risk identification, assessment and …...risk identification, assessment and response risk...

21
DRJ Spring World 2010 Sunday Workshop Session 5 Matt Gardner, CBCP RISK IDENTIFICATION, ASSESSMENT AND RESPONSE Leveraging Enterprise Risk Management techniques to strengthen Business Continuity Management practices Workshop Agenda The Professional Landscape – Standards, Guidelines and Best Practices and Best Practices The Intersection of BCM and ERM What is Risk Anyway? Risk Identification Risk Assessment Risk Response BCM and ERM Resources

Upload: others

Post on 10-Jun-2020

10 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

DRJ Spring World 2010Sunday Workshop Session 5Matt Gardner, CBCP

RISK IDENTIFICATION, ASSESSMENT AND RESPONSELeveraging Enterprise Risk Management techniques to strengthen Business Continuity Management practices

Workshop Agenda

The Professional Landscape – Standards, Guidelines and Best Practicesand Best PracticesThe Intersection of BCM and ERMWhat is Risk Anyway?Risk IdentificationRisk AssessmentRisk ResponseBCM and ERM Resources

Page 2: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

BCM Standards, Guidelinesand Best Practices

Common Elements

NFPA 1600 ISO/PAS 22399 ASIS International

BS 25999-2 CSA Z1600 TR19 DRI/BCI

Standard on Disaster /

Societal Security:

Organizational Resilience:

Business Continuity

Standard on Emergency

Technical Reference for

Professional Practices for Disaster /

Emergency Management and Business

Continuity Programs

Security: Guidelines for

Incident Preparedness

and Operational Continuity

Management

Resilience:Preparedness

and Continuity Management Best Practices

Standard

Continuity Management –

Part 2:Specification

Emergency Management and Business

Continuity Programs

Reference for Business

Continuity Management

(BCM)

Practices for Business

ContinuityPractitioners

Risk Assessment and Impact Analysis

5.3 Risk AssessmentA.3.3.6 Impact AnalysisA.5.3 Comprehensiverisk assessment

6 Planning6.1 General6.3 Risk assessment and impact analysis6.4 Hazard, risk, and threat

4.3 Planning4.3.1 Risk assessment and impact analysisA.3 PlanningA.3.1 Risk assessment and

4 Implementation and operation of the BCMS4.1 Understanding the organization

5. Planning5.1 Hazard Identification, risk assessment and business impact analysisA.5.1 Hazard

3 Risk assessment and review4 Business impact analysis5 Strategy5.3 Processes

2 Risk evaluation and control3 Business impact analysis

A.5.3.1 Methodologies and techniques for risk assessmentA.5.3.2 Hazard IdentificationA.5.3.3 Impact Analysis

identification6.5 Risk assessment6.6 Impact analysisAnnex A Impact analysis procedure

impact analysis 4.1.1 Businessimpact analysis4.1.2 Risk assessment

Identification, risk assessment and business impact analysis

- Framework for Voluntary Preparedness

BCM Standards, Guidelinesand Best Practices

Common Elements

Common Elements Issues Addressed by Common Elements

Risk Assessment and Impact Analysis

•Identify assets, needs, requirements and analysis of critical issues related to business disruption risks that are relevant to the organization and stakeholders.•Identify hazards and threats.•Establish a process for risk identification, analysis and evaluation.•Evaluate the effect of uncertainty on the organization’s objectives.•Evaluate the likelihood of a disruptive event and its consequences on

t (h h i l i t l i f ti d i t ibl )assets (human, physical, environmental, information, and intangible).•Evaluate and establish recovery time objectives.

