk Appetite 93
●● Set tolerance limits above the agreed appetite for operational risk. Hence appetite
would in effect reflect the amber threshold and the limit of tolerance the threshold
for red.
●● death or injury;
●● a breach of applicable laws and regulations;
●● financial distress and bankruptcy.
CASE STUDY 5.2 Working with the board to determine risk appetite
A large social enterprise was implementing an operational risk appetite framework for the
first time. It decided that the board should play an active role in determining the
appropriate degree of operational risk appetite.
The operational risk function designed a discussion and decision template similar to
that in Appendix B. The operational risk function also facilitated the initial operational risk
appetite workshop for the board, supported by a board member with experience in the
management of operational risk. This workshop took place during a board away-day to
ensure less time pressure. It was the first item on the agenda to further prevent the
discussion from being rushed. In total the workshop lasted 90 minutes.
The session started with a presentation from the operational risk manager on the
discussion and decision template. They also ensured that all board directors understood
the concept of risk appetite and its importance from a corporate governance perspective.
After a few questions from the audience, the operational risk manager invited each board
member to vote, secretly, on their preferences for the organization’s appetite for the various
operational risk strategic impacts. They could vote for one of four options each time, ranging
from ‘cautious’ to ‘significant’. An electronic voting system was used for this purpose.
The board members expressed their preferences for each of the operational risk
strategic impacts in turn. In all cases a range of views were indicated; however, there was a
clear majority view for each of the impacts. Board members that voted differently to the
majority were invited to express their views. At all times the operational risk manager kept
the discussion friendly and inclusive, providing their own perspective where appropriate.
Following the discussion board members voted a second time. This revealed a
unanimous majority for each of the strategic impacts, in some cases this shifted from the
previous majority view. For example, the appetite for financial impacts was set as
‘cautious’ (see terminology in Appendix B), compared to the initial vote for ‘open-
optimistic’, while the appetite for human resource impacts was set at ‘open-optimistic’,
compared to ‘cautious’.
The specific responsibilities for operational risk appetite that should be allocated to
the board include:
This includes ensuring that all of their employees are aware of these statements
and the need to comply with them.
●● Establish, monitor and control adherence to local operational risk tolerance limits
(e.g. limits for local risk, control and performance indicators), along with any
local qualitative statements.
●● Cooperate with the operational risk function and not interfere with their duties.
This includes supporting the wider monitoring and reporting activities of the
organization in relation to operational risk appetite, as well as, where required,
actions taken to resolve any breaches of the organization’s operational risk
appetite and tolerance limits.
●● Ensure that their local risk culture and remuneration arrangements are consistent
with the organization’s operational risk appetite and tolerance limits. Report any
concerns to the operational risk function in the first instance.
●● Escalate promptly any breaches of local tolerance limits, along with any potential
breaches of the organization’s overall appetite for operational risk.
In overseeing the work of business managers, the operational risk function should
balance the activities and objectives of specific business units, departments or func-
tions with the operational risk appetite set by the board. Business managers should
not set RAG tolerance limits that may facilitate decisions that are inconsistent with
the board’s appetite for operational risk (e.g. to set thresholds that promote exces-
sive or insufficient risk taking and control). The operational risk function should
challenge tolerance limits where they are concerned about consistency. Where ap-
plicable the risk or operational risk committee can be used to support this oversight.
efficiency, reducing the time taken on fraud-related due diligence (e.g. security
questions) and increasing the availability of staff to address customer needs.
The operational risk function is concerned that this decision will exceed the board’s
appetite for external fraud risk. The head of operational risk starts by organizing a
meeting with the business manager to understand further their rationale for the change
in tolerance and explain the potential consequences for the wider organization. Then
the operational risk function produces a paper for the board-delegated risk committee,
explaining the situation and asking for a decision on whether to accept the change. The
board risk committee decides that the change is too significant and would result in the
organization’s appetite for external fraud risk being exceeded. However, it does allow a
slight increase in tolerance for external fraud losses and recommends to senior
management that the external fraud controls of the customer-facing function should be
reviewed to determine whether their efficiency and effectiveness could be improved.
This ensures the appropriate control of external fraud risks without compromising
customer service.
The specific responsibilities for operational risk appetite that should be allocated to
the operational risk function include:
●● Lead the development of the operational risk appetite framework, working with
the board of directors and senior managers to ensure that this framework is
consistent with the organization’s objectives, stakeholder expectations and
regulatory requirements.
●● Establish a process to support the monitoring and reporting of the organization’s
risk profile in relation to its operational risk appetite and accompanying tolerance
limits.
●● Monitor the organization’s operational risk profile to ensure that it remains
consistent with its appetite for operational risk, involving the board and senior
management where appropriate.
●● Work with senior management to ensure that appropriate tolerance limits are set
for all material categories of operational risk and, as appropriate, each business
line/legal entity.
●● Ensure that front-line management set the above tolerance limits in a manner that
is consistent with the organization’s appetite for operational risk.
●● Ensure that the organization’s operational risk management systems and processes
provide effective support for the operation of the operational risk appetite
framework.
100 Fundamentals of Operational Risk Management
●● Act in a timely manner to ensure that operational risk exposures are managed in
such a way to prevent the operational risk appetite/tolerance limits and qualitative
statements being breached, and where limits or qualitative statements are breached
to ensure that such breaches are rectified.
●● Escalate to the board of directors any organization-wide risk appetite/tolerance
limits that have been breached. Where possible, provide an early warning of limits
that are close to being breached.
●● Report any evidence of non-compliance with the organization’s qualitative
statements of operational risk appetite to the board risk committee or equivalent.
●● Work with senior management to ensure that an organization has an appropriate
risk culture to support the operation of the operational risk appetite framework and
to ensure that decisions are made in a manner consistent with the organization’s
appetite for operational risk. This may include implementing measures to support
the assessment/monitoring and management of the organization’s risk culture where
appropriate. It may also include reviewing remuneration arrangements to ensure
that they are consistent with the organization’s appetite for operational risk.
●● Report promptly any deficiencies they may identify in the management of the
operational risk appetite framework on the part of front-line managers.
●● Evaluate whether any of the above should be supported by external third-party
audit expertise.
4.1 Qualitative
Qualitative expressions rely on written statements that do not involve any quantifi-
cation. They are useful where operational risks are difficult to quantify and to rein-
force the relationship between operational risk and strategic/business management
objectives. Qualitative statements can also be used to emphasize specific behaviours
or attitudes, and in so doing help to control an organization’s risk culture.
Specifically, qualitative expressions of appetite or tolerance can be used to rein-
force several important messages, such as:
For each of these elements a number of qualitative statements are agreed. Example
statements include:
●● Continuity of operations:
●● The organization’s goal is to reduce, as much as practicable, operational risks that
threaten the continuity of its operations. Ensuring that customers can access
services, at all times, with minimal delay, is paramount.
●● We will maintain a well-diversified range of outsource service providers and ensure
that they have adequate business continuity arrangements and IT backup
resources.
●● We will ensure that the actions or inactions of employees do not result in events
that significantly disrupt the continuity of operations. We will achieve this through
staff training and maintaining a risk-aware culture.
●● Financial sustainability:
●● We will not expose the organization to any operational risks that threaten its current
investment-grade credit rating.
●● We will maintain a contingency funding plan to ensure that appropriate funds are in
place to mitigate the severe financial impact of unexpected operational risk events.
This plan must be tested and updated on an annual basis.
●● We will ensure that appropriate provisions are put in place for expected future
operational losses, where such losses may exceed £1 million.
●● Growth:
●● Control before you grow: the organization should not grow faster than its
operational controls can keep pace with. The efficiency and effectiveness of
operations must not be compromised by extreme resource pressures caused by
overly rapid growth.
●● Return on assets must be sufficient to compensate for the expected annual cost of
operational risk exposures, plus an allowance for unexpected costs.
Risk Appetite 103
●● Entry into new products and markets must not occur before an assessment of the
potential operational risks has been conducted.
●● Compliance:
●● We will, at all times, comply with the minimum capital requirements for operational
risk. No decisions may be taken that could result in such a breach.
●● We will, at all times, comply with applicable health and safety and environmental
regulations.
●● Honesty and openness is expected. Any concerns about the honesty and openness
of behaviours should be reported to the whistleblowing team.
Many organizations situate specific qualitative statements like those in Case Study 5.4
within an overarching ‘risk appetite statement’. Such a statement outlines, in words,
an organization’s overall appetite for operational risk. In essence these statements
should outline the broad preference that an organization has for operational risk (e.g.
risk averse, neutral, preferring), along with the key priorities for operational risk
management (compliance, improving efficiency, maximize financial performance,
etc). Key information on how the operational risk appetite framework functions may
also be included in such a statement, but only where this is essential from a govern-
ance and control perspective. Additional information on the design of the operational
risk appetite framework should be documented separately in a risk appetite frame-
work document. The reason for this is to ensure that the operational risk appetite
statement is clear, to the point, and no longer than necessary.
ABC Group PLC is committed to managing and controlling operational risk as an integral
part of its business activities.
In order to free up investment capital to support ABC’s strategic objectives, as well as
to preserve its reputation and cash flows, the group’s goal is to minimize operational risk
exposures. However, it is recognized that most business operations cannot be carried out
in a risk-free environment. The group also recognizes that it is not always cost effective to
minimize operational risk exposures, especially where this may limit capital growth or the
generation of increased cash flows.
To ensure an appropriate balance between operational risk and return, limits of
authority apply for each business line when accepting operational risk exposures in
current or new activities. Front-line managers will inform operational risk management
104 Fundamentals of Operational Risk Management
whenever potential risks are identified that may exceed agreed tolerance limits. When
exposure levels exceed these limits, the Operational Risk Management Committee
may request that the business line takes additional action to mitigate these risks or to
avoid risk by exiting the business/cancelling the activity. Only the board of directors is
authorized to accept business that exceeds the stated appetite for operational risk.
4.2 Quantitative
Quantitative expressions of operational risk appetite involve hard data, i.e. numeri-
cal metrics. Normally these metrics are derived from existing sources of management
information, such as performance, risk or control indicators (see Chapter 9).
Quantitative expressions tend to be risk category or control specific and thus are
primarily an indication of operational risk tolerance, rather than overall appetite.
Such measures can be accompanied by amber and red thresholds, so that it is clear
when a tolerance breach has occurred or is imminent. The concept of setting zero-
tolerance thresholds may seem impractical, but they can have a cultural purpose in
reinforcing the message that it is not appropriate to accept avoidable losses without
question. For example, some organizations set zero-tolerance limits for internal
fraud losses and significant health and safety incidents. This does not mean that such
losses will not occur but sends a clear signal that they should be reduced as much as
is practicable. It also makes clear that when such losses/incidents occur they should
be escalated. This should usually mean escalation to the board risk committee or
equivalent, to reflect the seriousness of such events. The board risk committee can
then decide whether action is required to reduce exposure further.
Strategic-level performance metrics that provide a broad expression of opera-
tional risk appetite in isolation are rare. One potential measure is the amount of
economic or regulatory capital allocated to operational risk. Non-financial organiza-
tions do not tend to calculate or allocate capital to specific risk categories, but it is
more common in financial services. Where capital is allocated to operational risk, an
organization could express its appetite for operational risk in terms of a risk-specific
capital buffer. For example, an organization may allocate a minimum of £10 million
of capital to operational risk, plus a 10 per cent buffer (an additional £1 million) to
allow for the fact that unexpected costs may exceed the minimum allocation. A
larger buffer indicates a lower appetite for operational risk, because there will be less
surplus (unallocated) capital to invest in new, but potentially risky, business ventures.
Risk- and control-specific operational risk tolerance metrics are common.
Examples include:
●● Measures of system or process reliability, for example no more than xx per cent
chance any business-critical system is unavailable for more than one day in any
one year.
●● Reported loss amounts based on budgeting, aggregate annual amount by business
area/loss type and/or sensitivity, i.e. an adverse trend of 5 per cent may be
acceptable, 10 per cent tolerable, but 15 per cent unacceptable. Note that
thresholds may be set on a per-event basis, for specific risk categories over an
agreed time period or on an aggregate basis for all operational risks. The aim is to
cover both high-volume/low-value and low-volume/high-value types of events.
Thresholds may also be used to support reporting and escalation processes, to
help identify the level of management or executive attention.
●● Risk/control assessment boundaries to distinguish acceptable/tolerable/
unacceptable levels of exposure to specific risk types.
●● Risk and control indicator amber and red thresholds, expressed in units that are
appropriate for the indicator in question, i.e. numerical count, financial value,
percentage or variance.
When setting tolerance levels for specific operational risks or controls, front-line
managers should ensure that these are consistent with the board’s appetite for op-
erational risk. Whenever tolerance limits are set that are inconsistent, especially if
above the agreed appetite, this should be passed to the board (or board risk commit-
tee where present) for approval. Techniques that may be used to set tolerance thresh-
olds include:
Example 1
An organization wishes to set red and amber tolerance thresholds for staff turnover. High
levels of turnover can be a signal of declining staff morale and new staff are more likely to
make mistakes, so the organization is most concerned about a sudden increase. Monthly
staff turnover usually averages 3 per cent with a normal deviation of 1 per cent (i.e.
turnover tends to range between 2 per cent and 4 per cent). Once when the organization’s
turnover increased to 6 per cent for several months a morale issue was identified. Hence
the organization decides to set the amber threshold at 4.5 per cent and red at 6 per cent.
Example 2
Red and amber tolerance thresholds need to be set for the availability of a new core
system. Though extensive testing suggests that the system is very reliable, no historic
data exists regarding the stability of the system in regular daily use. Management set red
and amber limits based on their experience with other IT systems and user reactions to
failures. Evidence suggests that a non-availability rate of less than 1 per cent is tolerable,
but 2 per cent or more can disrupt business operations. Hence the amber threshold is set
at 99 per cent availability and red at 98 per cent.
Risk Appetite 107
6.1 Communication
To ensure staff make appropriate decisions it is essential that an organization’s op-
erational risk appetite and associated tolerances are communicated across the whole
organization. This will include communicating to staff involved in activities that
necessarily involve an element of operational risk (e.g. the operation of systems,
processes and procedures), as well as those involved in monitoring and controlling
specific categories of operational risk exposures (e.g. HR and IT staff).
Organizations may communicate their overall appetite for operational risk using
a range of methods, including staff induction and training, staff meetings, intranet
resources and performance reviews. It is recommended that multiple channels are
used to ensure the message is received and understood.
Tolerance thresholds for specific operational risks and controls should be com-
municated to all staff involved in the management of these risks and controls, espe-
cially risk and control owners, if used.
●● A senior representative from the operational risk function attended the quarterly
induction sessions for new staff. They talked about the organization’s appetite for
operational risk and answered questions from new staff. In particular they emphasized
108 Fundamentals of Operational Risk Management
●● Online operational risk appetite awareness training for existing staff, to emphasize the
key qualitative statements.
●● A three-hour classroom training session for relevant managers, explaining the changes
to the organization’s operational risk appetite and the rationale behind these changes.
The training also emphasized the importance of ensuring that operational risk
exposures are kept within appetite.
●● Relationship management meetings with risk and control owners to ensure they
understood the changes and to answer questions and address any concerns.
6.2 Monitoring
Procedures should be put in place to ensure that an organization’s operational risk
profile remains within its chosen appetite and tolerances for operational risk. The
aim of these procedures is to ensure that the organization uses its operational risk
management resources in the most efficient way, while preventing and mitigating the
most significant operational risk management exposures.
There are two distinct steps involved in the design and implementation of proce-
dures for monitoring operational risk appetite:
and investigation of adverse variances and trends, and analysing the underlying
causes. Some key considerations include, whether:
●● recurring ‘ambers’ are reflecting a static or worsening position;
●● a cluster of ‘ambers’ represents an overall ‘red’ in aggregate; and
●● recurring ‘greens’ may suggest thresholds are not sufficiently sensitive and
should be reviewed.
The monitoring of performance against qualitative statements of operational risk
appetite or tolerance is more challenging but should be attempted where possible.
One solution is to have regular conversations at board, risk committee and opera-
tional risk-function level about whether staff behaviours and organizational activi-
ties are consistent with these statements. Other relevant functions such as internal
audit, HR and IT security may also be involved to gauge their opinion. The value of
conversations about operational risk should not be underestimated. It can help to
promote risk awareness and identify potential areas of concern.
More formal mechanisms to monitor performance against qualitative statements
include internal audit reviews, information from staff performance reviews (where
adherence to key qualitative statements could be assessed), and investigations into
loss events, to determine whether they were partially the result of behaviours or ac-
tions included in qualitative statements (e.g. regulatory breaches).
R Group G
Division A Division B
R A
(80% of Group) (20% of Group)
●● the implications of poorly managed operational risk in one business may have a
contagious effect on the reputation of the group as a whole; and
●● weaknesses in operational risk management may be systemic, meaning that
problems in one business may be a signal of issues elsewhere.
that are outside of either its overall appetite for operational risk or agreed tolerance
thresholds. Key decisions include:
●● Whether it is appropriate to accept the breach for a limited time period. After
weighing all the evidence, it may be the case that a breach could involve a truly
one-off exception. In other cases, it may be appropriate to review and recalibrate
previous tolerance levels if they are believed to be too conservative. It is
recommended that such acceptances should be recorded and revisited regularly
(e.g. on a quarterly basis).
●● Taking steps to mitigate/avoid and prevent a recurrence. This is likely to be the
most appropriate response to a breach of operational risk appetite or tolerance
and will require approval to implement some additional or alternative control
measures.
●● Some intermediate management action – for example, conducting extended or
more intense monitoring, undertaking additional root cause analysis, or
investigating the cost/benefit of mitigation options.
7. Conclusions
Designing and implementing an operational risk appetite framework is challeng-
ing and time-consuming. However, it is hard to see how operational risk can be
managed effectively without one. There is no optimal level of exposure to opera-
tional risk. Neither is it usually possible or desirable to reduce operational risk
exposures to zero. As a result, organizations must decide upon and articulate their
appetite for operational risk, making it clear which risks can be taken in the pur-
suit of organizational objectives, which risks should be reduced where cost effec-
tive, and the degree to which these positive and negative exposures can vary across
the organization.
112 Fundamentals of Operational Risk Management
Operational risk appetite is an area where opinions can differ. Some opera-
tional risk professionals will accept that their organizations should be willing to
take certain operational risks. Others are uncomfortable with such language,
framing operational risks purely in terms of downside outcomes. Ultimately the
choice is for them to make. However, what is clear is that organizations will not
make effective operational risk management decisions without an understanding
of the positive and negative aspects of operational risk exposures and their associ-
ated control mechanisms. So long as we all agree that most operational risk expo-
sures cannot, should not, be reduced to zero, then there is a need to determine and
express operational risk appetite.
Appetite Avoidance of operational risk is Preference for safe Prepared to consider all Willing to be innovative and
Description a key objective. options that have a low options and choose the one to choose options offering
degree of operational that is most likely to result in potentially higher business
risk and may only have a positive return, even if this rewards (despite greater
limited potential for involves an element of inherent operational risk).
reward. operational risk.
Financial
●● Income ●● Avoidance of financial loss is ●● Prepared to accept ●● Prepared to invest for ●● Prepared to invest for the
●● Expenditure a key objective. the possibility of reward and minimize the best possible reward and
●● Procurement ●● No acceptance of budget some limited possibility of financial loss accept the possibility of
variation. financial loss for by managing operational financial loss (although
●● Fraud
Resources withdrawn from high gains. risks to a tolerable level. controls may be in place).
Economic ●●
●●
non-essential activities that ●● Risk reduction ●● Value and benefits ●● Budget is allocated
expose the organization to remains the primary considered (not just according to the
operational risk. concern, especially lowest risk). opportunity for highest
where budgets may ●● Budget is not fixed and is return.
be put at risk. allocated fluidly according ●● Resources allocated even
to priority need. where operational risks
●● Resources allocated in could impact on returns.
order to capitalize on
potential opportunities.
(continued)
113
114
1 Averse 2 Cautious 3 Open/Optimistic 4 Significant
Reputation and
Customer Service
●● Reputation ●● Minimal tolerance for any ●● Tolerances for ●● Appetite to take decisions ●● Appetite to take decisions
●● Community decisions that could lead to risk-taking limited to to enhance reputation that are likely to bring
challenge, adverse publicity those events where with some potential for challenge, but where
or scrutiny. there is little chance exposure to additional potential benefits
of any significant publicity, but only where outweigh the risks.
repercussion should appropriate steps have
failure occur. been taken to minimize
any exposure.
Human Resources
●● Equalities ●● Protect staff. Maintain status ●● Protect staff as ●● Flexible management of ●● Maximize efficiencies and
●● People quo as far as possible. much as possible. staff. cost savings.
●● Social
Risk Appetite 115
References
Furnham, A and Boo, H C (2011) A literature review of the anchoring effect, The Journal of
Socioeconomics, 40 (1), 35–42
IRM (2021) Risk appetite and tolerance, www.theirm.org/what-we-say/thought-leadership/
risk-appetite-and-tolerance/ (archived at https://perma.cc/9DLM-9DN7)
Tversky, A and Kahneman, D (1974) Judgment under uncertainty: Heuristics and biases,
Science, 185 (4157), 1124–31
116
Operational risk 06
governance
L E A R N I N G O U TCOM E S
●● Explain the role of operational risk governance and its importance for the
success of organizations.
●● Compare different approaches to the design and implementation of risk
governance.
●● Know how to implement effective operational risk governance arrangements.
1. Introduction
All organizations have in place governance arrangements to ensure that they are di-
rected and controlled in a manner that is consistent with the expectations of their
stakeholders (for example: shareholders, creditors, regulators, customers, employees
and third parties). These governance arrangements should span all aspects of an or-
ganization’s activities and operations, including the decisions made on its behalf by
employees. The management of risk forms a central element of these arrangements.
This includes the management of operational risk.
This chapter explores a range of sound practices for the governance of opera-
tional risk. The chapter is not intended as a replacement for existing governance
codes and standards, such as the UK Corporate Governance Code (FRC, 2018) or
the OECD’s Principles of Corporate Governance (OECD, 2015). Instead, the aim is
to highlight practices that may be employed to support the effective and appropriate
management of operational risk, as part of the wider governance activities of an
organization.
With sound practices for the governance of operational risk management an or-
ganization can ensure that its operational risk exposures are kept within appetite,
maintain compliance with applicable laws and regulations (e.g. health and safety,
environmental and solvency regulations) and ensure that internal policies and proce-
dures for the management of operational risk are followed. More generally, effective
Operational Risk Governance 117
operational risk governance should support the wider corporate governance and
financial reporting activities of an organization through the control of ‘people risks’.
Sound practices for the governance of operational risk management can reduce the
potential for inappropriate conduct on the part of directors, managers and employees,
including wilful negligence and criminal activity.
Research from the United States (Sahut, Peris-Otiz and Teulon, 2019) suggests that only
one in four financial-market frauds are detected and that 15 per cent of US companies
were engaged in fraudulent activities, such as financial misreporting, between 1996 and
2004. This research also estimates that the annual cost of internal fraud among large US
companies is US $380 billion each year.
Internal fraud is a long-standing category of operational risk and a common example of
people risk. Internal fraud is committed for a variety of complex reasons, ranging from
greed, incompetence, a desire to punish or even to protect an organization (as in the case
of the Barclays LIBOR scandal, see Chapter 4, Case Study 4.1). Sometimes internal fraud
is committed by isolated individuals, other times groups of people. Almost always, a
person’s ability to commit fraud is the result of failures in corporate governance (Farber,
2005), which includes operational risk governance.
Given that many of the categories of risk that fall within the scope of operational
risk management are forms of people risk (e.g. fraud, misreporting, mis-selling, non-
compliance with policies and procedures, and health and safety risks) operational
risk management and corporate governance are close relations. It would be impos-
sible to have an embedded operational risk management framework without effec-
tive corporate governance arrangements, including arrangements for operational
risk governance. Equally, effective corporate governance arrangements rely on an
embedded operational risk management framework being in place.
