Chapter 1: Risk Identification Tools Flashcards

1
Q

What is the main focus of the Top-Down Approach in risk identification?

To identify what? Who is this conducted by, why?

A

Strategic risks, major threats, and emerging risks

Conducted by senior management to align with strategic objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How often should the Top-Down Approach be conducted?

A

1-4 times a year, depending on business growth and risk levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What techniques are involved in the Top-Down Approach?

A
  • Reviewing exposures
  • Vulnerabilities
  • Risk wheel
  • Causal analysis
  • Scenario generation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary focus of the Bottom-Up Approach?

A

Specific vulnerabilities and inefficiencies at the business process level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which technique is commonly used in the Bottom-Up Approach?

A

Process mapping and interviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a risk and control self-assessment (RCSA)?

A

A technique used to identify risks at a granular level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can result from focusing too granularly in the Bottom-Up Approach?

A

A collection of small risks, potentially missing the big picture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are both Top-Down and Bottom-Up approaches necessary for risk management?

A

They provide different perspectives and are complementary for a holistic understanding of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a “key client vulnerability” in risk exposure?

What does this involve?

A

Involves key clients, distribution channels, central systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one example of a vulnerability in an organization?

Outdated what?

A

Outdated products/processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the importance of identifying exposures and vulnerabilities?

What does this encourage?

A

Business-driven and specific, encouraging natural risk discussions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of root cause analysis techniques?

A

To reflect on business risks beyond incident analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technique can help identify underlying causes of potential issues?

A

The ‘five whys’ technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do internal losses reflect in a firm?

A

Concentrations of operational risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are near misses in risk management?

A

Incidents that almost occurred but were avoided by luck or external intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of process mapping?

Very simply

A

To identify risks and controls associated with specific tasks.

17
Q

What is an important consideration in process mapping regarding the level of analysis?

Finding the what?

A

Finding the right balance in detail.

18
Q

What are common symbols used in process mapping?

A
  • Tasks/actions
  • Decision points
  • Documents
  • Manual operations
  • Outputs
  • Data
19
Q

What does ‘Auditing with Your Feet’ refer to?

A

Gathering information by walking around, talking to staff, and observing.

20
Q

What is an ‘Amazement Report’?

A

Captures new employees’ initial impressions.

21
Q

What are the benefits of interviewing key staff?

A
  • Reveals qualitative insights into risks
  • Encourages open communication
  • Offers historical context and operational insights