- Framework for Voluntary Preparedness

Page 3: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

The Discipline of Business Continuity Management

Professional Practice AreasP I i i i d MProgram Initiation and ManagementRisk Evaluation and ControlBusiness Impact AnalysisBusiness Continuity StrategiesEmergency Response and OperationsBusiness Continuity PlansAwareness and Training ProgramsBCP Exercise, Audit and MaintenanceC i i C i ti

Determine the risks (events or surroundings) that can adversely affect the organization and its resources (example(s) include: people, facilities, technologies) due to business interruption; the potential loss of such events can cause and the controls needed to avoid or mitigate the effects of those risks. As an outcome of the above, a cost benefit analysis will be required to Crisis Communications

Coordination with External Agencies

cost benefit analysis will be required to justify the investment in controls.

The Discipline of Business Continuity Management

Professional Practice AreasP I i i i d M Identify the impacts resulting from business Program Initiation and ManagementRisk Evaluation and ControlBusiness Impact AnalysisBusiness Continuity StrategiesEmergency Response and OperationsBusiness Continuity PlansAwareness and Training ProgramsBCP Exercise, Audit and MaintenanceC i i C i ti

Identify the impacts resulting from business interruptions that can affect the organization and techniques that can be used to quantify and qualify such impacts. Identify time-critical functions, their recovery priorities, and inter-dependencies so that recovery time objectives can be established and approved.

Crisis CommunicationsCoordination with External Agencies

Page 4: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

The Discipline of Business Continuity Management

Professional Practice AreasP I i i i d M L h f h BIA d Ri k Program Initiation and ManagementRisk Evaluation and ControlBusiness Impact AnalysisBusiness Continuity StrategiesEmergency Response and OperationsBusiness Continuity PlansAwareness and Training ProgramsBCP Exercise, Audit and MaintenanceC i i C i ti

Leverage the outcome of the BIA and Risk Evaluation to develop and recommend business continuity strategies. The basis for these strategies includes consideration of both the recovery time objectives and recovery point objectives to assess and plan for support of the organization’s critical functions.

Crisis CommunicationsCoordination with External Agencies

The Discipline of Business Continuity Management4.1.2 Risk assessment

4.1.2.1There shall be a defined, documented and appropriate method for i k t th t ill bl th i ti t d t d th th t

BS 25999-2:2007

risk assessment that will enable the organization to understand the threats to and vulnerabilities of its critical activities and supporting resources, including those provided by suppliers and outsource partners.4.1.2.2 The organization shall understand the impact that would arise if an identified threat became an incident and caused a business disruption.

4.1.3 Determining choices4.1.3.1 For each of its critical activities, the organization shall identify available risk treatments that:

d th lik lih d f di tia) reduce the likelihood of a disruption;b) shorten the period of disruption; andc) limit the impact of a disruption on the organization’s key products and

services.4.1.3.2 The organization shall choose and implement appropriate risk treatments for each critical activity in accordance with its level of risk acceptance.

Page 5: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Enterprise Risk Management Conceptual Frameworks

COSO’s Enterprise Risk Management – Integrated FrameworkThe Australian/New Zealand Risk StandardTurnbull ReportSouth Africa’s King Report on Corporate GovernanceStandard & Poor’s Enterprise Risk Management for Financial Institutions: Rating Criteria and Best PracticesC l A i l S i ’ O i f E i Ri k Casualty Actuarial Society’s Overview of Enterprise Risk ManagementBasel II: International Convergence of Capital Measurement and Capital Standards: A Revised Framework

The Discipline of Enterprise Risk Management

ERM – Integrated Framework The Five Steps of ERM

Internal EnvironmentObjective SettingEvent IdentificationRisk AssessmentRisk ResponseControl Activities

1. Identifying the Risks2. Assessing the Risks3. Evaluating the Risks4. Mitigating the Risks

Information and CommunicationMonitoringRoles and Responsibilities

5. Monitoring the Plan

Page 6: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Risk – the Intersection of BCM and ERM

Business Continuity

Management

Enterprise Risk

Management

Risk

- Identification

-Assessment

R- Response

What is a risk anyway?What is a risk anyway?

Page 7: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Events or Uncertainty

An event is an incident or occurrence emanating from internal or external sources that affects implementation internal or external sources that affects implementation of strategy or achievement of objectives.