The scope of operational risk governance spans a significant part of the wider op-
erational risk management framework. But it is important to stress that they are
not the same thing. As explained in Chapter 1, operational risk management is
concerned with the organization of operational risks to help make operational risk
management decisions that protect and create value. Operational risk governance
is concerned with coordinating this decision making. In short, the role of opera-
tional risk governance is to ensure that operational risk management decisions are
made in a consistent manner and that an appropriate balance is maintained
between the expectations of all stakeholder groups.
Sociologist Theo Nichols has been instrumental in the conduct of research on the
value trade-off between safety and profit. He and others (see Nichols and Walters, 2013)
have completed a wide range of empirical research in the area, which shows that
organizations continue to struggle with this trade-off, especially in less-regulated
jurisdictions. Ensuring the safest possible working environments can impact on the
efficiency and effectiveness of operations, increasing equipment costs and reducing
worker productivity, thus impacting on short-term profits. This is especially the case with
chronic workplace-related illnesses, which may take years to manifest, perhaps after a
worker has retired or moved to other work.
Law and regulation is a partial answer to this trade-off. Fines, legal liability laws and
criminal sanctions against management can be a powerful deterrent to lax health and safety
controls. However, increasingly the attitudes of traditionally profit-oriented stakeholders are
changing, including those of shareholders. Concern for corporate social responsibility (an
important component of corporate governance in the 21st century) has increased, especially
as shareholders have learnt that corporate social responsibility supports the achievement of
stable, long-term performance (Michelon, Rodrigue and Trevisan, 2020).
The key point here is that what is valued by stakeholders can change. Once shareholders
and managers focused on short-term profits – increasingly this has shifted to a longer-term,
more sustainable perspective. Corporate governance, in this case operational risk
governance, plays an important role in helping organizations to understand these trends and
ensure that their decision makers act in accordance with the changing wishes of
stakeholders. In this case, it means giving greater priority to health and safety concerns. Even
if this does impact on efficiency and effectiveness in the short term, the longer-term benefits
more than outweigh the associated costs, especially if the reputation of the organization
improves and shareholders reward the decision with a higher share price.
Informal:
Flat, reflects social relations
Relies on collective consensus
Less visible and undocumented
Personal, relies on trust and
Formal reciprocity
Dynamic and fluid
Formal:
Hierarchy
Lines of communication
Visible and documented
Informal
Bound by rules (processes,
procedures, codes, etc)
Established making it
relatively static
Formal structures represent the cogs in the operational risk governance architecture of an
organization. These cogs provide stability. They ensure that people understand what is
expected of them and how to report issues of concern. However, they can be rigid and
inflexible. The informal structures of an organization help to reduce these weaknesses.
They act as the oil that smooths the operation of the formal cogs, ensuring that the effi-
ciency and effectiveness of an organization’s operations are maintained. In this regard
both formal and informal structures are essential to effective operational risk governance.
A large financial conglomerate had multiple committees with responsibility for operational
risk. This included business unit and divisional operational risk committees, plus a group
operational risk committee and an enterprise risk committee.
The timing of these committees, coupled with the requirement for agendas/papers to
be circulated one week in advance, meant that the formal communication structure was
slow. Items deemed to be of group-wide concern at business-unit level could take two to
three months to reach the enterprise risk committee.
To counter this problem a strong informal network of communication existed.
Business-unit operational risk staff had regular, unscheduled discussions with their
counterparts at the divisional and group levels. These discussions were aided by the fact
that social gatherings were organized on a regular basis. This informal network ensured
that items of concern could be escalated more quickly, bypassing the intermediate
committees, where necessary.
Operational Risk Governance 121
When designing and implementing formal governance structures for the management
of operational risk, care should be taken to consider the potential impact of these
structures on the risk culture of the organization. Solutions include:
●● consulting with managers and employees on the business impact of any new
operational risk governance arrangements (to assess the effect on operating costs,
efficiency, etc);
●● regularly reviewing formal governance arrangements, both to consider the need
for new measures and to remove measures that are obsolete;
●● involving managers and employees in the above reviews;
●● working with colleagues in related control functions (e.g. HR, IT security, internal
audit, compliance, etc) to minimize any overlap in governance arrangements.
●● Set the operational risk governance standards by which the organization should
operate. This will include agreeing the organization’s appetite for operational risk
and approving its operational risk management policy, along with any risk-specific
policies (e.g. health and safety, IT security or environmental risk) that are
important from an operational risk governance perspective.
●● Demonstrate their commitment to the above standards, through what they say
and do. This means that the board and wider leadership team must be seen to
‘walk the walk’, not just ‘talk the talk’ of operational risk governance. Employees
are much more likely to follow an organization’s operational risk governance
arrangements if they perceive that the board and wider leadership team are also
following them.
●● Regularly monitor and review operational risk governance arrangements to
ensure that they are functioning correctly. This should include building good
relations with the operational risk function, including inviting representatives
from the team to board (and other relevant) meetings (e.g. audit and risk
committees), where appropriate.
Operational Risk Governance 123
The board and wider leadership team embody both the formal and informal aspects
of an organization’s operational risk governance architecture and so represent a key
intersection between the two. Board agenda items and papers are formal arrange-
ments. In contrast, how the board and senior leadership team ‘walk the walk’ of an
organization’s operational risk governance arrangements is an informal mechanism.
Building good personal relations with the operational risk function is also important.
A medium-sized social enterprise, operating in the housing sector, has a board consisting
of non-executive directors only. The enterprise is subject to governance regulation, which
encompasses operational risk.
The board employs a number of formal and informal mechanisms to build relations with
the operational risk manager. This includes:
●● The operational risk manager attends the quarterly audit and risk committee to report
on the organization’s operational risk profile and to present papers for approval (e.g.
annual reviews of the operational risk policy and business continuity arrangements).
●● Informal meetings between the operational risk manager and the audit and risk
committee chair, the aim being to socialize and discuss recent developments in
operational risk across the sector, rather than to focus on the operational risk
management practices of the organization.
Mechanism Description
Design Responsible for the policies, procedures and tools that comprise
an operational risk management framework. For more on the
contents of an operational risk management framework refer to
the IOR’s paper on embedding operational risk.
However roles and responsibilities are allocated, all three modes of accountability
should be present. Ideally no one person or function should have more than one
mode of accountability, although in smaller organizations this can be difficult to
achieve.
In terms of the application of the three modes of accountability a number of ap-
proaches are possible. This includes:
●● The three modes of accountability are very clearly segregated. This means that
individuals, and the functions or departments in which they are located, can only
have one role (implementation, design or assurance). Usually so-called ‘first-line’
management are allocated responsibility for implementation; the (operational)
risk function in the ‘second line’ has responsibility for design; and in the ‘third
line’ internal audit is responsible for assurance.
Operational Risk Governance 125
●● The individuals responsible for the design of the operational risk management
framework (usually the central risk or operational risk management function) are
allocated an additional oversight role. This means that they monitor those
responsible for the implementation of the framework and take action to correct
any errors or omissions.
One advantage claimed for the three lines of defence approach is that it mitigates the
potential for conflicts of interest within individuals or functions by segregating the
three modes of accountability. The argument being that the more segregated these
functions are, the more likely it is that weaknesses in the design or implementation
will be detected and corrected quickly.
Another claimed advantage of the approach is that by allocating an oversight role
to the designers of the operational risk management framework, errors or omissions
in implementation will be detected quickly, rather than relying on infrequent internal
audits to identify concerns.
However, there are also some significant disadvantages with this approach, as
highlighted by the Chartered Institute of Internal Auditors (IIA, 2020). Firstly, seg-
regating the three modes of accountability, especially when physically segregating
the individuals or functions responsible for them (e.g. by placing them in different
locations), can lead to a serious breakdown in trust and cooperation. Trust and
cooperation are built when colleagues can work together and help one another.
When co-working is inhibited, this can very quickly result in resistance and even
conflict, manifested in issues such as first-line managers not following the opera-
tional risk policy or procedures correctly, a failure to escalate issues of concern, or,
in the extreme, reckless risk taking.
Secondly, a strict interpretation of the three lines approach can prevent those re-
sponsible for designing and assuring the operational risk management framework
from helping those tasked with its implementation. First-line managers and their teams
have many responsibilities and are rarely risk experts. This means that they often
struggle to understand operational risk policies and procedures, and can find their
implementation complex and time-consuming. Hence, without guidance and training
from those experts in the design and assurance of operational risk management frame-
works they are more likely to make mistakes and incur unnecessary resource costs.
In view of the advantages and disadvantages of a strict three lines approach, or-
ganizations should think carefully about implementing one. Where regulators re-
quire a strict three lines approach, one should be implemented. However, in other
contexts, a strict three lines approach is rarely optimal.
sion of the approach in 2020, known as the three lines model (IIA, 2020). The model
states that close collaboration should be maintained by the first and second lines in
particular, although it argues that the third-line internal audit function should re-
main separate from the first and second lines. The three lines model also does away
with the word ‘defence’. This is because it promotes a negative view of risk. As
explained in Chapter 1, risk exposures have positive upsides, as well as negative
downsides. This includes operational risk exposures.
The three lines approach is built on the following core principles:
●● the CEO, managing director and other senior directors and managers;
●● the board of directors or trustees.
Within the five lines approach, the CEO or equivalent is responsible for building and
maintaining a robust risk management framework, including operational risk. They
ensure that the most significant value-creating and value-destroying risks to the or-
ganization’s (strategic) objectives are managed. Responsibility for the management
of these risks is assigned to senior directors and managers who act as the ‘risk own-
ers’, ensuring that their teams identify, assess, monitor and control these risks in an
effective manner.
Under a five lines approach the board has responsibility for ensuring that the
other four lines are performing their roles in an appropriate way. The board also has
responsibility for identifying, assessing, monitoring and controlling the risks associ-
ated with an organization’s objectives, as well as other organization-wide issues such
as succession planning, financial reporting and the performance of the CEO or
equivalent. This means that the board is involved, directly, in the management of
strategically significant operational risks and cannot delegate responsibility for their
management, although the board can of course use the operational risk function,
and other functions, to support its work.
A financial services organization launched a new operational risk and control assessment
approach, and supporting IT system. The initial first-line response to the approach and
system was negative. Staff did not understand how to complete the assessments and in
some cases they were required to repeat work.
128 Fundamentals of Operational Risk Management
●● internal audits that relate to operational risk management and approving the
annual internal audit plan.
●● Reviewing the operational risk policy on at least an annual basis and recommending
approval (or not) of the policy to the governing body.
●● Ensuring that appropriate action is taken to resolve any breaches of the operational
risk policy or breaches of the associated procedures.
●● Reviewing risk profile reports, including reports on operational risk events and
the effectiveness of operational risk controls.
●● Ensuring that operational risk exposures are kept within agreed appetite or
tolerance limits, where relevant.
Though one or more committees may have delegated responsibilities for operational
risk governance, the governing body must retain overall responsibility for the gov-
ernance of operational risk. It is essential that appropriate arrangements are in place
to keep the governing body informed of the work of these committees, especially
that of the board-delegated risk and/or audit committees. The whole board must, at
all times, be confident that a sound system of operational risk governance is in place
across the organization.
Where a hierarchy of committees exists for operational risk it is important that
escalation procedures are agreed to ensure that important risk exposures, events
or concerns are reported in a timely fashion to the relevant level of management.
Table 6.2 summarizes the relevant levels of importance for operational risk-
related governance matters.
risk. To help achieve this, the CRO should also have direct access, whenever required,
to the governing body and all board-delegated committees with responsibilities for
the governance of operational risk.
In relation to operational risk the CRO is the individual with ultimate accounta-
bility for the design of the operational risk management framework and associated
governance arrangements for ensuing that this framework is implemented appropri-
ately across the organization. In this regard the CRO should ideally report to the
chief executive officer (CEO), rather than the chief financial officer (CFO) or the
chief operating officer (COO). This is to ensure fully independent reporting lines for
the implementation and design of the operational risk management framework.
Where it is not possible for the CRO to report directly to the CEO, an alternative
may be for the CRO to report to the CFO, but only providing that the reporting line
of the CRO and risk function remains independent from the day-to-day operations
of the organization (e.g. sales, production, customer services, etc). In such a circum-
stance the CRO should retain direct access to the CEO and governing body in case
of any reporting-line conflicts.
●● having access to the governing body regarding matters concerning the design of
the operational risk management framework and the reporting/escalation of
significant operational risks or control failures that threaten the achievement of
an organization’s objectives;
●● working with the internal audit function to ensure that control weaknesses,
including non-compliance with operational risk policies and procedures, are
identified and rectified;
●● working with compliance colleagues to ensure that rules and guidance relating to
the management of operational risks are complied with.
Operational Risk Governance 133
As in the case of the CRO, the risk function must have an independent reporting line
from managers responsible for implementing the operational risk management
framework. This is to avoid any conflicts of interest between the responsibilities of
risk owners and the risk management function.
●● supporting the work of the governing body and senior managers in relation to
operational risk (e.g. providing advice, guidance, expert opinion, etc);
●● supporting the activities of the risk committee or equivalent;
●● monitoring the organization’s operational risk profile and escalating any concerns
about control weaknesses or exposures that exceed agreed appetite or tolerance
limits;
●● monitoring the risk culture of the organization and helping to influence this
culture where necessary;
●● drafting operational risk policies and procedures;
●● working with risk owners to ensure that operational risk policies and procedures
are implemented correctly (e.g. providing training, coaching, etc);
●● reviewing and improving the operational risk management framework to ensure
that it is user friendly and adds the maximum value for the organization and its
management.
Ideally the governance of all categories of operational risk should fall within the re-
sponsibility of the operational risk function. This will ensure a consistent approach
to the management of operational risk and avoid any gaps or overlaps.
However, in some organizations, areas like business continuity, health and safety,
insurance or security (cyber or physical security) may fall outside the governance
responsibilities of the operational risk function. Where this is the case it is important
that the various functions work closely together. In addition, it is recommended that
they have a common reporting line (e.g. the group head of risk or CRO).
134 Fundamentals of Operational Risk Management
As with the CRO and risk function, it is important that the operational risk
function is able to maintain its independence from the day-to-day operational risk
management decisions taken by risk owners. This should not, however, prevent the
function from providing advice or guidance. The key is to maintain separate re-
porting lines and to ensure that policies and procedures make it clear that risk
owners are accountable for all operational risk management decisions within their
area of responsibility.
In large organizational groups, local (e.g. business unit, divisional or departmen-
tal) operational risk managers may be recruited to support the work of risk owners.
The appointment of local operational risk managers can significantly improve the
implementation of an operational risk management framework and is recommended
when resources allow. It may also be that these local operational risk managers can
help the group operational risk function to review and improve the design of the
operational risk management framework and improve relations between risk own-
ers and the group operational risk function. However, it is important to note that,
from a governance perspective, the recruitment of local operational risk managers is
no substitute for the establishment of a central, group-level, operational risk man-
agement function. Usually, local operational risk managers perform a first-line role;
this means that a second-line group operational risk management function is re-
quired to coordinate operational risk management activities across the organization.
Even where local operational risk managers are assigned second-line responsibilities
it is important that their work is coordinated by a central function.
The operational risk function should work closely with these functions to maximize
the effectiveness of operational risk governance. This might include sharing informa-
tion, developing a common data-collecting and reporting system, providing input
into each other’s management frameworks, and regular relationship management
meetings.
Operational Risk Governance 135
4.1.6 Audit
External and internal auditors (where relevant) have an important role to play in
operational risk governance.
The most essential role is providing assurance to the governing body and senior
management on the effectiveness of the organization’s operational risk governance
arrangements. This might include conducting audits of both the design and imple-
mentation of the operational risk management framework, as well as highlighting
significant risk exposures or control weaknesses.
The operational risk function should maintain good relations with external and
internal auditors. This should include reciprocal information sharing, ideally through
the use of a common IT system; working together to ensure the effective oversight of
the implementation of the operational risk management framework; and, if possible,
requesting input from auditors into the design of the operational risk management
framework, to ensure that it meets their needs.
Finally, it is imperative that the operational risk management function shares any
concerns they may have about the integrity of the internal control environment. This
includes sharing information to external audits about any operational risk events,
exposures or control failures that could affect the integrity of the organization’s fi-
nancial reporting (e.g. frauds, disciplinary action taken against the senior staff in
control functions, financial reporting errors, etc).
●● The purpose and scope of the policy. In particular this section should explain how
the role and objectives of operational risk management supports the wider
objectives of the organization (in terms of achieving profit, ensuring compliance,
etc). This section should also make clear the categories of risk that fall within the
remit of operational risk management.
●● Key operational risk terms and definitions (e.g. distinguishing inherent and
residual risk or explaining terms like ‘risk events’, ‘near misses’, etc). This helps to
establish a common language for operational risk management.
136 Fundamentals of Operational Risk Management
Monetary incentives should be kept small, if used. The higher the stakes, the greater
the possibility that staff will attempt to game the system. Never underestimate the
power of small-scale, even symbolic incentives. This might include an employee of
the month or year award, for individuals who demonstrate good operational risk
governance.
Operational Risk Governance 137
4.4 Reporting
Effective governance is impossible without information. From an operational risk
perspective this requires information on the organization’s operational risk profile,
significant control weaknesses, and non-compliance with the operational risk policy
and procedures. Further information on risk reporting is provided in the chapters on
risk and control self-assessments and risk indicators (Chapters 7 and 9).
●● the organization’s exposure to operational risks that may threaten the achievement
of its objectives, or which exceed agreed appetite or tolerance limits;
138 Fundamentals of Operational Risk Management
The significance of any operational risk exposures, control weaknesses and policy
breaches should be agreed with the recipients of the reports. As a rule, a significant
weakness is one that might have a material effect on the cash flows or balance sheet
of an organization, damage its reputation, breach debt covenants, or result in legal
or regulatory sanction.
●● shareholders;
●● creditors;
●● rating agencies;
●● regulators;
●● supplies;
●● customers;
●● employees.
The nature and sensitivity of this information will vary. It is particularly important
to provide the fullest possible disclosure to rating agencies and regulators. Suppliers
and especially commercial customers may also require detailed information on an
organization’s operational risk exposure, and the design of its operational risk
management framework.
It is essential that the operational risk function is involved in all aspects of
external reporting. This function has the best understanding of the framework
and the organization’s risk profile. Where the function is not involved (e.g. in the
writing of the annual report and accounts) there is a danger that inaccurate or
incomplete information might be reported.
Operational Risk Governance 139
Periodic (e.g. every two to three years) audits of the governance arrangements for
operational risk are recommended. These may be conducted by the internal audit
function or specialist consultants. The purpose of these audits should be to bench-
mark against peers to ensure that the arrangements remain up to date.
5. Conclusion
Effective operational risk governance, from the board of directors down, is essential
for the survival and success of every organization. The operational risk governance
architecture and activities described in this chapter should produce direct benefits to
the organization. For example, the proper analysis of operational risk exposures and
events should lead to fewer losses and near misses, reducing costs and enhancing effi-
ciency. In so doing, governance activities should help to embed the management of
operational risk across the organization, not be perceived as unnecessary ‘red-tape’.
Good governance never exists for its own sake, it must be value adding to be effective.
1 Are you aware of the key formal and informal elements that comprise the
operational risk governance architecture of your organization? What steps have
you taken to manage both these formal and informal elements to improve
operational risk governance?
2 Does the board of your organization regularly discuss the organization’s
operational risk profile and any exposures or control weaknesses of organization-
wide significance?
140 Fundamentals of Operational Risk Management
References
Ashby, S, Bryce, C and Ring, P (2019) Risk and performance: Embedding risk management,
ACCA Professional Insight Report, www.accaglobal.com/content/dam/ACCA_Global/
professional-insights/embedding-risk/pi-embedding-risk-management.pdf/ (archived at
https://perma.cc/Y8RV-E2QK)
Farber, D B (2005) Restoring trust after fraud: Does corporate governance matter?, The
Accounting Review, 80 (2), 539–61
FRC (2018) UK Corporate Governance Code, Financial Reporting Council, www.frc.org.uk/
directors/corporate-governance-and-stewardship/uk-corporate-governance-code (archived
at https://perma.cc/7SU4-ZLNU)
IIA (2015) Internal audit, risk and corporate governance: The three lines of defence model, IIA
Policy Paper, Chartered Institute of Internal Auditors, www.iia.org.uk/policy-and-research/
position-papers/the-three-lines-of-defence/ (archived at https://perma.cc/BB93-CA9B)
IIA (2020) The IIA’s three lines model: An update of the three lines of defence, IIA Policy Paper,
Chartered Institute of Internal Auditors, https://global.theiia.org/about/about-internal-
auditing/Pages/Three-Lines-Model.aspx (archived at https://perma.cc/SRU3-GU2Q)
Leech, T and Hanlon, L (2016) Three lines of defence versus five lines of assurance, The
Handbook of Board Governance: A comprehensive guide for public, private, and
not-for-profit board members, John Wiley & Sons, New Jersey, 335–55
Michelon, G, Rodrigue, M and Trevisan, E (2020) The marketization of a social movement:
Activists, shareholders and CSR disclosure, Accounting, Organizations and Society, 80, 101074
Nichols, T and Walters, D (eds) (2013) Work, Health and Environment Series: Safety or
profit? International studies in governance, change and the work environment, Baywood
Publishing Co, New York
OECD (2015) G20/OECD principles of corporate governance, OECD Publishing, http://dx.
doi.org/10.1787/9789264236882-en (archived at https://perma.cc/4NA8-W5SZ)
Sahut, J M, Peris-Ortiz, M and Teulon, F (2019) Corporate social responsibility and
governance, Journal of Management and Governance, 23 (4), 901–12
141
L E A R N I N G O U TCOM E S
●● Know how to construct and assemble the components that comprise a risk and
control self-assessment.
●● Compare different approaches to the conduct of risk and control self-
assessments (e.g. workshops versus questionnaires).
●● Explain how to make effective use of the outputs from risk and control self-
assessments to support decision making in organizations.
1. Introduction
The risk and control self-assessment (RCSA) is an integral part of most operational
risk management frameworks. RCSAs provide a structured mechanism for estimat-
ing operational exposures and the effectiveness of controls. In so doing RCSAs help
organizations to prioritize operational risk exposures; identify control weaknesses,
along with control gaps and overlaps; and monitor the actions taken to address any
weaknesses, gaps or overlaps.
This chapter will explore how to design and implement effective RCSAs. A well
designed and implemented RCSA can help to embed operational risk management
across an organization, improving management attitudes towards operational risk
management and enhancing the overall risk culture. In contrast, an inefficient or
unnecessarily complex RCSA can damage the reputation of the (operational) risk
function and reinforce the perception that operational risk management is a bureau-
cratic, compliance-focused exercise that does not support the achievement of
organizational objectives.
In addition, this chapter will explore how to make effective use of RCSAs to sup-
port decision making. Here, it cannot be emphasized enough that the output from
RCSAs is about much more that the production of technical data. Though RCSAs
142 Fundamentals of Operational Risk Management
can, and should, be used to help assess, even quantify where necessary, operational
risk exposures, they are equally important as a mechanism for promoting open dis-
cussions about operational risk. Many operational risks are hard to identify, let
alone quantify. This is because of a lack of accurate loss data and because new risks
emerge on a regular basis. Equally, the effectiveness of specific controls can be hard
to assess accurately. However, despite these difficulties, operational risks and their
associated controls must not be ignored. Organizations that discuss, openly, their
operational risks and the effectiveness of their associated controls should be better
prepared for what the future holds, improving the proactivity of their operational
risk management activities.
Research into the practice of risk management in organizations has highlighted the
importance of ‘risk talk’ (Arena, Arnaboldi and Palermo, 2017; Mikes, 2016).
Risk talk is a structured mechanism for talking about risk issues, including operational
risk-related threats and opportunities, and the efficiency and effectiveness of operational
risk controls. Often this structure is provided by a tool such as RCSAs. In addition,
opportunities must be created for the conduct of risk talk, such as through the organization
of RCSA workshops. Expert facilitation by a relevant risk professional helps also.
