Managing Operational Risk Book
Managing Operational Risk Book
Dateline: North Atlantic, 400 miles south of the Grand Banks of Newfoundland, 23.50, 14
April 1912
On its maiden voyage, RMS Titanic hits an iceberg which buckles the hull, causing five
compartments to fill with water (the ship was designed to survive if up to four failed) and the
ship to sink. Inadequate construction, lack of escalation procedures to handle ice warnings
and, critically, inadequate lifeboat provisions lead to the deaths of 1517 of the 2223 on
board.
Dateline: Bligh Reef, Prince William Sound, 00.04, 24 March 1989, Exxon Valdez
As a result of failures to adhere to appropriate work patterns, to provide navigation watch
and, on the part of coastguards, to provide an effective traffic system through the Sound, the
Exxon Valdez oil tanker strikes the reef, shedding some 40 million litres of oil. The spill
results in the collapse of the local marine population and is disastrous to the local economy.
The road to operational risk, like the road from Moscow in the winter of 1812, has been long
and arduous. In the thirteenth century, when plagues, wars and famine were raging across
continental Europe, Thomas Aquinas, philosopher, and saint as he later became, wrote, ‘The
world has never been more full of risk.’ Over 750 years later, people continue to have the
same view, but now global warming, terrorism or even the rise of global capitalism keeps
them awake at night. And of course pandemics continue to haunt us, whether it is SARS, or
avian or swine flu. In October 2010, the UK government published its national security
strategy and identified the principal threats facing the country. The Tier 1 threats were seen
as: international terrorism, cyber-attacks, a major accident or natural disaster (which
included flooding and pandemics) and an international military crisis.1 Plus ça change.
Whether or not the world is more risky, awareness of risk is undoubtedly high. That in part
reflects changes in society in which risk assessment and risk tolerance are increasingly
democratised. Various forms of activism, whether by consumers or non-governmental
organisations, allied to a society which appears increasingly unable to accept personal risk
responsibility, mean that we no longer allow risk assessment, and especially risk tolerance,
to be left in the hands of governments or ‘experts’.
Not that activism is a new phenomenon. In response to social, and therefore political,
pressure, often by trade unions or other forms of organised labour, numerous laws and
regulations relating to health and safety in workplaces and elsewhere have been coming
steadily onto the statute book since the nineteenth century. The first Mining Acts passed into
law in 1803.
The interesting thing about these comments and the events at the start of this chapter is that
they all form part of what is now known as operational risk. It is a very broad church. As
those events show, one of the big problems of operational risk management is that we do
not fully know the risks we face now or in the future, but we must act as if we do. Risk
management implies that something can be done to reduce, if not eliminate, the likelihood
and impact of danger and uncertainty.
But there is always the possibility that something will go wrong, whether through a failure in
a process, human failures or simply because something unexpected happens in the external
environment. Of all these, the most unpredictable, and the ones most likely to cause serious
problems, are human failures and external events. That does not mean that these
unpredictable factors are unmanageable, but it does mean that we need to approach
operational risk management intelligently, with a humble acceptance of its limitations. If we
do not, operational risk management becomes a risk in itself as it falls foul of an expectation
that it is in some way a panacea for all our troubles. Risk management means neither risk
avoidance nor risk elimination.
Even financial services regulators seem to have recognised the limitations of risk
management. In the immediate aftermath of the financial crisis of 2007–9 they shifted their
emphasis from risk-based regulation or supervision to the more practical task of
outcomes-based regulation. Developing a climate of intelligent questioning is both the
challenge and the opportunity for operational risk managers – and probably for regulators as
well.
Having said that, risk is an integral part of life which has to be managed. In business life it
has been increasingly enshrined in codes of corporate governance since the early 1990s.
The Cadbury Report (1992) was the first of these, leading to the UK’s first Combined Code
on Corporate Governance, which was published in 1999, along with the Turnbull Report on
internal controls. Cadbury was closely followed by the Toronto Report in Canada and King
Report in South Africa (both 1994) and similar reports and recommendations in Australia and
France in 1995. The OECD Principles of Corporate Governance, which were first published
in 1999, include the paragraph:
An area of increasing importance for boards and which is closely related to corporate
strategy is risk policy. Such policy will involve specifying the types and degree of risk that a
company is willing to accept in pursuit of its goals. It is thus a crucial guideline for
management that must manage risks to meet the company’s desired risk profile.2
The discipline of operational risk management itself probably emerged first in those ‘hazard’
or ‘safety critical’ industries or activities where the effect of failure can be catastrophic,
whether in terms of lives lost or environments destroyed – nuclear, space, defence,
pharmaceuticals, energy and transport. And it also had an honourable tradition in
manufacturing, where the management of production lines and health and safety are vitally
important.
Against this background, at some time in the 1990s, operational risk emerged in the financial
services sector as a term to identify a particular set of risks. Folk memory suggests that its
emergence as a separate discipline was triggered by the Barings case in 1995, but it was
being considered before that, partly as a result of events and failures which proved to banks
that lending might be the least of their worries. Many were also conscious of events in other
industries, such as the Piper Alpha rig disaster in 1988.
Not that it was much different for medieval bankers several centuries before. Their
businesses failed as much because their communities and customers suffered from war,
plague and famine, as they did from imprudent lending to defaulting sovereigns or states. As
Thomas Aquinas suggested, operational risk has always been with us.
Before we consider practical ways of managing it, though, we will first establish what exactly
we mean in this book by operational risk.
Two other definitions of risk introduce a key element, impact on objectives, which will be a
running theme throughout this book. The British Standard on Risk Management defines risk
as ‘something that might happen and its effect(s) on the achievement of objectives’.3 This
echoes a Standard which had been in use in Australia and New Zealand, AS/NZS
4360:2004, which speaks of risk as being ‘the chance of something happening that will
impact objectives…’. In the latest international standard this has become ‘the effect of
uncertainty on objectives’ (ISO 31000:2009), which shifts the emphasis back from effect to
cause. The subject of risk becomes ‘something that might happen’. We are now moving into
‘unknown unknowns’ territory. Company reports and academic commentators draw a
distinction between risks, which are measurable, and uncertainties, which are not.4 For most
people, however, including the authors, the two come together. The measurable and the
immeasurable are definitely all part of operational risk.
People often say that risk is a threat to objectives, something which negatively affects those
objectives or threatens the factors which make a business successful. However, the two
definitions mentioned above, do not speak of threats, they speak of impacts, also known as
effects or outcomes. Risk and risk management can be about opportunities as much as
threats. As Peter Bernstein has expressed it in Against the Gods, when discussing the
theories of the eighteenth century Swiss mathematician, Daniel Bernoulli, ‘Risk is not
something to be faced, but a set of opportunities open to choice.’
In Chinese, the concept of risk is represented by two characters which ‘translate’ as crisis
and opportunity. In fact, the characters for crisis are wei ji and the characters for opportunity
are ji hui , so it’s probably truer to say that the character ji forms part of the concepts for
crisis and opportunity, which still shows that conceptually the Chinese understood the twin
sides of risk many centuries ago.
Loss of one or more key staff, loss of reputation or abandoning a project may well have an
adverse financial impact, but even then it is possible that they can result in financial benefit
both in the short and medium term. When something happens, it may even help you to
achieve and surpass your objectives. Those objectives can be sales, profit, market share or
something else, such as the behavioural objectives discussed later (in Chapter 15, Culture
and people risk). The disciplines of risk management will mean that you are prepared as
much for the upside as for the downside. Risk is not downhill all the way, even if it often feels
like it.
Definition
Operational risk
The risk of loss resulting from inadequate or failed internal processes, people and systems
or from external events.5
Although it was devised for banks and has been adopted within the European insurance
industry, it represents a reasonable statement of the scope of operational risk within all
industries. In fact, most firms would say that is their definition of business risk, which is true.
That is why this book applies as much to non-financial services as it does to financial
services.
This definition first emerged from a survey undertaken in 1999 by the British Bankers’
Association, the International Swaps and Derivatives Association and the Risk Management
Association, with the help of PricewaterhouseCoopers, subsequently written up in
Operational risk – The next frontier.6 Up until then, within financial services, operational risk,
if it had been thought about at all, was either limited to operations risk, i.e. internal processes
and systems, or was a negative statement or thought – ‘anything which isn’t credit or market
risk’. In the 1999 survey of more than 50 (mostly) international banks, including nearly 40%
of the top 100 banks in the world at that time, less than half had a positive group-wide
definition, 15% used the negative statement, and almost all the rest had no specific
definition.
The Basel definition has the merit of being positive: it says what operational risk is, rather
than what it is not; but it doesn’t really tell you what those various groups – people, process,
systems, external events – mean in practice. It is a scoping statement. It needs more detail
to flesh it out in the shape of sub-categories. Table 1.1 gives some examples of
sub-categories of the four key words in the Basel definition.
The Basel Committee classified operational risk losses and came up with the following
categories:
internal fraud
external fraud
employment practices and workplace safety
clients, products and business practices
damage to physical assets
business disruption and systems failures
execution, delivery and process management.7
That is not a list of risks, but a mixture of events and effects or impacts. Another
categorisation (see Table 1.1) took as its starting point the definition of operational risk and
listed risks under those four main headings. But even the Basel Committee limited its own
definition by adding a rider that it included legal risk, but excluded strategic and reputational
risk.8
Legal risk – the risk of capricious legislators, of capricious judges and juries, or of finding that
documentation is inadequate to sustain a claim against a debtor – is a perfectly legitimate
risk to include within operational risk. But it has a sister risk, regulatory risk, which is little
spoken of (by regulators), yet which consistently features high in the CSFI’s annual ‘Banana
Skin’ surveys.9 Until recently, that probably reflected irritation with the burden of ‘too much’
regulation, rather than the biggest genuine threat to the business. Now it might well begin to
encompass decisions by legislators and regulators, capricious in the eyes of some victims,
which will have considerable impact on business models.
Whilst it might be permissible to exclude strategic risk, i.e. making the wrong strategic
decision for the business, it is our view, especially if this concerns poor implementation of
strategy, that it is all part of operational risk.
The one outsider is reputation risk, which is not really a direct risk in itself, but is usually the
result or consequence of an operational risk failure or, more often, failures. As it is a
secondary consequence of another risk, an argument can be made for its exclusion.
However, many firms in all industries not unreasonably consider it one of their biggest risks,
given the life-threatening damage it can incur (see Chapter 16, Reputation risk). What
emerges is that operational risk encompasses practically all the risks of running the
business, apart from any which deserve specific treatment.
loss of reputation
failure of the organisation to change/adapt
business interruption
failure to retain employees
political risk
product liability
general liability
terrorism
failure of a key strategic alliance
computer failure.
None is avoidable. Many are transferable, perhaps by insurance (see Chapter 12), but all
are manageable to some extent, if only in the sense of the four Ts of: treat, transfer,
terminate and tolerate.
The answers to the ‘what needs to go right’ question also have the merits of both identifying
and prioritising the business’s key risks. They emerge quite naturally.
As we have seen, one of the glories – and frustrations – of operational risk, like Cleopatra, is
its infinite variety. In the words of Michael Power:
Definition
ERM is the culture, processes and tools to identify strategic opportunities and reduce
uncertainty. It is a comprehensive view of risk both from operational and strategic
perspectives and is a process that supports the reduction of uncertainty and promotes the
exploration of opportunities.11
ERM undoubtedly covers all the various risk categories. But for us, operational risk is
essentially business risk and at the heart of business risk management. That is the view
taken in this book, but how you define operational risk is up to you. Your definition must go
with the grain of your firm and all firms are different in their business, culture and people. But
define it, or scope it, you must, because how you define it will determine how you classify it
and assess it and how it is managed in your firm. Your definition is the cornerstone of any
operational risk policy.
Product risk involves the commodity, or market, risk of prices of components moving, but the
risks of product quality, design and distribution are operational risks. Supply risk involves the
credit risk of the supplier and buyer, but it is rooted in the operational risks of supply chain
logistics.
Turning to financial services, it has been claimed, albeit anecdotally, that at least 50% of
banks’ bad debts are, in fact, operational risk losses, often through failures of documentation
which invalidate collateral, whether on retail or wholesale transactions. But they tend to go
into the books as credit losses. Similarly, in the market trading environment, a significant
number of what are recorded as market losses are operational risk losses: for example, ‘fat
finger’, where the wrong key is struck or an order is mis-typed and you buy when you should
have sold, or buy, for example, the Japanese recruitment agency J-Com rather than the
cable television group JCom.12
Taking the example to a different level from the purely transactional, failure to adequately
stress test market risk models against extreme market movements is a form of operational
risk. It reflects a failure of internal controls over the stress testing function. Its impact, though,
may not be on an individual transaction, but on the general level of market risk to which the
firm is exposed and may well feed through into significant losses. Is that market risk or
operational risk?
As with so much about operational risk, it is very much up to you and the nature of your firm
and how you wish to allocate losses and manage your risks. What is meant by operational
risk – how far you push the boundaries out or pull them in – is entirely up to you. Your risk
management framework should reflect the ways you work within the firm. In many cases the
answer is straightforward, but not where risk categories overlap, which is where most of the
risk lies.
The downside of allocating risks by risk type at this higher level is that if you try to extract
quantitatively the operational risks which have traditionally been included in credit and
market risk data, you add other risks to the problem – the subjectivity of allocation and the
breaking of a relatively homogeneous time series of data. Even if you decide that you will
keep the boundaries tight – and traditional – you should at least track and record those
incidents where an operational failure has resulted in loss. The real object of the exercise is
operational risk management, not operational risk measurement.
Operational risk is ultimately about failure of controls – or even lack of controls – so that
operational risk management is about establishing and maintaining an effective and
cost-effective control environment across all risks. The fact is that operational risk crosses
boundaries (and steps on toes) and involves everybody at different levels and in different
ways. It gets into the micro-politics, as well as the macro-politics of the firm.
In a very broad sense, the answers to the risks in the right-hand column will be ‘Yes’ and
those under operational risk will be ‘No’. Let’s look at them in turn.
Transaction-based
Operational risk obviously occurs each time a transaction is undertaken, but it doesn’t
depend on transactions for its existence. Before a firm opens its doors and transacts any
business, it is exposed to operational risk in the guise of, for example, fire, theft or flood. The
right-hand column risks are entirely transaction-based.
Assumed proactively
Practically all financial services are about the assumption and management of risk, whether
it is a bank lending money, an insurer underwriting or a dealer trading currencies or bonds.
With other types of business, management of credit and liquidity risk, and of market or
commodity risk, may be an inevitable part of the business, but not the reason the firm is in
business. But as we said earlier, operational risk is essentially unavoidable, whether we like
it or not. There are exceptions, such as where a firm takes on another firm’s processing
under an outsourcing arrangement – for a fee. But generally operational risk is something to
be reduced and controlled, rather than actively taken on and increased.
Identified from accounting information
If you look through the various types of operational risk, such as the ones listed in Table 1.1,
you will certainly find somewhere in the firm’s financial information the financial losses (or
profits) which result from them, but you will rarely find one of them listed as a line in the
general ledger unless, perhaps, that item is fraud. As a result, it is extremely difficult to
obtain accurate information on the costs of operational risk. So, for reporting, we have to rely
considerably on human honesty and human reporting, rather than data feeds from the
accounting system.
Rating agencies are taking some steps to assess ‘enterprise-wide’ risk, which is effectively
an assessment of the tone and quality of risk management in a firm. But the gradings are
limited and certainly far from being able to support a trading market, even if investors wanted
one. Credit and market risk, as people have belatedly discovered, are only too readily
tradeable.
All of the above explains why operational risk is intrinsically different from other risks and
therefore needs a different toolset with which to manage it, as we shall see in the operational
risk management framework which forms the central part of this book.
Operational risk classification systems invariably identify particular operational loss events or
incidents. But that is not what operational risk management is about. It is about
understanding fully the chain of causality, the simple sequence of:
We can see the linkages of the chain by looking at some recent examples from non-financial
sector events (see Table 1.3). They provide an interesting catalogue, which again also
shows the wide range of operational risk.
Another important element of causal analysis lies in risk interconnectedness. The World
Economic Forum publishes an annual Global Risks Interconnection Map.13 Apart from
showing the connections between different risks, it also highlights the systemic nature of
many risks. If you apply a similar methodology to your own firm’s operational risks, you may
well find that a risk which on its own appears not to be especially significant, is in fact a
major node, so that if it occurs it can cause a range of other risk events and change your
view of the key risks facing your firm and their priority.
The exercise also highlights the simple fact that a risk event can have a number of causes
and can give rise to a number of different effects or outcomes, whilst a single cause can
trigger a number of different risk events. The chain of causality and its risk management is
another important theme in this book.
Given the importance of cause and behaviour, as well as the nature of the risks it covers, it is
probable that a truly scientific approach to operational risk measurement would probably
have to encompass professionals as various as economists (of many shades), engineers,
social scientists, behavioural scientists, futurologists and crystal ball gazers, as well as a
variety of different types of mathematician. If it is a science at all (as opposed to an art),
operational risk is a social rather than a purely mathematical science. When we look at the
mathematical aspects, data is thin where it is most needed, i.e. for rare, high-impact events.
Probability estimates for operational risk are inevitably affected by behavioural rather than
technical factors and, indeed, a major loss will cause behavioural changes and changes to
controls which will render past experience less relevant as a guide to the future. There are
no groundhog days in operational risk.
Table 1.3 The chain of causality and some major operational risk events
Measurement of operational risk has been driven within financial services by the need to
ascribe a capital number to it. The events of the financial crisis show how dangerous it is
when people believe that there is a mathematically precise answer to the risk problem they
have posed – when people place a misguided trust in numbers as a basis, or even a
substitute, for rational decision making. Risk management has been in danger of being
treated as a kind of alchemy – but the philosopher’s stone has not been found, nor will it be.
If that is true of the relatively homogeneous, data-rich environments of credit and market
risk, how much truer is it in the heterogeneous, data-poor environment of operational risk. As
Leibnitz once wrote to his friend Jacob Bernoulli, uncle to Daniel, in 1703, ‘A finite number of
experiments will always be too small a sample for an exact calculation of nature’s
intentions’.14 Nature’s intentions are frequently the subject of operational risk.
Operational risk requires a new kind of management and data collection which moves away
from existing norms of risk management, especially with regard to low-frequency/high-impact
events, which should be its prime concern. Operational risk, and indeed other forms of risk
management, should be encouraging managers to open their eyes and ears to other forms
of data – information is a much better word – than the purely numeric, even as far as gossip
and casual comment. That goes further against the basic laws of probability which demand
independent, objective observations of homogeneous events, a long way away from the
world of operational risk. Having said that, even actuaries will admit to using quantitative
frameworks to structure their ‘guesses’.15 Quantitative analysis undoubtedly has its place,
but the actuaries are applying intelligent risk management, which is what this book is all
about.
If, as we believe in this book, operational risk is effectively business risk, including strategic
and reputation risks, it should be an integral part of business strategy and management, the
board’s primary responsibility. One of the dangers is for operational risk to deal only with
internal process risks or to become merely a reporting rather than a management function.
If you get buy-in you can achieve extraordinary things. But if you don’t get buy-in you won’t
even achieve the ordinary. It’s alright to talk about tone at the top, but I like to think about the
tune in the middle.
It is the response of everybody in the firm which will make operational risk management
effective.
