Chapter 6: Operational Risk Management Framework Flashcards

1
Q

What are Maturity Models used for in ORM?

A

To assess the firm’s ORM framework on a 4- or 5-point scale

Examples include assessing from Beginner to Expert levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do firms assess ORM maturity?

A

Based on their objectives, prioritizing certain areas rather than aiming for ‘expert’ in all

Self-assessment allows for tailored evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an alternative to Maturity Models in ORM?

A

A list of quality criteria for each part of ORM

This allows firms to evaluate specific aspects of their ORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a major challenge ORM professionals face?

A

Proving their value, as compliance alone is not a strong motivator

ORM must be framed as a business investment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are key business benefits of ORM?

A
  • Reduced Large Losses
  • Improved Profitability
  • Increased Productivity

These benefits contribute to a more stable business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What metrics are used to measure reduced large losses in ORM?

A
  • Incident count
  • Tail risk losses
  • P&L volatility
  • Share price fluctuations

These metrics help quantify the impact of ORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does ORM improve profitability?

A

By reducing expected losses, which increases profitability

This can be tracked through trends in loss frequency and severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should ORM be justified with?

A

Hard evidence, such as:
* Success rate of internal projects
* Reduction in operational losses
* Cost-to-income ratio trends

Evidence supports the business case for ORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a key principle in a Risk-Based Approach to ORM?

A

Focus on top risks first before rolling ORM out firm-wide

Addressing significant risks is crucial for effective ORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the importance of prioritization in ORM?

A

To focus on pressing risks first before routine issues

This ensures resources are allocated effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Golden Rules in ORM?

A
  • ORM must gain business acceptance
  • Focus on major risks
  • Support decision-making

These rules guide effective ORM practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Deadly Sins in ORM?

A
  • Ignoring ORM teams
  • Wasting resources on minor issues

These pitfalls can undermine the effectiveness of ORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What stages are involved in the Project Risk Lifecycle?

A
  • Risk Identification & Planning
  • Ongoing Risk Monitoring
  • Closure & Lessons Learned

Each stage requires specific ORM involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a common cause of project failures?

A

Invalid Business Case

A lack of clear justification can lead to project failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a simple project rating criterion related to project scale?

A

Budget Size

Budget serves as a proxy for assessing project scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are advanced risk rating factors?

A
  • Regulatory Impact
  • Customer Impact
  • Reputational Risk
  • Project Dependencies & Portfolio Risks

These factors provide a more comprehensive risk assessment.

17
Q

What types of security risks are identified in Information Security Risk Management?

A
  • Cyber Risks
  • Physical Risks
  • Internal Risks
  • External Threats

Each type presents unique challenges to security.

18
Q

What was the cause of the Equifax Data Breach?

A

External intrusion via unpatched vulnerability

This breach exposed 145.5M customer records.

19
Q

What is ISO/IEC 27001:2013?

A

An international standard for information security governance & risk assessment

It provides a framework for managing sensitive information.

20
Q

What are the components of a risk-based protection strategy?

A
  • Categorizing Information Assets
  • Prioritizing Protection
  • Implementing Behavioral & Technical Controls

This strategy helps manage information security risks effectively.

21
Q

What are Key Risk Indicators (KRIs) for Information Security?

A
  • Exposure KRIs
  • Control Failure KRIs
  • Stress KRIs
  • Causal KRIs

These indicators help monitor security risk levels.

22
Q

What is a final takeaway regarding ORM?

A

ORM must prove its business value beyond compliance

This is crucial for ongoing support and investment in ORM initiatives.