The aim of risk talk is to come up with shared, unbiased, solutions for solving risk
problems in organizations, solutions that are the result of balanced, evidence-based
discussion, using the results of an RCSA, for example. Effective risk talk helps to reduce
the potential for instinctual and ill-considered ‘Systems 1’ thinking and promotes slower,
deliberate and logical ‘Systems 2’ thinking. Systems 2 thinking has been promoted as the
best route to effective decision making in environments of risk and uncertainty
(Kahneman, 2011).
An effective RCSA can also help support the governance and compliance activities of
an organization. The results of an RCSA provide assurance to the governing body
and regulators that an organization has in place a sound system for the management
of operational risks. Equally RCSAs can support the work of internal and external
auditors, helping them to prioritize audit attention and structure audit reports.
Finally, RCSAs can help to improve business efficiency. Weaknesses or gaps in
controls can increase the chance of system and process failures and the impact of
external events, increasing costs and the potential for disruption. In contrast, an
excessive level of control can slow down systems and processes unnecessarily.
Risk and Control Self-Assessments 143
Combinations of the above three approaches may be used to further refine the
application and scope of an RCSA. For example, option 2 might be conducted using
the level-1 risks in a categorization, option 3 the level 2-risks to increase granularity.
As in any risk management activity the costs and benefits of a more or less com-
prehensive RCSA approach must be considered. A fully comprehensive approach is
not necessarily best, especially if it results in information overload and requires ex-
cessive amounts of time and effort to complete. RCSAs should only be used where
they are value adding, meaning that the benefits must exceed the costs.
The downside of a process approach is the time required to map processes. The
greater the detail, the more comprehensive will be the set of identified operational
risk exposures. However, detailed process maps can take a considerable amount of
time and expertise to complete accurately.
Where an organization has detailed process maps in place already, it is recom-
mended that these are used as the basis for identifying operational risks for RCSAs.
However, where such maps are not in place, the costs involved in creating them are
likely to be excessive.
Role Responsibility
Senior Responsible for supporting the work of the board. This includes
Management ensuring that an effective RCSA approach is in place. Where
present the chief risk officer (CRO) will have primary responsibility
for overseeing the design and implementation of the RCSA.
Data Owner Responsible for providing data to risk and control owners to
enable them to complete the RCSA.
Internal Audit Provide assurance on the design and implementation of the RCSA
to senior management and the governing body.
Roles and role terminology may differ in organizations. Some may not use terms like
risk, control, or data owner, for example. In all cases it is essential when using RCSAs
to establish individuals responsible for the following:
A university was designing a new RCSA tool. To help save time when completing
assessments, a 3x3 risk matrix was selected. Tests of the tool indicated that users found it
relatively easy to assign a low, medium or high value for probability and impact.
Acceptance of the new tool was high. Users found it quick and easy to use. However,
the decision did result in a significant cluster of risks rated at 2 for probability and 2 for
impact.
To help address this cluster the operational risk function commenced a challenge
process. Risk owners were asked to provide evidence to justify the assessments, with a
particular focus on the cluster of medium-level risks. This challenge process helped to
stimulate debate about the university’s risk exposures and resulted in a more dispersed
priority order of operational risk exposures.
The key point about an ordinal scale is that data is shown in order of magnitude
only, meaning that 2 is larger than 1. With an ordinal scale it is not possible to deter-
mine how much bigger 2 is than 1 because there is no standard of measurement for
the differences between these two values. Sporting leagues are another example of
Risk and Control Self-Assessments 149
ordinal scales. It is possible to say that the team at the top is the best team, but not
how much better this team is relative to the others in the league. Table 7.2 illustrates
a simple 3x3 ordinal scale risk matrix for probability and impact.
Probability Impact
1 Rare 1 Low
2 Possible 2 Medium
3 Frequent 3 High
Impact
1 1 2 3
Probability 3 3 3 6 9
2 2 2 4 6
1 1 1 2 3
To assist in the use of ordinal scales, points of reference should be provided to help
users decide on the appropriate scale of probability and impact. A simple example is
provided in Table 7.3.
Probability Impact
(continued)
150 Fundamentals of Operational Risk Management
Probability Impact
Organizations should always determine their own points of reference for impact.
These should be linked to the size of the organization (especially in terms of cash
flows and assets and its strategic objectives). In terms of size, a loss of £1 million may
be significant for a small organization, but insignificant for a large organization with
a strong balance sheet. Financial values are the most common point of reference
when estimating impact, but some organizations also include non-financial values
like customer satisfaction or reputation. For factors like customer satisfaction or
reputation one option is to look at the number of complaints or bad news stories.
Another is to assign a financial equivalence value, such as a reputation event with an
equivalent impact of £1 million, £10 million, etc.
It is recommended to start only with financial values and to add non-financial
impacts later. A greater number of reference points should, in theory, improve the
accuracy of the assessment, but it also increases the time required for completion.
In terms of probability, it is normal to link this to either probability ranges (e.g.
0.8–1 for high, 0.5–0.79 for medium, etc) or temporal frequency, in terms of the
number of events every year or number of years. Table 7.3 provides an example that
may be used as a starting point.
Though qualitative risk matrices are used widely it must be emphasized that, at
best, they provide a rough estimate of an organization’s operational risk exposures,
at worst they can be biased and misleading (Cox, 2008). That said, recent research
shows that the value of using risk matrices in tools like RCSAs is less about the
production of risk exposure estimates and more about the conversations (risk-talk)
that are stimulated by the use of these tools (Jordan, Mitterhofer and Jørgensen,
2018). From a practical perspective this implies that the results of RCSAs should
never be assumed to be wholly accurate. But what they do offer is an opportunity
to raise awareness of operational risk and to improve an organization’s ability to
both predict and respond to operational risk events.
3.1.4 Causes
Operational risks are typically categorized on an event basis (see Chapter 3). This
means that inherent and residual risk assessments usually refer to an organization’s
exposure to specific operational risk events (e.g. the probability and impact of an IT
systems failure).
152 Fundamentals of Operational Risk Management
However, events rarely occur in isolation and may be caused by a range of factors.
For example, an IT systems failure may be the result of a power cut, a hacking at-
tempt or a faulty update, or a combination of all three.
Hence some RCSAs include information on the causes of risk events. This helps to
provide further information to assist in probability assessments. It can also be used
to help link controls to specific causes of risk events, and to check that controls are
in place to address all of the most significant causes.
By linking events and especially controls to causes RCSAs can be made more pro-
spective, helping organizations to better prevent future operational risk events. By
collecting information on causes it can also be possible to link events, thus identify-
ing how a particular cause or control failure in relation to a specific cause may pre-
cipitate a chain of operational risk events.
3.1.5 Effects
At the other end of the cause–event–effect chain are the effects of operational risk
events. Operational risk events have a range of effects (e.g. financial, business disrup-
tion, reputational and physical). Equally the size of these effects can vary. For exam-
ple, a small fire, contained to a limited area, compared to one that destroys a whole
building or site.
Certain controls are designed to reduce the effects of operational risk events (e.g.
insurance, sprinkler systems and business continuity plans). Hence some RCSAs col-
lect information on effects to help link the relevant controls to these effects. For ex-
ample, a sprinkler system will reduce the effect of a fire, but only if the system is well
designed and maintained. Equally the establishment of an IT contingency site can
help to reduce the effect of system failures, but only if the site is well maintained and
tested on a regular basis.
By collecting information on effects, it is possible to determine whether an ap-
propriate mix of controls are in place to address them, or whether there are gaps that
need to be filled, for example effects for which no controls are currently in place.
Control
Effectiveness Description
●● frequency with which business continuity plans are tested and updated, including
whether tests or updates are overdue;
●● the results of IT security penetration tests;
●● results of portable appliance testing, and whether tests are overdue (or alternatively
fire alarm and extinguisher testing);
●● number of errors identified in financial transactions or reconciliations;
●● identified breaches of policies and procedures.
Hence indicators may either be related directly to the operation of a control, or the
frequency and reliability of any reviews conducted to test effectiveness. For more on
the collection and use of control indicators please refer to Chapter 9.
1 Risk is undercontrolled, meaning that there are gaps in the control environment
that need to be filled.
2 The overall level of control is appropriate, meaning that the control environment
contains an appropriate mix of controls.
3 Risk is overcontrolled, meaning that some controls are unnecessary, and it may be
possible to remove them.
Loss event and near miss data (see Chapter 8), coupled with internal audit reports,
can provide valuable information on the overall effectiveness of the control environ-
ment. They may both highlight potential gaps in the control environment, while
internal audits may sometimes identify obsolete controls.
Care should be taken when adding new elements – at all times it is important to
weigh the costs and benefits. As explained above, the more detailed and complex an
RCSA is, the longer it will take to complete.
1 spreadsheet;
2 IT system.
Most organizations will design top-down and bottom-up RCSAs. The advantage
of a top-down approach is that strategic-level risks can be cascaded down, and
aligned to the risks, controls and actions identified in departments, divisions or func-
tion assessments. This can help to improve operational risk governance and ensure
that organization-wide and local priorities are aligned.
The advantage of a bottom-up assessment is that local managers are able to focus
on the risks and controls that are relevant to their area. Equally significant local risks
may be escalated for top-level consideration, as may significant correlations between
local-level risks in different areas.
Top-down and bottom-up RCSA templates must be consistent, using similar ele-
ments and terminology. This will facilitate the cascade of operational risk informa-
tion up and down the organization. However, given the time limitations of senior
managers it may be appropriate to develop a shorter, less complex template for them
to complete.
Identify and invite Determine who should attend the workshop and confirm
participants their attendance. If key attendees find that they are no longer
available they should be asked to nominate a delegate.
Workshop scope and Agree the scope and objectives of the workshop with the
objectives participants. For example, it may be that only a specific
category of operational risks will be considered (e.g. IT risks)
or specific operational processes (e.g. customer processes).
Sometimes risks are identified as part of the RCSA process.
This means that the workshop will begin by identifying the
relevant risks. However, it is recommended that the primary
categories of risk (e.g. the relevant level-1 categories) are
identified in advance. This will help to save time during the
workshop.
Supply standard Ensure attendees understand what an RCSA is, the
documentation (RCSA information required, and how the workshop will be
process and workshop performed.
agenda)
Organize a facilitator Workshops will require an expert facilitator skilled in RCSA.
The facilitator should be impartial and may be a member of
the (operational) risk function, a risk expert from another part
of the organization or an external consultant.
The role of the independent observer is to look for potential bias. The observer
should only speak if they are concerned that a risk exposure or control effectiveness
assessment is being over or underestimated.
Care should be taken when inviting managers to workshops, especially senior ones.
Often managers need to attend because they are the relevant risk or control owners.
However, there is a danger that they may dominate the discussion and/or discourage
others from raising concerns. Here the role of the facilitator is key, along with the in-
dependent observer. They should be of sufficient seniority to ensure that management
do not take over a workshop or use it to pursue a particular political agenda.
By focusing discussion at the workshops on these core aspects (i.e. risks, controls and
action planning), other additional requirements such as control testing, agreeing
action due dates, or allocating and amending risk and control ownership, can be
finalized outside of the workshops. In all cases, it is critical to remember that respon-
sibility for, and ownership of, the business objectives, processes, risks and controls
and their proper identification lies with local management. The workshop is merely
a tool designed to assist them in discharging that responsibility effectively.
4.1.4 Facilitation
The use of a skilled facilitator helps to reduce subjectivity and bias and identify po-
tential conflicts of interest and political manoeuvring (e.g. over or understating a risk
to influence resource budgets).
Some organizations prefer to facilitate their own internal RCSAs, others will use
external facilitators. When using internal facilitators, it is permissible to use experts
from the risk or audit functions, providing it is made clear that ownership of the as-
sessment and its outcomes rests fully with local management (e.g. the relevant risk
and control owners).
160 Fundamentals of Operational Risk Management
The role of the facilitator requires a specific skill set, as outlined in Table 7.7.
4.1.5 Validation
To help combat assessment bias it is recommended that the output from similar
workshops are compared. This should help to reveal significant outliers in terms of
responses. Usually, this work should be completed by the (operational) risk function.
For example, it should be possible to compare risk and control assessments for
similar risks across departments and functions. Where an assessment of a particular
risk or type of control differs significantly, a discussion should be had with the rele-
vant managers to confirm whether there are good reasons for these differences.
Note that care should be taken when asking for amendments to RCSAs. The op-
erational risk function must, at all times, ensure that RCSAs are owned by the man-
agers (e.g. risk owners) responsible for them. This may sometimes require tolerance
of assessments that are slightly biased. But a flag should be placed on such assess-
ments to ensure that this is signalled, especially when reporting RCSA output to
senior management.
4.2 Questionnaires
Questionnaires can be used to collect some or all of the information required for an
RCSA. Questionnaires may be used as a substitute for a workshop, to help save time
and resources. But they are most effective when combined with workshops. Here the
Ensure that the RCSA process is Create a safe space for discussion, ensure that
followed all perspectives are valued
Involve all attendees in the discussion Summarize discussions clearly and accurately
and set priorities
Ensure that decisions, actions, and any disagreements are recorded (may use a note-
taker to support this)
Risk and Control Self-Assessments 161
initial thoughts of RCSA participants can be collected via the use of a questionnaire
and a workshop can be used to discuss the findings.
It is also possible to use questionnaires to reach a wider audience than the few
who may be invited to a workshop. This should reduce the chance that risks or con-
trols are omitted, and help to control individual biases.
The questionnaire should be kept as short as possible. The longer the questionnaire
the greater the chance that respondents will either give up answering or provide
random responses.
Socio-demographic questions (e.g. age, gender, etc) are not usually necessary so
should be omitted to reduce the length of the questionnaire. The only potentially
162 Fundamentals of Operational Risk Management
relevant questions are the department or function in which an individual works and
their level of seniority.
●● Standard questions are written centrally, usually by the operational risk function.
These will address the minimum content identified above.
●● Non-standard questions are written locally by the relevant management to address
specific operational risk and control issues or concerns.
Structured What-If Structured what-if technique (SWIFT) is a systematic team-oriented technique most commonly used for the
Technique assessment of health and safety and environmental-related risks and controls in areas like chemical processing
and manufacturing, but it can be applied in many other ways. The technique uses a series of structured ‘what-if’
and ‘how-could’-type questions to consider how deviations from the normal operation of systems, processes and
controls may result in risk events.
Brainstorming is supported by checklists to help focus the discussion. SWIFT relies on expert input and the use of
a ‘SWIFT leader’ to structure the discussion. The SWIFT recorder keeps an online record of the discussion on a
standard log sheet.
There is no single standard approach to SWIFT – one of its strengths is that it is flexible and can be modified to
suit each individual application.
SWIFT is an expensive technique to use, because of the time and people involved. But it is more likely to address
all relevant risk events and controls. This is why it is most commonly used in hazardous sectors such as chemical
processing or nuclear power generation.
For an application of SWIFT in the context of operational risk assessments see Card, Ward and Clarkson (2012).
The paper focuses on the healthcare sector but is equally applicable to other sectors.
Delphi Technique The Delphi technique is an information-gathering tool that is used as a way to reach a consensus of experts on a
subject (Hsu and Sandford, 2007), in this case the completion of RCSAs. Each expert participates anonymously,
and a facilitator uses a questionnaire to solicit ideas about the important points related to the subject. The
responses are summarized and recirculated to the experts for further comment. Consensus may be reached in a
few rounds of this process.
In relation to RCSA the Delphi technique helps reduce bias and keeps any one person from having undue influence
on the assessment. A range of experts can be used including risk management specialists, other functional
specialists (IT, HR, governance, etc) and department and functional management (e.g. operations managers,
accountants, etc).
Anonymity is key because it encourages the experts to be as honest and open as possible. Studies have shown
that the technique can be very effective at predicting future outcomes, but it also very time-consuming, especially
if consensus is hard to reach.
(continued )
163
164
Table 7.8 (Continued)
Technique Description
Root Cause Analysis Root cause analysis assumes that operational risk events have multiple causes. For example, a fire-risk event
needs: material to burn, a spark and oxygen before it can cause damage. Root cause analysis adds depth to an
RCSA through an exploration of how and why an event may occur, the emphasis being on future prevention by
improving existing controls or adding new ones to address previously unforeseen causes.
Root cause analysis approaches vary, but most are based on four principles:
●● identify the causes of an event;
●● establish the timeline from normal operations to a risk event;
●● distinguish between root causes and more immediate causes;
●● use the results to help assess exposure and control effectiveness.
Often the causes of an event, as well as the order in which the causes may arise, are identified using the ‘five
whys’ technique. This asks ‘why’ questions such as:
●● Why did a fire occur? Because combustible material started to burn.
●● Why did the material burn? Because a spark caught the material alight.
●● Why did the spark occur? Because an electrical fault occurred in the building’s wiring.
●● Why did the electrical fault occur? Because the wiring was old.
●● Why was the wiring old? Because the wiring had not been safety inspected.
More or less ‘why’ questions than five may be used to get to the root cause, but usually it is possible to get to the
underlying process failure in five questions. Further questions could still be used in this example to identify why a
safety inspection has not been carried out, for example.
Root cause analysis is time consuming, and it is rarely practical or cost-effective to use it for all RCSAs, but it is a
good technique to use when assessing the most significant operational risks across an organization. For a detailed
discussion of the tools and techniques associated with root cause analysis see Andersen and Fagerhaug (2006).
Risk and Control Self-Assessments 165
The size and frequency of actual loss events provides an indication of what may
occur in the future, assuming current trends remain the same. Equally, operational
loss events can often be linked to specific control failures or gaps in the control en-
vironment, providing information on control effectiveness.
Where RCSA results differ significantly from the available internal or external loss
data, additional validation work may be required. This work should consider both
the accuracy of the RCSA output and the effectiveness of loss data collection. For
example, it may be that a high level of predicted residual exposure, relative to re-
ported loss events, is the result of assessment bias, or it could be that the loss data is
incomplete.
●● Narrative reports (descriptions of the various risk exposures and any control
weaknesses, may be presented in the form of a risk register).
●● Heat maps and red–amber–green (RAG) traffic-light reports.
●● Dashboards (risk, control effectiveness and performance indicators, usually
presented using trend diagrams, pie charts, etc).
166 Fundamentals of Operational Risk Management
●● Benefits log (a log of any improvements made to the control environment, such as
enhanced control effectiveness, removal of obsolete controls, etc, and the effects
of these in terms of reduced operating costs, improved efficiency, etc).
As a general rule, the more senior (high level) the audience, the less detail should be
reported. For the governing body and senior management, the focus should be on the
most significant areas of risk/control weakness that have the greatest potential to
damage the organization and prevent it from achieving its objectives.
Conversely, reporting for line managers can contain more detail, as the additional
information may be helpful to them in determining the best course of action and for
the purposes of detailed monitoring of progress of action plans against agreed mile-
stones and deliverables. Also, whatever the level of the audience, emphasis should be
placed on keeping it pertinent and relevant to the audience for which it is intended.
The maintenance of a benefits log is highly recommended. These logs can be used
to improve buy-in across the organization, thus improving the timeliness and accu-
racy of RCSAs. Such a log provides a tangible record of why RCSAs are a worthwhile
exercise that can add value to the business.
●● a change of supplier, where sensitive data was discovered in one of its vehicles
overnight as part of a controls testing process;
●● the removal of outdated manual controls (e.g. the use of a company seal stamp for
certain legal documents), where these were superseded by automated procedures;
●● improvements to the credit scoring model due to the discovery of unreliable data on
personal bankruptcies.
By recording and reporting these benefits, support for the new RCSA approach improved.
Management were able to see how the approach was improving the efficiency and
effectiveness of their operations.
Risk and Control Self-Assessments 167
1 Acceptance – no further action is taken, either because the residual risk exposure
is within appetite, or the cost of additional control is excessive relative to the
benefits earned.
2 Mitigation – this will involve enhancing the level of control (improving control
effectiveness or introducing new controls) to reduce the likelihood (loss
prevention) and/or the impact of the risk (loss reduction).
3 Transfer – this may involve financial risk transfer to an insurer, or the physical
transfer of risk to an external service provider (e.g. the use of a specialist
contractor for the removal/processing of hazardous materials).
4 Avoidance – where changes are made to an activity, process or system to reduce
inherent risk exposure.
All action plans must specify what is to be done, by whom and by when. Progress
against completing action plans should be monitored until completion. Depending
on the significance of the action, progress may be monitored by the governing body,
a board-delegated committee, the (operational) risk function or local management.
In relation to the physical transfer of risk, regulations in certain sectors, such as
financial services, do not permit the transfer of certain operational risks to external
service providers (e.g. risks that may impact on the financial or physical wellbeing of
the organization’s customers). It is recommended that readers check their local re-
quirements before attempting to use external service providers for operational risk
transfer purposes. Even in the absence of such regulations it is good practice to
maintain appropriate oversight over the work of external service providers to ensure
that they do not take inappropriate levels of risk. For example, by ensuring that they
do not take health and safety shortcuts.
168 Fundamentals of Operational Risk Management
It is also recommended that the internal audit function should review, periodically,
the effectiveness of the RCSA to ensure that it remains effective and proportionate.
6. Conclusion
This chapter has explained how to design and implement effective RCSAs. The
RCSA tool is an important part of most operational risk management frameworks.
However, if poorly designed and implemented the outputs can do more harm than
good. Like any operational risk management tool, the RCSA must be value adding,
not a bureaucratic, compliance-oriented, box-ticking exercise. Excessive complexity
or prescription can result in a process where the costs exceed the benefits. Remember
that the output from an RCSA is not the end of the process. Rather it is just the start
of meaningful conversations about operational risk. Such risk talk should be
designed to promote a considered, reflective attitude towards operational risk expo-
sures that reduce, as much as possible, the potential for instinctual bias.
4 Do you use your RCSA to help reduce excessive control as well as control
weaknesses?
5 How do you mitigate the potential for assessment bias? Do you use tools like
workshops and RCSA challenge processes to overcome bias?
6 Would you consider using techniques like Root Cause Analysis and SWIFT to
improve the quality of the output from your RCSA?
Expected
Risk Residual Action Action Target Residual
ID Description Risk Required Owner Date Risk
Outside Appetite
12c Significant Medium Introduce J Brown 30/09/20 Low
disruption to desktop
normal walkthrough
business exercises
operating twice a year
environment
References
Arena, M, Arnaboldi, M and Palermo, T (2017) The dynamics of (dis) integrated risk
management: A comparative field study, Accounting, Organizations and Society, 62,
65–81
Andersen, B and Fagerhaug, T (2006) Root Cause Analysis: Simplified tools and techniques,
2nd edn, Quality Press, Milwaukee
Card, A J, Ward, J R and Clarkson, P J (2012) Beyond FMEA: The structured what if
technique (SWIFT), Journal of Healthcare Risk Management, 31 (4), 23–9
Cox, A L (2008) What’s wrong with risk matrices?, Risk Analysis: An international journal,
28 (2), 497–512
Hsu, C C and Sandford, B A (2007) The Delphi technique: Making sense of consensus,
Practical Assessment, Research, and Evaluation, 12 (1), 10
Jordan, S, Mitterhofer, H and Jørgensen, L (2018) The interdiscursive appeal of risk
matrices: Collective symbols, flexibility normalism and the interplay of ‘risk’ and
‘uncertainty’, Accounting, Organizations and Society, 67, 34–55
Kahneman, D (2011) Thinking, Fast and Slow, Macmillan, New York
Mikes, A (2016) The triumph of the humble chief risk officer, in M Power (ed), Riskwork:
Essays on the organizational life of risk management, Oxford University Press, Oxford,
pp 253–73
Tversky, A and Fox, C R (1995) Weighing risk and uncertainty, Psychological Review,
102 (2), 269
171
Operational loss 08
events
L E A R N I N G O U TCOM E S
●● Explain the benefits associated with collecting external and internal
operational loss event data.
●● Know how to design and implement an operational loss event data collect tool.
●● Know how to use an operational loss event data collection tool to support risk
reporting and decision making.
1. Introduction
Operational loss event data collection, analysis and reporting is the backbone of a
sound framework for the management of operational risk. Data on actual events
provides a tangible source of information on the probability and impact of opera-
tional risks, helping to reduce the subjectivity of operational risk assessments and
reports. Data also provides organizations with the opportunity to learn from past
events, where effective hindsight can promote more accurate foresight.