Risk and control assessments and scenario analysis, for instance, will be effective only if
they involve people who are at the sharp end of a firm’s activities, whether they are
customer-facing, part of the support systems or on the board. The more people who are
involved in the assessment process and can see practical results and benefits, the more
buy-in there will be. They also need to see that they are not wasting their time. If we throw
them hundreds of so-called key risk indicators, we are giving indicators a bad name. Which
risks are truly key? What are the best indicators which relate to them? Get it down to a
workable number of key risk indicators which staff can monitor and use. Likewise with
reporting thresholds. We do need to gather information down to a low level, but we have to
balance the costs of comprehensive and voluminous reporting with the benefits, and
concentrate on the information which best tells us what we need to know.
Operational risk events are very often the results of people failures (see Chapter 15, Culture
and people risk). That is why, in Chapter 5, Risk and control assessment, we concentrate on
both the design and performance of controls. The design is all about the system and
process. The performance of a control is usually about people. If all staff are not engaged,
controls will fail and the costs of that can be considerable.
Buy-in comes from communication, especially communicating why we are doing what we do.
Why do we assess both inherent and residual risks? After all, the ‘reds’ amongst the inherent
or gross risks tell us where we’re most likely to have a disaster. They may, but the chances
are that you are doing something about them. So you need to find out and constantly
monitor how effective the controls you have in place are to bring them down to an
acceptable residual or net level. Explaining and communicating why we are doing what we
do in operational risk management means that management becomes clear in its own mind
and that other staff will understand the purpose and benefits. That way, we shall achieve real
buy-in.
In addition, of course, buy-in can extend beyond the firm. If there are critical third-party
dependencies, perhaps agents, sub-contractors or outsourcing suppliers, they need to be
part of the communication network and embrace the firm’s operational risk standards.
There are many numbers in operational risk, losses being the most painful ones. But
operational risk is not about management by numbers. It is about managing people and
circumstances which are constantly changing and where judgements, even when based as
far as possible on hard evidence, are necessarily subjective. That’s one argument for
colours (or words) in operational risk reports, rather than apparently precise numbers.
The other one is that numbers are not as accessible as colours and good operational risk
management happens as a result of good communication. In almost every chapter of the
framework we show reports which owe their accessibility to the fact that they use colours to
tell the story. A picture tells a thousand words. In operational risk, a colour tells a thousand
numbers.
So why model it, then?
The answer to that depends on what you expect a model to do. There is often too little
thought given to why and how models (and reports for that matter) are being constructed,
and how they will be used. In operational risk, a model should be seen as a framework for a
conversation. It might even give you the right question, rather than the correct answer. After
all, for the most part we are trying to model our ignorance.
At the outset of an operational risk management programme, there will be little hard data on
which to model. Even when the programme has been running well for some time, the data is
always going to be incomplete and probably imperfect. So what’s the point of trying to turn it
into something it is not? The answer is that, despite its limitations, modelling can probably
get you in the right ballpark, even if it’s not an exact science. In operational risk, modelling
may not provide the perfect answer, but it can provide a good answer – provided you
understand what you’re getting.
Reporting
The first challenge is to set up a system and a culture in which reporting of events and ‘near
misses’ is what we do, rather than what we try not to do. We will report events, because
everybody in the firm accepts and understands that it is only by comprehensive reporting
that we can understand what is actually happening; understand what major incident may
threaten; and pursue a policy of continuous improvement. If you look at most disasters,
whether financial or non-financial, you will find that they generally owe their origin to human
frailty of one form or another, of which the most dangerous is the failure to learn. The
evidence is all around us, but we choose to ignore it and not to learn the lessons. And
another disaster strikes. Intelligent operational risk management demands that we see and
analyse the evidence and learn from it.
Once the data is gathered, the next challenge is to ensure that reports up and down the
organisation are meaningful and useful; that they highlight the key risks the firm is facing and
that reporting of risks, near misses, indicators and so forth is coordinated. Effective reporting
should also involve causal analysis so that we can understand what really happened and
can work out what to do to control our risks better. All reports, and all the information in
them, should lead to action. If a report is not intended to lead to action, drop it.
And because of the infinite variety of operational risk, there is no universal answer to how to
manage it in every case. Indeed, if operational risk is as broad as business risk, it’s logical to
suggest that there are as many ways of managing operational risk as there are of running a
business. There is no universal list of operational risks which applies to everybody. Nor is
there a universal list of indicators. Risks are emerging all the time, just as they may recede
or disappear as systems, the business or the external environment changes. Even if the list
remains constant, the ranking of each risk will be constantly changing.
So there is no standard manual. And even if you write a manual of operational risk controls,
processes and reporting procedures, it will be constantly evolving. If operational risk is
managed intelligently, it demands constant re-evaluation both of the risks and their controls.
It is not a one-off exercise which can be put away for a year, or even more frequently, until it
comes up again in the diary. It is part of the everyday process of management, for which a
procedures manual is not the answer. It needs to be in the blood.
The framework described in Chapters 3–10 is simple, succinct and straightforward. It covers
the six major processes involved in operational risk management, from which any others can
be derived. It represents a system which can be understood from the boardroom to the
post-room. If there is clarity about what operational risk management entails, there is likely to
be an effective and accepted implementation which can then reap the business benefits
described in Chapter 2.
The operational risk management framework we use in this book is given in Figure 1.2. It sits
within an overall operational risk environment, where each component interacts with the
others to build the whole.
Before we get to the chapters where each element is dealt with in detail, it would be good to
consider them briefly. Governance (Chapter 3) is the first step in operational risk
management. Good governance, through a board approved operational risk policy and
appropriate terms of reference for relevant individuals and committees, will ensure that the
board and all staff have a clear view of the board’s strategy and objectives and of their
responsibilities. Governance will also involve establishing the principles and main elements
of the operational risk management framework.
The other essential to good governance is to ensure that appropriate reports (Chapter 8) are
generated to enable everybody from the board down to understand the operational risks to
which they are exposed at any one time. Reports on risk should be linked to relevant
controls and actions, so that recipients can use them to remedy control failures, review risk
appetite and perhaps remove controls. Good reports mean action. They demonstrate a firm’s
commitment to using operational risk management to enhance the firm’s business decisions
and continuously improve its performance.
The key to good reporting is to tailor it to the needs of the reader – at every level. Neither
governance nor reporting is something which is solely about the board. That is why we use
the term ‘governance’, rather than the board or similar, at the top of the framework.
Operational risk management involves everybody. It is not hierarchical.
Having established the environment, we can now move to the engine room of risk and
control assessment, recording events and near misses and establishing and monitoring key
indicators. Risk and control assessment (Chapter 5) is often the first operational risk
management process carried out by an organisation. Initial assessments will almost always
be subjective, but even then they can be of significant business value if they are linked to the
firm’s strategic objectives. As assessments progress and are linked to events and indicators
they become more objective. However, a continued focus on the business objectives will
help to ensure their relevance, as well as buy-in and use at all levels.
Losses (Chapter 6) often appear to lie at the heart of data-gathering for operational risk.
Losses are of little use unless they are analysed to identify causes. Operational risk is about
management. Understanding the causes of risk means that you can manage the risks
themselves. Merely knowing their number and size is of relatively little value. Finally, within
the engine room, indicators (Chapter 7) are invaluable management tools at every level of
the organisation, provided they are concentrated on key risks and key controls.
If you look closely at Figure 1.2, you will see that each of the boxes headed Indicators, Risk
and control assessment, and Events has, at the bottom, the words ‘Appetite and actions’.
The framework is a framework for management. It is only worth doing if it leads to
management action.
This brings us to scenarios and modelling. Scenarios, of which stress tests are one aspect,
are a practical and accessible way of assessing operational risks which, by their nature, are
at the far end of the scale of both likelihood and impact. As with most operational risk
processes and data, scenarios have to be handled with care (as is shown in Chapter 10).
But because they rely on stories involving the real world of work, they can be a powerful
means of involving staff and of getting buy-in. Stress tests and scenarios are themselves
one aspect of modelling. As we shall see in Chapter 9, all the elements we have discussed
in this section can be used in modelling and add significantly to the business benefits which
can be derived. Good modelling, using risk and control assessments, for instance, can assist
in a cost–benefit analysis of the controls used by a firm and the allocation of resources to
new or improved controls.
But before we go into the detail of the framework, we need to get buy-in. Buy-in comes from
showing that operational risk management really does add business benefit, which is the
subject of the next chapter.
Notes
1 HM Government, A strong Britain in an age of uncertainty – The National Security
Strategy, Cmd 7953, October 2010.
4 Frank Knight, Risk, Uncertainty and Profit (1921; reprinted, Dover Books, 2009).
10 Michael Power, Organized Uncertainty (Oxford: Oxford University Press), 2009, p. 126.
12 Jeremy Grant and Michael Mackenzie, ‘Ghost in the machine’, Financial Times, 18
February 2010.
13 http://www.weforum.org/reports/global-risks-2012-seventh-edition
14 Quoted in Peter L. Bernstein, Against the Gods (New York: John Wiley & Sons), 1998, p.
118.
Two other definitions of risk introduce a key element, impact on objectives, which will be a
running theme throughout this book. The British Standard on Risk Management defines risk
as ‘something that might happen and its effect(s) on the achievement of objectives’.3 This
echoes a Standard which had been in use in Australia and New Zealand, AS/NZS
4360:2004, which speaks of risk as being ‘the chance of something happening that will
impact objectives…’. In the latest international standard this has become ‘the effect of
uncertainty on objectives’ (ISO 31000:2009), which shifts the emphasis back from effect to
cause. The subject of risk becomes ‘something that might happen’. We are now moving into
‘unknown unknowns’ territory. Company reports and academic commentators draw a
distinction between risks, which are measurable, and uncertainties, which are not.4 For most
people, however, including the authors, the two come together. The measurable and the
immeasurable are definitely all part of operational risk.
People often say that risk is a threat to objectives, something which negatively affects those
objectives or threatens the factors which make a business successful. However, the two
definitions mentioned above, do not speak of threats, they speak of impacts, also known as
effects or outcomes. Risk and risk management can be about opportunities as much as
threats. As Peter Bernstein has expressed it in Against the Gods, when discussing the
theories of the eighteenth century Swiss mathematician, Daniel Bernoulli, ‘Risk is not
something to be faced, but a set of opportunities open to choice.’
In a very broad sense, the answers to the risks in the right-hand column will be ‘Yes’ and
those under operational risk will be ‘No’. Let’s look at them in turn.
Transaction-based
Operational risk obviously occurs each time a transaction is undertaken, but it doesn’t
depend on transactions for its existence. Before a firm opens its doors and transacts any
business, it is exposed to operational risk in the guise of, for example, fire, theft or flood. The
right-hand column risks are entirely transaction-based.
Assumed proactively
Practically all financial services are about the assumption and management of risk, whether
it is a bank lending money, an insurer underwriting or a dealer trading currencies or bonds.
With other types of business, management of credit and liquidity risk, and of market or
commodity risk, may be an inevitable part of the business, but not the reason the firm is in
business. But as we said earlier, operational risk is essentially unavoidable, whether we like
it or not. There are exceptions, such as where a firm takes on another firm’s processing
under an outsourcing arrangement – for a fee. But generally operational risk is something to
be reduced and controlled, rather than actively taken on and increased.
Identified from accounting information
If you look through the various types of operational risk, such as the ones listed in Table 1.1,
you will certainly find somewhere in the firm’s financial information the financial losses (or
profits) which result from them, but you will rarely find one of them listed as a line in the
general ledger unless, perhaps, that item is fraud. As a result, it is extremely difficult to
obtain accurate information on the costs of operational risk. So, for reporting, we have to rely
considerably on human honesty and human reporting, rather than data feeds from the
accounting system.
This is another consequence of operational risk not being transaction-based. If it were,
innumerable bits of data relating to it could be attached to each transaction and it could be
comprehensively assessed, analysed and monitored. But it is not. Nor are all its impacts
financial.
Can the occurrence of risk events be audited?
It is certainly possible to audit whether an operational risk loss has been correctly recorded –
but only if it has been reported. And it’s also possible to do this even for ones which haven’t
been admitted to – provided the auditors are aware of the incident. But you simply cannot
guarantee that all operational loss events have been recorded, whatever a firm’s policy may
be, short of examining every single debit and credit in the books – a rather futile exercise.
Can limits be put on operational risk?
Rarely, mainly because it is not assumed proactively. With other types of risk, you can limit
your exposure to an entity, a currency, a maturity, a geographical area and so on.
Operational risk, alas, happens. With internal risks, you seek to mitigate likelihood and
impact through controls. You can set thresholds and establish a risk appetite. But for the
most part (as we show in Chapter 3, Governance), you are unable to prevent risks having
the impact that they do. You are establishing a level of tolerance. With external events that is
especially true. You may be able to mitigate their effect, but for the most part you can’t
prevent their happening. Nor can you limit the force of the hurricane which hits you.
Can you trade operational risk?
Again, unlike the other risks, the answer is no. It is true that catastrophe bonds exist (as we
explore in the Alternative risk transfer mechanisms section of Chapter 12, Insurance), but
these tend to deal with very specific events, such as damage to property caused by
earthquakes or hurricanes within a particular geographical area or radius. They don’t purport
to cover the range of operational risks.
Rating agencies are taking some steps to assess ‘enterprise-wide’ risk, which is effectively
an assessment of the tone and quality of risk management in a firm. But the gradings are
limited and certainly far from being able to support a trading market, even if investors wanted
one. Credit and market risk, as people have belatedly discovered, are only too readily
tradeable.
Operational risk is universal
The final differences between operational risk and other risk types are that every single
person in the firm is responsible for some aspect of the risk and operational risk is involved
in every single activity which goes on within the firm. It is everywhere and universal, which is
why its management should be a paramount concern for the board and senior executives.
All of the above explains why operational risk is intrinsically different from other risks and
therefore needs a different toolset with which to manage it, as we shall see in the operational
risk management framework which forms the central part of this book.
CAUSE AND EFFECT
There is one further thought about the nature of operational risk – perhaps of all risks. For
most types of risk, an event happens and the result is usually a financial loss – or, rarely and
tragically, human loss. And that is what people focus on in trying to decide how better to
manage risk in future – the effect.
Operational risk classification systems invariably identify particular operational loss events or
incidents. But that is not what operational risk management is about. It is about
understanding fully the chain of causality, the simple sequence of:
CAUSE → EVENT → EFFECT (OR CONSEQUENCE)
Whilst operational risk management is about managing events, it does so through
preventative controls and indicators to manage their causes and through detective controls
and actions to mitigate their effects. Too often in operational risk management, including in
the Basel Accords, causes and effects are confused with events, and people base their risk
mitigation on events, rather than on causes. Cause is one of the major concerns of
operational risk management. Analysing causes is the best way to prevent operational risk
events from happening.
We can see the linkages of the chain by looking at some recent examples from non-financial
sector events (see Table 1.3). They provide an interesting catalogue, which again also
shows the wide range of operational risk.
Another important element of causal analysis lies in risk interconnectedness. The World
Economic Forum publishes an annual Global Risks Interconnection Map.13 Apart from
showing the connections between different risks, it also highlights the systemic nature of
many risks. If you apply a similar methodology to your own firm’s operational risks, you may
well find that a risk which on its own appears not to be especially significant, is in fact a
major node, so that if it occurs it can cause a range of other risk events and change your
view of the key risks facing your firm and their priority.
The exercise also highlights the simple fact that a risk event can have a number of causes
and can give rise to a number of different effects or outcomes, whilst a single cause can
trigger a number of different risk events. The chain of causality and its risk management is
another important theme in this book.
MEASUREMENT AND MANAGEMENT OF OPERATIONAL RISK
The events in Table 1.3 and those described at the beginning of the chapter highlight one of
the problems of operational risk – the sheer range of risks which it covers and the fact that,
depending on how it is defined, it often straddles a number of them, rather than being a
discrete risk in its own right. The simple fact of ‘cause’ is another reason why a relatively
homogeneous measurement system does not work.
Given the importance of cause and behaviour, as well as the nature of the risks it covers, it is
probable that a truly scientific approach to operational risk measurement would probably
have to encompass professionals as various as economists (of many shades), engineers,
social scientists, behavioural scientists, futurologists and crystal ball gazers, as well as a
variety of different types of mathematician. If it is a science at all (as opposed to an art),
operational risk is a social rather than a purely mathematical science. When we look at the
mathematical aspects, data is thin where it is most needed, i.e. for rare, high-impact events.
Probability estimates for operational risk are inevitably affected by behavioural rather than
technical factors and, indeed, a major loss will cause behavioural changes and changes to
controls which will render past experience less relevant as a guide to the future. There are
no groundhog days in operational risk.
Table 1.3 The chain of causality and some major operational risk events
Measurement of operational risk has been driven within financial services by the need to
ascribe a capital number to it. The events of the financial crisis show how dangerous it is
when people believe that there is a mathematically precise answer to the risk problem they
have posed – when people place a misguided trust in numbers as a basis, or even a
substitute, for rational decision making. Risk management has been in danger of being
treated as a kind of alchemy – but the philosopher’s stone has not been found, nor will it be.
If that is true of the relatively homogeneous, data-rich environments of credit and market
risk, how much truer is it in the heterogeneous, data-poor environment of operational risk. As
Leibnitz once wrote to his friend Jacob Bernoulli, uncle to Daniel, in 1703, ‘A finite number of
experiments will always be too small a sample for an exact calculation of nature’s
intentions’.14 Nature’s intentions are frequently the subject of operational risk.
Operational risk requires a new kind of management and data collection which moves away
from existing norms of risk management, especially with regard to low-frequency/high-impact
events, which should be its prime concern. Operational risk, and indeed other forms of risk
management, should be encouraging managers to open their eyes and ears to other forms
of data – information is a much better word – than the purely numeric, even as far as gossip
and casual comment. That goes further against the basic laws of probability which demand
independent, objective observations of homogeneous events, a long way away from the
world of operational risk. Having said that, even actuaries will admit to using quantitative
frameworks to structure their ‘guesses’.15 Quantitative analysis undoubtedly has its place,
but the actuaries are applying intelligent risk management, which is what this book is all
about.
CHALLENGES OF OPERATIONAL RISK MANAGEMENT
Operational risk is a young discipline. It is the softest of risks, difficult to grasp, yet only too
familiar. Establishing an effective operational risk management framework in a firm is not
easy and open to many challenges. Let us look at some of them.
Getting the board on board
The first task, and the critical one, is to get the board to agree to take operational risk
management seriously and for senior management and the board to be involved in devising
an operational risk management policy.
If, as we believe in this book, operational risk is effectively business risk, including strategic
and reputation risks, it should be an integral part of business strategy and management, the
board’s primary responsibility. One of the dangers is for operational risk to deal only with
internal process risks or to become merely a reporting rather than a management function.
For operational risk management to be effective, it needs to be embraced by everybody and
to be integral to all the business decisions made by a firm. That is not to say that it’s about
risk avoidance. It is about risk assessment and the opportunities which can flow from that.
As we say repeatedly in this book, for that or any other approach to be embedded in the firm,
it needs to be led and sponsored from the top. And if the board is not sure it is worth it,
perhaps they can be asked to read Chapter 2, The business case for operational risk
management.
Getting buy-in throughout the firm
Understanding and explaining the benefits of good operational risk management is probably
the best way to get buy-in throughout the firm. Because operational risk involves every
activity in the firm from the strategic to the minutiae of operational activities, it needs to be
embraced by everybody. At an Institute of Internal Auditors conference in September 2008,
Professor Mervyn King, chair of South Africa’s King Committee on corporate governance,
made the pertinent point,
If you get buy-in you can achieve extraordinary things. But if you don’t get buy-in you won’t
even achieve the ordinary. It’s alright to talk about tone at the top, but I like to think about the
tune in the middle.