Events may have positive or negative impact, or both.Events with negative impact represent risks, which require management’s assessment and response. Events with positive impact represent opportunities, which management channels back into the strategy and objective-setting processes.

What Counts as Risk Management

Definition of Risk

d f fLong definition: The probability and magnitude of a loss, disaster, or other undesirable eventShorter (equivalent) definition: Something bad could happen

- Douglas W. Hubbard, The Failure of Risk Management

Page 8: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

What Counts as Risk Management

Definition of Management

d fLong definition: The planning, organization, coordination, control, and direction of resources toward defined objective(s)Shorter, folksier definition: Using what you have to get what you need

- Douglas W. Hubbard, The Failure of Risk Management

What Counts as Risk Management

Definition of Risk Management

d f fLong definition: The identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate eventsShorter definition: Being smart about taking chances

- Douglas W. Hubbard, The Failure of Risk Management

Page 9: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Risk Identification

Risk Identification, Assessment and Response

Risk Identification

Risk Identification Techniques

Any number of techniques can be used to identify potential events affecting achievement of objectives:potential events affecting achievement of objectives:Risk InventoriesFacilitated WorkshopsInterviewsQuestionnaires and SurveysProcess Flow AnalysisLeading Event Indicators and Escalation TriggersLoss Event Data Tracking

Page 10: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Risk Inventories

Use listings of potential risks common

Risk Identification

potential risks common to a specific industry or functional area, developed by personal within the organization or from

Financial Strategic

OperationsHazard

organization or from generic lists generated externally.

GM’s ERM team assembled a four-quadrant map of vulnerabilities, documenting more than 100 types of events that had impacted the organization.

Facilitated Workshops

Risk Identification workshops typically bring together cross-functional or multi-level individuals for the purpose of drawing on the group’s collective

Workshop AgendaIntroduction

Explain background of workshop and

Risk Identification

drawing on the group’s collective knowledge.

Prior to the WorkshopIdentify experienced facilitatorEstablish and agree on ground rulesRecognize the different participant styles and personality typesIdentify which category of risks on which to foc s

Explain background of workshop and why each participant has been invitedExplain ground rules

Explain workshop processRisk are to be considered against corporate objectivesThe facilitator will prompt discussion on risks emanating from various factors, such asExternal Internalto focus

Invite an appropriate number of participants – normally 15 or fewerSet realistic expectations up front with respect to what the workshop is intended to achieve

Economic InfrastructureEnvironmental PersonnelPolitical ProcessSocial TechnologyTechnological

Page 11: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Interviews

Typically conducted in a one-on-one setting, or sometimes two-on-one, where the interviewer is

Interview Agenda1. Introduction2 Provide background on the interview process

Risk Identification

where the interviewer is accompanied by a colleague taking notes. The purpose is to ascertain the individual’s candid views and knowledge of actual past risks and potential risks.

2. Provide background on the interview process3. Confirm the person’s current role and responsibilities4. Confirm they received and read background materialStrategies and Objectives1. Identify key business functions2. Determine the established risk tolerances3. Discuss factors related to potential events relative to

business function4. Identify potential events creating risks to business5. Consider how the interviewee prioritizes these events,

considering likelihood and impact6. Identify events that have occurred in the past 12 months7. Consider whether risk identification mechanisms need to

be enhanced

Questionnaires and Surveys

Use questionnaires and surveys to address a range of iss es to be considered b participants foc sing

Risk Identification

of issues to be considered by participants, focusing their thinking on internal and external factors that have given rise, or may give rise, to risks.

Page 12: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Process Flow Analysis

Typically involves the diagrammatic representation of a process with the goal of better understanding the

Risk Identification

process, with the goal of better understanding the interrelationships of its component inputs, tasks, outputs and responsibilities. Once mapped, risks can be identified and considered against process objectives.