This chapter explains how to design and implement processes and procedures for
the collection and use of internal operational loss event data and for the use of ex-
ternal loss event data, where appropriate. As a general rule the more data that can be
collected, the better. A large dataset will cover a greater range of potential events,
improving the statistical accuracy of the reports produced using this data. External
data can help a lot in this regard, adding to the smaller number of internal events
that are likely to be recorded. However, the usefulness of external data can depend
on its relevance for the organization in question. Different organizations can experi-
ence different degrees of operational risk exposure, meaning that data from other
organizations is not always comparable.
In this chapter the emphasis will be on operational losses. Current practice fo-
cuses on the collection of downside, loss outcomes only. It is theoretically possible to
collect data on the upside outcomes of operational risk exposures (e.g. the potential
172 Fundamentals of Operational Risk Management
for an unexpected efficiency improvement), but in practice such events are all but
impossible to identify. Loss events normally have a tangible impact on the bottom-
line finances of an organization. Efficiency gains will provide gradual gains over
time. Benefit logs are one way to collect information on the upside outcomes of op-
erational risk exposures.
Figure 8.1 S imple exponential probability density and cumulative distribution functions
(author’s own)
1 0.5
Cumulative probability
Probability density
0.5
0.25
0 2 10 0 2 10
Loss impact Impact
£ million £ million
Operational Loss Events 173
Pandemics are nothing new. Neither is the fact that pandemics can impact on the
operations and supply chains of organizations. Pandemics such as SARS (Severe Acute
Respiratory Syndrome) in 2002–04, MERS (Middle East Respiratory Syndrome) in 2012 and
Ebola in 2013–16, caused global concern and prompted many organizations to improve
their operational risk management practices to address future pandemics.
The rapid spread of Covid-19 shocked many governments and organizations.
Organizations were doubly surprised by the unprecedented measures taken to control the
spread, which included travel bans, household lockdowns and the closure of non-
essential businesses.
Based on the available historical evidence few would have predicted that the
operational impact of the Covid-19 virus would have been as large as it has been. In this
regard the pandemic is an important lesson for organizations – expect the unexpected
and be ready to manage impacts far greater than imagined previously.
174 Fundamentals of Operational Risk Management
Hence, even where plentiful amounts of operational loss event data are available, it
must be remembered that the potential to construct forward-looking PDFs and
CDFs using this data is limited. Large amounts of loss data are of limited statistical
use if the world of operational risk is changing.
Table 8.1 Using internal data to support the operational risk management process
Identification Loss events may reveal new operational risk exposures not
previously identified. New exposures may arise as a result of social
and technological change, for example new types of cyber risks
associated with developments in hardware or social media.
i nformation about each event, including specifics about which organization incurred
the loss, and the details of the control failures, contributory factors and aftermath of
the event. Various operational risk management advisory organizations provide pub-
lic source data services for a fee (e.g. the RiskBusiness Newsflash Library, www.
RiskBusiness.com).
Public source databases are usually cheaper and there are no reciprocal reporting
requirements. However, the public nature of the data means that it is unlikely to be
as accurate or complete. Nevertheless, public data can provide a valuable source of
information on low-probability, high-impact risk events, as these are the ones that
tend to reach the media. They may also reveal emerging operational risks, where
events have occurred in other organizations (e.g. new types of cyber risk).
Consortium data is most common in the financial services sector. Here organiza-
tions like ORIC International, ORX and the Global Operations and Loss Database
(GOLD) provide specialist datasets for banks and insurers. Outside of the financial
services sector, corporate insurance providers and brokers sometimes provide exter-
nal operational loss data to clients, but there is no commercially available c onsortium
product.
176 Fundamentals of Operational Risk Management
Research into organizational crises and disasters has revealed that large-scale
operational loss events are usually preceded by a number of small-scale near misses
(Elliott, Smith and McGuinnes, 2000; Tinsley, Dillon and Madsen, 2011). If organizations are
able to detect these near-misses and take corrective action (e.g. by enhancing the control
environment), then there is a good chance that they may avoid disaster. If they do not,
then the potential for disaster remains high.
A tragic example of the dangers associated with ignoring near misses was the King’s
Cross Fire in 1987. Wooden escalators caught fire, resulting in a major incident that cost
31 lives and injured 100 more people.
The cause of the fire was a discarded match (used to light a cigarette) that was
dropped beneath an escalator. Rubbish routinely collected beneath the escalators, and
this caught fire. Initially the fire appeared minor, but it suddenly erupted into a ‘flashover’
that spread fire and smoke into the ticket hall.
Prior to the fire, smouldering incidents were known to occur. Discarded matches and
cigarettes routinely caused minor fires under escalators. The inquiry into the fire (Fennell,
1988) criticized London Underground for complacency towards fire safety. Because there
had never been a fire-related fatality, concern for fire was low and staff were given little
or no training on fire safety. Fire safety was much improved after the incident, making the
London Underground one of the safest mass-transportation systems in the world. Had
management taken note of the many smouldering events that had taken place before the
fire, and improved safety earlier, the lives lost and injuries that resulted would have been
prevented.
some time before it was detected. For example, pollution may occur on a site, but not
be detected for some weeks, months or even years. Identifying the very first date an
event manifested can be a time-consuming exercise that requires considerable detec-
tive work. However, it can facilitate things like insurance claims and may help an
organization to improve its ability to detect events in a timely fashion in the future.
Plus, where an event is found to have occurred in an earlier accounting year it may
be appropriate to amend the accounts, especially if it impacted on reported profits,
and hence corporation tax, for example.
4.3 Location
Along with recording the date and time of an operational loss event, it is essential to
collect data on the location of the event. For larger, more dispersed, organizations
this is especially important, as it allows them to build a ‘geographical’ profile of loss
events. Where a geographical area has a higher proportion of the total losses than
might be expected, adjusting for its size/significance (e.g. adjusting for the number of
employees, operational output, etc), this may indicate control or operational risk
governance weaknesses or an inappropriate operational risk culture.
Location includes the physical location of an event (e.g. the establishment or site
in which the event occurred) and the business unit(s), function(s) or department(s)
from which the event originated (e.g. Finance, Operations, HR, etc). For larger estab-
lishments or sites, it may be appropriate to record the building, room or production
line in which an event has occurred. This will help to provide more granular infor-
mation on where operational loss events occur. For example, it may be that fires are
more prevalent in a particular building because of some local weakness in fire safety,
or there may be some undetected fault in a specific production line.
4.5 Causes
All operational loss events have causes, often multiple causes. These causes may form
chains, consisting of proximate, intermediate and underlying causes, as illustrated in
Figure 8.2.
Operational Loss Events 179
Process Failure
1
Poor
Communication
Process Failure
Low Managerial 2
Competence
Causal chains may span multiple layers of causes, sometimes more than three.
However, it is rare to collect this level of detail when collecting data on operational
loss events. Many organizations simply collect information on the primary causal
category (e.g. people, process failure, systems failure or external event). Others may
use more granular categories, facilitating a more accurate picture of the causal chain,
but increasing the complexity and cost of data collection. By way of a compromise,
it is good practice to investigate the causal chains of large-scale losses, but not for
low-impact events, when the effort is less justifiable on cost-benefit grounds.
In 1997 a fire shut down a factory owned by Aisin Seiki Co, a gearbox-parts subsidiary of
Toyota. The fire was notable because the parts were vital to the production of almost all
Toyota vehicles. Because of Toyota’s use of modern ‘just-in-time’ manufacturing
techniques, the company was reported as having only four hours’ supply of the crucial
part (Nishiguchi and Beaudet, 1998).
Luckily, Toyota was able to avoid a lengthy shutdown in the production of its vehicles,
because of the close working relationship it had with other suppliers. Using plans provided
by Aisin Seiki, these suppliers were able to resume production of the part within days of
the fire.
The cost of repairing the Aisin Seiki factory and replacing the lost machinery reflects a
major part of the direct costs of the incident. Also accounted for as direct costs are the
engineering and overtime costs incurred by the other suppliers that reproduced the part
in record time. The interruption in vehicle production represents the indirect costs of the
event, costs that would have been much higher had the other suppliers not rallied round
Toyota and produced the part.
Operational Loss Events 181
5. Implementation
Though organizations should strive for timely and comprehensive operational loss
event datasets there are trade-offs. Implementation can be costly and divert resources
from other activities; the more data an organization attempts to collect, the greater
will be the implementation costs. As discussed in Chapter 2 on embedding opera-
tional risk management frameworks, a high-cost approach to operational risk man-
agement can induce resistance from staff, especially when resources are diverted
from activities they perceive as higher priority.
To help maximize the benefits and minimize the costs of operational loss event
data collection there are a number of important implementation factors to consider.
These are outlined below.
182 Fundamentals of Operational Risk Management
Business activities The activities, processes and operations that were affected by
affected the operational loss event.
Dates and times The date and time that the event was detected and when the
event was closed.
Causes The circumstances that helped to cause the event. This may
be refined once the event is closed, following a detailed
root-cause analysis.
Impacts and recoveries The direct financial impact of the event and any recoveries
(e.g. compensation payments received, insurance claims,
etc).
Thresholds may be set at any amount, for example, for events with an impact that
exceeds £500, £5,000 or £50,000. The threshold chosen by an organization should
reflect its size and appetite for operational risk. Large organizations with a high ap-
petite for operational risk may choose a high threshold. Smaller organizations with
a lower appetite may choose a smaller one.
Organizations implementing operational loss event data capture for the first time
may choose a relatively high data-capture threshold, to help reduce initial collection
costs. Over time, as users become accustomed to the process, the threshold can be
reduced.
The BP Deepwater Horizon oil-well spill began on 20 April 2010 and the well was
declared sealed on 19 September 2010. However, further oil slicks were reported in 2011,
2012 and 2013.
Due to the prolonged nature of the spill, along with adverse effects from the response
and clean-up activities, extensive damage to marine and wildlife habitats was reported,
which in turn impacted on the fishing and tourism industries. This damage continued to be
reported for many years after the initial spill (Beyer et al, 2016).
From a loss data collection perspective all reported oil spills, along with every incident
of habitat damage, clean-up cost, compensation payment and so on should be linked to
the underlying event, the initial oil spill.
●● Timeliness: data should be collected and reported as soon as possible after the
identification of an operational loss event. To ensure timeliness, setting a time
limit for the recording of new data is recommended. This time limit should reflect
the nature, scale and complexity of an organization, as well as its appetite for
operational risk and risk culture. Some organizations may require data to be
recorded within one working day; others require five working days or more. In all
cases the operational risk function should consult with those required to supply
the data to ensure that timescales are realistic and to maximize ‘buy-in’.
●● Accuracy: operational loss event data is rarely perfect, especially in the early
stages of the event when the total impact may not be known with certainty. Steps
should be taken to ensure that recorded data is as accurate as possible and that it
is updated when any new information comes to light. To maximize accuracy,
validation processes should be put in place, though usually these should only be
employed when an event is closed, and all of the available data has been collected.
This may include comparing data from similar events across business lines,
departments or functions, and comparison with external events or internal audits
of local data collection processes.
●● Completeness: all required fields should be completed for each loss event and
information on all eligible events should be collected. This may include all operational
Operational Loss Events 187
loss events or events for which the financial impact exceeds the agreed reporting
threshold. Information may also be collected on near misses, though it is rare that
all near misses will be captured. The fact that near misses do not have a financial or
non-financial impact makes them harder to detect.
It would be very difficult, if not impossible, and require significant time and effort,
to validate all direct financial losses, for example, by comparing loss estimates to the
available accounting records.
This is partly because financial impacts of events tend to be charged to a variety
of expenditure accounts and also, possibly, income accounts (e.g. in respect of a re-
fund of commission earned). There is also the challenge presented by direct and in-
direct financial impacts being accumulated over a period of time.
In practice most organizations who attempt validation take an ‘80/20’ approach,
focusing on what is readily identifiable in accounts and aiming to fully validate only
the largest individual events.
●● Data security – all data must be stored securely, with appropriate encryption and
access controls. In addition, compliance with applicable data protection laws is
essential. This is especially important where personal details are collected (e.g.
names and addresses).
●● User-friendliness – the system must be easy to use, to help minimize the amount
of time required to record, manage or report data.
●● Adaptability – the system should adapt to the needs of an organization, using the
operational risk management vocabulary and event categorizations that staff are
used to, for example.
●● Compatibility – with the other systems used by an organization, especially its
operational risk assessment and reporting systems.
188 Fundamentals of Operational Risk Management
5.8 Escalation
Procedures should be agreed for the escalation of recorded operational loss events.
Ideally these should be signed off by the board or a board-delegated committee with
responsibility for operational risk management. Where possible these procedures
should be aligned with the organization’s appetite for operational risk and any as-
sociated tolerances for the value of operational losses (see Chapter 5).
By way of an example an escalation process might look like this:
1 Losses below £5,000 are not reported outside the relevant local area.
2 Losses £5,000 or over are reported to the operational risk function.
3 Losses £50,000 or over are reported to relevant senior management (e.g. divisional
director, business unit head).
4 Losses £250,000 or over are reported to the organization’s executive directors.
5 Losses £500,000 or over are reported to the board-delegated risk committee or
equivalent.
6 Losses £1 million or over are reported immediately to the board.
While upon initial reporting an event may not look to breach a particular threshold,
care should be taken to recheck this once new data is received.
Operational Loss Events 189
Mitigation Reduce the financial or non-financial impacts of the current event (e.g.
public relations activities, goodwill payments, out-of-court settlements, etc).
Actions taken to reduce the financial or non-financial impacts of future
events.
Prevention Actions taken to prevent similar events from occurring in the future.
190 Fundamentals of Operational Risk Management
In this section the various ways in which operational loss event data can be used are
discussed.
●● Risk and control self-assessment (see Chapter 7), by validating probability and
impact estimates, providing information on control effectiveness, and identifying
risks not currently subject to assessment.
●● The identification and use of risk and control indicators (see Chapter 9). Loss
amount trends by risk category is a valuable indicator in its own right. Similarly,
recorded incidents of control failures could be used as a control indicator. It may
also be possible to compare the number and value of reported losses to risk and
control indicator trends. This can help to identify the most predictive indicators.
It may also identify indicators that are not effective predictors and that can be
removed.
●● Scenario analysis (see Chapter 10), where actual event data can be used to inform
estimates of probability and impact, as well as provide information on how
controls might fail. Individual operational loss events could be ‘magnified’ to
examine how a larger-scale event might impact on the organization. Equally,
elements could be taken from a number of reported events to create a more severe
scenario. External loss data can be especially useful for severe scenario generation,
because of the greater number of low-probabilities, high-impact operational loss
events that should be present.
●● Additionally, where data is collected on the causes of operational loss events this
could be used to construct potential causal chains for scenarios.
Operational Loss Events 191
●● The mean of recorded data could be adopted as the threshold for moving from
green/acceptable to amber/tolerable on the basis it indicates variation from the
norm (e.g. historic levels of expected loss) and is worthy of investigation.
●● The worst recorded position could represent the threshold for moving from amber
to red/unacceptable if there is no appetite for the position to be worse in future
than previously experienced.
Furthermore, the interpretation and use of internal loss event data can be used to
support the following activities:
●● Real event data can be used to monitor actual loss experience versus the
organization’s desired tolerance levels for losses. If the impact of a loss event is
within the stated tolerance level then it less likely to demand a response (other
than continued monitoring) – i.e. it may be accepted as a cost of business.
●● If the impact of a loss event is at a level that can be sustained, and if the cost of
mitigating is prohibitive then it is likely the exposure will be accepted. In effect,
this may represent an increase in appetite/tolerance.
●● Where an event has had significant consequences and breaches existing appetite/
tolerance thresholds it is likely to demand mitigating action.
●● demonstrate how various smaller loss events might aggregate resulting in a large-
scale or complex impact;
●● reinforce the message that a particular type of event in one part of the organization
(or in another organization in the case of external data) could occur elsewhere.
194 Fundamentals of Operational Risk Management
Such insights can help staff to understand and respond to future warning signs of
potential major losses ahead and ensure that action is taken to help prevent/mitigate
such losses.
7. Conclusions
This chapter has covered how to design and implement an effective operational loss
event data collection and management tool. Though costly and disruptive, opera-
tional loss events provide an opportunity to learn. Often they are not one-off events
and do not occur in isolation. By collecting loss event data, organizations are able to
exploit this opportunity to the full, enriching their operational risk management
framework in the process. Combining internal loss data with external data further
increases the amount of data, allowing organizations to learn from the losses of
Operational Loss Events 195
thers, especially low-probability, high-impact tail events that are rare in any one
o
organization.
Perfection in loss data capture is rarely needed. The priority is to start analysing
and learning from past events, especially when they reveal factors (e.g. control weak-
nesses or inappropriate human/cultural behaviours) in need of improvement. The
goal is to build a greater understanding of the causes, control weaknesses and effects
that influence the probability and impact of operational loss events, and to highlight
the value of operational risk management in mitigating these losses.
1 Has your organization begun collecting operational loss event data? Does this
include data on near misses?
2 When considering the required data fields and loss reporting threshold (the
minimum loss size that must be recorded) did you weigh the costs and benefits of
additional complexity and comprehensiveness?
3 As your operational loss collection tool has become established have you
considered reducing the loss reporting threshold to capture a greater proportion
of operational loss events?
4 Do you collect information on the causes and non-financial effects of operational
loss events? Do you use this information to support risk assessment activities,
such as scenario analysis?
5 To whom is operational loss event data reported? Do you report local data to local
management and organization-wide data to senior management and the board?
6 What action is taken in response to loss event reporting? Have controls been
improved and have the probability and impact of similar loss events in the future
been reduced?
References
Beyer, J, Trannum, H C, Bakke, T, Hodson, P V and Collier, T K (2016) Environmental
effects of the Deepwater Horizon oil spill: A review, Marine Pollution Bulletin, 110 (1),
28–51
Chapelle, A, Crama, Y, Hübner, G and Peters, J P (2008) Practical methods for measuring
and managing operational risk in the financial sector: A clinical study, Journal of Banking
& Finance, 32 (6), 1049–61
196 Fundamentals of Operational Risk Management
Cruz, M (ed) (2004) Operational Risk Modelling and Analysis: Theory and practice, Risk
books, London
Elliott, D, Smith, D and McGuinnes, M (2000) Exploring the failure to learn: Crises and the
barriers to learning, Review of Business, 21 (3/4), 17
Fennell, D (1988) Investigation into the King’s Cross Underground fire, Department of
Transport, UK, www.railwaysarchive.co.uk/documents/DoT_KX1987.pdf (archived at
https://perma.cc/NM3A-P7FM)
Nishiguchi, T and Beaudet, A (1998) The Toyota group and the Aisin fire, Sloan
Management Review, 40 (1), 49
Tinsley, C H, Dillon, R L and Madsen, P M (2011) How to avoid catastrophe, Harvard
Business Review, 89 (4), 90–7
197
Operational risk 09
indicators
L E A R N I N G O U TCOM E S
●● Explain the benefits associated with using operational risk indicators.
●● Be able to distinguish between risk, control and performance indicators and
explain the criteria for key indicators.
●● Know how to use risk, control and performance indicators to support
operational risk reporting and decision making.
1. Introduction
Risk indicators, commonly, though incorrectly, known as ‘key risk indicators’ or
‘KRIs’ (see section 2.4, this chapter) are an important operational risk management
tool. As with any type of risk, operational risk exposures are dynamic and change on
a frequent basis. Operational risk indicators offer a cost-effective means to keep
track of potential changes in exposure.
All organizations use operational risk indicators in some form or another.
Management rely on a range of indicators to help them do their jobs and make effec-
tive decisions. This includes metrics relating to the performance of people, processes
and systems, along with the impact of external events – four elements that define the
scope of operational risk. These indicators are monitored by management at different
levels within an organization, right up to the executive and board of directors.
This chapter explains how to design and implement processes and procedures for
the use of operational risk indicators to support decision making in organizations. A
well-managed operational risk indicator process can provide an up-to-date picture
of how an organization’s operational risk profile is changing over time, both in rela-
tion to changes in underlying exposures and the effectiveness of its controls and
overall management environment. Indeed, it is hard to imagine how an organization
198 Fundamentals of Operational Risk Management
could manage its operations effectively without effective operational risk indicator
processes and procedures. It would be impossible to drive a car or fly a plane without
a range of risk metrics; the same is true when managing an organization.
Social housing organizations build and/or buy homes to rent at below the private market
rent, usually 50 per cent below this rent. This makes homes more affordable. In addition,
many social housing providers offer long-term leases, increasing the security of tenants.
It would be impossible to manage a social housing organization without a wide range
of operational risk indicators. This includes the monitoring of:
●● building costs (e.g. raw-material prices);
●● lead times for new-build houses;
●● potential legal title issues (pollution liability, uncertainties over boundaries, tree
protection orders, etc);
●● new-build faults and repair costs for the total housing stock;
●● void rates (the speed with which unoccupied houses can be rented);
●● lead times for property repairs;
●● customer complaints regarding property defects, customer service, anti-social
behaviour, etc;
●● health and safety incidents;
●● gas and electrical safety checks;
●● staff absence rates, to maintain operations;
●● internal and external fraud (e.g. employee and tenant fraud);
●● compliance with applicable laws and regulations (e.g. data protection, social housing
regulation, etc).
2. Definitions
Operational risk indicators are measurable metrics that provide a proxy for opera-
tional risk exposure. A change in the value of a metric signals that a particular risk
exposure may be changing, that it may be increasing or decreasing in probability or
Operational Risk Indicators 199
impact, or that a risk event may be about to occur very soon. In this regard an
indicator may signal:
Here it is important to emphasize the proxy nature of most operational risk indica-
tors. In statistics a proxy is used when direct evidence of a variable is unavailable or
unobservable. In order for a proxy to be useful it must be closely correlated with the
underlying variable; this means that it should move (either positively or negatively)
in response to changes in the underlying variable and that these movements must be
reliable and predictable.
The use of proxy variables is common in risk management, especially when prob-
ability distributions, such as probability density functions and cumulative distribution
functions for a given distribution of impacts (see Chapter 8), cannot be constructed
reliably in advance. In a world full of uncertainty, the construction of reliable probabil-
ity distributions is rare. Either historical data is unavailable or is a poor predictor of
the future, because of the changing risk environmental. This is especially the case in the
context of operational risk, where data can be especially scarce and risk environments
changeable. As a result, it is rare that organizations can construct accurate, forward-
looking probability distributions.
In the absence of reliable, forward-looking, statistical data on the probability of
potential impact outcomes from operational risk exposures, the only alternative is to
make use of proxy risk indicators. If chosen correctly, these proxies can be a very
effective substitute for direct statistical data. However, if poor-quality proxies are
chosen, then an organization may formulate an inaccurate and misleading picture of
its exposure to operational risk.
Number and type of causes The direct financial cost of operational loss events
identified in loss event or (asset write downs, provisions for liability claims, etc)
near-miss data collection
Staff turnover as a % of staff The indirect costs of operational loss events (e.g.
lost market share, goodwill payments to customers,
fines, etc)
Staff morale (collected from Duration of staff absence due to health and safety
staff surveys) incidents
executive-level risk and control self-assessment process could be used as the basis
for this exercise (please refer to Chapter 7). An organization’s key risks should be
those that have the largest inherent and/or residual risk exposure scores – these
being the risks that represent the greatest threat to the achievement of an or-
ganization’s objectives.
red and amber tolerance thresholds for a range of risk and control indicator metrics.
Table 9.3 provides some examples of these metrics.
By monitoring whether these metrics stay within the agreed tolerance thresholds the
manufacturer can be reasonably assured that it is within its appetite for process
interruption risk. Where metrics breach an amber threshold the production line
management are informed and must decide whether action is required to correct the
situation. Where metrics breach the red threshold, immediate action is required on the
part of production-line management to correct the situation, and senior management must
be informed of the action taken.
In relation to risk modelling, risk and control indicators may be used as variables
in statistical models. Alternatively, they may be used to help validate these models.