It is the response of everybody in the firm which will make operational risk management
effective.
Risk and control assessments and scenario analysis, for instance, will be effective only if
they involve people who are at the sharp end of a firm’s activities, whether they are
customer-facing, part of the support systems or on the board. The more people who are
involved in the assessment process and can see practical results and benefits, the more
buy-in there will be. They also need to see that they are not wasting their time. If we throw
them hundreds of so-called key risk indicators, we are giving indicators a bad name. Which
risks are truly key? What are the best indicators which relate to them? Get it down to a
workable number of key risk indicators which staff can monitor and use. Likewise with
reporting thresholds. We do need to gather information down to a low level, but we have to
balance the costs of comprehensive and voluminous reporting with the benefits, and
concentrate on the information which best tells us what we need to know.
Operational risk events are very often the results of people failures (see Chapter 15, Culture
and people risk). That is why, in Chapter 5, Risk and control assessment, we concentrate on
both the design and performance of controls. The design is all about the system and
process. The performance of a control is usually about people. If all staff are not engaged,
controls will fail and the costs of that can be considerable.
Buy-in comes from communication, especially communicating why we are doing what we do.
Why do we assess both inherent and residual risks? After all, the ‘reds’ amongst the inherent
or gross risks tell us where we’re most likely to have a disaster. They may, but the chances
are that you are doing something about them. So you need to find out and constantly
monitor how effective the controls you have in place are to bring them down to an
acceptable residual or net level. Explaining and communicating why we are doing what we
do in operational risk management means that management becomes clear in its own mind
and that other staff will understand the purpose and benefits. That way, we shall achieve real
buy-in.
In addition, of course, buy-in can extend beyond the firm. If there are critical third-party
dependencies, perhaps agents, sub-contractors or outsourcing suppliers, they need to be
part of the communication network and embrace the firm’s operational risk standards.
It’s common sense, or what we do every day
Operational risk is present in everything we do. It’s what we have to cope with all the time,
whether as business managers or as individuals. We are all risk managers. And because we
do it every day, and are here to tell the tale, we are patently doing it well. We may be. But
how do we know? And could we do even better?
There is no great mystery to operational risk management. The fundamentals of identifying,
assessing, managing and mitigating risk to an agreed level of risk appetite, are the same in
all risk management activity. But if we establish a coherent framework for management, we
will understand why some risks are being controlled successfully and where we can put our
resources to best use.
Why colours and not numbers?
If it’s risk, it must be a number. And, indeed, there’s a view that if it isn’t a number, you can’t
manage it. Numbers, even if they are spurious, give the comfort of certainty – dangerously
so if they are spuriously accurate. They help to prioritise and focus actions, but it can be
unhelpful to go for unjustified precision. The financial crisis of 2007–9 showed, amongst
other things, the dangers of relying on numbers whose limitations were not understood.
There are many numbers in operational risk, losses being the most painful ones. But
operational risk is not about management by numbers. It is about managing people and
circumstances which are constantly changing and where judgements, even when based as
far as possible on hard evidence, are necessarily subjective. That’s one argument for
colours (or words) in operational risk reports, rather than apparently precise numbers.
The other one is that numbers are not as accessible as colours and good operational risk
management happens as a result of good communication. In almost every chapter of the
framework we show reports which owe their accessibility to the fact that they use colours to
tell the story. A picture tells a thousand words. In operational risk, a colour tells a thousand
numbers.
So why model it, then?
The answer to that depends on what you expect a model to do. There is often too little
thought given to why and how models (and reports for that matter) are being constructed,
and how they will be used. In operational risk, a model should be seen as a framework for a
conversation. It might even give you the right question, rather than the correct answer. After
all, for the most part we are trying to model our ignorance.
At the outset of an operational risk management programme, there will be little hard data on
which to model. Even when the programme has been running well for some time, the data is
always going to be incomplete and probably imperfect. So what’s the point of trying to turn it
into something it is not? The answer is that, despite its limitations, modelling can probably
get you in the right ballpark, even if it’s not an exact science. In operational risk, modelling
may not provide the perfect answer, but it can provide a good answer – provided you
understand what you’re getting.
How can you set a risk appetite for operational risk?
Perhaps the quickest answer is to turn to Chapter 4, Operational risk appetite. Unfortunately,
operational risk is not like The Hitchhiker’s Guide to the Galaxy where fans will remember
that the Answer to the Ultimate Question of Life, the Universe and Everything is 42. In
operational risk, risk appetite may be a finite number but, because of the range of
operational risks and the unavoidability of many, appetite can just as well be expressed in a
statement of policy, or by using coloured assessments, or through a range of indicators. So
you can set a risk appetite, but there will be different ways of doing it, depending on the risks
involved. And remember – setting an appetite will not prevent an operational risk actually
happening.
Reporting
The first challenge is to set up a system and a culture in which reporting of events and ‘near
misses’ is what we do, rather than what we try not to do. We will report events, because
everybody in the firm accepts and understands that it is only by comprehensive reporting
that we can understand what is actually happening; understand what major incident may
threaten; and pursue a policy of continuous improvement. If you look at most disasters,
whether financial or non-financial, you will find that they generally owe their origin to human
frailty of one form or another, of which the most dangerous is the failure to learn. The
evidence is all around us, but we choose to ignore it and not to learn the lessons. And
another disaster strikes. Intelligent operational risk management demands that we see and
analyse the evidence and learn from it.
Once the data is gathered, the next challenge is to ensure that reports up and down the
organisation are meaningful and useful; that they highlight the key risks the firm is facing and
that reporting of risks, near misses, indicators and so forth is coordinated. Effective reporting
should also involve causal analysis so that we can understand what really happened and
can work out what to do to control our risks better. All reports, and all the information in
them, should lead to action. If a report is not intended to lead to action, drop it.
Just give me the manual
If it were that easy, this book would not be necessary. Unfortunately, it isn’t that easy. For a
start, as we said earlier, what you mean by operational risk is entirely up to you. In this book
we can give you a framework to manage, but only you can decide what it is you are trying to
manage. Only you can decide what your risk appetite is. Only you can establish the culture
of control – or relative lack of control – in which you wish to operate. Each firm is different;
each firm faces different risks; each firm will treat each aspect of operational risk
management in a unique way.
And because of the infinite variety of operational risk, there is no universal answer to how to
manage it in every case. Indeed, if operational risk is as broad as business risk, it’s logical to
suggest that there are as many ways of managing operational risk as there are of running a
business. There is no universal list of operational risks which applies to everybody. Nor is
there a universal list of indicators. Risks are emerging all the time, just as they may recede
or disappear as systems, the business or the external environment changes. Even if the list
remains constant, the ranking of each risk will be constantly changing.
So there is no standard manual. And even if you write a manual of operational risk controls,
processes and reporting procedures, it will be constantly evolving. If operational risk is
managed intelligently, it demands constant re-evaluation both of the risks and their controls.
It is not a one-off exercise which can be put away for a year, or even more frequently, until it
comes up again in the diary. It is part of the everyday process of management, for which a
procedures manual is not the answer. It needs to be in the blood.
INTRODUCING THE FRAMEWORK
Having overcome the challenges, it is time to put a management framework in place. As we
said above, there may not be a manual which fits every firm, but a framework provides a
structure for implementing and embedding operational risk management. Without a coherent
framework you simply cannot get to first base.
The framework described in Chapters 3–10 is simple, succinct and straightforward. It covers
the six major processes involved in operational risk management, from which any others can
be derived. It represents a system which can be understood from the boardroom to the
post-room. If there is clarity about what operational risk management entails, there is likely to
be an effective and accepted implementation which can then reap the business benefits
described in Chapter 2.
The operational risk management framework we use in this book is given in Figure 1.2. It sits
within an overall operational risk environment, where each component interacts with the
others to build the whole.
Figure 1.2 Operational risk management framework
Legal risk – the risk of capricious legislators, of capricious judges and juries, or of finding that
documentation is inadequate to sustain a claim against a debtor – is a perfectly legitimate
risk to include within operational risk. But it has a sister risk, regulatory risk, which is little
spoken of (by regulators), yet which consistently features high in the CSFI’s annual ‘Banana
Skin’ surveys.9 Until recently, that probably reflected irritation with the burden of ‘too much’
regulation, rather than the biggest genuine threat to the business. Now it might well begin to
encompass decisions by legislators and regulators, capricious in the eyes of some victims,
which will have considerable impact on business models.
Whilst it might be permissible to exclude strategic risk, i.e. making the wrong strategic
decision for the business, it is our view, especially if this concerns poor implementation of
strategy, that it is all part of operational risk.
The one outsider is reputation risk, which is not really a direct risk in itself, but is usually the
result or consequence of an operational risk failure or, more often, failures. As it is a
secondary consequence of another risk, an argument can be made for its exclusion.
However, many firms in all industries not unreasonably consider it one of their biggest risks,
given the life-threatening damage it can incur (see Chapter 16, Reputation risk). What
emerges is that operational risk encompasses practically all the risks of running the
business, apart from any which deserve specific treatment.
Of course, another approach to understanding what is meant – or to be more exact, what
you mean – by operational risk is to ask the simple question, ‘What keeps you awake at
night?’ Or, given that risk can be defined as a threat to objectives, a better question is ‘What
needs to go right for the business to achieve its objectives?’ and think about what might
prevent that happening. The answer to either question might be a list like this:
• loss of reputation
• failure of the organisation to change/adapt
• business interruption
• failure to retain employees
• political risk
• product liability
• general liability
• terrorism
• failure of a key strategic alliance
• computer failure.
None is avoidable. Many are transferable, perhaps by insurance (see Chapter 12), but all
are manageable to some extent, if only in the sense of the four Ts of: treat, transfer,
terminate and tolerate.
The answers to the ‘what needs to go right’ question also have the merits of both identifying
and prioritising the business’s key risks. They emerge quite naturally.
As we have seen, one of the glories – and frustrations – of operational risk, like Cleopatra, is
its infinite variety. In the words of Michael Power:
Operational risk is an extended institutionalised attempt to frame the unframeable, assuage
fears about the uncontrollable ‘rogue others’ and to tame the man-made monsters [of the
financial system].10
That is its continual fascination and challenge.
Operational risk and ERM
In this book, we take the view that operational risk covers all the internal and external
sources of operational risk, all those ‘rogue others’. It is equivalent in many ways to
enterprise risk management (ERM), but certain discrete financial risks, such as credit risk,
market risk and liquidity or commodity risk can be hived off from it, as is shown in Figure 1.1.
Figure 1.1 Operational risks and other financial risks
ERM and operational risk management share very similar aims. There are numerous
definitions of ERM, but the Risk and Insurance Management Society has published one
which chimes with this idea:
ERM and operational risk management share very similar aims. There are numerous
definitions of ERM, but the Risk and Insurance Management Society has published one
which chimes with this idea:
Definition
ERM is the culture, processes and tools to identify strategic opportunities and reduce
uncertainty. It is a comprehensive view of risk both from operational and strategic
perspectives and is a process that supports the reduction of uncertainty and promotes the
exploration of opportunities.11
ERM undoubtedly covers all the various risk categories. But for us, operational risk is
essentially business risk and at the heart of business risk management. That is the view
taken in this book, but how you define operational risk is up to you. Your definition must go
with the grain of your firm and all firms are different in their business, culture and people. But
define it, or scope it, you must, because how you define it will determine how you classify it
and assess it and how it is managed in your firm. Your definition is the cornerstone of any
operational risk policy.
Product risk involves the commodity, or market, risk of prices of components moving, but the
risks of product quality, design and distribution are operational risks. Supply risk involves the
credit risk of the supplier and buyer, but it is rooted in the operational risks of supply chain
logistics.
Turning to financial services, it has been claimed, albeit anecdotally, that at least 50% of
banks’ bad debts are, in fact, operational risk losses, often through failures of documentation
which invalidate collateral, whether on retail or wholesale transactions. But they tend to go
into the books as credit losses. Similarly, in the market trading environment, a significant
number of what are recorded as market losses are operational risk losses: for example, ‘fat
finger’, where the wrong key is struck or an order is mis-typed and you buy when you should
have sold, or buy, for example, the Japanese recruitment agency J-Com rather than the
cable television group JCom.12
Taking the example to a different level from the purely transactional, failure to adequately
stress test market risk models against extreme market movements is a form of operational
risk. It reflects a failure of internal controls over the stress testing function. Its impact, though,
may not be on an individual transaction, but on the general level of market risk to which the
firm is exposed and may well feed through into significant losses. Is that market risk or
operational risk?
As with so much about operational risk, it is very much up to you and the nature of your firm
and how you wish to allocate losses and manage your risks. What is meant by operational
risk – how far you push the boundaries out or pull them in – is entirely up to you. Your risk
management framework should reflect the ways you work within the firm. In many cases the
answer is straightforward, but not where risk categories overlap, which is where most of the
risk lies.
The downside of allocating risks by risk type at this higher level is that if you try to extract
quantitatively the operational risks which have traditionally been included in credit and
market risk data, you add other risks to the problem – the subjectivity of allocation and the
breaking of a relatively homogeneous time series of data. Even if you decide that you will
keep the boundaries tight – and traditional – you should at least track and record those
incidents where an operational failure has resulted in loss. The real object of the exercise is
operational risk management, not operational risk measurement.
Operational risk is ultimately about failure of controls – or even lack of controls – so that
operational risk management is about establishing and maintaining an effective and
cost-effective control environment across all risks. The fact is that operational risk crosses
boundaries (and steps on toes) and involves everybody at different levels and in different
ways. It gets into the micro-politics, as well as the macro-politics of the firm.
In a very broad sense, the answers to the risks in the right-hand column will be ‘Yes’ and
those under operational risk will be ‘No’. Let’s look at them in turn.
Transaction-based
Operational risk obviously occurs each time a transaction is undertaken, but it doesn’t
depend on transactions for its existence. Before a firm opens its doors and transacts any
business, it is exposed to operational risk in the guise of, for example, fire, theft or flood. The
right-hand column risks are entirely transaction-based.
Assumed proactively
Practically all financial services are about the assumption and management of risk, whether
it is a bank lending money, an insurer underwriting or a dealer trading currencies or bonds.
With other types of business, management of credit and liquidity risk, and of market or
commodity risk, may be an inevitable part of the business, but not the reason the firm is in
business. But as we said earlier, operational risk is essentially unavoidable, whether we like
it or not. There are exceptions, such as where a firm takes on another firm’s processing
under an outsourcing arrangement – for a fee. But generally operational risk is something to
be reduced and controlled, rather than actively taken on and increased.
Rating agencies are taking some steps to assess ‘enterprise-wide’ risk, which is effectively
an assessment of the tone and quality of risk management in a firm. But the gradings are
limited and certainly far from being able to support a trading market, even if investors wanted
one. Credit and market risk, as people have belatedly discovered, are only too readily
tradeable.
Operational risk classification systems invariably identify particular operational loss events or
incidents. But that is not what operational risk management is about. It is about
understanding fully the chain of causality, the simple sequence of:
We can see the linkages of the chain by looking at some recent examples from non-financial
sector events (see Table 1.3). They provide an interesting catalogue, which again also
shows the wide range of operational risk.
Another important element of causal analysis lies in risk interconnectedness. The World
Economic Forum publishes an annual Global Risks Interconnection Map.13 Apart from
showing the connections between different risks, it also highlights the systemic nature of
many risks. If you apply a similar methodology to your own firm’s operational risks, you may
well find that a risk which on its own appears not to be especially significant, is in fact a
major node, so that if it occurs it can cause a range of other risk events and change your
view of the key risks facing your firm and their priority.
The exercise also highlights the simple fact that a risk event can have a number of causes
and can give rise to a number of different effects or outcomes, whilst a single cause can
trigger a number of different risk events. The chain of causality and its risk management is
another important theme in this book.
Table 1.3 The chain of causality and some major operational risk events
Measurement of operational risk has been driven within financial services by the need to
ascribe a capital number to it. The events of the financial crisis show how dangerous it is
when people believe that there is a mathematically precise answer to the risk problem they
have posed – when people place a misguided trust in numbers as a basis, or even a
substitute, for rational decision making. Risk management has been in danger of being
treated as a kind of alchemy – but the philosopher’s stone has not been found, nor will it be.
If that is true of the relatively homogeneous, data-rich environments of credit and market
risk, how much truer is it in the heterogeneous, data-poor environment of operational risk. As
Leibnitz once wrote to his friend Jacob Bernoulli, uncle to Daniel, in 1703, ‘A finite number of
experiments will always be too small a sample for an exact calculation of nature’s
intentions’.14 Nature’s intentions are frequently the subject of operational risk.
Operational risk requires a new kind of management and data collection which moves away
from existing norms of risk management, especially with regard to low-frequency/high-impact
events, which should be its prime concern. Operational risk, and indeed other forms of risk
management, should be encouraging managers to open their eyes and ears to other forms
of data – information is a much better word – than the purely numeric, even as far as gossip
and casual comment. That goes further against the basic laws of probability which demand
independent, objective observations of homogeneous events, a long way away from the
world of operational risk. Having said that, even actuaries will admit to using quantitative
frameworks to structure their ‘guesses’.15 Quantitative analysis undoubtedly has its place,
but the actuaries are applying intelligent risk management, which is what this book is all
about.
If, as we believe in this book, operational risk is effectively business risk, including strategic
and reputation risks, it should be an integral part of business strategy and management, the
board’s primary responsibility. One of the dangers is for operational risk to deal only with
internal process risks or to become merely a reporting rather than a management function.
If you get buy-in you can achieve extraordinary things. But if you don’t get buy-in you won’t
even achieve the ordinary. It’s alright to talk about tone at the top, but I like to think about the
tune in the middle.
It is the response of everybody in the firm which will make operational risk management
effective.
Risk and control assessments and scenario analysis, for instance, will be effective only if
they involve people who are at the sharp end of a firm’s activities, whether they are
customer-facing, part of the support systems or on the board. The more people who are
involved in the assessment process and can see practical results and benefits, the more
buy-in there will be. They also need to see that they are not wasting their time. If we throw
them hundreds of so-called key risk indicators, we are giving indicators a bad name. Which
risks are truly key? What are the best indicators which relate to them? Get it down to a
workable number of key risk indicators which staff can monitor and use. Likewise with
reporting thresholds. We do need to gather information down to a low level, but we have to
balance the costs of comprehensive and voluminous reporting with the benefits, and
concentrate on the information which best tells us what we need to know.
Operational risk events are very often the results of people failures (see Chapter 15, Culture
and people risk). That is why, in Chapter 5, Risk and control assessment, we concentrate on
both the design and performance of controls. The design is all about the system and
process. The performance of a control is usually about people. If all staff are not engaged,
controls will fail and the costs of that can be considerable.
Buy-in comes from communication, especially communicating why we are doing what we do.
Why do we assess both inherent and residual risks? After all, the ‘reds’ amongst the inherent
or gross risks tell us where we’re most likely to have a disaster. They may, but the chances
are that you are doing something about them. So you need to find out and constantly
monitor how effective the controls you have in place are to bring them down to an
acceptable residual or net level. Explaining and communicating why we are doing what we
do in operational risk management means that management becomes clear in its own mind
and that other staff will understand the purpose and benefits. That way, we shall achieve real
buy-in.
In addition, of course, buy-in can extend beyond the firm. If there are critical third-party
dependencies, perhaps agents, sub-contractors or outsourcing suppliers, they need to be
part of the communication network and embrace the firm’s operational risk standards.