I t T k O t tInputs Tasks Outputs

Leading Event Indicators & Escalation Triggers

Leading risk indicators are qualitative or quantitative measures that provide insight into potential risks. To be useful, they must be available to management on a timely basis which depending on the

Risk Identification

available to management on a timely basis, which, depending on the information, might be daily weekly, monthly, or in real time.Escalation triggers typically focus on day-to-day operations and are reported, on an exception basis, when a pre-established threshold is passed.

Target / Potential Leading Escalation Objective Measure

Target / Tolerance

Potential Risk

Leading Indicator

Escalation Trigger

Page 13: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Loss Event Data Tracking

Monitoring relevant data can help an organization identif past risks and q antif the associated

Risk Identification

identify past risks and quantify the associated losses, in order to predict future occurrences. While event data typically are used in risk assessment –based on actual experience with likelihood and impact – they also can be useful in risk identification by providing a basis for fact-based discussionby providing a basis for fact-based discussion.

Talking to People

“The best way to understand a risk and the things dri ing it is to j mp down into the trenches and meet

Risk Identification

driving it is to jump down into the trenches and meet with the people who deal with that risk as part of their daily jobs.”“Take a survey, schedule some meetings, or just drop by to talk to the people throughout the enterprise,

d k i l ti “Wh t th t and ask a simple question: “What are the most important risks you believe the company faces?””

- Enterprise Risk Management for Dummies

Page 14: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Risk Assessment

Risk Identification, Assessment and Response

Risk Assessment

Risk Assessment

No matter which method or methods you employ for Risk Identification o ’ll most likel find o rself Risk Identification, you’ll most likely find yourself with a long list of risks – so many that it may seem overwhelming…

Risk assessment techniques help focus attention on those risks that are most significant.

Page 15: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Likelihood and Impact

Risks are typically assessed from two perspectives –lik lih d and i t and normall with a

Risk Assessment

likelihood and impact – and normally with a combination of qualitative and quantitative methods.

Likelihood (%) – the probability that a given event will occur…Impact ($) – the potential effect on revenue, net operating profit, margin…

Risk Appetite

Determining an acceptable level of exposure represents the gist of the matter

Risk Assessment

the gist of the matter…

Inherent risk refers to the risk that exists before you address it – the risk in the absence of any actions you might take to alter either the likelihood or impactResidual risk is also known as your “vulnerability” or Residual risk is also known as your vulnerability” or “exposure” – the risk that remains after you have attempted to mitigate the inherent risk (see Risk Response)

Page 16: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Qualitative versus Quantitative

Qualitative assessment techniques are typically employed where risks do not lend themselves to quantification or when

ff d bl d d f

Risk Assessment

sufficient credible data required for quantitative assessments is not practically available.

Risk RankingQuestionnaires

Quantitative assessment techniques bring more precision and are used in more complex and sophisticated activities to p psupplement qualitative techniques.

Value at risk, Cash Flow at Risk, Earnings at RiskLoss DistributionsBack-Testing

Likelihood of Events Affecting Computer Operations

Level Descriptor Likelihood of Occurrence Risk

1 Rare Very low Technology systems shut down for

Risk Assessment

prolonged periods by terrorist or other intentional action

2 Unlikely Low A natural disaster or third party (e.g., utility) event requires invoking the business continuity plan

3 Possible Moderate Hackers penetrate our computer securitysecurity

4 Likely High Internal staff use company resources to access inappropriate information from the Internet

5 Almost certain Very high Internal staff use company resources for personal messaging

Page 17: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Impact of Hazardous Materials Release

Level Relative Impact Measures

1 Insignificant •No reportable incidentsM l l f d h

Risk Assessment

•Minimal loss of production hours•No injuries

2 Minor •1-2 reportable incidents•Materials contained on-site by staff•Effect less than 5% of day’s production hours•No or minor injuries

3 Moderate •Several reportable incidents•Material contained on-site with outside assistance•Effect between 5% and 20% of day’s production hours•Out-patient medical treatment required