Questions should be asked when there is a significant change in the predictions of a
risk model, but there is no change in the related risk and control indicators or vice-
versa. Such a situation may indicate that either the risk model is imperfect or that the
wrong indicators have been identified.
4.1 Relevant
Operational risk indicators must be good proxies, providing reliable and accurate
information on an organization’s operational risk exposures. This should include
providing information on both current and future exposures.
Relevance can change over time, as new operational risk exposures emerge, and
existing exposures are either mitigated or modified. Linking periodic reviews of the
selected suite of operational risk indicators with the completion of risk and control
self-assessments is an effective way to maintain relevance, as is drawing on the expe-
rience, knowledge and understanding of risk and control owners to help select the
initial set of indicators and to suggest changes, as necessary. This should include both
the addition of new indicators and the removal of existing ones to ensure that the
total number monitored does not become excessive.
The following questions are useful to consider when assessing the relevance of
existing operational risk indicators, or when considering adopting new ones:
4.2 Measurable
Indicators should be measurable in a consistent and reliable manner. This is to allow
the construction of trends to facilitate comparisons over time. It also enables the use
of targets, limits and thresholds.
This feature requires that indicators should be one of the following:
Non-metric-based indicators that are described by text are prone to being subjective, can
easily be misinterpreted and are subject to manipulation through the structure of the text
employed. Hence they are not recommended, though they are in theory possible.
Measurable indicators (usually described as metrics) should reflect the following
characteristics:
Good indicators are those that quickly convey the required message, without the
need for comparison or reference to other information. In this regard, percentages
and ratios – presented against an appropriate benchmark – are typically far more
useful than the actual underlying information.
208 Fundamentals of Operational Risk Management
During the Covid-19 pandemic a wide range of infection statistics were monitored and
reported by public health officials, some more leading than others. These statistics ranged
from the number of new cases and the total number of cases, through to the number of
hospitalizations and Covid-related deaths.
The number of virus-related deaths is very much a lagging indicator. Though it was
possible to calculate the number of Covid-related deaths with a reasonable degree of
accuracy, the past rate of deaths did not prove to be a good predictor of the future rate,
especially as countermeasures were employed (e.g. lockdowns and vaccines) and as the
virus mutated into new strains. However, the number of new cases proved to be a
relatively good leading indicator of the near future progress of the virus, especially when
converted into the reproduction number (known as the R0), which indicated how quickly
the virus was spreading in a given geographical area.
The R0 is an epidemiological statistic that shows whether the current rate of infection
of a virus is rising or falling, along with the speed of this rise or fall. A value above 1
indicates a rising rate of infections, the higher the number the faster the projected rise. A
value below 1 means that the rate of infection is falling, the smaller the number the faster
the projected fall. Using this data, it was then possible to predict the number of
hospitalizations and deaths based on the trends in serious illness and mortality (e.g. using
statistically robust estimates of the percentage of infected people likely to become
seriously ill and die).
It should be emphasized that the accuracy of these R0 calculations were not perfect.
Rates of new infections were hard to assess in most countries, because of incomplete
Operational Risk Indicators 209
testing (not every newly infected person was tested, especially those who did not exhibit
symptoms). As a result, the R0 was usually presented as a range. For example, 0.72–0.81 or
1.1–1.4. The width of these ranges reflected the level of confidence in the estimate. The
narrower this width the higher the degree of confidence.
As Covid-19 vaccines were rolled out, new leading metrics were added, notably the
numbers of people partially (first dose) and fully (first and second dose) vaccinated. As
vaccination rates rose the potential for future outbreaks diminished, as did the
potential for hospitalization and death. Scientifically robust medical trials were used to
provide evidence of the effectiveness of vaccines in preventing infections,
hospitalizations and deaths.
Major operational risk events are often the result of a chain of causes and effects. For
example, bad IT, leading to poor information, leading to a wrong decision, leading
to poor customer service, leading to complaints, is an example of one such cause-
and-effect chain. Therefore, a lagging indicator for one risk can be leading for an-
other: for example, a lagging indicator of bad IT (such as IT breakdown) can be a
leading indicator of customer dissatisfaction, since poor customer service can be
caused by IT disruption. Similarly, consider the number of unresolved customer
complaints – such complaints relate to issues that have already occurred (the lagging
aspect), but which still need to be addressed (the current aspect).
Lagging and current indicators can also have a leading element to them that may
need to be considered. For example, in the case of unresolved customer complaints
an organization’s failure to address these could give rise to a costly lawsuit at some
point in the future and/or bad publicity, leading to reduced sales.
Pay gap and job satisfaction metrics Staff turnover as a measure of staff morale
to capture the causes of staff
resignations
Truly leading indicators are rare and are usually related to causal drivers within the
business environment within which the organization operates – they tend to be
measures of the state of people, process, technology and the market that affects the
level of risk in a particular organization. A leading or preventive indicator can be
something as simple as the number of limit breaches on market or credit risk expo-
sures, or cash movements, or the average length of delays in executing particular
activities. In themselves, such occurrences may not be loss events in their own right,
but if their value starts to increase this may point to the potential for a higher fre-
quency or severity of operational loss events.
In addition to causal indicators, indicators of exposure, stress or failure may pro-
vide more leading information on operational risk exposures for managers.
4.5 Comparable
Operational risk indicators must provide data that is comparable with some form of
benchmark. Comparability allows management to understand the relative ‘scale’ of
the indicator. This helps them to determine when action is required to address the
value of the indicator or the risks or controls that it relates to.
Relevant benchmarks are either over time or across comparable internal depart-
ments or business units and external organizations. An organization can track its
own evolution through time, provided that the type of indicator and information
collected is stable over a long period. Cross department/unit or external organiza-
tional comparisons are also very useful. They provide a wider context and are not
prone to inconsistent historical trends. Some industries share data in less sensitive
areas like staff sickness absence or health and safety incidents, for example. Where
data is shared in this way it should be used as a benchmark. For example, along with
212 Fundamentals of Operational Risk Management
the ‘raw’ metric an organization’s position relative to the industry distribution could
be provided (fourth to first quartile). Comparisons between internal departments
and units could be made in the same way and used to help facilitate friendly compe-
tition to improve the value of indicators and, by extension, the related operational
risk exposures.
A consumer retail organization monitored new starters and leavers on a monthly basis.
This provided raw data on the number of staff joining and leaving the organization.
The organization relied on a large number of staff with part-time contracts ranging
from full-time equivalent (FTE) 0.1 to 0.9. As a result, the number of joiners and leavers
each month was quite high. To make the metric more meaningful, the organization
adjusted the raw number of leavers and joiners to reflect the range of contracts. As a
result, staff turnover was reported as a percentage of the total number of FTE staff
present in the organization. This was further broken down to reflect the FTE of specific
departments and functions.
In time, to make the metric even more meaningful the staff turnover percentage for the
organization was compared to industry benchmark data for the consumer retail sector.
This involved reporting the quartile in which the organization’s staff turnover was located.
By making this enhancement the retailer was able to track its performance relative to
industry norms. This helped it to understand how well it was doing in areas like the
proportion of experienced staff to inexperienced staff, staff morale and the
appropriateness of its salary scales.
4.6 Auditable
Auditable means that the data used to produce a metric is:
●● comprehensive and accurate, and that this remains consistent over time;
●● comes from a documented course;
●● is constructed using a clear and consistent formula; and
●● is reported in a clear and timely manner.
●● reflect the operational risk profile of the division, business line, country or region
or of the overall organization, depending upon the level at which selected;
●● facilitate aggregation across relevant business entities, product or service areas,
countries or business lines, resulting in a meaningful and understandable metric
at the relevant level of management;
214 Fundamentals of Operational Risk Management
●● apply to all parts of the organization structure below the level where they are
being applied; and
●● are usually imposed by management and must be reported on, without choice.
Typically, the selection process for bottom-up operational risk indicators should
consider:
●● the results of risk control self-assessments, ensuring that indicators are identified
to facilitate the ongoing monitoring of identified risks and controls;
●● the results of any regulatory examinations or audit findings to help facilitate the
rectification of any control or monitoring deficiencies that may have been
identified;
●● being identified during the new product review process (mainly short term) to
monitor and manage the operational risk during the implementation phase;
●● the views of the appropriate risk owners (e.g. the relevant department managers
or business line managers) or that of the local operational risk manager, both
during and between formal risk assessments;
●● any insights that may have been provided by recent loss events (for example in
terms of the identification of significant new indicators); and
●● changes in the economic environment, which might mean that certain indicators
become more important (e.g. indicators of fraud risk may become more important
in a recession, etc).
also, based on current industry and regulatory trends. This led to the addition of two data
protection metrics (the numbers of reported internal and external data protection
incidents).
A draft list of recommended bottom-up metrics was presented to the board risk
committee for review. The committee agreed with most of the recommendations but made
some changes to the design of certain metrics and added two metrics on Brexit/Covid-
related supply chain risk. One metric tracked the cost of supplies, the other tracked
supply lead times, both of which were increasing and threatening the profitability of the
business.
In terms of the last point concerning the intended audience it is usually appropriate
to collect a more detailed set of metrics for the local management of a specific busi-
ness area/entity than for executive management or the board. This is because local
management will probably require a detailed set of indicators in order to help them
monitor and control the day-to-day activities of their area/entity effectively, while
executive management/boards, whose time is limited, should normally only focus on
the most relevant metrics that relate to the most significant risks that may be threat-
ening their organization at the current time.
To arrive at an appropriate list of operational risk indicators to report to its board a bank
completed an annual significant operational risk exercise. The purpose of the exercise
was to identify the operational risks considered most likely to impact on the bank’s
216 Fundamentals of Operational Risk Management
strategic objectives. Executive management completed this exercise, with support from
the operational risk function.
Usually, three or four significant operational risks were identified each year. These
changed depending on the external risk environment (e.g. pandemics, Brexit, etc),
significant new laws or regulation, such as data protection regulation and whether major
internal change projects were scheduled (e.g. IT core systems replacement). For each of
the significant operational risks two to four metrics were identified. The focus was on
identifying the most relevant (best proxies) and leading metrics as possible.
Each quarter, the Board Risk Committee received a full report on all of the selected metrics.
Any metrics that breached their amber or red threshold were subsequently escalated to the
full board, with an accompanying action plan approved by the Board Risk Committee.
Table 9.5 Example data collection frequencies for operational risk metrics
Metric Frequency
●● A cap or upper boundary, where as soon as the indicator value exceeds the
threshold value, the escalation process kicks in.
●● A floor or lower boundary, where as long as the indicator value is above the
threshold value, nothing happens, but when it drops below that level, the escalation
process starts.
●● A collar or combination of a cap and floor/upper and lower boundary, where
essentially the indicator values are expected to remain within the pre-defined range.
Caps, floors and collars may be specified using a variety of numerical options. Table 9.6
summarizes those in common use.
(continued)
218 Fundamentals of Operational Risk Management
Discrete data Discrete data thresholds are derived from observations that
can only take certain numerical values, usually an ordinal
count of some variable. Examples include specifying
tolerance thresholds for the number of reported near
misses or the number of customer complaints.
●● The value of this indicator is higher/lower than normal suggesting that the
organization may be exposed to an elevated and potentially significant level of risk.
●● Management attention is required to determine whether action needs to be taken
soon.
●● The value of the indicator is within normal parameters, suggesting that the
organization is not exposed to significant risk.
●● No action is required – the indicator and its associated risks are under adequate
control.
ranges over time. Assess existing budgets or targets, relevant public information and
the organization’s risk appetite and apply this information to the historical ranges.
Then, decide where the first level of slight discomfort within the data range lies and
use this as the basis for establishing your first threshold. Monitor the next few data
submissions against the threshold and adjust if necessary.
It is common to set limits and thresholds using a RAG (red–amber–green) ap-
proach. Indicators that are within their amber zone should normally be given greater
priority than those that are green, with even greater priority being given to red indi-
cators. Table 9.7 illustrates the normal significance and response criteria that are
assigned to red, amber or green indicators. Note that for indicators that are assigned
a single limit (indicating zero tolerance for values above or below this limit) there
may be a case to omit the amber threshold and present such indicators as being ei-
ther red or green.
Remember, as operational risk indicators are proxy variables, the aim is not to
manage the indicator, but rather the associated operational risk exposures. A breach
of an indicator is a signal of potential threats ahead. Getting the indicator back into
the amber or green zone does not necessarily mean that these threats have been
averted.
Limits and thresholds should reflect the implementation of the risk appetite
statement cascaded down to the organization. Please refer to Chapter 5 for more
information.
6.4 Reporting
There is little point collecting data on operational risk indicators if this is not reported
to the appropriate level of management in a timely and usable fashion. However, or-
ganizations that have just begun to collect data on new operational risk indicators
may decide to wait six months to a year before producing regular reports. This is to
ensure that sufficient data is collected to facilitate trend analysis and the setting of
thresholds or limits. However, this should not be used as an excuse to avoid or delay
taking action, where there are concerns about something material. For example, a
sudden (adverse) change in the available data might trigger an ad hoc exception re-
port, with suitable health warnings about the lack of sufficient trend data.
Where pre-existing data is available there is no need to delay the commencement
of routine risk reporting. However, such data should only be used if it meets the de-
sirable criteria set out in section four, this chapter.
The effective reporting of operational risk indicators requires consideration of a
number of additional factors:
●● Short – care must be taken to avoid producing overly detailed reports with large
numbers of indicators. Management will not have the time or attention required
to process large amounts of information. One way to achieve this is through
exception reporting, only reporting on indicators that have breached thresholds
or limits, or which are trending adversely, indicating that a future breach is likely.
●● Simple – reports should not be overly complex or contain jargon terms, large
tables of data or complex mathematical formulae. Where possible, the simplest
available graphs and charts should be used.
●● Timeliness – reports should be produced in a timely manner so that they can be
acted upon while the data they contain is still relevant.
●● Accuracy – inaccurate metrics will provide a false picture of an organization’s
exposure to operational risk and may mean that it ends up overexposed or spends
too much reducing certain risks. Processes should be in place to check the accuracy
of reported metrics on an ongoing basis.
●● Trending – reports should make clear the historical trends of the chosen indicators
to provide some indication of their volatility and/or where they may be heading.
●● Clear escalation procedures – so that the recipients of a report know when to
escalate areas of concern to more senior management.
●● Compliance – with any regulations that may exist, where appropriate.
224 Fundamentals of Operational Risk Management
225
226 Fundamentals of Operational Risk Management
7. Conclusion
This chapter has explored how to select, monitor and report on risk, control and
performance indicators for key operational risks. It is hard to imagine a sound
framework for the management of operational risk without the use of such indi-
cators. Though the implementation of operational risk indicator monitoring and
reporting can be time-consuming, the benefits are considerable. Management is
effectively blind without access to the appropriate risk metrics. It is impossible to
drive a car without access to metrics on factors like speed or temperature.
Similarly, management require operational metrics to support effective decision
making and to ensure that they steer organizations away from threats to their
objectives and towards value-creating opportunities.
1 Has your organization begun collecting and reporting data on operational risk,
control and performance indicators?
2 How did you select these proxy operational risk indicators? Did you consider their
relevance, along with the costs associated with data collection?
Operational Risk Indicators 227
3 How leading are your operational risk indicators? Do they provide information
about your future exposure to operational risk, or do they simply tell you what
happened in the past?
4 Do you regularly review your chosen set of key operational risk indicators, adding
and removing indicators when appropriate?
5 To whom are operational risk indicators reported? Are reports provided for
management at all levels of your hierarchy?
6 How are operational risk indicator reports used? Are they primarily for
compliance purposes (to signal compliance with regulations) or are reports used
to support value-creating business decisions?
References
John Hopkins University (2021) Coronavirus Resource Centre, https://coronavirus.jhu.edu/
map.html (archived at https://perma.cc/XC4C-CVA5)
Kaspersky (2021) Cyberthreat Real Time Map, https://cybermap.kaspersky.com/ (archived
at https://perma.cc/J7VS-MJ3Y)
228
Scenario analysis 10
and stress testing
L E A R N I N G O U TCOM E S
●● Explain the role and benefits of scenario analysis, stress testing and reverse
stress testing in an operational risk context.
●● Be able to conduct effective scenario analysis, stress testing and reverse
stress testing workshops.
●● Know how to use the output from scenario analyses and stress tests to support
operational risk assessment and management decision making.
1. Introduction
The accurate assessment of operational risk exposures is a major challenge for or-
ganizations. Often historical data on probability and impact is limited and, even
when available, there is no guarantee that historical trends will repeat themselves.
Particularly problematic are low-probability, high-impact ‘tail’ events, where data
is often non-existent. Likewise, dynamic organizational environments, where there
are high levels of internal or external change (e.g. political, technological or social
change), further reduce the value of tracking historical trends.
Research shows that climate change is causing an increase in severe weather events
such as flooding, droughts and windstorms (e.g. Stott, 2016). In turn this is increasing the
risk exposures of organizations to external weather events (Huber and Gulledge, 2011).
Though it is known that climate change has increased organizations’ exposure to
severe weather events it is impossible to attribute climate change to specific events or
estimate precisely the degree to which the probability and impact of extreme weather
Scenario Analysis and Stress Testing 229
events are increasing. As a result, it is difficult to assess the extent to which past and
current trends of extreme weather events are a reliable predictor of the future.
Scenario analysis is one way to help address the uncertainties associated with
assessing the probability and impact of severe weather events, including their economic
impacts (Bouwer, 2013). Using scenario analysis, it is possible to estimate a range of
possible economic outcomes, based on plausible assumptions about the future
prevalence and intensity of specific types of severe weather events over the next few
decades.
Scenario analysis, and the related tools of stress and reverse stress testing, have
emerged as common responses to the problems of limited data and unreliable trends.
When done effectively, these tools can shed light on uncertainty and help organiza-
tions to prepare for and proactively respond to operational risk events. This includes,
but is not limited to:
Figure 10.1 Comparing scenario analysis, stress testing and reverse stress testing
Stress
testing:
Scenario analysis: • Impact of
• Assess probability • Stressed external
and impact of scenarios to stress events
operational risk reflect on
events operational operational
risk, tail risk risk losses
events
Stress testing involves the assessment of specific stress events that might occur within
the external operating environment of an organization, and that may impact on a
range of risk types, including operational risk. Examples include an economic reces-
sion, a pandemic or political events such as Brexit. Stress events have the potential to
seriously disrupt the strategy and operations of an organization, making them high
impact, though usually the probability of occurrence is low.
Reverse stress testing involves analysing events that threaten the viability of an
organization, causing insolvency or bankruptcy. The starting point of reverse testing
is to identify the point of non-viability, usually in terms of determining the maximum
financial loss that an organization can withstand and then considering the types of
internal risk event that may cause losses that exceed this value. From an operational
risk perspective this may include a major IT failure or fraud, for example.
Scenario analysis encompasses elements of stress and reverse stress testing but can
be used in a wider range of applications. Scenarios need not be extreme stress events,
for example, but more common situations that have a higher probability of occur-
rence, up to and including events that may be expected to occur once or more a year.
In contrast the events considered as part of stress, and especially reverse stress test-
ing, will occur much less often and have a significantly higher impact.
Scenario Analysis and Stress Testing 231
For organizations that categorize their operational risks (see Chapter 3), one com-
mon approach is to select one topic for each of the level 1 or 2 operational risks that
the organization is exposed to. However, this is a rather arbitrary approach, espe-
cially where some categories are considered more or less significant than others.
Ultimately the number of topics per category of operational risk should vary de-
pending on the nature, scale and complexity of an organization and the stability of
its internal and external operational risk environments. There is no point selecting a
topic for a non-significant risk category. Equally, the most significant risk categories
may require the analysis of multiple topics.
Different types of organizations will often select different operational risk scenarios and
stress events to focus on.
Financial institutions produce fewer tangible products, such as savings accounts,
insurance contracts and advice. To produce these products, they rely on IT systems and a
range of human and automated processes and procedures. In contrast, a housing
developer produces something tangible (a house), using skilled manual labour, physical
tools and equipment.
Both organizations are exposed to a wide range of operational risks, many of which
overlap (health and safety, fraud, IT systems failure, etc). However, the significance
of these exposures varies. Table 10.1 summarizes the types of operational risks that each
might select for the purposes of scenario analysis and stress testing, using the Basel level
1 operational risk categories as the basis for this comparison.
Table 10.1 E xample scenarios by Basel operational risk types for a financial institution
and housing developer
Employment practices and Major diversity and Major health and safety
workplace safety discrimination case. incident leading to loss of
life and liability claim(s).
Clients, products and Major breach of conduct of Housing development has
business practices business regulations, major problem with defects
including financial crime or environmental quality
regulations. (e.g. houses built on
contaminated land).
Damage to physical assets Loss of head office or a Flooding significantly
major IT processing site. damages a development
site near completion.
Business disruption and Prolonged core systems Delays in the development
system failures failure. of a site due to staff or
material shortages (e.g. as a
result of Covid-19 or Brexit).
Execution, delivery and Incorrect financial reporting Major problem with the
process management information sent to a supply of building materials
regulator. (e.g. wood, bricks or
cement).
Operational risk events that have recently Operational risk-loss events and near
impacted similar organizations. Plus, misses that have occurred within the
operational risk events identified as being organization. Near misses can be especially
of particular significance over the coming useful in topic selection. Allowing the
year (e.g. as identified by professional organization to investigate how impactful
organizations, regulators, or publications they would have been as they crystallized
like the World Economic Forum Global Risk into losses.
Report: WEF, 2021).
Regulatory or legislative changes, such as Output of the risk and control assessment
the risks associated with new laws or process, especially the most significant
regulations (e.g. data protection risks in terms of probability and impact or
regulations). risk exposures that have increased
significantly.
The results of the annual emerging operational risk PESTLE analysis are used to inform
the scenario analysis and stress testing required by the Regulator of Social Housing.
Emerging operational scenarios have included issues such as fire safety (changes to
building regulations related to building cladding), data protection regulation, Brexit-
related supply chain risks and the Covid-19 pandemic.
●● The pace of change – the faster an area is changing (e.g. technological innovation),
the greater should be the level of focus.
●● Concerns about future changes that might create major new emerging risks.
●● The degree of internal strategic or operational change – the greater the level of
change the greater the focus.
●● The ability of an organization to manage potential sources of operational risk.
For an example concerned about technological change and its ability to manage
the associated risks an organization may choose cyber risk as an important topic
for scenario analysis and stress testing.
Ultimately these factors are linked to two fundamental elements that should influ-
ence the choice of topics for analysis/testing: the proximity of an organization to
236 Fundamentals of Operational Risk Management
potential operational risk scenarios/stress events and its vulnerability to these sce-
narios/stress events. The more urgent or pressing a source (e.g. imminent regulatory
change) the higher its priority for inclusion. Equally the less able an organization
feels in relation to controlling a source (e.g. rapid internal change) the higher the
priority for inclusion.
In some sectors regulators may stipulate specific scenarios or stress/reverse stress
tests for analysis. This is most common in financial services but can occur in other
heavily regulated sectors such as social housing, as is the case in the UK. It is im-
perative that organizations fulfil their regulatory obligations and analyse any sce-
narios or stress/reverse stress tests set by their regulators.
Table 10.3 Key tasks required before conducting a scenario or stress test workshop
Operational risk events that have recently Operational risk loss events and near
impacted similar organizations. Plus, misses that have occurred within the
operational risk events identified as being organization. Near misses can be especially
of particular significance over the coming useful in topic selection. Allowing the
year (e.g. as identified by professional organization to investigate how impactful
organizations, regulators, or publications they would have been as they crystallized
like the World Economic Forum Global Risk into losses.
Report, WEF, 2021)
Regulatory or legislative changes, such as Output of the risk and control assessment
the risks associated with new laws or process, especially the most significant
regulations (e.g. data protection risks in terms of probability and impact or
regulations) risk exposures that have increased
significantly.
Social changes, such as changes in norms Information on control weaknesses,
and behaviours (e.g. attitudes towards data including the output from internal audits, to
privacy, the environment, etc) help understand how control failures might
contribute to a scenario or stress event.
Economic changes, such as a recession Trends in key risk or control indicators,
especially those that indicate a large
increase in potential risk exposure.