There are many numbers in operational risk, losses being the most painful ones. But
operational risk is not about management by numbers. It is about managing people and
circumstances which are constantly changing and where judgements, even when based as
far as possible on hard evidence, are necessarily subjective. That’s one argument for
colours (or words) in operational risk reports, rather than apparently precise numbers.
The other one is that numbers are not as accessible as colours and good operational risk
management happens as a result of good communication. In almost every chapter of the
framework we show reports which owe their accessibility to the fact that they use colours to
tell the story. A picture tells a thousand words. In operational risk, a colour tells a thousand
numbers.
So why model it, then?
The answer to that depends on what you expect a model to do. There is often too little
thought given to why and how models (and reports for that matter) are being constructed,
and how they will be used. In operational risk, a model should be seen as a framework for a
conversation. It might even give you the right question, rather than the correct answer. After
all, for the most part we are trying to model our ignorance.
At the outset of an operational risk management programme, there will be little hard data on
which to model. Even when the programme has been running well for some time, the data is
always going to be incomplete and probably imperfect. So what’s the point of trying to turn it
into something it is not? The answer is that, despite its limitations, modelling can probably
get you in the right ballpark, even if it’s not an exact science. In operational risk, modelling
may not provide the perfect answer, but it can provide a good answer – provided you
understand what you’re getting.
Reporting
The first challenge is to set up a system and a culture in which reporting of events and ‘near
misses’ is what we do, rather than what we try not to do. We will report events, because
everybody in the firm accepts and understands that it is only by comprehensive reporting
that we can understand what is actually happening; understand what major incident may
threaten; and pursue a policy of continuous improvement. If you look at most disasters,
whether financial or non-financial, you will find that they generally owe their origin to human
frailty of one form or another, of which the most dangerous is the failure to learn. The
evidence is all around us, but we choose to ignore it and not to learn the lessons. And
another disaster strikes. Intelligent operational risk management demands that we see and
analyse the evidence and learn from it.
Once the data is gathered, the next challenge is to ensure that reports up and down the
organisation are meaningful and useful; that they highlight the key risks the firm is facing and
that reporting of risks, near misses, indicators and so forth is coordinated. Effective reporting
should also involve causal analysis so that we can understand what really happened and
can work out what to do to control our risks better. All reports, and all the information in
them, should lead to action. If a report is not intended to lead to action, drop it.
And because of the infinite variety of operational risk, there is no universal answer to how to
manage it in every case. Indeed, if operational risk is as broad as business risk, it’s logical to
suggest that there are as many ways of managing operational risk as there are of running a
business. There is no universal list of operational risks which applies to everybody. Nor is
there a universal list of indicators. Risks are emerging all the time, just as they may recede
or disappear as systems, the business or the external environment changes. Even if the list
remains constant, the ranking of each risk will be constantly changing.
So there is no standard manual. And even if you write a manual of operational risk controls,
processes and reporting procedures, it will be constantly evolving. If operational risk is
managed intelligently, it demands constant re-evaluation both of the risks and their controls.
It is not a one-off exercise which can be put away for a year, or even more frequently, until it
comes up again in the diary. It is part of the everyday process of management, for which a
procedures manual is not the answer. It needs to be in the blood.
The framework described in Chapters 3–10 is simple, succinct and straightforward. It covers
the six major processes involved in operational risk management, from which any others can
be derived. It represents a system which can be understood from the boardroom to the
post-room. If there is clarity about what operational risk management entails, there is likely to
be an effective and accepted implementation which can then reap the business benefits
described in Chapter 2.
The operational risk management framework we use in this book is given in Figure 1.2. It sits
within an overall operational risk environment, where each component interacts with the
others to build the whole.
Before we get to the chapters where each element is dealt with in detail, it would be good to
consider them briefly. Governance (Chapter 3) is the first step in operational risk
management. Good governance, through a board approved operational risk policy and
appropriate terms of reference for relevant individuals and committees, will ensure that the
board and all staff have a clear view of the board’s strategy and objectives and of their
responsibilities. Governance will also involve establishing the principles and main elements
of the operational risk management framework.
The other essential to good governance is to ensure that appropriate reports (Chapter 8) are
generated to enable everybody from the board down to understand the operational risks to
which they are exposed at any one time. Reports on risk should be linked to relevant
controls and actions, so that recipients can use them to remedy control failures, review risk
appetite and perhaps remove controls. Good reports mean action. They demonstrate a firm’s
commitment to using operational risk management to enhance the firm’s business decisions
and continuously improve its performance.
The key to good reporting is to tailor it to the needs of the reader – at every level. Neither
governance nor reporting is something which is solely about the board. That is why we use
the term ‘governance’, rather than the board or similar, at the top of the framework.
Operational risk management involves everybody. It is not hierarchical.
Having established the environment, we can now move to the engine room of risk and
control assessment, recording events and near misses and establishing and monitoring key
indicators. Risk and control assessment (Chapter 5) is often the first operational risk
management process carried out by an organisation. Initial assessments will almost always
be subjective, but even then they can be of significant business value if they are linked to the
firm’s strategic objectives. As assessments progress and are linked to events and indicators
they become more objective. However, a continued focus on the business objectives will
help to ensure their relevance, as well as buy-in and use at all levels.
Losses (Chapter 6) often appear to lie at the heart of data-gathering for operational risk.
Losses are of little use unless they are analysed to identify causes. Operational risk is about
management. Understanding the causes of risk means that you can manage the risks
themselves. Merely knowing their number and size is of relatively little value. Finally, within
the engine room, indicators (Chapter 7) are invaluable management tools at every level of
the organisation, provided they are concentrated on key risks and key controls.
If you look closely at Figure 1.2, you will see that each of the boxes headed Indicators, Risk
and control assessment, and Events has, at the bottom, the words ‘Appetite and actions’.
The framework is a framework for management. It is only worth doing if it leads to
management action.
This brings us to scenarios and modelling. Scenarios, of which stress tests are one aspect,
are a practical and accessible way of assessing operational risks which, by their nature, are
at the far end of the scale of both likelihood and impact. As with most operational risk
processes and data, scenarios have to be handled with care (as is shown in Chapter 10).
But because they rely on stories involving the real world of work, they can be a powerful
means of involving staff and of getting buy-in. Stress tests and scenarios are themselves
one aspect of modelling. As we shall see in Chapter 9, all the elements we have discussed
in this section can be used in modelling and add significantly to the business benefits which
can be derived. Good modelling, using risk and control assessments, for instance, can assist
in a cost–benefit analysis of the controls used by a firm and the allocation of resources to
new or improved controls.
But before we go into the detail of the framework, we need to get buy-in. Buy-in comes from
showing that operational risk management really does add business benefit, which is the
subject of the next chapter.
Notes
1 HM Government, A strong Britain in an age of uncertainty – The National Security
Strategy, Cmd 7953, October 2010.
4 Frank Knight, Risk, Uncertainty and Profit (1921; reprinted, Dover Books, 2009).
10 Michael Power, Organized Uncertainty (Oxford: Oxford University Press), 2009, p. 126.
12 Jeremy Grant and Michael Mackenzie, ‘Ghost in the machine’, Financial Times, 18
February 2010.
13 http://www.weforum.org/reports/global-risks-2012-seventh-edition
14 Quoted in Peter L. Bernstein, Against the Gods (New York: John Wiley & Sons), 1998, p.
118.
Business optimisation
Conclusion
understanding the operational risk context of decisions (which is part of governance, see
Chapter 3)
differentiating which risks you are prepared to accept at what level through considering your
risk appetite, see Chapter 4
distinguishing and differentiating your operational risks and how they are controlled (which is
part of risk and control assessment, see Chapter 5)
evaluating and assessing problems in the past (which is part of loss causal analysis, see
Chapter 6)
knowing where you are now (which is part of indicator analysis, see Chapter 7)
knowing where you might be in the future (which is part of scenario analysis, see Chapter
10)
allocating capital on an operational risk basis (which is part of modelling, see Chapter 9)
getting the right information on past events, the present state of the operational risk
environment and its possible future state (which is part of reporting, see Chapter 8).
The alternative, of poor operational risk management, will almost certainly lead to the
business dying – either slowly or suddenly because of a major operational risk event.
Good operational risk management will also help to instil a culture of continuous
improvement and business optimisation. There are a number of links between operational
risk management, business optimisation and Six Sigma and Lean management techniques
which we will explore later in this chapter (and which are also part of the business outcome
from modelling operational risk, see Chapter 9).
Similarly, in the financial services sector, many firms go beyond the regulatory requirements
for the reporting of operational risk within their reports and accounts. The Basel Committee
on Banking Supervision, in its Accord published in 2004,1 aimed to raise standards in
banking, in part through increased transparency of reporting. One of the three pillars of
Basel II was the disclosure of information about the bank’s risk management. However, the
regulatory disclosure requirements for operational risk were minimal compared with those for
credit risk. It is clear that firms perceive a competitive advantage in making it clear to any
reader that they identify, measure, monitor and manage their operational risks thoroughly
and so many go into some detail explaining what they do. Where would you rather deposit
your money: in a firm which is making a concerted effort in its operational risk management,
or a firm which is unable or unwilling to articulate what it does?
International and national accounting rules, and business review rules in the UK, have also
joined the trend by requiring increasing disclosure of risk in the annual report and accounts.
All of these are designed to bring risk management out into the open. But, again, many firms
go beyond the minimum standards and a ‘boilerplate’ approach and see marketing gain from
what was initially viewed as a tedious and oppressive necessity.
Clear operational risk governance is the base for developing an effective and consistent
operational risk management framework. It will clarify:
the operational risk policy of the firm and ensure that the board approved risk appetite is
aligned with its business policy and objectives
risk and control ownership and accountability, thus reducing oversights and duplication of
effort.
Operational risk is a potential threat to the objectives of the firm. Given that the management
of the firm should be driven by its objectives, a better understanding of operational risk will
force clarity in the objectives and help to embed better operational risk management within
the firm.
However, good operational risk management is as much about opportunities as threats. This
means that, for every risk, the opportunities which are implicit in the risk should be explored,
as well as the threats to the firm. Intelligent operational risk management enables a firm to
exploit risk for its benefit, as well as protecting itself from the risks which are not exploitable.
Good operational risk governance, though, is not only about the existing business and risk
environment of the firm. It should mean that discussions about new products, initiatives and
business lines include the operational risks inherent in them. If not, major strategic decisions
will be taken which are not fully informed.
The statement of operational risk appetite through capital, risk or indicator measures forces
an acceptance that operational risk appetite cannot be easily cascaded down from the
board, in contrast to financial risks such as market risk and credit risk. A far clearer
understanding of operational risk by the board results from this type of consideration of
operational risk appetite. This extends to senior management and assists in the acceptance
of accountability for operational risk by the business lines. Regular consideration of a firm’s
operational risk profile against its operational risk appetite embeds good operational risk
management and leads to appropriate mitigating actions being taken, in line with the
operational risk appetite.
An agreed methodology of risk and control assessment, which is applied across the firm, will
also help to bring about a cultural change towards embedding operational risk management
within the firm. This assists both senior management and those responsible for managing
risk on a day-to-day basis within the business line. Clear assessment criteria will also help to
ensure consistent and stable measurement of risk (see Chapter 5).
Risk and control assessments enable you to identify potential risk hotspots and control
bottlenecks quickly. They also allow the firm to model operational risk, without having to wait
for a number of years to gather accurate and complete operational loss data (see Chapter
9). Risk and control assessments are a simple way of getting the benefits of operational risk
management early.
Reliable loss data can be used as a form of back-testing for operational risk exposure, for
instance by identifying data gaps in the risk and control assessments. Risks and their
associated control failures, which are detected in the event analysis, should appear in the
relevant risk and control assessment as high residual risks and as poor controls – unless, of
course, the firm has been going through a period of bad luck!
Comprehensive and consistent capture of events and losses will also aid loss causal
analysis by providing a reliable set of data from which to draw tentative conclusions. It will
highlight any gaps in the data and show potentially high-loss areas. All sources of
operational risk data will be recorded which may show gaps in the risk and control
assessment programme.
Modelling benefits a firm through the use of objective (as well as subjective) data, as the
losses and events are what have actually happened to the firm. Real events also help to
validate the indicators discussed next. However, loss data is based in the past and future
losses are just that: based in the future.
Indicators also allow a firm to measure its exposure against its risk appetite, which can be
set in terms of indicators. This enables financial resources to be targeted on those areas
which will provide the business with the most benefit. Indicators facilitate the setting of
realistic and achievable improvement targets to enhance controls and reduce risk.
By monitoring indicators of key risks, the firm may be able to identify oversights and
duplication of effort. This will be achieved through being able to evaluate the risk and control
environment, monitoring outstanding improvement actions and reviewing the performance of
risk owners.
Scenarios are an excellent means of getting senior management attention; as a result, they
can frequently lead to a reinvigoration of the risk and control assessment process. This is
because scenarios should be performed by the senior management team as a whole, so that
a complete and realistic review of their effects can be obtained. Scenarios also help senior
management to move away from a historic risk management approach, towards a serious
consideration of how the firm may look in the future.
Modelling allows the possibility of reducing a regulatory operational risk capital charge where
this is applicable. A number of modelling approaches are discussed in Chapter 9. The use of
an integrated approach to modelling (combining losses with qualitative data) can assist the
business in forecasting future losses objectively. The scorecard approach allows the firm to
target its resources and controls based on cost–benefit analysis.
Once an operational risk model has been established, operational risk costs can be
incorporated into a pricing model. This is often either ignored or forgotten, leading to a lack
of understanding of the true costs of a transaction or product to a firm and pricing which can
ultimately be ruinous. Many firms in the financial services industry learned this to their
disadvantage during the 2007–8 sub-prime crisis. Although this was seen as a credit risk
event, it was fundamentally fuelled by the operational risk of failing to understand the
relatively complex securitisation products which were used.
Senior management monitoring of operational risk performance will challenge the results of
operational risk management activity and further embed the firm’s approach to operational
risk management. Risk ownership and control ownership can be clarified through good
reporting and assist in identifying priorities for enhancing controls and the firm’s operational
risk profile.
BENEFITS BEYOND THE FRAMEWORK
The benefits of good operational risk management do not just lie in the framework
processes. There are also specific aspects of operational risk management which we deal
with in later chapters: mitigants to operational risk such as business continuity and
insurance; specific risks such as outsourcing risk, people risk and reputation risk.
Business continuity
The benefit of a robust, tested and up-to-date business continuity plan should be
self-evident. Fundamentally, it is about survival. Business continuity, or indeed any
contingency arrangement, is an essential tool of operational risk mitigation and uses the
processes of operational risk in its creation and activation: risk assessment, scenarios and
indicators. Just as with any other part of operational risk management, business continuity
helps you identify your vulnerabilities. As we shall see in Chapter 11, you need to make sure
that you are a survivor. The stakes can be that high in getting business continuity right. And,
of course, if you can get back in business quickly, especially if an event occurs which affects
both you and your competitors, you will have an immediate competitive advantage. Not
having an adequate plan can mean permanent loss of market share or loss of staff and the
difficulty and expense of recruiting replacements.
A good business continuity plan might even mean that you can negotiate a reduction in your
business interruption policy premium, a point which we pick up next.
Insurance
The fundamental benefit of insurance is, of course, risk transfer at an appropriate cost.
Operational risk is the flip-side of commercial insurance since, for the most part, commercial
insurance – property, key man, product liability, public liability, directors’ and officers’
insurance – is there to cover operational risk.
Outsourcing
Outsourcing is another example where good operational risk management is also good
business management. If outsourcing is managed correctly, as we show in Chapter 14, it
has the huge advantage of placing the outsourced activity and its associated risks in the
hands of somebody who can perform them more efficiently than you: a good example, too,
of operational risk management being about opportunities and not just threats.
Outsourcing should enable higher transaction levels, improved speed and quality of
customer service and improved financial controls – another aspect of improved operational
risk management. And, of course, it should reduce costs and improve profitability. But the
primary aim, and most significant benefit, is to make the business and its risk management
more efficient.
People risk
As we explain in Chapter 15, our people are not just a firm’s greatest asset, but can
potentially be its greatest source of operational risk liability. Good people risk management is
a fundamental part of good operational risk management. It encourages an environment in
which risks are reported, so that lessons can be learned – an environment of continuous
improvement. A good people environment will also be one where people are open to change
and are able to respond flexibly and quickly to business opportunities, as well as to threats to
the business. With good operational risk management in place, people can genuinely
become a firm’s greatest asset.
Reputation risk
Reputation risk can seriously damage your health and wealth. Since reputation risk almost
always results from the occurrence of an operational risk event, it follows that good
operational risk management is a vital part of good reputation risk management. If you can
prevent a risk happening, you will have no reputation risk to deal with. And if you are the only
one of your competitors to have avoided the risk, your reputation will inevitably be enhanced.
In Chapter 16 we show some of the many ways in which reputation can be harmed, but we
also explain how operational risk management can reduce the chances of reputation risk
occurring, as well as how to deal with a reputational crisis if it should occur. The costs of
failure and the rewards of success are immeasurable.
BUSINESS OPTIMISATION
Operational risk management is not just about avoiding losses or reducing their effect. It is
also about finding opportunities for business benefit and continuous improvement. As we
mentioned (in the introduction to this chapter), operational risk management can be used as
the groundwork for Six Sigma and Lean management approaches, as shown in Figure 2.1.
The just-in-time method of management relies on properly identifying, measuring, monitoring
and managing supply chain risks which are part of the universe of operational risk.
Additionally, quality circles rely on full and informed operational risk management, as does
total quality management.
Figure 2.1 Interaction of operational risk management and Six Sigma and Lean management
approaches
Source: Courtesy of Chase Cooper Limited
The concepts of process improvement and business optimisation are fundamental parts of
operational risk management and Six Sigma gives a structured approach. The Six Sigma
themes of focus on the customer, of fact-driven proactive management and of unwelcome
variations in a process are wholly compatible with good operational risk management and
many would argue are, indeed, the same themes as pervade operational risk management.
Further, the Six Sigma starting point of process mapping can be very useful to operational
risk management and gives business benefit in its own right.
The equivalent stage in operational risk management is to identify and assess risks and
controls (through a risk and control assessment) and to identify indicators and their
thresholds.
The equivalent operational risk stage is to compare the operational risk appetite with the
current state using the risk and control assessment and the indicator thresholds from Stage
1.
Data is collected to support the root cause analysis and, by using the tools, strong
correlations are sought that point to which cause should be addressed as a priority. Root
causes are regarded as relevant when the testing shows that the variation within the process
(attributed to the proposed root cause) is statistically significant and not the result of natural
variation. Note that only one cause at a time is chosen to be improved, otherwise
improvement results can be confused due to an inability to apportion the improvements to
the relevant root cause.
The equivalent operational risk management stage is event causal analysis, although there
may be very few events relating to the particular process. However, such causal analysis will
help significantly with the Six Sigma root cause analysis.
4. Develop solutions
In order to develop solutions, this stage of the Six Sigma process will utilise workshops to
determine the links to controls and other processes for the identified root causes. Cause and
solution diagrams may also be utilised. This stage also tends to develop further relationships
between causes, controls and processes which themselves may point towards solutions.
The solutions generated are then prioritised for testing.
Action plans resulting from event causal analysis, and from appetite analysis using risk and
control assessments and indicators are the operational risk equivalents of Stage 4.