4 Major •Major reportable event•Material released into environment, but without real/perceived detrimental effects•Significant loss of production – between 20% and 100% of day’s production•Limited in-patient care required

5 Catastrophic •Multiple major reportable events or a single catastrophic event•Release into environment with significant detrimental effect, requiring significant third party resources•Substantial loss of production capability – more than two days’ production hours•Significant injuries

Risk Exposure MapsRisk Assessment

Catastrophic DCatastrophic

Minor

Moderate

Major

Impact ($) B

K

H

EJ

F

I

A

D

Rare CertainUnlikely LikelyPossible

Insignificant

Minor

Likelihood (%)

C

GI

Page 18: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Risk Response

Risk Identification, Assessment and Response

Risk Response

Risk Response

To mitigate a risk is to moderate or alleviate a risk to lessen it in some wa – to lessen it in some way.

It is common in risk management to think of a choice among four basic alternatives for managing a given risk:1. Avoid.2. Reduce.3. Share / Transfer.4. Retain / Accept.

Page 19: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Risk Responses

Avoidance – Exiting the activities giving rise to risk. Risk avoidance may involve exiting a product line, declining

h l k llexpansion to a new geographical market, or selling a division.Reduction – Action is taken to reduce risk likelihood or impact, or both. This typically involves a myriad of everyday business decisions.Sharing – Reducing risk likelihood or impact by transferring or otherwise sharing a portion of the risk. Common techniques include purchasing insurance products, engaging in hedging transactions, our outsourcing an activity.Acceptance – No action is taken to affect risk likelihood or impact.

Examples of Risk Responses

Avoidance Sharing

•Disposing of a business unit, product line, •Insuring significant unexpected lossgeographical segment•Deciding not to engage in new initiatives/activities that would give rise to the risks

•Entering into joint venture/partnership•Entering into syndication agreements•Hedging risks through capital market instruments•Outsourcing business processes•Sharing risk through contractual agreements with customers, vendors, or other business partners

Reduction Acceptance

•Diversifying product offerings•Establishing operational limits•Establishing effective business processes•Enhancing management involvement in decision making, monitoring•Rebalancing portfolio of assets to reduce exposure to certain types of losses•Reallocating capital among operating units

•“Self-insuring” against loss•Relying on natural offsets within a portfolio•Accepting risk as already conforming to risk tolerances

Page 20: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Costs versus Benefits

Virtually every risk response will incur some direct or indirect cost that is weighed against the benefits

Risk Response

or indirect cost that is weighed against the benefits it creates. The initial cost to design and implement a response is considered, as is the cost to maintain the response on an ongoing basis.

BCM and ERM Resources

Enterprise Risk Management – Integrated Framework, The Committee of Sponsoring Organizations of the Treadway CommissionE t i Ri k M t f D i B t V d J Enterprise Risk Management for Dummies, Beaumont Vance and Joanna MakomaskiThe Framework for Voluntary Preparedness, Briefing Regarding Private Sector Approaches to Title IX of H.R. 1 And Public Law 110-53 “Implementing Recommendations of the 9/11 Commission Act of 2007”Professional Practices for Business Continuity Practitioners, DRI InternationalBritish Standard 25999-2:2007 “Business Continuity Management”B i C ti it M t G d P ti G id li 2008 Th Business Continuity Management Good Practice Guidelines 2008, The Business Continuity InstituteThe Failure of Risk Management, Douglas W. HubbardThe Resilient Enterprise, Yossi Sheffi

Page 21: RISK IDENTIFICATION, ASSESSMENT AND …...Risk Identification, Assessment and Response Risk Identification Techniques Any number of techniques can be used to identify potential events

Your Biggest Risk

ff“How do we know our risk management efforts work?”

“…doing nothing about risk management is not actually the worst case.”

Douglas W. Hubbard, The Failure of Risk Management