Political changes, such as the impact of a Changes in the financial or operational
new government performance of the organization.
Technological change, such as the ‘Internet Strategic change, such as IT systems
of Things’ and other IT innovations implementation, new products, etc.
Environmental events, such as pandemics Operational changes such as process
or the effect of climate change improvements, changes in supply chains,
outsourcing, etc.
A retail bank organized a scenario analysis workshop to explore the risk of a major IT
systems disruption. Attendees were invited from the following departments:
The discussion focused on the likely duration of a core systems failure and the number of
systems that could fail. Many attendees were confident that the duration of a failure
would be short (up to 24 hours), and that failure would be limited to a single system, as
most operated independently.
An attendee from the IT infrastructure department spoke up. She pointed out that the
bank’s core systems were all reliant on a single IBM-PC disc operating system (DOS), that
has been in place since the 1980s. Though it had proved extremely reliable, a failure of the
DOS system would impact on all core systems. The IT infrastructure attendee went on to
explain that only two people in the organization had the necessary skills to work on the
DOS system and that one of them was retiring in a month’s time.
Following a discussion, it was agreed that the potential duration and scope of a severe
IT systems failure scenario should be increased to reflect the essential nature of the DOS
system and the limited resources available to maintain and repair it.
3.4.2 Key output variables from scenario and stress test workshops
Though open discussion is important in a scenario or stress test workshop, this must
be focused on producing usable management information, to support operational
risk assessment, monitoring and control. Table 10.4 summarizes the key variables
that should be discussed during a workshop.
The outcomes of the discussion on these variables should be recorded on a template
of some form; Table 10.4 can be used as the basis for such a template. Alternatively,
many operational risk assessment and reporting systems offer scenario analysis and
stress testing modules. In addition, it is recommended that minutes are taken during each
workshop to ensure that items discussed before reaching any conclusions are recorded.
240 Fundamentals of Operational Risk Management
These minutes will help those not in attendance to understand why particular outcomes
were agreed. Ideally a member of the operational risk function should take the minutes,
as they have the necessary technical expertise to understand the points that should be
recorded.
To help the participants arrive at plausible outputs for the variables in Table 10.4,
workshops can be conducted in one of two main ways:
Table 10.4 Key output variables from a scenario or stress test workshop
Variable Explanation
Mitigating Actions Management actions that could be taken during the scenario or
During the Scenario stress event to help mitigate its effects and reduce any financial
or Stress Event impact.
Current Actions Actions that should be taken following the workshop to help
reduce the probability or impact of the scenario or stress event
in question. Typically, this will include enhancing existing controls
or adding new controls.
In extremes a decision might be taken to reduce or cease a
particular activity to help prevent the occurrence of a scenario or
stress event. However, this is only recommended where the
benefits of doing so outweigh the costs associated with ceasing
the activity.
Scenario Analysis and Stress Testing 241
A structured approach is not necessarily superior. This is because it may limit par-
ticipant creativity and divert their attention from important aspects of a scenario or
stress event that are especially relevant to an organization. Equally an unstructured
approach does not mean the absence of an agenda, just that the discussion of specific
agenda items are not structured using formal analysis techniques.
Chapter 7 – on risk and control self-assessment – explored a range of risk analysis
techniques that could also be used to structure scenario and stress test workshops.
These include the Structured What If Technique (SWIFT), Root Cause Analysis and
the Delphi Technique (see Table 7.8).
3.4.4 Probability
A key difference in the context of scenario analysis and stress testing relates to the
comparative rareness of these events. Hence, the probability scales used for routine
risk and control self-assessment may prove to be insufficient. In addition, accurate
probability assessments for scenarios, and especially stressed events, can be hard, if
not impossible, because of a lack of objective data.
If formal percentage or decimal point probabilities are used it is recommended
that these are presented in terms of ranges, for example 1–10 per cent, 11–20
per cent, or 0.01–0.1, 0.11–0.2, etc. This is because of the difficulties in assigning
precise probabilities to rare events, due to the lack of reliable data. However, the use
of statistical probabilities is not recommended in the context of scenario analysis
and stress testing, because non-risk professionals tend to struggle with formal statis-
tical representations of probability, especially when these probabilities are very small
(Tversky and Fox, 1995). Hence for scenarios and stress events, it is better to use
duration ranges or qualitative terms. For example:
●● 1 in 80-year or ‘tail’ event – that may occur once during an individual’s whole
lifetime. There may not be any examples of such events, except possibly in
historical records, although such historical examples would have to be extensively
reworked to bring them up to date. Alternatively, there may be examples of such
events that have affected other, similar organizations in recent years.
Workshop participants should be provided with definitions like the three above during
a workshop, to help them discuss and agree the estimated probability of occurrence.
Different versions of a scenario or stress event will have different probabilities.
There is no need to try to define every possible version of a scenario. The point is to
examine scenarios and stress events that are representative of hypothetical, yet fore-
seeable and plausible, operational risk events. In short, the focus should be on events
that could occur, and which management should discuss openly and prepare for.
Alternatively, some organizations take one central scenario for a particular risk
category (e.g. damage to physical assets) and then work on different versions for two
to three probability levels. For example, a routine version of the scenario (e.g. repair-
able damage to an area of a building), followed by a stressed (repairable damage to
the whole building) and tail event (destruction of the building). This is more time-
consuming but can help highlight a wider range of possible future events.
3.4.5 Impact
Scenarios, especially when worked into stress or reverse stress events, are by defini-
tion high impact. In the case of reverse stress events, impact is effectively determined
in advance, since by definition such events threaten the financial sustainability (sol-
vency) of an organization.
Impact need not be quantified for scenarios and stress events. Instead, events
might simply be labelled routine/expected, stressed/unexpected or extreme/tail, as
indicated above.
Where an organization does wish to quantify impact, it is recommended to start
with a discussion of the effects and to then think about the quantum of these effects,
typically in financial terms, but reputational impacts may also be considered (e.g.
impact on customer goodwill).
Table 10.5 summarizes some financial and reputational effect factors that could
be estimated quantitatively during a scenario or stress test workshop.
Where financial quanta are estimated it is recommended that they are presented
in terms of a range. Precise estimates of impact are impossible, given the hypothetical
nature of scenarios and stress events, and imply a false sense of accuracy and objec-
tivity. The use of a financial impact range reinforces the fact that these impacts are
estimates and could be exceeded.
Additional guidance on the estimation of impact in relation to more severe stress
and reverse stress test events is provided in section five below.
Scenario Analysis and Stress Testing 243
Financial Reputation
●● Comparison with the available data on external events, through the use of public
data or an external loss database. Though an organization may not have
experienced a stressed or extreme tail scenario it may be that other, similar
organizations have. Often, for more extreme operational risk events, expenditure
on an external loss database is not required. Such events are often reported in the
public press, meaning that an internet search can reveal much valuable information,
including data on the financial impacts of such events.
●● Where an organization has access to an external loss database it may be possible to
determine the probability of occurrence for more extreme (very low probability, very
high impact) events, providing that sufficient data is available to build a reliable
probability distribution. Alternatively, specialist statistical techniques are available to
help construct probability distributions for tail events, such as Extreme Value Theory
(see De Haan, Ferreira and Ferreira, 2006; Gourier, Farkas and Abbate, 2009).
●● For business unit or department/function-level scenarios, intra-organization
comparisons may be possible, providing similar loss events have occurred elsewhere
in the organization. This is most likely to be effective in larger organizations.
244 Fundamentals of Operational Risk Management
Beyond the immediate confines of operational risk, boards may be asked to re-
view the agreed topics for scenarios and stress tests and suggest any additional ones
they feel are necessary, which might include scenarios/tests that have an element of
operational risk exposure. In some sectors this may be a regulatory requirement, as
is the requirement for boards to receive information on the most significant, organi-
zational-wide scenario analyses and stress tests. For example, within financial ser-
vices it is common for scenario analysis and stress testing to be used as part of the
Pillar II supervisory review and evaluation process (SREP) that forms part of the
banking and insurance capital adequacy regulations. This process covers exposures
to a range of risk types, including operational risk.
In terms of reverse stress tests, where conducted, these should always be reported
to boards. Reverse stress tests provide important information on the long-term via-
bility of organizations and their ability to remain a going concern.
Finally, some organizations may be required to report the results of their scenario
analysis and stress/reverse stress testing processes to regulators. This is the case for
systemically important financial institutions and in non-financial sectors such as so-
cial housing in the UK.
An international charity that provides relief for communities hit by natural disasters
organizes regular scenario workshops to discuss potential disasters and the ability of the
charity to respond to them. During these workshops participants discuss the effectiveness
of key controls (e.g. emergency response procedures, contingency finance,
communication networks, health and safety of first responders, etc) and the
consequences of failures in these controls.
Participants also discuss the inherent risk of potential disaster scenarios, considering
factors such as political turmoil, population movements and climate change. The idea is to
consider plausible future scenarios, the potential frequency of occurrence and impact on
local populations.
The outputs from the workshops are used to estimate the inherent risk of natural
disasters over the coming one to five years, plus the ability of the charity to respond to
them in a safe and effective manner. For example, the output from the workshops are used
to help assess the charity’s inherent exposure to health and safety risks related to its
employees and the people that they help during disasters.
For more on the conduct of risk assessments please refer to Chapter 7 on risk and
control self-assessment.
Scenario Analysis and Stress Testing 247
The idea is to stress (increase the hypothetical severity of) an organization’s opera-
tional risk exposures and to investigate how its controls may be impacted by such
events. Key questions include:
●● What would be the financial and reputational impacts of such events? How might
control failures/ineffectiveness escalate these impacts?
●● Can action be taken to mitigate these financial and reputational impacts during
the event?
●● Might additional controls be required to help reduce the probability and/or
impact of stress events?
●● Should existing controls be reinforced to ensure they are effective during stress
events?
●● Do other factors, such as the timing of an event, influence the scale of the stress
event?
●● Could multiple stress events occur simultaneously? What would the impact of this be?
A university used sensitivity analysis to examine the differing impacts that could be
experienced due to a failure in its student registration and examination systems.
The analysis revealed that the timing of such a failure could have a significant impact
on the financial and reputational impacts of a failure. The most vulnerable months were
May and June, when student final results were being compiled for progression or
graduation, and September, when the majority of students were registered onto degree
programmes. Here the impact of even a one-day failure would be significant.
In contrast the impact of even a prolonged (one week) failure over the summer
(July and August) was negligible, while the impacts during other months were modest,
providing the systems could be restored within a week.
In relation to multiple stress tests, it is recommended that individual tests are com-
bined to examine the cumulative financial impact on an organization. This might
include combining potentially correlated stress events (e.g. a cyber attack followed
by an adverse social media campaign) that could occur together (e.g. a new wave of
Covid-19 coupled with a no-deal Brexit).
Scenario Analysis and Stress Testing 249
●● events that destroy the infrastructure of the organization and therefore its ability
to generate income (e.g. major systems failure, loss of key buildings, prolonged
supply chain failure, etc);
●● sudden loss of liquidity, such as a major debt covenant breach or loss of investment-
grade credit rating;
●● major loss of reputation, leading to the loss of many customers, employees,
suppliers, etc;
●● serious regulatory or legal sanctions (e.g. forced closure).
It is unlikely that every potential extreme scenario will be, or can be, considered. This
is not the point of reverse stress testing. Primarily the aim is to help the board and
senior management understand when the organization becomes non-viable, so that
they can ensure that the organization has sufficient funds (capital and liquidity).
However, it is also prudent for them and their organization to understand the types
of events that may cause non-viability. From an operational risk perspective there are
many such events and boards/senior management will better understand the value of
operational risk if such events are identified.
6. Conclusion
This chapter has explored how to design and use scenarios and stress tests to support
the management of operational risk. Scenario analysis, stress testing and reverse
stress testing are important components within an organization’s operational risk
management framework. Operational risk events are often the most serious of all for
organizations, eclipsing pure market, credit or business risk events in terms of their
magnitude. Equally the probability and impact of these more extreme operational
risk events can be very difficult to assess, without the use of effective scenario analy-
sis or stress testing approaches. The Covid-19 pandemic is a recent example of how
severe and unpredictable such events can be (see Chapter 11), as was the global fi-
nancial crisis of 2007–08 (Ashby, Clark and Thirlwell, 2011).
It is imperative that organizations prepare for the unexpected, including so-called
‘tail’ events that may threaten their viability. Though it may be impossible to an-
ticipate every possible extreme operational risk event, that is not the point. The
point is to help management, especially the board and senior management, to un-
derstand the types of operational risk event that may threaten the viability of their
organization, and to ensure that their strategic and operational decisions do not
significantly increase their exposure to such events or render the organization exces-
sively vulnerable to their impacts.
Scenario Analysis and Stress Testing 251
1 Do you understand the differences between scenario analysis, stress testing and
reverse stress testing in an operational risk context?
2 Does your organization use scenario analysis and stress testing to support the
assessment of its operational risk exposures?
3 How do you complete these analyses and tests? Do you organize workshops to
gather the views of a range of relevant experts?
4 What measures have you taken to validate scenario analysis and stress test
outputs? Do you make use of public information on events that have affected
other organizations and consider whether such events could occur in your
organization?
5 Who decides on the operational risk scenarios and stress events that are
analysed? Are executive management involved in this process to provide a
strategic perspective and does the board receive information explaining why
particular scenarios and stress events were chosen?
6 How do you make use of the outputs from scenario analyses and stress tests? Are
these outputs used to support strategic and operational decision making, as well
as to satisfy any regulatory requirements?
References
Note: Some of the sources included in this chapter have been listed previously. Only new
sources are listed below.
Ashby, S, Clark, D and Thirlwell, J (2011) Waking the sleeping giant: Maximizing the
Potential of Operational Risk Management for Banks, Journal of Financial
Transformation, 33, 127–36
Bouwer, L M (2013) Projections of future extreme weather losses under changes in climate
and exposure, Risk Analysis, 33 (5), 915–30
De Haan, L, Ferreira, A and Ferreira, A (2006) Extreme Value Theory: An introduction, vol
21, Springer, New York
Gourier, E, Farkas, W and Abbate, D (2009) Operational risk quantification using extreme
value theory and copulas: From theory to practice, The Journal of Operational Risk, 4 (3), 3
Huber, D G and Gulledge, J (2011) Extreme weather and climate change: Understanding the
link, managing the risk, Arlington: Pew Center on Global Climate Change, www.c2es.org/
site/assets/uploads/2011/12/white-paper-extreme-weather-climate-change-understanding-
link-managing-risk.pdf (archived at https://perma.cc/MZ8K-UCTF)
252 Fundamentals of Operational Risk Management
Organizational 11
resilience
L E A R N I N G O U TCOM E S
●● Explain the role of organizational resilience in an operational risk context and
why it is essential to the survival and success of 21st-century organizations.
●● Know the operational risk management capabilities that are essential for
effective organizational resilience.
●● Understand how organizations can implement effective capabilities for
resilience that help them to mitigate the threats and maximize the opportunities
that can come from major operational risk events.
1. Introduction
When managing operational risk in complex and dynamic operational environments
organizations are faced with two alternatives: anticipation or resilience (Comfort
et al, 2001).
Anticipation is a risk management strategy rooted in the assumption that it is pos-
sible to look into the future and estimate what may or may not occur. Many of the
chapters in this book, so far, have been based on this strategy, resting on the assump-
tion that the nature, probability and impact of operational risk events can be
estimated. For example, operational categorizations rely on the assumption that
99.9 per cent of operational risk events share the same basic characteristics of those
that have occurred before. Equally, risk assessment and monitoring tools – such as
risk and control self-assessments, loss event databases, risk indicators and scenario
analysis – assume that history is often repeated, allowing us to use past events and
trends to estimate what operational risk events may occur over the coming months
and years.
In contrast, the notion of resilience rests on the assumption that the past is not
always a good predictor of the future and that organizations must prepare for unex-
pected surprises. That such surprises occur in the 21st century should be clear to us
all. Events such as the global financial crisis of 2007–08 and the Covid-19 pandemic
254 Fundamentals of Operational Risk Management
possess elements that may be considered unprecedented, if not by their causes then
certainly in terms of their effects on organizations (see section 2.1. below). Hence
resilience as a strategy is less about prediction and more about preparing for and
adapting to an uncertain and ever-changing future – a future that cannot always be
inferred by events that have gone before.
This chapter will outline the sound practice of organizational resilience in
organizations in the face of increasingly uncertain and severe operational risk events.
In so doing, lessons from recent operational risk events such as the global financial
crisis and the Covid-19 pandemic will be explored. The aim is to help organizations
prepare for and adapt to operational risk events that have not occurred before, along
with events that, though familiar, have implications for organizations that far exceed
those that have occurred in the past.
This chapter builds on the recent definitions and guidance issued by the IOR.
Specifically, the focus will be on how to build capabilities for effective organizational
resilience in response to change that takes the form of major operational risk events.
from similar prior events. Hence, black swan events possess unique and potentially
very severe consequences.
The unpredictable nature of black swan events mean that traditional, anticipa-
tion-based operational risk management tools, like risk and control self-assessments,
will be ineffective. Tools like scenario analysis will also be of limited use, as it is un-
likely that previously unknown events will be reflected in such analysis. Hence, to
deal with the effects of black swan events organizations must focus on building their
robustness to the negative aspects of black swan events (threats) and their ability to
exploit the positive aspects (opportunities).
Though some organizations may be surprised by what is to them a black swan
event, Taleb notes that other organizations may not be so surprised, based on their
capabilities for organizational resilience. Hence, black swan surprises are specific to
organizations. This means that black swans can be made more predictable by
effective organizational resilience.
The global financial crisis of 2007–08 was a major operational risk event that surprised
many banks and regulators, but not all (Ashby, 2010; Ashby, Peters and Devlin, 2014). For
those banks and regulators surprised by the crisis it was a black swan event. Banks such
as Lehman Brothers, Bear Stearns, Halifax Bank of Scotland and Northern Rock were
totally unprepared for the crisis and either failed, as in the case of Lehman Brothers, or
received government-funded bailouts.
One bank that was not so surprised by the crisis was the Hong Kong and Shanghai
Banking Corporation (HSBC). In early 2007 it warned that a crisis in the US mortgage
market was emerging, observing that the mortgage arrears rate in one of its US
subsidiaries was rising. Many market observers and bank executives dismissed this
warning. In contrast, HSBC took steps to mitigate its exposure to US mortgages and the
associated financial securitization products, such as collateralized debt obligations,
which were hard hit during the crisis.
One reason HSBC might have been better able to see the global financial crisis coming
in 2007, was its experience of the Asian financial crisis in 1997 (Kynaston and Roberts,
2015). HSBC was one of only a few Western banks to operate extensively in Asia, meaning
that it learnt lessons other banks did not. This meant that for HSBC the global financial
crisis of 2007 was not a shocking black swan, but an anticipatable event, given its
experience of the Asian financial crisis.
Organizational Resilience 257
No one predicted the year that was 2020. Though the World Economic Forum Global Risk
Report (WEF, 2020) had identified infectious diseases as an emerging global risk, the
probability and impact of this risk was rated well below the then more immediate
concerns of environmental issues (e.g. global warming) and cyber attacks. Many
organizations and governments were unprepared for the pandemic and were forced to
make difficult social and economic decisions to help combat the spread of the virus (e.g.
the temporary closure of business premises and household lockdowns). Never have lives
and livelihoods been disrupted so significantly, for so long, and on a global scale. As early
as April 2020, the IMF predicted an economic impact larger than the Great Depression of
the 1930s (Goparth, 2020), predictions that only worsened as time, national lockdowns and
international travel restrictions continued (Williams, 2020).
Pandemics are an inevitable consequence of human life. For thousands of years
humans have moved around the globe, helping to spread disease. Historical pandemics
include the so-called ‘Spanish flu’ after the First World War (the virus had nothing to do
with Spain, it was called that because Spain was one of the few countries to permit news
reporting on the spread). That virus infected 500 million people worldwide (one-third of the
global population) and may have killed more than 50 million people (CDC, 2021). More
recently SARS (Severe Acute Respiratory Syndrome) in 2002–04, MERS (Middle East
Respiratory Syndrome) in 2012 and Ebola in 2013–16, caused global concern. All of these
more recent pandemics impacted on the operations of organizations, prompting many to
include pandemics for the first time in their business continuity planning activities.
However, none of these early 2000s pandemics impacted on operations to the extent that
Covid-19 did. In all cases the outbreaks were contained, and people’s social/business
lives soon returned to normal.
Hence, before Covid-19, it was known that pandemics could, hypothetically, disrupt the
operations of organizations should large numbers of workers (or those they care for)
become unwell or find that they are unable to travel into work. What was new about
Covid-19 was the rapid escalation, scale and duration of the government responses to
rising infection rates. All of a sudden, in March 2020 borders and businesses were closed
Organizational Resilience 259
and people in many countries were locked down in their homes, except for a small
number of essential activities. Worse, these restrictions remained in place for weeks,
often months. Subsequently, restrictions were repeatedly eased and reimposed in many
countries as new transmission waves and virus strains spread. The net result was that
human social and economic activity was curtailed for an extended period, causing
ongoing operational disruption.
The Covid-19 pandemic illustrates how a medical problem can spread into politics,
economics and business. It also shows that this can happen very suddenly with little or no
notice, and progress into a major health and economic crisis. That said, although the
pandemic created many threats for organizations it also brought opportunities, and not
just for the medical and hygiene sectors. In particular there were significant opportunities
for organizations willing to increase their use of the internet, both to support initiatives like
home working and to develop new delivery channels for products and services.
These three stages are relevant for any type of operational risk event, including
more-routine and less-disruptive events. But the last two stages take on greater sig-
nificance in the context of organizational resilience. This is because of the difficulties
associated with anticipating sudden and unplanned change events.
Taking first the response and adaption phase, the emphasis here is on recognizing
sudden and unplanned change and ensuring that organizations respond to this, both
by attempting to mitigate the associated threats and maximizing potential opportu-
nities. Recognizing the presence of sudden and unplanned change can be difficult,
especially if the risk culture of an organization (see Chapter 4) does not promote
awareness of operational risk, or there is a blame culture. There are numerous exam-
ples of organizations that deny the significance of an event and/or are slow to
respond – the VW emissions and BP Deepwater Horizon cases illustrate that (see
Case Studies 1.4 (Chapter 1) and 8.5 (Chapter 8) respectively). Equally, other or-
ganizations are much quicker to respond, as in the case of Toyota and the Aisin Seiki
fire (Case Study 8.3, Chapter 8). Here, speed of response is key. The sooner an
260 Fundamentals of Operational Risk Management
rganization recognizes that sudden and unplanned change has occurred and taken
o
steps to mitigate and/or exploit this change, the better. This is true both for sudden
and unplanned change that is the fault of an organization (e.g. due to some type of
management failure), as when it is due to external factors such as a pandemic.
Moving to the third phase the focus is on getting the organization back to routine
operations, although not necessarily the same routine as before. Here it is helpful to
consider first-order versus second-order change (Meyer, 1982). First-order change is
concerned with overcoming the change event and returning operations back to the
way they were before the event (the old normal). Second-order change embraces
what has occurred and involves the adoption of new practices (e.g. new operational
processes and working arrangements). Sometimes second-order change is discussed
in terms of embracing the ‘new’ normal that can follow a major change event.
The scale and significance of the Covid-19 pandemic has resulted in significant social
change. One major change for organizations is expected to be a permanent shift towards
a distributed working model that permits a blend of onsite, remote and hybrid working.
Plus, greater flexibility in relation to when and how work is completed, leading to a move
away from the traditional 9–5 working day (Martin, 2021).
Organizations may choose to resist this change and return to the old normal of onsite
working during fixed office hours. However, this resistance could affect their productivity
and result in staff seeking new employment. Alternatively, they can embrace the new
normal and work to exploit the benefits it can bring in relation to productivity and staff
satisfaction (Ipsen et al, 2021).
Finally, in terms of readiness and preparedness, there are two elements to consider.
Firstly, the standard notion of anticipation. Not all sudden and unplanned change
events are black swans or transboundary crises. This means that organizations
should, where possible, look to anticipate events that might disrupt their operations
in the future. Secondly, it is important to remember that even when sudden and un-
planned changes cannot be anticipated it is often possible to put in place planned
responses, pre-event, to help an organization adapt to events when they occur. This
will be explored further in section three below.