5. Test solutions
Taking the most promising solution generated in the previous stage, controlled experiments
are run to evaluate the impact of the solution. This stage also begins to determine the
appropriate implementation of the solution, assuming that it delivers the required
improvement/impact.
The modelling of action plans, including modelling of qualitative data, is the operational risk
management equivalent of Stage 5.
The equivalent in operational risk is completing action plans, designing new controls and
indicators and checking to see if the reduction in risk or improvement in controls expected
has, in fact, been achieved.
7. Review learnings
This is the typical debrief of a project, including the following:
From an operational risk perspective, a new risk and control assessment and continuing
monitoring of losses and indicators will lead to further appetite comparisons and renewal of
the cycle.
CONCLUSION
At the business level, a robust and efficient operational risk system will enable managers to
react to events more quickly and with greater effectiveness. At the board level, good
operational risk management reduces the volatility of performance and facilitates efficient
resource and capital allocation.
From an investor point of view, operational risk management encourages and allows an
understanding of where shareholder value is being created or destroyed. A good operational
risk management system, fully embedded in the business, will prevent any blindness to risk
which may affect the profitability of a business line or transaction. Risk and control
perception is improved through distilling a risk culture which leads to business optimisation.
That will be reflected in a firm’s credit rating. And it will also generate a significant regulatory
benefit in an improved relationship with the regulator, wherever that is applicable. A further
benefit is that if you get it right, you avoid paying the lawyers!
Note
1 http://www.bis.org/publ/bcbs128.pdf
Part 2
THE FRAMEWORK
3. Governance
4. Operational risk appetite
5. Risk and control assessment
6. Events and losses
7. Indicators
Governance
Getting it right at the outset
Glossary
Timeline
GETTING IT RIGHT AT THE OUTSET
Good governance is the starting point for good operational risk management (ORM). Given
that risk management (RM) is vitally important to all firms, good operational risk (OR)
governance should be one of the board’s primary aims and responsibilities. It is essential for
the effective embedding of operational risk management into a firm’s everyday activity. It is
not a rigid set of rules, nor is it a box-ticking exercise, but the basis of good business
conduct.
Risk management has also become a focus of investor as well as supervisory attention and
investors are increasingly looking to firms for clear evidence of good governance. As we saw
earlier in Chapter 1, there are numerous corporate governance codes and requirements
around the world which apply to the risk management of any firm, particularly if it is publicly
listed. The point of good corporate governance is to establish a system which ensures
effective accountability on the part of a board to investors and other stakeholders.
Operational risk governance is about the organisational structure of the firm and
accountabilities for operational risk management, including risk ownership. It includes: the
risk culture which the firm displays; the attitude of the board and senior management to risk
and its risk management staff; and may include awareness sessions for both the board and
staff. As was also said in Chapter 1, culture is as much about the tune in the middle as the
tone from the top of the firm, so governance is the responsibility of everybody in the firm, not
just the board. A firm operating good governance will encourage dialogue and challenge on
operational risks up and down the organisation.
The acid test that operational risk is embedded in the firm is how it uses operational risk
management methodologies and techniques in its day-to-day management. This is often
referred to as the ‘use test’. Can the firm demonstrate that operational risks are considered
fully when strategy is being set: when a possible merger is being considered for instance;
when a new product is being mooted; indeed when any business decision is being made?
Operational risk governance, in common with other forms of corporate governance, is about
enabling the board and senior management to guide and direct operational risk strategy and
to review its effectiveness. From a practical perspective, this will encompass:
A framework showing how to identify, measure, monitor and manage operational risks
a policy document approved by the most senior executive body of the firm
terms of reference for relevant bodies, departments and persons
a timeline for tracking and reviewing the development of operational risk processes within
the firm.
Operational risk governance, in common with other forms of corporate governance, is about
enabling the board and senior management to guide and direct operational risk strategy and to
risks
● a policy document approved by the most senior executive body of the firm
The first line of defence, business line management, is responsible for establishing an
appropriate risk and control environment. Establishing and maintaining a strong risk culture,
agreeing the practical application of risk appetite and risk definitions, putting in place
adequate controls and operating the risk management framework are all part of the
day-to-day responsibilities of business line management. Good risk management is
fundamental to business success and should be aligned to business objectives. The risk
management function is not responsible for risk. That is the primary responsibility of the
business, the first line of defence.
Risk oversight
The second line of defence involves those who provide oversight over business processes
and risks, and monitor the proper implementation of risk management policies and the risk
management framework. They provide advice and support to the business lines on risk
management; they challenge the inputs and outputs provided by the business lines in risk
measurement and reporting; and they ensure a consistent application of risk management
policies throughout the firm. Operating against the background of the board’s agreed
strategy and risk appetite, they are management’s assurance mechanism, providing reports
to business line management and to the board. They challenge the risk management
information produced by the business lines, such as key risk and control indicators and risk
and control assessments.
It is often assumed, because risk management is generally a control function and has an
oversight role, that it should be independent from the business to prevent any conflicts of
interest or undue influence on its decisions. Whilst that may be true of control functions, such
as those involved in counterparty credit risk or market risk, it is not invariably true of the
operational risk management function. Operational risk is an integral part of the business. As
we said in Chapter 1, it is effectively business risk. It is therefore impossible to dissociate its
management from the business and establish an organisational structure where it has the
appearance of independence.
The role of the credit or market risk function is to approve and decline risk limits and monitor
risk exposures. There is an inevitable tension between the sales or distribution functions and
the control functions exercised in respect of market and credit risk which means that the
control function should be independent. Credit and market risk limits need independent
monitoring or vital controls will be compromised, although even these functions must not
become isolated either geographically or otherwise from the business so that they cannot
understand the business or access necessary information.
Operational risk thresholds are set by the business, with the assistance of operational risk,
and require an in-depth knowledge of the business, both where it is and where it is going.
Setting and monitoring operational risk thresholds would inevitably be compromised if the
function had to remain in some way independent of the business.
A further example of the difference between the operational risk function and the other risk
functions relates to the ability or indeed authority to decline an exposure. This simply doesn’t
happen with operational risk, where the operational risk function acts more as a specialist
adviser to senior management and the board. Whilst it may advise on the quality of mitigants
and controls, it does not have the ability to prevent the firm from taking additional operational
risk exposure or preventing operational risks from occurring.
Independent assurance
The third line of defence, the audit or assurance process, has two complementary parts –
internal and external audit. These functions and their relationship to operational risk
management are described in detail in Chapter 13, Internal audit. At this point, it is sufficient
to say that internal audit provides independent assurance to the board and senior
management on the quality and effectiveness of internal control, risk management and
governance systems and processes. External audit’s role is to give an opinion on the
financial statements.
Board
All three lines, though, come together at the board. The board is responsible for all aspects
of risk management: the risks undertaken and managed by the business, ensuring that there
is proper oversight of the risks and making sure that financial statements and internal risk
processes are properly audited.
Following the financial crisis, the independent Group of Thirty published a report on
governance in financial institutions which stated that fundamentally the board was
responsible for ‘three factors which ultimately determined the success of the firm: the choice
of strategy; the assessment of risk; and the assurance that the necessary talent is in place,
starting with the CEO, to implement the agreed strategy’.1 Without a clear strategy, there is
no context for risk management. And strategy can be implemented only if the right talents
are available. These are all components of people risk management and embedding a risk
culture, which we develop in more detail in Chapter 15, Culture and people risk.
The framework shown in Figure 3.2 is the one we use in this book and which was introduced
in Chapter 1. It has the merit of simplicity and concentrates on the essential processes of
operational risk management. The various elements work together within the overall
operational risk environment.
Frameworks can take many forms. Framework ‘A’ (Figure 3.3), for example, is in the form of
the familiar ‘temple’ image. Its three pillars are: strategy and governance, identification and
assessment, and monitoring. Within these can be found the elements of the framework
shown in Figure 3.2. Framework ‘A’ shows that a common understanding and embedding of
risk management is the fundamental foundation. In this framework, assurance is shown as
the key-stone and over-arching process, rather than being part of governance.
Framework ‘B’ (Figure 3.4), interestingly, separately identifies governance and structure, and
strategy and policy. It shows the risk management cycle of risk identification, risk
assessment, management and mitigation, monitoring and reporting, but does not identify the
processes which are used to achieve that.
A clear operational risk policy supports the organisation in achieving its business objectives.
Along with the framework, it also allows the board and senior management to communicate
to all staff the approach of the firm to operational risk management. As such, the policy
should be approved by the board. The executive or management committee may develop
the policy document or, at a minimum, review and comment on it, but ultimate responsibility
for approving and implementing it rests with the board.
The contents of an operational risk policy vary from firm to firm and are dependent on the
firm’s culture and the typical structure of its policies. They will also be consistent with the
scale, nature and complexity of the firm.
A definition of operational risk. This was dealt with in Chapter 1, where we considered issues
such as whether strategic and reputation risks should be included and how the ‘boundary’
issue is to be dealt with, where operational risk inevitably overlaps other risk types. One
further consideration is whether operational risk losses involve only ‘direct’ losses, i.e. those
where there is a debit to the P&L, or whether they include ‘indirect’ losses, for example, the
cost of internal staff, opportunity costs or lost profits caused by an operational risk event (see
Chapter 6, Events and losses, What is meant by an event).
A statement of operational risk appetite. This is often a high-level initial statement which will
be broadened and deepened over time as the firm gains knowledge of the operational risk
management processes and how these are used in the firm (See Chapter 4, Operational risk
appetite).
An overview of the operational risk management processes. Although this is necessarily high
level in a policy, it helps significantly in making clear that the board and senior management
are aware of, and have considered how, operational risk management will be carried out by
the firm. It should include a short description of each process, together with the links and
reinforcements between each process, to show a considered, holistic approach to
operational risk management. The various processes will be dealt with in detail in Chapters 5
to 10.
A statement of the roles and responsibilities of various personnel and departments. It is
especially important that the board recognises and actively manages the potential conflicts
of interest which exist between operational risk, internal audit and compliance. This point is
particularly applicable to any firms where operational risk management was initially carried
out by either internal audit or compliance. Clear roles for these three areas must be
documented. In smaller organisations, the three functions often overlap. Extreme care
should be taken, however, even in small firms, to ensure the independence of internal audit
(see Chapter 13, Internal audit).
A glossary of terms. It is vital that all staff have a clear explanation and understanding of the
various terms used in operational risk. Even seemingly innocuous terms such as risk event,
control and loss can give rise to confusion if they are not clearly defined and understood.
In addition, policies will often have references to:
Clarity about roles and responsibilities is a key part of risk governance and of a good risk
culture. It is critical that individuals, committees or other groups understand clearly their role
in operational risk management and that everybody with whom they deal is equally clear.
The best way to achieve that is to agree with them and write down their responsibilities in a
statement. These will include the board, audit committee, executive operational risk
committee, the head of operational risk, the business lines, as well as the internal audit and
compliance functions. Statements will be approved by the board or other appropriate body.
Examples for each of these are given below, but they are only a guide. How statements of
this sort are used will depend not only on the actual responsibilities of individuals within each
firm, but also the way in which such statements are expressed and disseminated within
individual firms.
Board of directors
The board sets the tone and culture of the firm and also the business strategy and
objectives. In addition, it has a vital oversight role. Given this, it is important that its role and
responsibilities in operational risk are clearly articulated and understood. The board should:
Audit committee
The roles and responsibilities of the audit committee in relation to internal and external audit
are considered more fully in Chapter 13, Internal audit. Increasingly, boards are forming
separate risk committees to maintain board level oversight regarding risk management and
reporting. The Walker Review of corporate governance in banks, which was instigated by the
UK government in the aftermath of the financial crisis, recommended that all FTSE 100
banks and other major financial institutions should establish a board risk committee separate
from the audit committee.2 However, where this is not the case, the audit committee should:
keep the firm’s internal controls and operational risk management systems under review
receive reports from management on the effectiveness of operational risk management
systems and of any tests carried out on them
review and approve any statements about operational risk management contained in the
company’s public financial reports.
Executive operational risk committee
The board of a larger firm may have established a risk committee but, failing that, an
executive operational risk committee is the most senior body with direct and explicit
expertise to consider operational risk management in a firm. The executive operational risk
committee is one of the points where lines 1 and 2 of the three lines of defence come
together. It should:
be chaired by the chief risk officer (or the CEO)
include the head of operational risk
include representatives from the business lines
recommend for approval the operational risk strategy and policy
receive reports, highlighting major operational risks and issues
advise the board on operational risk appetite and tolerance for future strategy, taking into
account the board’s overall degree of risk aversion and the current financial situation of the
firm; this may include an assessment of emerging operational risks as the business
environment changes
develop quantitative as well as qualitative metrics for risk assessment
oversee a due diligence appraisal of the operational risks of any proposed strategic
transaction, particularly one involving acquisition or disposal – even if operational risk
management is or has been part of the project team
produce a separate annual report on its work, focusing on the governance of risk, the
relevance of the committee’s work to current and future risk strategy and recognising that
there may be a potential overlap with reporting by the audit committee
recognise that taking external advice is consistent with the board’s duty of care, where
sufficient skill or knowledge is lacking in a technical area of operational risk.
The role of the head of operational risk (or the chief risk officer if the firm is too small to have
a separate head of operational risk) is to:
establish, implement and maintain a framework for identifying, assessing and managing
operational risks
set and agree firm-wide operational risk priorities
act as the operational risk adviser to the firm, and in particular guide senior management in
their operational risk management responsibilities
establish a process for embedding operational risk awareness
bring an operational risk focused viewpoint to strategic planning and other activities of senior
management
facilitate the implementation of the operational risk processes, providing coaching and
guidance to business line management
manage the process for setting the operational risk appetite
monitor and manage the firm’s overall exposure to operational risk, including working with
the business line and other functions to mitigate operational risk
ensure a consistent approach to operational risk across the lines of business
coordinate appropriate and timely reporting of operational risks
coordinate operational risk input to the risk committee and the board on the firm’s risk profile,
control infrastructure and any control failings or weaknesses and actions taken
coordinate input to the regulators on relevant operational risk matters;
liaise with the internal audit department.
Business lines
The ‘three lines of defence’ model explicitly recognises the primary role of the business line
in managing risk in a firm. Business lines are responsible for the risks they generate. As part
of their responsibilities for line operational risk management they should:
develop operational risk awareness and an operational risk culture within the business line
own the risks which they generate and their controls
own the operational risk profile and operational risk appetite of the business line
identify and assess the relevant business line risks and their mitigating controls in line with
policy
monitor, manage and review their risks
manage and report incidents, events, losses and near misses in line with policy and
guidelines
keep risk exposures within limits and follow policies when limits are breached, including
escalation as appropriate
support the risk management organisation in recognising and assessing risk, including:
fully disclosing known risks
being aware of the market environment and its influence on risk
recognising and disclosing when conditions or assumptions change
accurately represent risk exposures in management information, risk management and other
systems
obtain approval, including from the operational risk function, of new products.
Internal audit
Although Chapter 13 deals extensively with the internal audit function, it is worth
commenting, in a chapter on governance, on the confusion there often is between the
internal audit function and the operational risk management function. There should not be
any confusion if it is clearly recognised that the operational risk function has an oversight
role (line 2 of the three lines of defence in Figure 3.1), whilst internal audit is part of the
independent assurance process, line 3.
The confusion probably arose from the fact that operational risk started life within internal
audit on the basis that it was the only function which understood all the firm’s internal
processes. Operational risk managers should be involved in establishing processes, with the
business line, which cover all aspects of operational risk and providing reports to the board
and senior management. It is internal audit’s responsibility to review those processes
regularly, to assess their effectiveness and to report on the review to the board. Internal audit
provides assurance to the board that operational risk is effectively managed.
Of course, there will be liaison between the two functions, but internal audit should not be
involved in establishing processes or, for instance, producing scenario assessments. It is
there to provide assurance and can hardly give assurance on something on which it has
been a party to creating.
Compliance function
There is also often confusion between the roles and responsibilities of the compliance
function and those of the operational risk management function, although in this case both
are part of the line 2 oversight function (see Figure 3.1). Whilst the compliance function
primarily focuses on regulatory requirements, whatever the industry, these are a sub-set of
the overall focus for the operational risk management function, which has a broader and
more business oriented portfolio. In respect of operational risk management, the compliance
function will:
liaise with the operational risk department on regulatory approaches which relate to
operational risk issues
be involved with all communication and responses to appropriate regulators
manage operational risk compliance obligations, such as those associated with health and
safety regulations or financial services regulatory requirements
manage operational risk events which are primarily compliance focused.
GLOSSARY
The importance of all staff having a clear understanding of operational risk terms has already
been highlighted. One way of ensuring that everybody is speaking the same language is to
provide a glossary of terms in the operational risk policy document. Examples of terms and
definitions which might be included are as follows.
Terminology
TIMELINE
The final part of governance is to implement the operational risk framework. The timeline
sets out the project timetable which incorporates the six main operational risk processes and
also important items such as staffing.
The chart (see Figure 3.6 for an example) will also enable the efficient management and
review of the development of operational risk management. Senior management and the
board will find that they can more easily understand the implications of changing the speed
of the development of operational risk.
If the governance is right, then almost certainly operational risk management will be right.
With proper operational risk governance in place, there will be commitment from the top,
acceptance through the middle, and policies in place to establish the operational risk
framework, which is what we shall cover in the next few chapters.
Figure 3.6 Example timeline for implementing an operational risk management programme
Source: Courtesy of Chase Cooper Limited
Notes
1 Group of Thirty, Toward effective corporate governance of financial institutions, 2012;
www.group30.org
RISK APPETITE
Defining operational risk appetite
A typical definition of risk appetite is as follows:
Definition
Risk appetite
The amount and type of risk that an organisation is willing to take to achieve its strategic
objectives [over a specified time horizon at a given level of confidence].
The clause in square brackets gives more precision and is often included in definitions of risk
appetite by more sophisticated firms which are further down the road of risk modelling (see
Chapter 9, Modelling, for further discussion). Clearly this broad definition is as applicable to
operational risk as it is to other types of risk.
Trying to write a similar definition for operational risk appetite is more difficult. One approach
is to look at individual loss categories and to write statements covering these.
Definition
Operational risk appetite
Financial crime: The firm has no appetite for financial crime and will implement appropriate
measures to control it.
Or
Reputational losses: The firm has no appetite for adverse media coverage and will use every
effort to ensure that events that could potentially lead to such events are avoided.
Or
Regulatory risk: The Group has zero risk appetite for regulatory breaches or systemic unfair
outcomes for customers. To achieve this, the Group encourages and maintains an
appropriately balanced regulatory compliance culture and promotes policies and procedures
to enable businesses and their staff to operate in accordance with the laws, regulations and
voluntary codes which impact on the Group and its activities. (Lloyds Banking Group plc
Report and Accounts 2011.)
Another might attempt to quantify its operational risk appetite as follows:
To manage the firm’s operations to ensure that unmitigated losses are no more than x% of
profit before tax in any three-year rolling period.
Or
We do not wish to see an operational loss of more than £xxx at the 90th centile.
Or
The firm has no appetite for individual operational risk losses above £x and cumulative
losses of £y within a 12-month period. Any individual operational risk losses exceeding £z
are to be reported to the Audit and Operational Risk Committee.
All of these definitions acknowledge, as we saw in Chapter 1, that the traditional view of risk
appetite – that it should be a hard number and that it should be limit based – is not
appropriate for operational risk. Many operational risks are unavoidable and, even if an
appetite for loss is agreed, it will be exceeded, despite the controls and other mitigants which
are in place.
