Risk-management in practice Flashcards
4 common applications of risk-man which each have their own sub-discipline:
- Operational risk-man
- Cyber risk-man
- Project risk-man
- Supply-chain risk-man
Key consideration if specialists are employed (internally or as consultants) for each of the 4 sub-disciplines of risk-man
Care must be taken to avoid silo-based approach
Which organisations have operations?
All of them
Either very visible, such as manufacturing orgs
Or less visible, such as in professional services (operation is to provide the service)
What is the biggest source of operational risk? Why?
People - required to control operations and carry out manual tasks, and can make mistakes, act negligently, or be absent
Examples of operational loss events: (8)
- Absence or loss of employees
- Employee negligence or misconduct
- Fire
- Human error
- IT systems failure
- Machine breakdown
- Power failure
- Weather related damage
Potential adverse effects of operational risk: (6)
- Increased costs
- Reduction in efficiency
- Business interruption
- Customer complaints
- Reputation damage
- Compliance breach
What is operational risk-man concerned with?
Reducing the probability and impact of operations-related loss events
Key individuals / groups within an org responsible for management of operational risk: (2) and how
- All employees and managers - they are carrying out the operations, and are expected to do so with due skill, care and diligence
- Operational risk manager - support management of risk by putting together reports, developing tools to asses exposure and to ensure controls are effective
Which organisations are exposed to cyber risk?
Any organisation which uses IT equipment and systems, the internet, etc.
What is cyber risk-man concerned with?
All forms of digital risk
Which area of cyber risk has been traditional focus?
Information assurance
What is information assurance?
The practice of assuring that an org’s information and technical resources are:
- scarce
- only accessible to authorised personnel
- used only for intended purposes
- complete and intact
5 areas into which information assurance is broken down: (with brief description)
Integrity - information assets are accurate and complete
Availability - info assets are available when needed
Authenticity - info assets are genuine and sources are valid
Non-repudiation - transactions and communications of info assets are valid and undeniable
Confidentiality - only those who have right to access info assets can access them
3 cyber risk factors/areas (other than re. information assurance) and an example loss event for each
Reputation - employee using social media in embarrassing or litigious manner
Recruitment - prejudging suitability of potential new recruits based on social medias
Productivity of operations - network failures
5 types of controls for cyber risk-man: (with brief description)
Technical controls - system-based safeguards such as malware protection, firewalls
Physical controls - physical prevention of unauthorised access
Procedural controls - acceptable-use policies, effective risk assessments and auditing
People controls - effective recruitment practices and training
Legal controls - ensuring compliance with legislation, including data protection
Key individuals / groups within an org responsible for management of cyber risk: (2) and how
- All employees and managers - they are using the tech, and need to ensure they comply with policy and report potential risk events
- Risk function or other specialist functions - supporting employees with above
What is project risk-man concerned with?
Planning and co-ordinating the work of a team of people to achieve specific goals
Projects: (3)
- Are temporary endeavours, but the changes that they bring may be permanent
- Are conducted within a range of constraints, including financial, time and quality constraints
- Can be complex, requiring co-ordination of different resources, skills, knowledge and expertise, all of which are subject to a range of risks
5 examples of projects within orgs: and example of loss event for each
- Designing and implementing a new IT system - may be unreliable or require extensive manual workarounds
- Moving or refurbishing a work site - may prove unsuitable to employee needs
- Launching a new product - may have design flaws or be unreliable
- Merging with another org - culture clashes
- Setting up a new subsidiary in a new location or market - may not meet the needs of customers
What is PRINCE2 ?
A formal methodology for managing projects, including associated risks
Seven principles of PRINCE2
- Projects must have a business justification
- Project teams should learn from xp at every stage, to improve future performance
- Roles and responsibilities are clearly defined
- Work in planned stages by breaking projects up into phases
- Boards oversee projects, but project managers are generally in control
- Team focus on quality to ensure objectives are met in full
- Project-man and risk-man approaches are tailored to meet needs of org and project
What is a supply chain?
A network of organisations and people that work together to produce and distribute a good or service
Supply-chain risk-man is concerned with:
identifying, assessing, monitoring and controlling supply-chain risks to maintain continuity, quality and affordability of upstream supplies
5 causes of supply-chain loss events
- Bankruptcy of a supplier (or other crisis)
- Human error
- Weather events (snow or flooding)
- Financial risks affecting costs and prices
- Socio-political risks affecting supply