Organizational Resilience 261
Section 3.6 below puts these capabilities together using a case study of the Texan
supermarket chain H-E-B. This case shows how, with the right capabilities, organiza-
tions can thrive in the most challenging of conditions.
Formal
(7)
Communication
(1) Resources
(8) Deliberative
(2) Redundancy
democracy
(3) Scenarios
(9) Human capital
(competency)
Adaptive
Planned
(4) Distributed
resources (10) Leadership
(5) Collateral (11) Culture
pathways (12) Social
(6) Non-linear networks
planning
Informal
1 All organizations require resources to operate, and most will maintain some degree
of surplus resource. This is especially the case in industries like financial services.
Resilient organizations should ensure that they have sufficient financial (cash or
credit) and physical resources for both normal and abnormal operating
environments. This could range from contingency finance arrangements to
stockpiling vital components and equipment, such as personal protective equipment
(PPE) or virus testing kits.
2 Redundancy is an extension of maintaining ‘excess’ resources and involves the
development and maintenance of sites, systems or equipment that are not
necessary in normal operations. Examples include maintaining mothballed office
space or manufacturing capacity, access to a dedicated or shared continuity site,
backup generators or multiple internet connections.
Organizational Resilience 263
3 As explained in Chapter 10, scenario analysis and the related tools of stress testing
and reverse stress testing can be used to imagine future operational risk events,
especially more severe events. The results from this work can subsequently be
used to support other planned measures, such as resource planning, or to test
adaptive tools like information cascades. Remember that effective scenario
analysis need not involve imagining specific (deterministic) situations. Techniques
such as reverse stress testing allow organizations to analyse the point at which
their operations, business plans or finances become non-viable without having to
determine specific scenarios in advance.
The Swiss Government maintains one of the largest stockpiles of essential goods in the
world (Bryce et al, 2020). This includes maintaining 3–6 months’ supply of essential
foodstuffs, medicines and equipment, including personal protective equipment (PPE). In
2016 the Swiss Government increased these supplies due to concerns over the stability of
increasingly complex and international supply chains.
The stockpiles are maintained to cover any form of essential supply disruption,
including political conflict (e.g. trade wars and sanctions); accidents, such as the March
2021 Suez canal blockage; and pandemics such as Covid-19. Given this range of
applications, these stockpiles may be considered non-deterministic slack.
2014). The aim is to develop localized event monitoring and resource management
systems that allow for the widest range of response (see Case Study 11.5). Another
form of distribution is distributed governance (Barasa, Mbau and Gilson, 2018),
where staff are empowered to develop bottom-up solutions to problems, rather
than relying on a slower and less flexible top-down response. Effective distributed
governance requires clear statements (policies and procedures) on the circumstances
and situations where decisions may be taken outside the conventional hierarchy
and what should be escalated. Training may also be required to help staff
understand these policies and procedures.
2 Collateral pathways involve using different routes to achieve a goal (Barasa, Mbau
and Gilson, 2018). The aim is to find an alternative route or course of action when
an established system, process or procedure is unavailable. Authorized workarounds
may be planned in advance, or staff may be empowered to implement unforeseen
workarounds if required. The use of distributed resources and non-linear planning
can improve the ability of an organization to find collateral pathways.
3 Non-linear planning (Barasa, Mbau and Gilson, 2018) incorporates feedback
loops when using pre-planned responses during an event. This allows response
plans to be refined through iteration and trial and error. The idea is to act quickly
and then to reflect on the outcome, adjusting the response as necessary.
Often distributed resources are combined with the use of collateral pathways. For
example, power supplies can sometimes be rerouted around the problem area (e.g. a
faulty pylon); in addition, multicustomer microgrids can be created that permit electricity
customers to be dynamically ‘islanded’, meaning they can be temporarily isolated from the
main grid to sustain supplies, so long as local electricity generation or storage resources
are sufficient.
Research by Ashby, Bryce and Ring (2018) into the management of risk at the level of the
board revealed that the risk environments faced by organizations are becoming
increasingly uncertain. Traditional, anticipation-based risk management techniques still
have value, but increasingly boards are having to respond to unanticipated events.
Interviews with board directors revealed that boardroom diversity was an essential
element in effective resilience. Specifically, diversity in terms of the skills, knowledge,
experience, education and training of board members – the aim being to combine
different Skills, Knowledge, Experience, Education and Training (SKEET) to create what
the report termed ‘Risk Intelligence’ or RI-SKEET.
‘If you have an organization, for example, that’s been a board composed of people
who’ve come up through the ranks, and understand the culture of the organization and
understand what really makes it tick and how things, how politics work, and how
communication really works in practice, and you have non-execs who all come from the
same industry, then you have a board that is very good at understanding what I would
describe as internal risk… If they lack true exec and non-exec members who have come
from outside of the organization and ideally outside the industry, then they will lack that
external perspective and there will be a lens around the boardroom table that is missing’
(Ashby, Bryce and Ring, 2018, p17).
In 2011 the Association of Insurance and Risk Managers in Industry and Commerce
(AIRMIC), published a major report on the causes of major operational risk events: ‘Roads
to Ruin’ (Atkins et al, 2011). This report used multiple cases of public-sector and corporate
disasters and crises to reach its conclusions. Subsequently AIRMIC published a more
positive report looking at how real-world organizations build effective organizational
resilience: ‘Roads to Resilience’ (Goffin et al, 2014).
Each report highlights the importance of leadership, culture and communication, both
as escalation factors at the onset of major operational risk events and as important
mitigating controls. In terms of adaptive and informal capabilities for organizational
resilience the Roads to Resilience report identified two key factors:
●● Relationships and networks – to ensure that information flows freely vertically (up and
down) and horizontally (across) a network. Here the report warns of ‘risk blindness’,
especially at board level, where some boards focus too much on the exploitation of
strategic opportunities and can ignore significant downside threats, until it is too late.
268 Fundamentals of Operational Risk Management
●● Rapid response – where organizations must be willing and able to act when faced with
sudden and unexpected change.
To support the findings of the Roads to Resilience report a number of case studies are
discussed to highlight the elements of effective resilience. One such case is the
InterContinental Hotels Group (IHG), which places significant importance on risk culture.
To help achieve this IHG uses a four-stage maturity framework to review risk management
activities in its hotels. The aim is to move its hotels from reactive risk management (stage
1), through compliant (2), embedded (3) and finally rooting risk management as a core
value that is second nature for staff (4).
IHG recognizes that it is working in an uncertain environment where staff must
regularly deal with the unexpected, not least because every guest has different
expectations regarding the service they wish to receive.
4. Conclusion
Organizational resilience is a journey, not a destination. Major operational risk events
such as the Covid-19 pandemic provide organizations with valuable o pportunities to
270 Fundamentals of Operational Risk Management
1 Do you understand the significance of black swans and transboundary crises for
operational risk management? What discussions have you had in your
organization about the potential for such events?
2 Does the scope of the operational risk function include business continuity
management (BCM)? Are operational risk professionals routinely involved in BCM
activities?
3 How vulnerable are the operations of your organization to disruption? Have you
considered the implications of concepts like just-in-time manufacturing and
lean production on the effects of disruption? What steps have you taken to
establish financial contingency funds, as well as resource stockpiles of key
equipment and supplies?
4 How flexible are your business continuity and disaster recovery plans? Are they
able to adapt to new, unplanned for, situations?
5 What steps have your organization taken to build risk intelligence in your
organization? Do managers and directors have a diverse range of skills,
knowledge, experience, education and training?
6 How does your risk culture support organizational resilience? What steps have
you taken to influence your risk culture to enhance resilience?
Organizational Resilience 271
References
Arghandeh, R, Brown, M, Del Rosso, A, Ghatikar, G, Stewart, E, Vojdani, A and von Meier,
A (2014) The local team: Leveraging distributed resources to improve resilience, IEEE
Power and Energy Magazine, 12 (5), 76–83
Ashby, S (2010) The 2007–2009 Financial Crisis: Learning the risk management lessons,
Financial Services Research Forum, Nottingham
Ashby, S, Bryce, C and Ring, P (2018) Risk and the strategic role of leadership, Professional
Insights Series, Association of Certified Chartered Accountants, www.accaglobal.com/sg/
en/professional-insights/risk/risk-and-the-strategic-role-of-leadership.html (archived at
https://perma.cc/36Y6-4ET7)
Ashby, S, Peters, L D and Devlin, J (2014) When an irresistible force meets an immovable
object: The interplay of agency and structure in the UK financial crisis, Journal of
Business Research, 67 (1), 2671–83
Atkins, D, Fitzsimmons, A, Parsons, C and Punter, A (2011) Roads to ruin: A study of major
risk events, their origins, impact and implication, AIRMIC, London, www.airmic.com/
technical/library/roads-ruin-study-major-risk-events-their-origins-impact-and-implications
(archived at https://perma.cc/9G4C-JNQP)
Barasa, E, Mbau, R and Gilson, L (2018) What is resilience and how can it be nurtured? A
systematic review of empirical literature on organizational resilience, International
Journal of Health Policy and Management, 7 (6), 491
Bhamra, R, Dani, S and Burnard, K (2011) Resilience: The concept, a literature review and
future directions, International Journal of Production Research, 49 (18), 5375–93
Boin, A (2019) The transboundary crisis: Why we are unprepared and the road ahead,
Journal of Contingencies and Crisis Management, 27 (1), 94–9
Bryce, C, Ring, P, Ashby, S and Wardman, J K (2020) Resilience in the face of uncertainty:
Early lessons from the Covid-19 pandemic, Journal of Risk Research, 23 (7–8), 880–7
CDC (2021) 1918 pandemic (H1N1 virus), Centre for Disease Control and Prevention,
www.cdc.gov/flu/pandemic-resources/1918-pandemic-h1n1.html (archived at https://
perma.cc/85JQ-N9VS)
Comfort, L K, Sungu, Y, Johnson, D and Dunn, M (2001) Complex systems in crisis:
Anticipation and resilience in dynamic environments, Journal of Contingencies and Crisis
Management, 9 (3), 144–58
Goffin, K, Hopkin, P, Szwejczewsk, K and Kutsch Dipl Kauf, E (2014) Roads to resilience:
Building dynamic approaches to risk to achieve success, AIRMIC, London, www.airmic.
com/technical/library/roads-resilience-building-dynamic-approaches-risk-achieve-future-
success (archived at https://perma.cc/3X43-QBRC)
Goparth, G (2020) The great lockdown: Worst economic downturn since the Great
Depression [blog] IMF, 14 April 2020, https://blogs.imf.org/2020/04/14/the-great-
lockdown-worst-economic-downturn-since-the-great-depression/ (archived at https://
perma.cc/DV9T-XCEG)
272 Fundamentals of Operational Risk Management
Regulating 12
operational risk
L E A R N I N G O U TCOM E S
●● Explain why the regulation of operational risk management is required.
●● Identify some important international and local regulations that relate to
operational risk.
●● Understand the compliance role of the operational risk management function.
1. Introduction
The operational risk management practices and decisions of organizations are sub-
ject to various regulations. Common areas of regulatory focus include financial
crime, health and safety, environmental protection and legal liability requirements,
such as compulsory insurance for employee and public liability.
Certain industries, such as financial services, are subject to significant additional
operational risk management regulation aimed at protecting the overall financial
system and preventing financial or legal misconduct (protecting consumers from
being mis-sold financial products that do not meet their needs). Much of this regula-
tion is now global, as financial markets and institutions become more interconnected.
In addition, there are a range of professional standards that relate to the manage-
ment of operational risk. These standards explain what good operational risk man-
agement practice looks like. Some of these standards are linked to specific areas of
regulation and have a degree of legal force behind them. Others are stand-alone, but
organizations can still experience pressure from stakeholder groups (e.g. shareholders,
creditors, customers and rating agencies) to comply.
Operational risk management professionals must understand the regulations and
standards that relate to operational risk. This is to ensure that the operational risk
management practices and decisions made within their organization are compliant
with these regulations and standards. Plus, along with internal audit and compliance
Regulating Operational Risk 275
r isk-related conflict between stakeholders. In this case, evidence was presented that
shareholders tend to prioritize profit over employee safety. This is because the ben-
efits of a safe working environment do not directly flow to shareholders.
Where risk-exposure-related conflicts exist between stakeholder groups, the prac-
tice of operational risk management takes on an additional objective: to further
protect and create value by managing these conflicts and increasing the overall level
of stakeholder satisfaction. Effective operational risk management is needed to help
balance the conflicting interests of different stakeholder groups, weighing up differ-
ent priorities and assessing the costs and benefits of different risk management
decisions and risk exposure levels.
In a perfect world, organizations would implement this additional objective with-
out the need for any legal coercion; after all, satisfied stakeholders should reward the
organization in some manner, for example through greater loyalty, lower cost of
credit or a higher share price. However, the world is far from perfect and, left to their
own devices, not all organizations manage the operational risk-related conflicts that
exist between stakeholders in an effective manner, as illustrated by Case Study 6.2.
The reason the world is not perfect in this context is because of market failures,
failures that prevent stakeholders from exerting effective incentives on organizations
to manage operational risk in accordance with their wishes. Stakeholders need
efficient markets to ensure that their risk preferences are reflected in the risk manage-
ment decisions made by organizations. For example, customers must know the
health and safety, or quality risks associated with the use of a particular product if
they are to decide whether to purchase it at a given price or even to choose to pay a
higher price for a safer product. Equally, a prospective employee’s decision to work
for a company may be affected by the associated health and safety risks. They may
demand higher wages for a higher-risk job or decide that the job is too risky at any
price. From a financial perspective, employees and creditors must be able to assess
the risk of bankruptcy before deciding how much to charge for their time and skills
(in the case of employees), or loan interest (in the case of creditors).
A key factor that is needed to ensure market efficiency is information. Stakeholders
must know the types and degrees of operational risk to which they will be exposed
in order to generate market incentives for effective operational risk management.
This can be hard to achieve in practice. Customers are unlikely to know how safe or
reliable a product is before they purchase it, whereas the organization manufactur-
ing the product will have a much better understanding of the product’s safety and
reliability. This is known as the asymmetric information problem.
Self-interested opportunism can arise in the presence of asymmetric risk manage-
ment information between stakeholder groups. In the previous product safety and
reliability example, it may be that an organization exploits a customer’s lack of prior
information by making a product less safe or reliable than it could be, thus saving
the organization money but exposing the customer to an unacceptable level of risk.
Regulating Operational Risk 277
A second market failure that can help to justify risk management regulation is the
public goods problem. Public goods are products, services or other benefits that are
enjoyed on a non-exclusive basis by all the members of a society. From an opera-
tional risk management perspective, key public goods are the environment and the
protection of shared systems – such as the global financial system – from systemic
operational risk events, like the global financial crisis of 2007–08 (McConnell and
Blacker, 2013). The problem with these public goods is that individuals or organiza-
tions may make operational risk management decisions that benefit them, but which
do not protect the wider environment or financial system. In the case of the environ-
ment, an organization may not invest as much in preventing pollution as required by
society to preserve public health and wellbeing. This is because the organization may
only consider the costs and benefits to itself from managing pollution risks, not those
to society as a whole. The same can also be the case in financial organizations, which,
left to their own devices, may not do enough to protect the financial system as a
whole from operational risk.
Finally, consider the need for international regulations and standards. These are
required because operational risk exposures often cross national boundaries. The
removal of trade barriers, easier travel and tools like the internet mean that organi-
zations are now more multinational in terms of their operations and markets. The
impact of major operational risks on public goods like the environment or the
financial system can have far-reaching effects. Diverse risks may be connected: for
example, major environmental pollution events and weather events may affect finan-
cial markets across the world. In addition, the impact of operational risk events on
financial markets and institutions can affect the supply of credit and cause global
economic problems, as has occurred during the Covid-19 pandemic.
The stability of the global financial system is important for both financial and non-
financial organizations. For non-financial organizations, a stable global financial sys-
tem is necessary to ensure that they continue to have access to capital resources to
help finance their activities. Financial system instability can trigger worldwide eco-
nomic problems, restricting access to consumer and government credit, threatening
278 Fundamentals of Operational Risk Management
the safety of saving deposits and disrupting payment systems. Ultimately, these prob-
lems can cause major economic recessions and even economic collapse of businesses
and nations alike.
There are few, if any, financial markets that are not interconnected in some way.
Money markets are by their nature international, and stock markets like the London
Stock Exchange attract investors and other stakeholders from around the globe.
Most other financial markets, such as commodities, bonds and derivatives, are also
inherently international. The net result of these interconnected markets is that finan-
cial problems in one country or even in a single, large financial institution can have
global implications. This is known as systemic risk and financial market contagion.
It is tempting to think that systemic risks are primarily market-, credit- or liquid-
ity-related. Certainly, systemic events impact on financial markets and the availabil-
ity of cash and credit; however, often their root causes are operational in nature, such
as an external event, like a pandemic, or a failure in risk governance or risk culture.
Research by McConnell and Blacker (2013) reveals that systemic operational risk events
exist and can have a major impact on financial markets. Focusing on the global financial
crisis of 2007–08 the paper shows how people and process risks existed and increased
before the crisis. This includes factors like weaknesses in credit approval processes,
flawed sales incentives and ineffective operational risk governance.
Earlier research, looking at insurance company failures across Europe, reached a
similar conclusion (Ashby, Sharma and McDonnell, 2003). This research demonstrated
that operational risk factors such as an inappropriate risk culture, weak risk governance
and flawed underwriting processes are the most common underlying causes of insurance
company failures.
Figure 12.1 Basel Accord pillars, applied to operational risk (author’s own)
Basel Accord
Originally the Basel Committee focused on market and credit risk, but in the late
1990s, during the negotiations for the second global Basel Accord, known as Basel
II, the committee added operational risk to its remit. Subsequently the original Basel
II regulation was reviewed and enhanced as part of the most recent Basel III accord,
which followed the global financial crisis. For a history of the Basel Committee see
Basel Committee (2021b).
The content of the Basel Accord is not legally binding on banks and other deposit-
taking financial institutions. However, governments around the world sign commit-
ments to implement them in their jurisdictions. This means that most deposit-taking
financial institutions are subject to the operational risk-related regulations contained
within the prior Basel II or current Basel III Accord.
Like all the other risk types covered by the Basel Accord, the Basel regulations on
operational risk are built around three pillars, as illustrated in Figure 12.1.
As illustrated in Figure 12.1 there are two levels of regulation:
●● rules that specify the minimum capital requirements, management standards and
public disclosures for operational risk;
●● guidance that provides further detail on the effective management of operational
risk.
Banks and other deposit-taking financial institutions are expected to comply with all
of the rules contained within the Basel Accord. Non-compliance would, in most
cases, lead to supervisory intervention by the relevant local supervisory authority. In
contrast, they have more discretion over compliance with the guidance issued by the
Basel Committee, but local supervisory authorities do have powers to encourage
280 Fundamentals of Operational Risk Management
The latest and future, 2023, version of the Basel III Accord is available online via the
Basel Committee website (Basel Committee, 2021a). In terms of operational risk, the
rules contain, currently:
●● three options for calculating the minimum capital requirement (Basic Indicator,
Standardized and Advanced Measurement Approaches);
●● minimum standards for using the Standardized and Advanced Measurement
Approaches.
The three approaches to calculating the minimum capital requirements are soon to
be revised (from 1 January 2023). As part of these revisions the Advanced
Measurement Approach will be removed, and the method used to calculate the cur-
rent Standardized Approach will be changed. In addition, new rules will be added on
the identification, collection and treatment of operational losses.
The Basic Indicator Approach (BIA) will remain unchanged. The BIA calculation
relies on calculating the average annual gross income over the last three years and
holding 15 per cent of this three-year average as the minimum capital requirement.
Hence the volume of business conducted by a bank is taken as a proxy measure for
its overall exposure to operational risk. The higher the income the greater the mini-
mum capital requirement.
The new Standardized Approach uses a more sophisticated financial statement-
based proxy for operational risk exposure, known as the Business Indicator (BI).
The amount of capital required to support this BI measure is then customized ac-
cording to specific coefficients determined by a local supervisor, known as the
Business Indicator Component (BIC) and an Internal Loss Multiplier (ILM) that
Regulating Operational Risk 281
reflects the historical operational losses of a bank. Hence the new Standardized
Approach provides a more customized measure of operational risk capital and
should incentivize banks to reduce their exposure to operational loss events.
For more information on the rationale for the changes to the minimum capital
requirements for operational risk, see Basel Committee (2016).
A major example of bad conduct relates to the historic mis-selling of payment protection
insurance in the UK.
282 Fundamentals of Operational Risk Management
Payment protection insurance (PPI), also known as credit protection insurance and
loan repayment insurance, is a form of insurance that provides funds to help repay a loan
if a borrower dies, is ill or injured or loses their job.
PPI is a form of insurance that can be sold as a stand-alone policy or as an add-on to a
mortgage, personal loan or some other form of debt such as an overdraft or credit card. In
the UK, the growth in popularity of PPI as an add-on product took place in the 1990s.
Billions of pounds in premium income was generated.
Stand-alone PPI policies were not generally mis-sold, but many add-on policies have
been found to have been mis-sold. Mis-selling occurred because the contractual
provisions of the policy made it very difficult to claim or because information was hidden
from customers, such as the full cost of cover or claim limits. In some cases, customers
were not aware that they had purchased PPI.
Concerns about PPI mis-selling began in the 1990s, but it was not until 2005, when a
super-complaint was brought by the Citizens Advice Bureau, that financial institutions
were required to make changes to how they sold PPI and provide compensation to all
affected customers.
It is estimated that up to 64 million policies could have been mis-sold, requiring refunds
of around £33 billion (Financial Conduct Authority, 2020). The scandal led to significant
changes in selling practices to avoid similar problems in the future. It also forced financial
institutions to hold back large sums of money in provisions for these claims.
The Financial Conduct Authority (FCA) regulates the conduct of UK financial institutions.
The FCA has three objectives (www.fca.org.uk/about):
1 protect consumers;
2 enhance market integrity;
3 promote competition.
In terms of protecting consumers the FCA ensures that they receive products that meet
their needs and that financial institutions place the welfare of consumers before their own
profits. To achieve this the FCA operates a licensing scheme for both financial institutions
and their directors and officers. Both must meet appropriate ‘fit and proper’ standards
before they are allowed to operate. In addition, the FCA works to educate consumers
about conduct risks, including informing them about investment scams.
Market integrity is enhanced through a variety of mechanisms, including rules relating
to the handling and safe return of client funds, holding senior management accountable
for the actions of their organization and the monitoring of financial crime prevention
activities.
Competition is promoted through the monitoring of markets to ensure fair competition
and the enforcement of competition law where necessary. This includes preventing price
fixing (collusion between financial institutions) and ensuring that fees and charges are
transparent.
The FCA’s approach to the regulation and supervision of financial services
organizations is rooted in a number of Principles of Good Regulation (www.fca.org.uk/
about/principles-good-regulation). These principles include:
●● Ensuring that shareholders with a controlling interest do not force excessive risk
taking to generate short-term returns because their limited liability may help to
insulate them from the costs of this risk taking.
●● Prevention of unethical or illegal practices through the use of whistleblowing
controls.
●● Public disclosure to ensure that stakeholders have information on all reasonably
foreseeable material risks.
●● The board is considered responsible for overseeing an organization’s internal
control and risk management systems. This includes board-level reviews of risk
management policies and procedures and, where relevant, the creation of audit
committees and risk committees to facilitate this work.
In terms of jurisdiction-specific corporate governance rules there are two main ap-
proaches: the ‘comply or explain’ and the ‘comply and sign’ approaches.
Under the comply or explain approach organizations subject to the principles and
guidance contained within a governance code are not required to follow its contents
in a strict rule-based way. An organization may decide not to comply or to amend
specific principles to better suit its situation. When organizations decide not to com-
ply or to amend a principle, they are expected to explain publicly why they have
Regulating Operational Risk 285
made such a decision. This requirement to explain ensures that stakeholders are kept
informed of the organization’s governance arrangements and the reasons why these
arrangements may not follow precisely the principles contained within the code.