The intelligent view of operational risk appetite recognises that, whilst there are different
ways of mitigating operational risk, thresholds and targets are more relevant to operational
risk appetite than hard limits. Appetite can also be expressed using the various processes in
the operational risk framework. We shall see how that can be achieved later in this chapter.
Determining the operational risk appetite of a firm is an important component of any firm’s
operational risk management approach. Used effectively, operational risk appetite will
influence the operational risk culture (and vice versa), operational risk operating style and
operational risk resource allocation. Operational risk appetite, in common with other risk
appetites, represents the firm’s view of how much risk can be taken to help achieve business
objectives, whilst respecting the constraints within which the firm operates.
Whilst senior management, of course, plays a fundamental role in determining the
operational risk appetite of the firm, it should be approved by the board. This sends a clear
signal to all staff that the operational risk appetite agreed by the board should clearly govern
the activities of all employees. It also defines the boundaries within which the firm’s business
objectives should be pursued. From an operational risk perspective, this is fundamental, as
operational risk identification and assessment is undertaken in relation to the firm’s business
objectives.
The operational risk appetite of the firm is also important in managing shareholder
expectations regarding the amount and type of risk which is accepted. Whilst the appetite of
the firm for market risk and credit risk is relatively easy to articulate and quantify, operational
risk appetite will include elements which cannot be measured quantitatively, including some
risks for which there may be no appetite whatsoever, such as employee deaths or injuries
due to poor health and safety procedures.
Some firms seek to differentiate between operational risk appetite and operational risk
tolerance. This is often explained by reference to the example of theft of the firm’s assets.
Although there is no appetite for theft in any organisation, many senior managers expect that
some level of theft of assets will inevitably occur (if only of pens and paper clips). This level
is tolerated even though there is no appetite for allowing theft itself.
An example where there are different levels of appetite and tolerance in differing industries is
the risk of ‘death or injury whilst working for the firm’. In the financial services industry, as
with all others, there is a zero appetite for this risk. Financial services employees, though,
are not exposed to the risk of death or serious injury in their normal work, other than as
targets for armed raids, so that the outcome is likely to be in line with risk appetite.
The construction industry also has a zero appetite. But it is more likely, in a high-hazard
industry, that deaths or injuries will occur. Having said that, and possibly as a result of
pressure from customers, employees and the public, construction has put a lot of effort into
improving safety over recent years and has significantly reduced the number of deaths.
According to the UK Health and Safety Executive, fatalities have fallen from 5.9 per 100,000
workers in 2000/01 to 2.4 per 100,000 in 2010/11. Major accidents have also fallen
significantly over the same period.1
In 2008, one of Britain’s major construction companies, Balfour Beatty, decided to take the
process a stage further and introduced the ‘Zero Harm’ project on its construction sites and
throughout the company worldwide. Its stated aim was that, from 2012 onwards, there would
be:
• zero deaths
• zero injuries to the public
• zero ruined lives amongst our people.
Balfour Beatty has estimated that approximately half a million people are working on their
sites during a 12-month period, the vast majority of them sub-contractors, and that figure
excludes the public on and near their sites, for whom they also accept responsibility. The
project has an ambitiously low-risk appetite but, as with all the best operational risk
management strategies, it is founded on good communication. The ‘Zero Harm by 2012’
project slogan and logo (see Figure 4.1) – ‘Zero Harm by 2012’ alongside a large zero in a
striking shade of orange – were simple and powerful, and quickly and clearly convey to
employees and sub-contractors the company’s risk appetite.
Figure 4.1 Balfour Beatty ‘Zero Harm by 2012’® logo2
Balfour Beatty sees eradicating serious accidents as a competitive virtue and has
differentiated them from competitors when tendering for contracts. The common vision is
shared by the group’s leadership; is constantly communicated at every level, including to
sub-contractors who must sign up to it; best practice is freely shared and peer pressure
keeps everybody driving towards the target: the benefits of operational risk management in
action.
A further example of zero appetite comes from the retail sector where theft of goods is
euphemistically referred to as ‘shrinkage’. Most firms will set a level of shrinkage that is
tolerated by senior management. However, the appetite of the sector can be determined
from notices posted around shops which clearly state ‘Shoplifters will be prosecuted’.
Whose appetite is it anyway?
Another complicating factor for operational risk appetite is the question: ‘Whose appetite is it
anyway?’ There are many groups and individuals who have separate appetites relating to a
particular firm and industry. Typical external groups will include customers, suppliers,
investors, regulators and business partners. All of these will have varying levels of appetite,
which may be very different. Appetite also ties in closely to reputation (see Chapter 16
Reputation risk, for further discussion). There are natural tensions between the board, senior
management and the shareholders which lead to at least three levels of appetite for any firm:
• Senior management’s operational risk appetite is likely to be relatively short term and
focused on business opportunities which generate an appetite that is inevitably bullish in
nature, i.e. thresholds/targets are likely to be significant in size. An example could be a
merger, which will often lead to acceptance of a considerable increase in operational risk to
reflect the period of significant change that will be involved. An intelligent senior
management will also increase its relevant operational risk thresholds.
• The board’s risk appetite is likely to be longer term in nature and lower than senior
management’s. Continuing the merger example, the board will state an operational risk
threshold, perhaps in terms of the capital it is willing to risk. This may well be exceeded by
senior management, even though it is attempting to manage to the board’s operational risk
policy threshold. The issue will then be resolved, depending on the firm’s culture and
processes of communication and reporting between senior management and the board.
• The shareholders’ risk appetite is likely to be the lowest of the three and will probably be
focused on the smallest possible volatility in earnings consistent with a reasonable return.
However, amongst the family of investors, bondholders may have a very different view of
appetite to shareholders.
It is important for the board periodically to review and challenge the risk appetite which has
been proposed by senior management. Following the review or challenge the board should
reconfirm its appetite, with appropriate changes where necessary. During the challenge
period, the board should assure itself that senior management has considered all
foreseeable emerging operational risks to which the firm may be subject and that appropriate
processes and resources are being utilised to manage them.
Within the firm there will also be different approaches to operational risk appetite at each
level, so that we need to ask the question: ‘At which level within the firm are we considering
our operational risk appetite?’ In any firm there are at least four levels which have different
approaches to operational risk appetite:
• the board, who will frequently seek a risk appetite in terms of capital (either economic or
regulatory) and profit
• senior management, who will tend to define operational risk appetite in terms of risk and
the action taken to manage and mitigate each risk
• business units, which may well use the classic approach to operational risk management
of defining their operational risk appetite through risk and control assessments, key risk
indicators (KRIs) and loss data
• business support functions, which mostly focus on KRIs and loss data.
This is shown diagrammatically in Figure 4.2.
Figure 4.2 Appropriate levels of risk appetite
It is natural to wonder whether the risk appetites at the different levels of the firm can be
aggregated. After all, credit risk appetites can certainly be aggregated up the firm and
broken down throughout the firm from the board level. However, as noted above, the
different levels in a firm see operational risk appetite fundamentally differently. This means
that easy arithmetical aggregation is not possible for operational risk appetite. It is only when
the operational risk appetite can be turned into a figure (preferably a monetary value) that
the arithmetic works. In operational risk, this is not possible unless the firm models its
qualitative data (see Chapter 9, Modelling, for further discussion).
One of the challenges which the board should give to senior management is proper
consideration of reputational loss. Whilst some firms consider reputational loss as part of the
overall impact of a risk event, others consider reputational loss as a separate impact, often
using the same scale as is used for risk impact scoring. If this is done, the reputational loss
may be greater than, or less than, the impact to the firm from the direct loss from an event.
Combining the two assessments will give a total risk loss. However, if the two assessments
are kept separate, it is possible that there will be double-counting of some elements.
Before looking at different ways of expressing operational risk appetite there is one other
point which needs to be considered: which type of operational risk appetite is the firm
considering – expected or unexpected operational risk appetite? The expected operational
risk appetite reflects the amount of loss to which the firm is subject, assuming that its
controls are operating normally. This is effectively ‘business as usual (BAU)’ and is a
relatively easy level of loss to identify and measure, as it is the amount of loss which the firm
suffers on a regular day-to-day basis. It is usually provided for in the budget or in special
provisions. This expected operational risk appetite can, of course, be back-tested by
comparing it with actual attritional losses.
From a strategic perspective, it is more helpful to consider the unexpected loss that a firm
may suffer. This is the loss to which the firm is subject when controls fail. It is a much larger
figure than the expected loss, as it is usually at a lower frequency and higher severity. It is,
therefore, more difficult to identify and calculate. Scenario analysis can be helpful when
considering operational risk appetite at an unexpected loss level (see Chapter 10, Stress
tests and scenarios). If mathematical models are used in the calculation of unexpected
losses, the process will almost certainly be less accessible to most senior management,
unless they are given statistical training. Unexpected loss is effectively what a firm’s capital
and profits are there to absorb.
Many commentaries on risk appetite state that it should be firmly grounded in the firm’s
financial reporting. From the perspective of operational risk appetite this is often easier said
than done. However, there are a number of ways in which the various components of the
operational risk management process can be used to define and manage operational risk
appetite.
Absolute figures
At an individual risk level, the main link to the firm’s financials is through the amount of loss
that the firm is willing to accept in relation to that particular risk. One practical way of
expressing the firm’s operational risk appetite is therefore through the monetary loss which
the firm is willing to accept for each risk to the strategic objectives.
Figure 4.3 shows how a firm may deduce its risk appetite by considering its actual losses
against a loss distribution, with the capital determined at a specific confidence level. This can
be done at an overall firm-wide loss level or at a loss category level, where sufficient data
exists to generate a reliable distribution and its analysis.
The board may decide that its acceptable risk tolerance lies at the mean of the losses
incurred over a given period of time for a particular risk. It can then decide at what point on
the curve it should identify thresholds, including for the level of loss it considers
unacceptable. Once this is established, risk assessment can be matched to a scale of
monetary values as a basis for risk appetite.
As a starting point, low, and following the board’s overall risk policy, acceptable, warning and
unacceptable levels of annual loss are separately identified for the firm as a whole, probably
at risk committee or board level. But wherever they are agreed, it is important that the
decisions are made independently of the figures which emerge from the risk and control
assessment itself. These loss thresholds are shown at the top of Figure 4.4 and form the
basis for the identification of risk appetite by risk.
From the format used in Figure 4.5 it is possible to see immediately which risks in the risk
assessment are outside the agreed appetite. At the bottom left-hand corner, the values
should be easily ignored as they are so small. If any risks are in the top right-hand corner,
immediate action should be taken as these are considerably beyond acceptable levels.
Using risk and control assessments
Another method of setting and managing operational risk appetite, as will be seen in Chapter
5, Risk and control assessment, is to use risk assessment scores which are linked with the
quality of the mitigating controls and displayed graphically, as in Figure 4.6.
This graphical representation of risk and control assessment (RCA) scores is constructed
through multiplying the likelihood and impact scores for a risk and multiplying the relevant
control design and control performance scores. This allows a comparison of the relative
levels of different risks and their mitigating controls and enables an implied current risk
appetite to be derived.
Figure 4.6 Risk appetite using risk and control assessment scores
For example, from Figure 4.6, it appears that the risk ‘Operational threats to IT’ is relatively
small at a gross level and is very well controlled. This implies that the firm has a very low
appetite for this risk as it has a high mitigation level. If this is not the case, the firm can afford
to reduce its controls and free up resources which can be applied elsewhere.
The risk ‘IT dependency on people’ has been assessed as quite high although the controls
have been assessed as relatively poor. The implication here is that the firm has a high
appetite for this risk. If this is not the case, the firm should put in place action plans to
enhance its controls. These may be drawn from the freed up resources in the paragraph
above.
Approaching operational risk appetite in this way means that the firm can adjust its resource
application to be more consistent and better fit its actual appetite, whilst keeping its resource
spend at a minimum level.
The final and ultimate use of risk and control assessments for expressing operational risk
appetite is to model the RCA data (see Chapter 9, Modelling). The output of such modelling
is a monetary loss amount which provides the necessary value expression to link with the
board’s articulation of its appetite in the form of a capital figure (see Figure 4.2 above).
Using indicators
An alternative method for setting risk appetite is through key risk indicators (KRIs). This
enables one or more appetites to be set for the same risk depending on the number of
indicators identified for that risk. As noted in Chapter 7, Indicators, KRI thresholds explicitly
identify a firm’s risk appetite. Figure 4.7 shows a green band for the indicator of down to 3
and up to 7. Clearly therefore if the indicator reaches 3 or 7 the appetite for this indicator has
been breached. Equally if the indicator reaches 1 or 8 there is a significant breach of
appetite resulting in the indicator being in the red band.
As a practical example, consider the bands for the risk ‘Loss of IT system’ and the indicator
‘Number of help desk queries’ in Figure 4.8. The boundaries of the firm’s appetite around the
indicator of ‘Number of help desk queries’ are very clear (and by implication the
management of the risk of loss of the IT system is much clearer than it might otherwise be).
The usual number of queries expected is between 7 and 15 per day. If ‘Number of help desk
queries’ is over 25 per day this is a clear signal that the systems are failing the business and
that there is a very high likelihood of a loss of the entire system. In this event, there is clearly
a senior management problem that requires immediate attention. If ‘Number of help desk
queries’ ever reached those levels it would be likely to be referred to the board as loss of IT
system is a typical strategic risk. If ‘Number of help desk queries’ is 2 or fewer, the firm
should question whether or not there may be a problem with apathy in the firm towards the
help desk (due to the number of unanswered help desk queries, for example) which may
indicate probable likely failure of the IT system too.
Figure 4.7 Risk appetite using KRI thresholds
Figure 4.8 Risk appetite using KRI thresholds for ‘Number of help desk queries’
Comment has already been made on the size of loss attributable to an operational risk being
one way to express the appetite for that risk. However, an even simpler measure relating to
losses is the number of losses. This is a straightforward count of the number of losses
relating either to a particular risk or to a category or sub-category of risks.
In Figure 4.9 it can be seen that, by business line, there is a range of between 10 and 79 for
the number of losses captured relating to external fraud. It may be that the firm has different
appetites for different business lines. For example, external fraud may be more likely in retail
parts of the firm, although the impact is likely to be smaller than in the corporate and
wholesale parts such as Trading & Sales or Corporate Finance. However, a simple count
across the firm can be used for an appetite for external fraud and this may be said to be no
more than 20 losses in the period. If this is the case, four out of the eight business lines have
exceeded the firm’s appetite for external fraud. This may result in an action plan to
investigate the relevant controls in the four delinquent business lines, perhaps carried out by
internal audit.
Operational risk appetite, in common with other risk appetites, can also be expressed in
terms of the regulatory capital required to support a business line and with reference to
particular loss event types. Figure 4.10 gives an example of this and shows the capital
required to support the risks allocated to each cell. It can be seen that column 4, Clients,
Products and Business, is a significant consumer of capital and that Retail Banking and
Trading & Sales have probably exceeded the firm’s risk appetite for this loss event type.
Additionally, the Payments & Settlement line of business has suffered a massive internal
fraud which has also undoubtedly exceeded the firm’s risk appetite for this loss event type.
CONTROL APPETITE
Some people may think that risk appetite includes controls. However, control appetite is
fundamentally different. As an example, consider the risk ‘Loss of key staff’ and two of its
controls ‘Performance appraisal’ and ‘Salary surveys’. The risk appetite for ‘Loss of key staff’
may be the loss of one key person every three years. This is achieved by a control appetite
for performance appraisal that the appraisals are completed every 12 months, and a control
appetite for salary surveys that all salaries are within the second quartile. It is therefore clear
that risk appetite is linked with control appetite, but that control appetite is completely
separate. This is analogous to the link between KRIs and key control indicators (KCIs) (see
above Using indicators and Chapter 7, Indicators).
Definition
Control appetite
The amount a firm is willing to spend (in time, money and/or resources) to mitigate a risk(s)
to an acceptable residual level.
It should be noted that this definition focuses control appetite internally to the firm. This is in
contrast to the definition of risk appetite which can be as much affected by external factors
as by internal factors. The definition explicitly recognises that management has a finite
willingness to mitigate risks and implicitly recognises that certain risks cannot be mitigated or
mitigated further. This is very helpful from a practical perspective as it allows management to
focus on controls that can be improved.
The definition above, of course, only covers the business-as-usual control appetite. There
are also control appetites at an unexpected level of loss and at an extreme (scenario) level
of loss. However, we shall consider the practical business-as-usual level in this chapter.
Describing control appetite
Control appetite can be described in simple terms and it can be modelled. Just like risk
appetite, control appetite can be described through the tools that are used in operational risk
management. For example, control appetite can be expressed as:
• an acceptable level of control assessment (within a risk and control assessment)
• a reduction in the assessed risk level from gross (inherent) to net (residual) risk
• targets and threshold of KCIs
• reductions in the number and/or value of events and losses
• the monetary benefit that the control makes to the reduction in the risk profile (this can
use mathematical modelling of the risks and controls in order to determine a value)
• the money spent on risk profile reduction.
As noted above, control appetite can be analysed in different ways. Consequently, the
interpretation of control appetite may vary at different levels of the firm, and this is illustrated
in Figure 4.11.
Control appetite also links to internal audit work and to Lean/Six Sigma. As we shall see in
Chapter 13, Internal audit is a fundamental part of the operational risk management
framework. Internal audit tends to focus on the effectiveness of controls within the firm and
its work is therefore valuable in determining what the control appetite of the firm is in reality
(as opposed to what the firm says it has as a control appetite). It is often true that controls in
an area will be improved following an internal audit as senior management may not have
been aware of the poor functioning of certain controls. However, it is also true that (unless
action plans are in place and being actioned) the current state of the firm’s control profile is
an accurate reflection of its actual control appetite (notwithstanding what it may say to the
contrary).
Both Lean and Six Sigma are concerned with the effective and efficient operation of controls.
It may be argued that some Lean practitioners are more concerned with the elimination of
unnecessary controls, whilst some Six Sigma practitioners are more concerned with the
improvement of existing controls. However, both methodologies rely on control analysis and
this is the link to control appetite. From an operational risk perspective, the design of a
control is particularly susceptible to Six Sigma analysis as it is often about the processes or
systems around the control. And without a good design, it is very difficult to have a
defensible low control appetite.
Control appetite is also very useful in eliminating confusion inherent in the current
approaches to risk appetite. There are at least three types of risk appetite:
• residual risk appetite
• inherent risk appetite
• stressed risk appetite, which is not applicable to the following discussion.
Taking residual risk appetite first, it is a function of the amount a firm is willing to risk when
controls are working. Put into an equation this becomes:
Residual risk appetite = f [amount willing to risk when controls are working]
Breaking down the right-hand side gives us:
= f {[residual likelihood value], [residual impact value], [control appetite]}
as the amount must be a function of the likelihood of the risk occurring, the impact of the risk
when it does occur, and the quality of the controls mitigating the risk.
Equally, inherent risk appetite gives:
Inherent risk appetite = f [amount willing to risk when controls have failed]
= f {[inherent likelihood value], [inherent impact value], [control appetite]}
Control appetite is of course simply:
Control appetite = f [amount willing to spend (in money, time and/or resources) to mitigate a
risk(s)]
Breaking down control appetite into its components
Control appetite itself splits into two main parts: causes appetite, which concerns
preventative control appetite, and effects appetite, which concerns corrective control appetite
(drawing on the four internal audit control types of directive, preventative, detective and
corrective; see also Chapter 5, Risk and control assessment).
