Week 6 Flashcards

1
Q

What is a maturity model in Operational Risk Management?

A

A tool used to assess the performance of risk management frameworks on a 4-5 point scale (e.g. “beginner” to “expert”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main challenge faced by risk managers when implementing ORM?

A

Risk managers often struggle to prove the value of their work and gain acceptance within the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended approach for firms new to non-financial risk management?

A

Focus on top risks first before deploying an ORM framework across all departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three key business benefits of effective Operational Risk Management?

A

Improved business stability, improved profitability, and increased productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What metric can measure business stability in Operational Risk Management?

A

Peer comparisons of tail risk losses, count of large incidents, P&L volatility, or share price volatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ORM stand for?

A

Operational Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is more effective than regulatory compliance in motivating businesses to adopt risk management?

A

Demonstrating the tangible value of risk management through business benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How long does it typically take for a firm to reach an operational risk steady state?

A

Several years, as it’s a long-term process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one of the ““golden rules”” for risk managers to be effective?

A

Being accepted by the business to gain access to information, risks and incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of areas should be prioritized when identifying high-risk areas in a firm?

A

Areas with high money flows and transaction volumes, such as back-office operations, IT, and finance functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When should a firm implement IT ORM solutions?

A

Only after reaching ORM maturity and ensuring it integrates with existing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Project Risk Management?

A

The process of identifying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a common cause of project failures?

A

Invalid business case, insufficient quality attention, undefined outcomes, or lack of stakeholder communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At what stage should the risk function become involved in project management?

A

Initial stage before project kick-off to act as a gatekeeper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are path dependencies in project management?

A

Dependencies where a project relies on deliverables from another project which can compound delays if the deliverables are late

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a key distinguishing feature of mature organizations regarding project completion?

A

Systematic debriefing and maintaining a database of lessons learned from project evaluations

17
Q

What are the three main categories of information that project reporting focuses on?

A

Time, budget, and quality of deliverables

18
Q

What is a key risk indicator (KRI) for IT projects that serves as a crucial control?

A

Reduced time or resources for testing

19
Q

What are the three aspects of information security that risks can threaten?

A

Confidentiality, integrity, and availability of data

20
Q

What percentage of data leaks are insider-related according to the McAfee 2017 study?

A

43% of data leaks are insider-related with half being unintentional

21
Q

What are the four quadrants of the risk taxonomy for information security?

A

Internal data theft, external data theft, internal data loss, external data loss

22
Q

How are information assets typically categorized in an information security context?

A

Highly confidential, confidential, internal, or public

23
Q

What technique is used to model rare events like data breaches?

A

Fault trees or Bayesian networks through scenario analysis

24
Q

What type of simulation is used to estimate loss distributions in cyber scenarios?

A

Monte Carlo simulations

25
What factors are considered when calculating the impact of a data breach?
Time to detection, data volume affected, data value, and post-event mitigation
26
What are behavioral controls in information security?
Controls that address human behaviors when handling information, such as awareness campaigns and rules of conduct
27
What are technical controls in information security?
Controls related to technical aspects of systems for prevention or detection, such as firewalls, encryption, and passwords
28
What standard is widely recognized for information security management?
ISO/IEC 27001:2013
29
What tool is recommended for evaluating information security risks based on questionnaire results?
Risk and Control Self-Assessments (RCSA)
30
Why is a risk-based approach to protection recommended in information security?
Because protecting all information fully is too costly; firms should prioritize based on asset value