The advantages of this ‘comply or explain’ approach are that organizations are
provided with clear principles in relation to their corporate governance practices but
at the same time they are allowed a degree of flexibility in how they may apply them
in their specific situation. This flexibility is appropriate, given the wide variety of
contexts that organizations operate within and the diversity of their activities and
operating environments.
A comply and sign approach is more prescriptive. Organizations must comply to
the letter of the rule, with no exceptions. In addition, accountable individuals (usu-
ally the board of directors) are required to personally sign off the effectiveness of an
organization’s governance arrangements. If the organization is then found not to
have effective governance they can face fines or even imprisonment.
The comply and sign approach ensures maximum compliance. But it is much less
flexible than a comply or explain approach. A comply and sign approach can work
well where there is agreed best practice or where organizations are very similar in
terms of their nature, scale and complexity.
CASE STUDY 12.4 US comply and sign corporate governance regulation
Where organizations are listed on a US stock exchange or where they have a subsidiary
that is listed they are required to comply with US corporate governance regulations.
The Sarbanes-Oxley (SOX) Act was signed into US federal law in 2002 (H.R. 3763). The
act was a response to a number of high-profile governance scandals, such as the failure
of Enron. Mostly the act relates to the production and disclosure of company accounts.
A key requirement is section 302, which requires company accounts to be free of any
untrue statements and material omissions. Further, to ensure this is the case the
signatories of the accounts must satisfy themselves that appropriate internal controls are
in place to present any accidental or deliberate (fraudulent) misstatements.
The signatories of a company’s accounts (usually the CEO, CFO and Chair, where
appropriate), are held personally liable for this action. Hence they may be subject to
personal prosecution (criminal or civil) if material errors are discovered.
286 Fundamentals of Operational Risk Management
For more on effective governance from an operational risk perspective see Chapter 6.
The UK regulatory authority is the Health and Safety Executive (HSE). The HSE is an
independent health and safety regulator that draws its powers from the Health and Safety
at Work Act 1974. The act gave the HSE its powers to create regulations, inspect health
and safety practices in organizations and take enforcement action, such as issuing fines,
where necessary.
The 1974 act places expectations on employees and employers, but prime
responsibility for providing a safe working environment rests with the employer, which
means an organization’s management and directors. Employers are expected to ensure
‘as far as reasonably practical’ that employees are protected from hazards that may
endanger their health and safety. This includes providing appropriate levels of protection
against hazards such as fire, ‘slips, trips and falls’, dangerous equipment, excessively long
working hours or undue workplace stress. In return, employees are expected to
cooperate with the health and safety activities of their employers and to act responsibly to
ensure that they do not endanger themselves or others.
The act covers non-employees who may be at a place of work, including contractors,
suppliers, customers and third parties.
The HSE is responsible for enforcing three further pieces of UK legislation:
The COSHH regulations apply to substances that are deemed to be especially hazardous,
such as acids, fumes, dusts and vapours, plus more modern developments such as
nanotechnology and germs that are used in laboratories. Hazards such as asbestos and
radiation are dealt with separately. Many organizations are affected by the COSHH
regulations. For example, dangerous cleaning products like bleach are covered by the
regulations, as is dust generated within agricultural processes and baking. Areas such as
hairdressing and beauty are also covered by the regulations because of the chemical
products, like peroxide, that may be used.
The RIDDOR regulations apply to all organizations in the UK. Here, organizations are
required to report to the HSE any significant injuries, diseases or dangerous occurrences.
Reportable incidents include the death or serious injury of any person on an organization’s
premises, occupational diseases (such as asbestosis) and dangerous occurrences such
as a gas leak or building collapse.
The Employers Liability (Compulsory Insurance) Act 1969 requires most organizations
to maintain employers’ liability insurance. This helps the employer to pay compensation if
288 Fundamentals of Operational Risk Management
an employee is injured or becomes ill because of the work they do. The purpose of this
insurance is to ensure that an employee will receive the funds that they are due if they
make a successful liability claim against their employer for a health- or safety-related
incident. If, for example, an organization was to declare bankruptcy after a claim is
awarded, then the employee might not receive the award. Compulsory insurance ensures
that all legitimate claims are paid.
The premises of many organizations are subject to periodic inspections by trained HSE
inspectors. The inspector will review health and safety management practices and
examine how they are implemented. Areas of non-compliance with HSE regulations will
be identified and an organization will be issued enforcement notices that allow it a set
time period to achieve compliance. The frequency of inspections is usually risk-based: the
premises of an organization that operates in a high-risk sector or one that reports high
numbers of RIDDOR incidents will be inspected more frequently.
In addition to its regulatory, inspection and enforcement powers, the HSE issues a
wide range of guidance documents, designed to help an organization to improve its health
and safety management practices. This guidance is topic- and sector-based, focusing on
high-risk sectors like nuclear power, chemical processing, farming, fishing and diving.
Guidance on topics relevant to all sectors include dealing with workplace stress, manual
handling, preventing industrial diseases, fire safety and preventing slips, trips and falls.
●● air quality;
●● water quality;
●● waste management;
●● contaminant clean-up;
●● chemical safety.
c limate change. For most organizations, these laws and protocols are incorporated
into national regulation or in the case of the European Union (EU), EU Directives.
This means that, except in complex multinational enterprises, it may not be necessary
for organizations to understand in detail these international laws and regulations.
The standard is used by regulators, external and internal auditors, risk management
professionals and company secretaries/governance professionals to help improve the
management of risk against an international benchmark for good practice.
In addition to the core standard, the ISO also provides a number of additional
documents in this family, such as:
The 2018 update of ISO 31000 did not change the core philosophy of the original
2009 standard, but is shorter and more concise, with the intention to make the
various concepts easier to understand. It also places greater emphasis on top man-
agement leadership in the creation and preservation of organizational value
through risk management. There is a greater focus on the integrated nature of risk
management, whereby organizations should review and regularly update their risk
management practices, taking account of new and changing risks such as cyber
and terrorism risks.
Soon an additional member of the ISO 31000 family of standards is expected:
ISO 31050 (guidance for managing emerging risks to enhance resilience). Work on
this guide began in 2018, just before the Covid-19 pandemic, but no doubt the guide,
when published, will reflect the lessons learnt.
●● Governance distinct from management: this ensures that those responsible for
overseeing the operating of an organization’s IT risk management activities are
not involved in the day-to-day running of the organization. This should, in theory,
mean that they maintain a degree of impartiality, allowing them to challenge
management practices where necessary.
●● Tailored to enterprise needs: there is no one best approach to good governance;
organizations must implement an approach that helps them to achieve their
objectives and deliver stakeholder value.
●● End-to-end governance system: effective IT risk management must cover the
entire operational processes and supply chains of an organization.
The GDPR regulation of the European Union (Regulation (EU) 2016/679 (General Data
Protection Regulation)) covers all aspects of the collection, storage and use of data in
organizations (see: https://gdpr.eu/). From a personal perspective the regulation provides
important protections for EU citizens, ensuring that they have control over any data that is
stored on them, including a requirement to keep the data within the EU and a right to have
this data erased, when it is no longer necessary. From an organizational perspective the
regulations are a significant source of operational risk. Failure to comply with the
regulations can result in enforcement action, including large fines.
Regulating Operational Risk 293
1 There are many laws and regulations that relate to the management of
operational risks.
2 Whenever an organization breaches a law or regulation it runs the risk of
enforcement action, including fines, compensation payments and the possible
imprisonment of directors and officers. Such compliance risks fall within the remit
of operational risk.
Many organizations have a compliance function that is separate from the opera-
tional risk function, although sometimes the two are combined. Where separate
functions exist, it is essential that the two functions work together closely. Each will
require the support of the other. The operational risk function will have the neces-
sary expertise on the management of operational risks, while the compliance func-
tion will know how to implement appropriate processes and procedures to ensure
that all applicable laws and regulations are complied with. This might include de-
signing compliance monitoring activities, reviews and audits, for example.
Many countries have laws and regulations that are designed to prevent criminals from
using the proceeds of their illegal activities. This can include regulations around the
purchase and sale of high-value assets (cars and houses), and the opening and operation
of bank accounts and bank loans.
Organizations that are found to be in breach of these regulations can face significant
fines and other criminal sanctions. As a result, the associated exposure to compliance
risk can be very high.
Compliance monitoring can be frequent and in-depth in relation to proceeds of crime
regulations. Every single transaction (such as bank account transactions) may need to be
monitored on a real-time basis to check for suspicious activity. Any such activities are
then escalated to the compliance function or the Money Laundering Reporting Officer
(MLRO) where required. The decisions made by staff members may also be assessed in
detail. For example, regular checks may be made to ensure that a customer’s identity is
confirmed using multiple sources of verification. This can include recording and analysing
phone conversations to provide additional assurance that staff members are using the
necessary controls in a consistent and effective manner.
294 Fundamentals of Operational Risk Management
7. Conclusion
Operational risk exposures do not impact organizations in isolation. Many different
stakeholder groups are impacted, including shareholders, creditors, employees,
customers and third parties.
Regulations and standards exist to help ensure that organizations manage their
operational risk exposures in a manner that meets the expectations of these stake-
holders. Organizations that fail to comply with these regulations and standards face
not only the disapproval of these stakeholders, but also sanctions from the regula-
tory and supervisory agencies appointed to protect these stakeholders from exploita-
tion and potential financial or physical harm.
It is important that operational risk professionals are familiar with the key laws
and regulations that relate to operational risk exposures. This includes international
regulations, along with local laws and regulations. Equally it is important that they
Regulating Operational Risk 295
References
Note: Some of the sources included in this chapter have been listed previously. Only new
sources are listed below.
Ashby, S, Sharma, P and McDonnell, W (2003) Lessons about risk: Analysing the causal
chain of insurance company failure, Insurance Research and Practice, 18 (2), 4–15
296 Fundamentals of Operational Risk Management
INDEX
The index is filed in alphabetical, word-by-word order. Acronyms are filed as presented. Numbers are
filed as spelt out, with the exception of Basel Accords and ISO Standards, which are filed in chronological
order. Page locators in italics denote information within tables and figures; those in roman numerals
denote information within the preface.
chief executive officers (CEOs) 37, 127, 132, 285 cost-benefit analysis 27, 67, 90, 91, 111, 121,
chief risk officers (CROs) 13, 37, 45, 129, 144, 167, 181, 211
131–32, 133, 146 see also repair costs
classification levels 58 counterparty risk 46, 53, 247
climate change 12, 228–29, 289 see also contractors; creditors; customers;
closed questions 162 suppliers
COBIT framework 291–92 Covid-19 pandemic 8, 17, 57, 173, 208–09, 250,
codes of conduct 79 258–59, 260, 268–69, 277
cognitive dissonance 78–79 creativity 81, 229, 265, 267
collaboration 81, 126, 127–29 credit risk 46, 62, 210, 279
collar thresholds 217 creditors 62, 249, 275, 276
collateral pathways 264, 265 critical dependencies 210
commercial risk 46, 138, 244 CROs (chief risk officers) 13, 37, 45, 129,
Committee of Sponsoring Organizations of the 131–32, 133, 146
Treadway Commission 2, 3, 11, 290–91 culture 14, 23, 25, 29, 64–88, 97, 98, 100, 121,
communication 31, 37, 75, 80–81, 90, 107–08, 182–83
183, 265 blame 182–83, 259
see also body language; language; one-to-one organizational 267
meetings; risk talk cumulative distribution functions 172–74, 199
community 40, 114, 269 current status assessment 39
completeness 32, 186–87, 235 customers 150, 275, 276
compliance 75, 89–90, 92, 100, 103, 114, 118,
121, 223, 293–94 daily operational risk reporting 216, 224
comply or explain 284–85 dashboards 165
conceptual slack 265 data
conduct regulation 281–89 accuracy of 186–87
confirmatory questionnaires 161 aggregation of 48, 58, 69, 105, 109–10,
consistency 61, 77 185, 213
consortium data 174, 175 capture (collection) of 184–85, 208,
consultation 31, 33, 54–55, 76, 80, 122, 139, 211, 216
186, 233 interpretation of 108–09
Consumer Safety Commission 16 primary 207
contingency funding 102, 189, 262 security of 187
continual improvement 139, 183 timeliness of 32–33, 186, 223, 265
continuity of operations (business see also consortium data; external loss data;
continuity) 102, 153, 258 internal loss data
contractors 54, 118, 167, 287 data fields 183–84, 186–87
control environment 153–54 data owners 34, 146
control failures 179, 190, 234 decision making 36, 89, 90, 110–11
control indicators 34, 92, 93, 153, 190, 200–01, Deepwater Horizon spill 185, 259
205–06, 210 defeat devices 16, 45
Control of Substances Hazardous to Health deliberated democracy 265, 266
Regulations 287 Delphi Technique 163, 240, 265
control owners 34, 97, 108, 146, 157, 158, 159, demutualization 78–79
205, 206 desk-based reviews 39
controls 48, 91, 102–03, 118, 152–54, 157, detective controls 179
161, 175 deterministic slack 262, 263
see also key control indicators; quality direct impacts 180
control; risk and control direct observation 73
self-assessments discrete data thresholds 218
cooperation 30–31, 98, 125, 266 distributed governance 260, 264
corporate governance 60, 67, 81, 90, 93, 95, distributed resources 262, 263–64, 264–65
116–17, 119, 121, 284–85 diversity 51, 72, 238, 265, 266, 270
Corporate Governance Code 116 divisional operational risk committees 120, 129,
corporate social responsibility 119 130, 137
COSO 2, 3, 11, 290–91 documentation 61, 67, 94, 158, 220–22
Index 299
duration metrics 41, 181, 200, 205, 207, 239, Financial Conduct Authority (FCA) 28, 282–83
241–42, 243 financial crime 59, 204, 293, 294
financial crisis (2007–2008) 78–79, 253–54, 256,
EBITDA 249 277, 278
Ebola 173, 258 financial market contagion 278
economic environment 214, 230, 231, 234, 237, financial metrics 202
248, 258, 259 financial risk 6–7, 46, 54, 113, 150, 181, 187,
effect-based controls 153 242, 243
effect-based operational risk 56, 57, 152, 200 financial services sector 56, 68–69, 93, 104, 175,
effectiveness 9–10, 90–91 274, 282–83
efficiency 9–10, 90–91 scenario analysis 232–33, 236, 245, 247
80/20 data validation 187 solvency regulation 277–81
embeddedness 27–28, 29, 41–42, 81 see also Barclays (Barclays Capital); Barings
emerging risk 192, 194, 235, 290 Bank; global financial crisis; Halifax Bank
emotional ambivalence 267 of Scotland; HSBC; Northern Rock
employee relations 51 financial strength 65, 93, 105
Employers Liability (Company Insurance) Act fines 180
(1969) 287–88 first-line management 23, 30–31, 124, 125, 126,
employment practices 51, 233 127–29, 134
enablers 22, 24, 29 see also front-line management
see also documentation; people (human) risk; first-line risk specialists 34–35
technology first-order change 260
enterprise risk function 45 five lines of assurance 126–27
see also central risk (risk management) 5x5 risk matrices 148–50
function flexibility 81, 263, 265, 285
enterprise risk management 3, 11–14, 45, 62, floor thresholds 217
290–91 focus groups 71–72, 74
entrepreneurial environments 93 focused questionnaires 161
Environmental Protection Agency 16 fog computing systems 262
environmental risk 16, 54, 234, 237, 277, 288–89 formal capabilities 261–63, 265–66, 268, 269
escalation procedures 97, 98, 100, 104, 118, 182, formal organizational factors 14
188, 219–20, 223 see also policy; procedures; process design
ethical standards 79, 136 (management)
even-numbered risk matrices 148 formal organizational structures 119–20,
event-based operational risk 56, 57, 61, 144, 121–22
151–52, 184 4x4 risk matrices 148–50
exception reporting 33, 210, 222, 223 fragmented social networks 267
excess resources 262 fraud 61
experience 66 external 50, 98–99, 198, 232
exploratory questionnaires 161 internal 50, 104, 117, 232
exponential cumulative distribution front-line management 30, 32, 36, 41, 76, 97–99,
functions 172–73 103–04, 106, 121, 269
exponential probability density functions 172 see also first-line management
exposure indicators 210
external audit 135, 201 gap analysis 39, 40
external categorization 49, 54–55 General Data Protection Regulation 292
see also Basel Committee on Banking geographical profiles 178, 208, 226
Supervision (BCBS) global financial crisis 78–79, 253–54, 256,
external environment 21–22, 23–24, 234, 237 277, 278
external fraud 50, 61, 98–99, 198, 232 Global Operations and Loss Database 175
external loss data 26, 165, 171, 174–75, 190, governance
191–92, 193–94, 243, 247 corporate 60, 67, 81, 90, 93, 95, 116–17, 119,
external loss databases 192, 243 121–22, 284–85
external reporting 138 distributed 260, 264
operational risk 22, 24–25, 30–31, 116–40,
facilitators 72, 158, 159, 160 205, 212, 294
failure indicators 210 granularity levels (categorization) 58–59, 62
300 Index
graphics 33, 172, 223 internal audit 30–31, 60, 68, 75–76, 100–01,
gross (inherent) risk 150–51, 165, 200, 246 146, 168, 212–13, 244
group operational risk committees 129, 130, 134 governance 124–26, 128, 130, 135, 139
group risk function see central risk (risk internal consistency 70
management) function internal environment 23–24, 234, 237
group-think 75, 78, 238 internal facilitators 159
growth strategy 28, 102–03 internal fraud 50, 104, 117, 232
internal loss data 26, 165, 171, 174–75, 183,
H-E-B 268–69 191–92, 193, 194–95
Halifax Bank of Scotland 28, 256 Internal Loss Multiplier 280–81
health and safety 32, 51, 54, 92, 104, 144, 177, internal reporting 137–38
286–88 International Association of Insurance
governance 119, 131, 133 Supervisors 281
regulation 276, 286–88 International Labour Organization 286
risk indicators 203, 216 International Organization for Standardization
scenario testing 233, 246 (ISO) 277, 284, 295
Health and Safety at Work Act (1974) 287 ISO 31000:2018 3, 4, 8, 11, 39, 289–90
Health and Safety Executive 287–88 ISO 31050 290
H1N1 virus 268 ISO 38500:2015 292
horizon scanning 234–35 ISO Guide 73:2009 290
housing sector 123, 198, 203, 232–33, 234–35, interviews
236, 245 semi-structured 71
HSBC 256 structured 39
human capital 265–66 IRM (Institute of Risk Management) xiv, 3, 10, 254
human (people) risk 44, 45, 47, 114, 117, 118, IT systems 13, 32, 33, 50, 52, 61, 81, 91, 262
203, 210 RCSAs 152, 155
see also behavioural risk; internal fraud; staff risk indicators 203, 211, 216
risk scenario analysis 233, 239
human resources (HR) function 68, 79–80, see also automation; COBIT framework;
137, 210, 238 Global Operations and Loss Database;
see also recruitment operational loss event databases; TSB
systems failure
IEC 31010:2009 290
impact 4–5, 179–80, 184, 240, 241, 242–43 ‘just’ culture 80
incentive schemes 36, 136–37
see also bonuses key control indicators 92, 93, 153, 190, 200–01,
independent observers 158–59, 238 205–06, 210, 234
individual control effectiveness 152–53 key performance indicators (KPIs) 201–02, 203,
individual stress tests 248 204–05
induction 80, 107–08 key principles assessment approach 38
influence 77 key risk indicators 202–03, 234
informal capabilities 263–65, 266–68 King’s Cross Fire 177
informal communication 80–81 Knightian uncertainty 4, 5, 173
informal organizational factors 14 knowledge 66
see also culture; social networks Kyoto Protocol 288–89
informal organizational structures 119–20, 123
information (information sharing) 47, 244, 276 lagging indicators 208, 209
see also asymmetric information problem language 49, 59, 80, 135, 224
inherent risk (gross risk) 150–51, 165, 200, 246 leadership 29, 77–78, 122–23, 266–67
Institute of Operational Risk (IOR) 2, 3, 254 leading (preventive) indicators 41, 208–10
Institute of Risk Management (IRM) xiv, 3, league tables 148–49, 183
10, 254 Leeson, Nick 15
insurable risk 48, 189, 286, 287–88 legal risk 47, 54
Insurance Core Principles 281 legislation (laws) 119, 123, 234, 237, 287
insurance sector 2, 175, 278, 281–82 Lehman Brothers 256
interbank rates 64–65 liability insurance 286, 287–88
InterContinental Hotels Group 268 LIBOR scandal 64–65
Index 301
people (human) risk 44, 45, 47, 114, 117, 118, qualitative statements of risk appetite 97–98,
203, 210 100, 101–04, 108, 109
see also behavioural risk; internal fraud; staff quality assurance 211, 213
risk quality control 9–10, 211
percentage thresholds 207, 218 quantitative metrics 40, 41, 94, 242–43
performance appraisals 80 quantitative statements of risk appetite 97,
performance indicators 201–02, 203, 204–05 104–05
performance management 36, 80, 109, 136–37 quarterly reporting 40, 42, 74, 216, 224
league tables 148–49, 183 questionnaires 69–71, 72–74, 83–87, 160–62
see also metrics; performance indicators
Perrier 12–13 RAG (red-amber-green) status 25, 92–93, 94, 97,
personal risk 8, 9 98–99, 105, 106, 109, 219
PESTLE analysis 234–35 Raising Concerns Team 79
physical assets risk 3, 52, 54, 233, 242 rating agencies 41, 138, 274
Pillar I (Basel Accords) 279 ratio-based thresholds 207, 218
Pillar II (Basel Accords) 2, 8, 15, 56, 245, RCSAs see risk and control self-assessments
279, 280 readiness and preparedness phase (resilience)
Pillar III (Basel Accords) 279, 280 260, 261
planned capabilities 263–65 recalls 12–13, 16–17
points of reference 149–50 recruitment 15, 79, 134, 265
policy 70, 75, 77–78, 79–80, 124, 134, regulation 114, 119, 123, 180, 234, 235, 236,
135–36 237, 274–96
political environment 230, 234, 237, 246, 247, reliability 70
257, 263, 282 remuneration 98, 100
preparedness and readiness phase (resilience) repair costs 180, 198
260, 261 repetitive touch triggers 220
preventive (leading) indicators 41, 208–10 reporting 30–33, 48, 53, 62, 67, 121
primary source data 207 audit 168
Principles of Corporate Governance 116, 284 board requirements 215–16, 223, 224,
prioritization 48, 92, 157 244–46
pro-social motivation 267 daily 216, 224
see also social networks exception 210, 222, 223
probability 4–5, 241–42 external 138
probability and impact matrices 148–50 internal 137–38
probability density functions 172–74, 199 line management needs 166
problem categories 61 monthly 74, 204, 205, 212, 216, 224
procedures 61, 67, 79–80, 94, 124 narrative 165, 226
process design (management) 22, 35–37, 39, 40, operational risk indicators, use of 214–16,
52–53, 81 222–26
RCSAs 144–45, 157 quarterly 40, 42, 74, 216, 224
risk appetite 94, 99, 105 RCSA results 165–66
scenario analysis 233, 234 risk appetite 97, 98, 99, 100–01, 105, 108,
process mapping 49, 144–45 109–10
product recalls 12–13, 16–17 scenario analysis 245–46
product risk 51, 52, 233 team 223
professional risk 54 Reporting of Injuries, Diseases and Dangerous
profit maximization 118–19 Occurrences Regulations see RIDDOR
project risk 47 reporting lines 30, 37, 81, 132
property risk 47 reproduction number (RO) 208–09
proxy variables 199, 202, 204, 219, 280 reputational impact 242, 243
public data 174–75, 243 reputational risk 17, 45–47, 57, 65, 100, 114,
public goods 277 150, 181, 242–43, 250
pulling versus pushing indicators 41 residual (net) risk exposure 145, 151, 159,
pure risks 4 165, 200
resilience
qualitative metrics 40, 41 operational 254–55
qualitative risk matrices 148–50 organizational 253–73
Index 303