Causes appetite is linked to management’s view of the likelihood of the risk and also splits
into two. Preventative controls are often automatic controls. They also often have a
significant cost (often IT costs primarily) and occupy a significant amount of management
thought and time. They are the immediate, obvious and visible side of the control
environment. Thus management’s risk appetite is actually often focused on its appetite for
the causes of risks. The other part of causes appetite is directive control appetite which is
linked to management’s willingness to implement governance, as directive controls consist
of policies, procedures, committees and the power of the board.
Corrective control appetite is linked to management’s willingness to correct for the effects of
the impact on the business. Corrective controls are often relatively cheap and unused (until
an event happens). They are also therefore often under-rated, do not figure largely in
management’s thinking and are under-tested. When they are required, it is almost always
too late to implement and test them. For this reason, prudent management should consider
carefully its effects appetite, alongside its causes appetite.
To conclude the appetite analysis of the four types of control, detective control appetite is
linked to management’s willingness to identify events once they have happened. However,
the focus for action is of course on correction and this is often considered more necessary
than detecting the event. In reality therefore there is often only tacit acceptance of the need
for detective controls, despite the obvious necessity of needing to detect an event before you
can correct for its effects. This leads to a very low level of appetite for spending money on
standard detective controls such as reconciliations.
Summary
The objective of a risk and control assessment is to identify, measure and monitor the risks
and controls to which a firm is subject.
The risk and control assessment can be qualitative, quantitative or both. A qualitative risk
and control assessment will be based on value judgements such as high, medium-high,
medium-low and low. In contrast, a quantitative risk and control assessment will assess the
risks identified through actual numbers, such as percentages for likelihood and monetary
values for impact.
Business objectives/processes/activities
A risk and control assessment aims to capture the risks and controls of a firm at the
appropriate level. The level required may be strategic, process or activity, as shown in Figure
5.1. A strategic risk and control assessment will derive its risks and controls from the
business objectives of the firm and what will prevent the firm from meeting its business
objectives. Similarly, the risk and control assessment carried out at the process level will
have regard to processes which a firm undertakes and the objectives of those processes.
These may be high-level processes, i.e. those carried out at the business unit level, or may
be lower-level processes carried out at a departmental level. Processes will ultimately break
down into many activities. The risk and control assessment carried out at an activity level will
therefore produce a significant number of risks and controls.
Benefits to firms
There are many benefits to firms in carrying out risk and control assessments. These range
from a clearer understanding of the operational risks which the business faces, through
identifying risks which have insufficient controls, to setting action plans to enhance existing
controls and implement new controls. A clear understanding of risks will also point to
opportunities for profitable risk-taking and business optimisation (see Chapter 2, The
business case for operational risk management).
In detail the benefits include:
• a comprehensive understanding of the business’s operational risk profile
• more accurate information regarding the level of risk to the business
• identification of potential risk hotspots and control bottlenecks
• a defined structure to risks and controls, which provides an effective and consistent
treatment of risks across the firm and consistent risk reporting
• managing risks and mitigation as a ‘portfolio’ to help the business make a clear link
between risk and performance
• increased acceptance of a risk culture in the business by assisting those who are
responsible for managing risk on a day-to-day basis
• embedding risk management processes into the core processes of the business
• communicating the firm’s view of its risks and controls to existing staff and new recruits
• enabling risks associated with cross-functional processes to be managed more
effectively
• a better response to issues within the business, as the risks are more clearly understood
• further assurance to the board that the statements in the annual report are accurate
• improved business continuity planning
• documentation of risks and controls for use by external stakeholders such as regulators.
PREREQUISITES
An operational risk framework is an essential prerequisite for the effective and efficient
conduct of a risk and control assessment. A framework provides a clear understanding of the
structure and process around the identification of risks and controls and how the risk and
control assessment fits into the overall management of operational risks (see Figure 5.2).
As discussed in Chapter 3, the operational risk policy, approved by the board, will state at a
high level how operational risk is to be managed. This will include a vision, guiding
principles, high-level procedures, strategy and reporting lines. The policy is also likely to give
the governance structure within which operational risk is managed, including ultimate and
intermediate responsibilities, information flows (both up and down the firm) and how
operational risk is used within the firm.
It is important that there is clear commitment from the highest level of the firm before
beginning the risk and control assessment. The board should approve the operational risk
policy and a full member of the board should have responsibility for the management of risk.
Without such sponsorship, a risk and control assessment will not be taken seriously and it is
very unlikely that the risks and controls which the firm faces will be fully identified and
monitored.
Business objectives
Risk and control assessments should start at a strategic level. It is therefore necessary to
have a list of the business’s strategic objectives so that the assessment can be carried out in
relation to the principal aims of the firm. Without the business objectives to provide a focus,
the risk and control assessment will lack an appropriate level in which to place its risks. The
result will be a mixture of high-level, process and activity risks, which will give very little
business benefit, due to the heterogeneous nature of the risks (and therefore the controls)
and the lack of any clear connection with the business objectives relevant to each level.
These are not necessary, but if the firm is starting its risk and control assessment at a
process level, it is useful that the processes are mapped so that all the processes are
captured and the risk points can be seen. This is especially important if the process risk
analysis is being carried out at a detailed level or at an activity level. The maps will help to
identify where controls may be weak and therefore assist in control analysis. This can also
be the start of process improvement, particularly through Six Sigma and Lean analyses.
However, whilst it is possible to start risk and control assessments at a process or activity
level, it is not recommended as it is very difficult to show quick business wins. Much better is
to start at the top at the business strategy level.
BASIC COMPONENTS
Risk events
A risk event is an unchanging and distinct occurrence which may impact the firm’s profit and
loss account or its balance sheet. An event can have its origin in a number of causes or
triggers, which may vary through time (Figure 5.3). An event may also generate different
consequences or effects, which may also vary over time. However, the event itself is
immutable. A risk event is evaluated in terms of the likelihood and the impact of a risk.
A risk owner has direct and explicit responsibility for the management of the risk event. This
will ultimately be a board member, but ownership will be delegated down to an appropriate
level and individual. Given that operational risk involves everybody in the firm, it could be
said that everybody is a ‘risk owner’. The identification of a specific risk owner ensures
transparency and clarity over the management of a risk. It also enables the firm to judge its
concentration exposure in terms of management responsibility for risks, as risk owners
generally own several risks. The firm should try hard therefore to identify a single owner for
each risk. However, for certain risks, composite owners are unavoidable. These will include
a number of strategic risks, which the board will own as a whole.
Control
A control is the element within a process which has been developed to facilitate action to
reduce or eliminate either the likelihood or impact of a risk event. A control is evaluated in
terms of its design and performance.
Control owner
Action plans
Action plans are created in response to a control that does not reduce the risk to within the
firm’s tolerance for that risk. They modify or add to existing controls so that the risk is within
the agreed appetite.
AVOIDING COMMON RISK IDENTIFICATION TRAPS
The first task when undertaking a risk and control assessment is to identify the risks which
are to be assessed. That sounds simple enough, but there are a number of traps into which
it is easy to fall.
Risk register
A risk register lists all the risks identified by a firm by risk category and may also be known
as a risk inventory, a risk library or a risk list. Whilst it is useful to have a full list of risks
identified by the firm, it can be constraining in a risk and control assessment, since
participants tend to focus on the list rather than on what might prevent the firm from
achieving its strategic objectives or the process from being carried out. Given that one of the
purposes of a risk and control assessment is to identify the risks, the existence of a risk
register begs the question as to how the risks in the register were identified and to what the
risks relate. If there is a risk register, put it to one side and start the risk and control
assessment from scratch. The register can be used later to check that no significant risks
have been forgotten.
Cause/trigger
A cause or trigger is something which precipitates a risk event. The identification of triggers
is helpful in recognising risk events and in avoiding confusion between a cause and an
event. However, causes are more useful in assisting the identification of an efficient action
plan; the prevention of a cause will, by definition, prevent a risk event.
Bear in mind, though, that causes of risk events change over time, so that preventing a
cause today will not necessarily prevent the same risk event from occurring tomorrow from a
different cause. Just as one cause can trigger many risk events, so a risk event can be
triggered by many causes.
Effect/consequence
Indicators
Indicators show the movement in the likelihood or impact of a risk, in the design or
performance of a control, or in the performance of a firm in relation to its objectives or
processes. As such, existing key indicators are useful in identifying the risks and controls on
which the firm focuses. However, key risk indicators and key control indicators are often
mixed with key performance indicators, so a first step is to sort the indicators (see Figure 7.2
and Chapter 7 in general). Although there will be business benefit in sorting indicators into
logical and consistent sets, this activity is likely to be outside the scope of a risk and control
assessment and will therefore generally be undertaken separately.
Losses
Losses are the monetary result of a risk event occurring. Losses are often collected by firms,
particularly in internal audit reports and reports to the audit committee. When loss causal
analysis is used, this can again be helpful in identifying the risks which have occurred and
controls which have failed. However, the risks will have been identified without any reference
to the business objectives or processes and are often couched as control failures relating to
causes or effects, rather than as risk events which resulted from the control failures. Again,
care must be taken and additional work will probably be required for the analysis to be used
in the risk and control assessment.
A firm’s losses will only give a historical view of the risk events to which it has previously
been subject. It is therefore important to understand that there will be many more potential
risk events than are identified by a loss causal analysis. (See also Chapter 6, Events and
losses.)
A firm which has not yet performed a risk and control assessment will be unlikely to have
contemplated stress tests and scenarios. Risk and control assessments give a valuable
insight into the likely causes and effects of the risk events about which the firm is most
concerned. Without a risk and control assessment it is unlikely that the firm will have
separated causes from effects, a fundamental element to building scenarios. (See also
Chapter 10, Stress tests and scenarios.)
Link to objectives/processes/activities
A risk and control assessment must be related to a business objective or procedure and
must not be performed in isolation. It should start, and often does, as a strategic assessment
linked to the business objectives, although assessments can be carried out on processes,
activities and projects. The explicit link with business objectives gives the risk and control
assessment a focus and enables risks to be identified within a framework and therefore at an
appropriate level. Without such a link, it is difficult to relate the risks identified to a specific
business area and therefore difficult to identify and provide clear business benefit.
A risk driver is a single item comprising a collection of closely linked risk causes or triggers,
which share an underlying similarity, such as a macro-economic downturn. A risk theme is a
set of similar risks, such as fraud. In their first attempts at a risk and control assessment,
firms often try to undertake the exercise at this high level, by using combinations of risk
drivers and themes (see Assessing risks later in this chapter). This is possible, but has little
benefit either to the business or to identifying a firm’s risk profile. You need to get down to a
granularity which yields business and operational risk benefit, but is not so unwieldy as to
provide overwhelming and ultimately meaningless detail.
A risk category is a set of similar risk events, for which there is benefit in treating them as a
group (see Table 1.1). This is obviously an advantage, but it is important that they are
identified after the risk and control assessment and are not identified beforehand. The risk
and control assessment will have been linked to the business objectives, so that any linked
risks will naturally emerge from the risk and control exercise and be aligned to the
objectives.
Similar, or the same, risk event and control pairs often exist between related products (dollar
bonds and sterling bonds) or comparable geographic regions (UK and USA). Conversely,
some products, such as over-the-counter (OTC) derivatives, and regions (such as Southern
Africa) will be more likely to have unique risk and control pairs. A thorough understanding of
the firm’s business is therefore essential when undertaking risk and control assessments to
ensure that links are included.
Frequency of identification
Identifying risks (and their accompanying mitigating controls) should be a part of the firm’s
day-to-day business life and processes. Risk identification is a normal and natural part of
being in business and should not be regarded as something which is done only once every
six months or whenever a full risk assessment is performed.
Immutable
As noted above (in Risk events), a risk event is an unchanging and distinct occurrence.
Although the causes of an event may change (a building burning down may be caused by
different factors), the risk event itself does not change. This enables a consistent analysis to
be taken of the gross risk to the business. It also enables the required controls to be viewed
consistently for the same risk across a firm, as the firm may develop an ideal set of controls
for the risk event. Comparability of the effectiveness of the controls for the same risk across
a global organisation is then possible.
Reputational damage is generally a consequence of a risk event. As such, there are strong
arguments for not identifying it as a risk in its own right. However, many firms view this risk
as their most serious and would not give credibility to a risk and control assessment which
did not identify reputational damage as a risk. It is therefore important to ensure that double
counting does not take place when using a risk and control assessment for quantification of
operational risk (see Chapter 9, Modelling).
There are a number of examples of reputation damage in Chapter 16, Reputation risk. In the
BP Deepwater Horizon example, BP’s small resevoir of public trust and its conduct in the
aftermath of the disaster caused a profound loss to its reputation and future business
opportunities. But the reputational damage was a direct consequence of failures of risk
controls.
ASSESSING RISKS
Gross/net/target
Risks can be assessed at several levels of mitigation. Gross (or inherent) risk is assessed
with no account taken of the controls which exist within a firm. The only controls which are
assumed at the gross level are inherent controls such as people’s honesty and society’s
willingness to obey the law. The advantage of assessing risk at a gross level is that there are
no assumptions about the quality or existence (or otherwise) of controls. It also identifies the
level of loss to which the firm is exposed if and when the existing controls fail.
Net (or residual) risk is assessed after allowing for the existing controls within the firm. This
means that there are assumptions about the adequacy and continuing effectiveness of the
controls. These assumptions are rarely stated in net risk assessments. If they are stated,
they become close to control assessments. The object of this part of the exercise is to
assess risks, not controls. The level of loss arising from a net risk assessment is the
day-to-day loss which the firm suffers with the existing level of control.
Target risk is the name often given to the final level of expected risk appetite which exists
within a firm after all mitigating effects are at the firm’s desired level. It is used to assess the
impact (and sometimes the effectiveness) of control enhancement plans.
If risks are assessed at a gross level, a control assessment can easily be linked to the risk
assessment. If risk is assessed net, the control assessment is already implicit in the net risk
assessment and the result will require reconciling back to the explicit control assessment.
Frequency of assessment
How often risk and control assessments are carried out is dependent on each firm’s
circumstances. Many firms carry out quarterly risk and control assessments, focusing on the
risks and controls which have changed during the quarter. These firms will often carry out an
annual risk and control assessment going back to the business objective or procedure which
formed the basis for the original assessment. Other firms carry out half-yearly assessments
at a more detailed level.
The best guide is to consider how frequently individual risks are likely to change. That
probably means that it is unlikely that a full risk and control assessment will be performed on
a monthly basis unless the risks are likely to change that frequently. At the extreme, an
assessment may be carried out several times a day in a department responsible, say, for
receiving retail firms’ monies and sending out contract notes or policies.
Likelihood/frequency and impact/severity
Once risks are identified, they are evaluated for likelihood (or frequency) and impact
(sometimes called severity). Likelihood is reviewed on the basis of how frequently a risk
event will occur over a given period (e.g. monthly, three times a year, once in 50 years).
Alternatively, many firms find it helpful to think of the percentage likelihood of a risk occurring
in one year. A more detailed discussion on alternative likelihood terms and their possible
weaknesses is given in connection with Table 10.1.
Impact is reviewed on the basis of the (possible) cost to the firm if the risk event happens.
Whilst the term severity is also used by some firms as being synonymous with impact, the
word may also be used as a single value for a risk assessment, being a combination of
likelihood and impact. This was more common before separate likelihood and impact
assessments became widely used.
Expected/unexpected
Risks can also be assessed using the terms expected or unexpected. This refers both to the
expected or unexpected likelihood and to the expected or unexpected impact. In practice,
both levels give value to a firm. The expected level will give a check on the usual
effectiveness of the controls and therefore acts as a check on the provisions or reserves
which are made on a regular basis by a firm. It is similar to the net risk level.
The unexpected level gives information about the amount of capital required to withstand a
financial shock to the firm from a risk event occurring. This is similar to the gross risk level.
The unexpected level is therefore used for assessing economic and regulatory capital
requirements.
The period used for likelihood assessment should be aligned to the level of risk being
assessed. For example, an annual period (i.e. the interval in years between the risk
happening) is probably inappropriate for an activity risk assessment. Conversely, the use of
a monthly frequency would give possibly misleadingly large figures for a strategic
assessment based on a five-year plan.
Direct loss for impact is often easier to assess as it is linked to the charge to the profit and
loss account. Even when there are no historical figures available, it can often be calculated
easily. Indirect loss is much more difficult to assess and inevitably more subjective, as it is
based on the total cost to the firm of a risk event occurring. Such items as opportunity loss,
for example the loss of additional sales or the cost of redirecting staff to resolve an
operational risk problem, are considered in evaluating indirect loss. This means that the
indirect loss can often be a larger figure than the direct loss. Firms should be aware of the
two levels of loss (direct and indirect) and combine the two to assess the true impact of risk
events.
A decision is also needed as to which period for the loss it is taking into account. Although
multiple years can be considered in an assessment which uses the profit and loss account
as a basis for impact, usually only the impact on the first year is evaluated.
Consideration of multiple years often occurs when a firm is using business objectives to be
attained over a multi-year plan period as its risk reference. This can give rise to the concept
of the net present value of the risk event, although this should be considered only if the firm
is comfortable with the concept and already uses it in day-to-day business management.
The largest and most difficult value to assess is the impact on shareholder value, as this is a
multi-year indirect loss figure. However, where a firm already uses shareholder value as a
concept, its use should be seriously considered, as this is the true impact of a risk event on
the owners of the firm.
Impact components
If the firm considers only direct losses, it significantly limits the business benefits of risk and
control assessment. By breaking down the impact into separate components, such as
financial, people, customer and other stakeholders, it can be easier and more beneficial to
assess indirect as well as direct losses.
Loss causal analysis (see Chapter 6, Events and losses) typically analyses the components
of the loss and can be used to ensure that the risk and control assessment is consistent with
the loss analysis and so delivers business value.
One pair (impact/likelihood), two pairs (average and worst case) or three
Whilst most organisations start their risk and control assessments with assessing one pair of
scores for a risk (such as impact/likelihood), some choose two pairs (adding average and
worst case for each of impact and likelihood). A third level can be added, by taking the
assessment of impact and likelihood to an ‘extreme worst case’. In mathematical terms,
average represents a 50% confidence level, ‘business as usual worst case’ takes the
assessment to a 95% or 1 in 20 confidence level, whilst the third level reaches up to 99.5%
or even 99.9% confidence (1 in 200 or 1 in 1000).
Two pairs help the firm to think about the expected and unexpected parts of a risk’s
distribution without making the mathematical part explicit. Three pairs enable a firm to begin
to specify the distribution which constitutes the risk. A very occasionally used alternative is to
specify a mean and a standard deviation, although this requires an understanding of
mathematics which is generally beyond most managers.
Use of losses to back-test impacts and likelihood
Losses provide a real-life view to guide and challenge the subjective assessments which are
made when considering the likelihood and impacts of risks. However, it is important to
ensure that the causal analysis of the losses correctly identifies the risks to which the losses
relate. The mapping of the risks underlying the losses to the risks which have been identified
during the risk and control assessment is difficult but worthwhile as it enables a methodology
to be established which tests the assessors’ judgement against actual losses experienced by
the firm.
This ‘back-testing’ technique should take account of any changes to the firm. An example
might be an increase or decrease in staff numbers, which might affect the relevance of both
the frequency and severity of losses to the firm as it currently exists. So when using losses,
make sure that the risk profile when the losses occurred is the same as the risk profile at the
time of the assessment. If not, adjustments will have to be made.
Heat maps
Heat maps give readily accessible and visual representation of the risk profile of a firm. They
are often the first risk report seen by the board and, as such, must be positioned as the start
of risk reporting and not the final risk report. They are helpful in allowing management to
focus on the most significant risks to the firm, in the absence of any further data.
Heat maps often start as net or residual risk heat maps (see Figure 5.4) and then expand to
cover both gross and net risk as the firm develops its expertise in risk assessment, as shown
in Figure 5.5 later. Illustrating, by means of a heat map, the reduction to a risk due to the
mitigating effect of the controls is helpful in visualising which controls are fundamental to
reducing the risk profile.
OWNERS
Different levels
There can only be one ultimate owner of a risk and that person must be at board level.
However, the board director responsible for the risk may delegate the management of the
risk to another person who in turn may delegate further. This can lead to confusion over who
owns the risk. It is likely that those to whom the risk is delegated own only a part of the risk
for which the board member is ultimately responsible. However, the risk and control
assessment process will decompose the risk down to each level – strategic, process,
activity. As a result, the person responsible for a particular process or activity which
contributes to the strategic goal of the firm for which the board member is responsible will be
clearly seen as the person who owns the risks inherent in the process or activity.
It is often also the case that the CEO is nominated as the owner of most of the risks when a
board first considers its strategic risk profile. This must be challenged. Board members
should take responsibility for their own risks, for example the sales and marketing director
must take responsibility for risks relating to sales and marketing, such as mis-selling.
Risk owners
Risk owners may exist at several levels, although there is only one ultimate risk owner. The
owner of the risk is responsible for measuring, monitoring and mitigating the risk, at the
relevant level, within the risk appetite set by the board. The actual tasks of measuring,
monitoring and mitigation are generally given to another member of staff. This does not
reduce or remove the risk owner’s responsibility for managing the risk, which is carried out
through receiving and actioning reports from the staff to whom the tasks have been
delegated.
Control owners
These are the people responsible for managing the mitigation of the risk through the
operation of internal controls. Control owners are vital both in designing appropriate controls
to mitigate the risk and in ensuring adequate performance of the control in line with the
board’s risk appetite. They are responsible for identifying any action plans necessary to
increase the effectiveness of the control and are also responsible for implementing the
action plans.
Suitable level
Just as identifying a suitable level of risk can be a challenge, so too can identifying the
appropriate level of control. However, as controls are typically identified after risks, it is often
easier to set control identification to the appropriate level. If the risk identification has been
set, for example, at a business objectives level, the controls which are identified should be at
the same level.
It is very easy to identify controls at a departmental or activity level and relate these to the
business objectives of a firm. However, this should be avoided as there will be a mismatch
between the level of the risks and the level of the controls. Additionally, it is important to
identify and then score the strategic controls which are in place to mitigate the risks to the
business objectives. If this is not undertaken a firm can be lulled into a false sense of
security, believing that its business risks are well controlled by a considerable number of
activity or departmental controls.
Independent controls
When identifying controls, we are seeking to identify the independent controls which mitigate
a risk. Although there is some point in identifying linked controls, far more business benefit
will be achieved through identifying and scoring controls which are independent of each
other. Controls which are linked to each other, perhaps in a sequence, are only as good as
the preceding control. This means that if the first control in the sequence fails, none of the
other controls gives any benefit in mitigating the relevant risk(s). It is therefore vital that
controls are checked to ensure that they are independent, otherwise they become another
source of false security.
An example of three typical independent controls are those which might be considered to
mitigate the risk of ‘Failure to attract, recruit and retain key staff’, as shown in Figure 5.6
later: ‘Salary surveys’, ‘Training and mentoring schemes’ and ‘Retention packages for key
staff’. Linked controls within this example may be ‘Salary increases’ and ‘Title changes’, both
of which are linked with ‘Salary surveys’.
Another method of mitigation is to remove the risk altogether from the firm, for example by
ceasing business in the particular product to which the risk is attached. This is, of course, an
extreme move to take but may be justifiable in the circumstances. For example, it was
reported that Goldman Sachs withdrew from some markets before its peers during the
2007–9 financial crisis and by doing so considerably reduced its losses.
Types of controls
Controls can be divided into four types: directive, preventative, detective and corrective.
• Directive controls provide a degree of direction for the firm and are typically policies,
procedures or manuals.
• Preventative controls act to prevent the risk or event from happening. They are often
automated controls, such as guards round a piece of machinery or system checks to prevent
limits being exceeded.
• Detective controls act after the risk or event has happened and identify and mitigate the
risk which has occurred. Typical detective controls might be the sensors providing warnings
of the safety around a piece of machinery being compromised, or reconciliations and
monitoring of accounting entries.
• Corrective controls again act after the risk event has happened and mitigate the effects
of the event through remedial action. Typical corrective controls are following-up on
outstanding reconciliation items or other risk reports and taking action following risk
monitoring.
It is helpful to differentiate the controls identified into their various types (see also Chapter 7,
Indicators, for a further use of these four types of controls). This enables the firm to assess
whether it has a balance of the different types of controls or whether it has a number of, for
example, detective and corrective controls but lacks directive and preventative controls. With
this imbalance, a firm will be unlikely to prevent a risk from occurring, but may be well placed
to minimise the impact of a risk when it does occur. An example of such a risk would be an
external event beyond the firm’s management influence, such as flooding or a terrorist
attack.
Use of losses
Loss causal analysis is extremely useful in providing objective knowledge of the probable
failure of controls, particularly due to poor performance. Even without comprehensive data it
is still possible to use losses as a guide to the likely scoring of a control. For example, a
control is unlikely to be scored as having a good performance if a number of losses have
occurred recently due to its failure. Conversely, no losses occurring in recent times may be
an indication of good performance – or simply of good luck.
ACTION PLANS
Explicit acceptance of risks or need for action plans
When the gross risk has been assessed and the current quality of control(s) for each risk
has been scored it is possible to review whether the net risk remaining is acceptable to the
firm, or whether there is a need for an action plan to either enhance the control(s) or reduce
the risk exposure in some other way.
However, there is a lot of merit in assessment sessions being facilitated by a third party,
such as a consultant, and by the head of operational risk or the head of risk of the firm. This
enables the best of both worlds to be obtained by using someone with outside knowledge of
risk methodologies combined with someone with internal knowledge of the firm.
An independent review of risks and controls by a third party provides relatively little business
benefit. An outside third party may bring a wider knowledge of risks and controls, but the firm
itself should be in the best position to understand its own risks and controls. However, a third
party with a wider knowledge can provide benchmarking against similar firms, which can be
invaluable in helping the firm to improve its controls and so reduce its risk profile
cost-effectively.
Follow-up
A risk and control assessment workshop, interview or questionnaire invariably requires
follow-up work. This will typically be in relation to further control investigation and testing.
Additionally, risk and control assessment participants need further time to consider the
scores to be assigned to controls, and sometimes to risks as well. Action plans are another
common area requiring follow-up after a risk and control assessment.
Validation of the identified risks and controls (and their scores) can also be obtained by
follow-up discussions with peer group members and with internal audit (see also Use of
losses to back-test impacts and likelihood above).
Control effectiveness
Once controls have been identified and scored, it is possible to assess their effectiveness in
mitigating the risk. Control scores can be directly compared with risk scores although many
organisations use pictorial representations such as heat maps (see Figure 5.4) and
spidergrams (see Figure 4.6).
Link to provisions/budgets
The expected level of risk impact, i.e. the net or residual level after controls, can be linked to
management provisions and budgets as this is the ‘accepted’ level of loss from a risk and
will therefore be taken into account when calculating internal management figures. This level
of impact can be regarded as the cost of doing business. Where there is little or no link
between management budgets for expected loss figures and the figure indicated as the
residual impact on a risk assessment, management should be challenged on the validity of
the budget or the residual impact or both.
Using risk and control assessments for quantification
Risk and control assessments can be used for quantification and modelling purposes, as
well as internal and external losses. A risk and control assessment is a good indication of the
internal control environment, which is one of the four items required for advanced modelling
of operational risk (see Chapter 9, Modelling, for more details).
Additionally, risk and control assessments can be used to make clear the effects of a
scenario on the risk profile of a firm. A scenario will inevitably change the mitigation effects
of controls and may reveal further risks to a firm. These can be reflected in the relevant risk
and control assessments (see Chapter 10, Stress tests and scenarios, for more details).
Internal audit
The production of risk and control assessments is of great use to internal audit. A risk
assessment identifies areas where management feels much of the controls are perfectly
adequate and areas where management believe that the controls require enhancement.
Internal audit based on perceived adequate controls can be extremely helpful. If it is
confirmed that controls are indeed adequate, remedial action can be focused elsewhere.
However, if the internal audit finds that controls are not operating as intended and as
believed, the need for remedial action is clear.
Risk and control assessments ‘go wrong’ for many reasons. The most common ones are:
• lack of management buy-in to the risk and control assessment process because there is
little perceived business benefit: this leads to strategic risks not being identified and to the
assessment process not being taken seriously
• paper overload resulting from too many questionnaires
• lack of feedback from the risk department to the area being assessed
• inflexible software leading to the assessment process being discredited
• failure to link indicators and losses to the identified risks and controls leading to a lack of
coherence and consistency in the assessment
• lack of action/follow-up to controls which are viewed as ineffective or to risks which have
too few controls.
Of these, the critical ones are: lack of buy-in, lack of feedback and lack of follow-up or action.
All are symptomatic of a lack of commitment to operational risk management. If the right
management structures are in place, a risk and control assessment will be seen as the
simple and valuable process which it is and the problems quoted will either not exist or will
be dealt with.
SUMMARY
Risk and control assessments are probably the first step in establishing an operational risk
management process. The concepts of impact and likelihood assessments are readily
grasped and they can deliver quick business benefit to the risk owners in the business as
well as those in either an oversight or independent assurance role.
To be truly effective, they should be linked to objectives at each level of the business. They
come with a number of health warnings as this chapter has made clear. There needs to be
clarity about the levels of both risks and controls and especially clarity about whether the
thing being assessed is a cause, event or effect.
Risk and control assessments, though, are only one tool in the toolbox of the operational risk
manager. They should be used in conjunction with loss causal analysis (see Chapter 6,
Events and losses), indicators (see Chapter 7) and scenario analysis (see Chapter 10,
Stress tests and scenarios), which we shall go on to look at in the following chapters.
6
Events and losses
Introduction
Data attributes
Reporting threshold
Use of events
Timeliness of data
Summary
INTRODUCTION
Events and losses are a fundamental part of operational risk management. They are a clear
and explicit signal that an operational risk has occurred. This may be due to the failure of a
control, the lack of a control or simply a very unusual event that was not foreseen.
As shown in Figure 6.1, events are one of the three fundamental processes of operational
risk management. They provide a valuable objective challenge to the subjective nature of
risk and control assessments. They are also often used as indicators of risks and controls
(as we shall see in Chapter 7, Indicators).
a direct hard event is the overtime money paid to the software and hardware engineers to
restore the system – this is the money which actually flows out of the firm
an indirect hard event is the extra food and hotel bills paid to feed and accommodate the
software and hardware engineers whilst they will restore the system – this is also money
which has flowed out of the firm
a direct soft event is the loss of sales that were unable to be concluded – although this is
difficult to quantify, it is a direct consequence of the event
an indirect soft event is less growth achieved by the firm than it had budgeted – this is also
difficult to quantify, although it is still a consequence of the event.
Near misses
Events can also be categorised into actual losses or near misses. An actual loss is easy to
describe in that it is a debit to the profit and loss account of the firm or the reduction of the
value of an asset held by the firm.
In the second definition, either a positive or a negative value is attached to the event (a gain
or a loss), or there is no financial impact at all, although there may be some non-financial
impact. Some firms which adopt the first definition as a near miss characterise the second
definition as an incident, to differentiate it from an event which has a negative financial
impact. Again, there is significant operational risk management information: preventative
controls have failed (or they did not exist) and need to be analysed, whilst the detective and
corrective controls may have worked; or the firm may have been very fortunate. As an
example, a brick falls from the top of a building on a building site, but nobody is hit or hurt.
Near misses are therefore invaluable for challenging risk and control assessment scores.
They are particularly helpful in assessing the performance of controls. If there have been a
number of near misses relating to a specific preventative control, the current score of that
control should be questioned, especially if its performance is assessed as good or even very
good.
Inevitably, and throughout most of this chapter, events and losses tend to be spoken of in the
same breath. We are primarily concerned with negative impacts, whether they are financial
or reputational. In operational risk, however, events which produce gains are just as valuable
a source of information because they also represent control failures. Operational risk is not
all about adverse consequences. It demands a different risk mindset.
As well as gains being realised when an event happens, sometimes an event will generate
offsetting amounts to the actual loss. These may themselves be hard or soft and direct or
indirect. For example, if the loss of an IT system prevents a trader from reducing a position
which then results in an unexpected profit, there is a financial offset. From an operational
risk perspective, the offset should be separated from the costs involved in the loss of the IT
system and both should be investigated.
Likewise, recoveries should be separately identified so that the gross loss is known, as well
as the net loss. A typical recovery is a claim on an insurance policy. This may be viewed as
the operation of a corrective control which transfers the financial loss to a third party outside
the firm. Alternatively, recoveries may be obtained directly from a third party. An example of
this will be the back-valuing of a payment by a counterparty who has paid late.
Lost data
One of the great problems with operational risk is that it depends on the comprehensive
reporting of events and losses, near misses and gains in order to build up as accurate a
picture as possible of the scale of operational risk in the firm, or whether controls are
effective. However, events and losses are rarely reported fully. Actual losses are the best
reported, although even these are frequently incomplete. As noted above, near misses are
less frequently reported and gains are rarely reported at all. Considerable amounts of
information are therefore in danger of being lost.
One way some firms have successfully tackled the problem of lost data is by making the
operational risk function responsible for the insurances of the firm. The head of operational
risk (in conjunction with the CFO) then assures the business line heads that any potential
loss which is reported to operational risk within 12 hours of first being identified will not be
charged to the business line profit and loss, even if it ultimately results in an actual loss. This
approach:
DATA ATTRIBUTES
Given the valuable business uses to which events and losses – and gains – can be put (see
later, Use of events), the next step in the process is to decide what information should be
gathered about the events and losses. The information collected will vary from firm to firm,
but there is a minimum set of data attributes which is collected:
Name of firm
This may seem obvious, but in a group of companies more than one firm may be involved.
Often both the name of the organisation in which the event occurred and the name of the
organisation in which the event is detected are recorded as both of these are important from
a risk management and control improvement perspective. Additionally, data may be held
relating to the firm which will suffer any loss, as this may be different from the firm in which
the event occurred and the firm which detected the event. This can happen, particularly in a
group, where the firm in which a transaction is booked is different from the firm in which the
transaction is originally undertaken and again different from the firm processing the
transaction.
Geographic location
Recording where an event happens is important from an operational risk management
perspective. There may be control weaknesses which are inherent in a particular location
(perhaps due to ethnic culture) or, alternatively, which indicate a better or worse control
culture, as compared with other locations. Either way, it is vital to understand each area’s
control ability so that decisions on improving controls can be taken based on knowledge,
rather than take a blanket approach, possibly based on guesswork.
Business activity
Identifying the particular business activity or product line is useful, especially in a group
where business units in different companies may be involved in the same activity or in selling
similar products. It helps to achieve consistent reporting, both within the group and if external
reporting is necessary, perhaps to a government body or regulator, although it is not often
that the taxonomy of external reports conform to internal ones. Recording the business
activity can also identify units where controls which are operated across a particular activity
have failed, or appear to have been particularly successful, and point to improvements which
will benefit the whole group.
An example of business activities used by an industry is the table of business lines set by
the Basel Committee in its Revised Framework issued in June 2004 (see Table 6.1). These
are focused on profit centres (as given by the name ‘business lines’). But cost centres are
just as valid. Significant operational risk events can occur in, for example, HR, the legal
division, IT or even the CEO’s office. In fact some of the biggest risks lie at the door of the
CEO’s office. Examples range from unguarded statements (Ratner) to outright fraud (Enron
and Maxwell).
Firms should, of course, draw up their own schedules of business lines or activities. The list
given in Table 6.1 is bank-related. In banking, all banks can draw up their own lists, but have
to be able to map them to the ‘Basel’ business lines. Whilst a common taxonomy may help
regulators to compare firms and jurisdictions, there is a danger that firms simply adopt the
regulators’ taxonomy, without really thinking about what is useful for their business.
The Basel business lines are, in fact, often fairly meaningless even to many financial
services firms as there are relatively few firms which span a significant number of business
lines. Firms which cover only one or two business lines, such as asset managers, are far
more likely to analyse the loss data at a detailed level which is relevant to them. They may
prefer to categorise loss data by fund type or by each fund. It is common for the trustees of a
fund to require notification from the manager of losses which have been suffered by the fund
above a certain level, either an absolute monetary amount or a specified percentage of the
fund assets under management.
Table 6.1 Generic financial services business lines
Equally a regional retail bank will find significant business value in categorising its losses by
the detailed products it sells to its customers, or alternatively categorising by department.
The choice is often determined by the level of risk analysis undertaken by the firm. This will
be influenced by, and will influence, the level at which risk and control assessments are
carried out.
Loss event type
Classifying losses by business activity or product line is important. But the foundation of
operational loss analysis is to be able to allocate losses to loss event types. The difficulty
with loss event types is to have enough to be able to break down operational risk losses into
sufficient granularity to be useful for effective and intelligent operational risk management,
without disappearing into an unwieldy myriad of detailed categories. Those who handle
volumes of manual reports can tell you that in any batch, anything up to 30% of entries will
contain at least one data element which is incorrectly recorded. The more loss categories
you have, the more likely it is that events will be incorrectly recorded, however excellent your
instructions may be.
Remember that loss event types are not a substitute for risk types. You need to be clear as
to whether you are classifying risks or risk events. Risks are generally ‘failures to …’ or ‘poor
…’. Events are the manifestation of a risk actually occurring.
Another example from the Basel Committee is given in Table 6.2. This is a start for financial
services firms, but is not detailed enough to provide meaningful management analysis, even
if it apparently helps the regulators to understand the operational risk profile of banks. It also
confuses causes and effects with the events it is aiming to record.
How you classify loss events both is, and should be, up to you, but always remember that
how you classify will affect much of your operational risk analysis.
Dates
It might be thought that the date of an event or loss is a fairly simple piece of data to record.
However, it can be difficult to ascertain, particularly if the event occurred several months
before detection. Often the only clear date is when the event is discovered. Some events
occur over a period of time, in which case it is helpful to record the start and end dates. On
the other hand, when an event is first reported, it is often ongoing and it may be a number of
months before it is closed and the loss established.
Where the ‘event’ is in fact a number of separate events linked by a single cause, such as
the unauthorised trading undertaken by Nick Leeson at Barings and Jérôme Kerviel at
Société Générale, a single date may be inappropriate and a period may work better. In that
case, though, it is important to consider the effect on estimates of likelihood, since dates are
fundamental to this. In operational risk assessments, even dates are not as simple as they
seem.
Causes
Cause lies at the heart of operational risk management. It is not enough to know that an
event occurred or nearly occurred. It is essential to understand why, so that remedial action
can be taken. Reporting events and not causes means that they can be counted, but not
managed. The cause of an event should form part of the detailed description of an event,
although it is more helpful to report it separately. There is a danger, if cause, event and effect
are not separately identified, for the loss event type (of the types shown in Table 6.2) to be
used as a proxy for causal analysis. There is relatively little loss of business benefit by doing
so if the point of the exercise is to provide a consistent basis for assessing risk. But the point
is often ignored.
There are certainly benefits to be gained through a more accurate description of the cause of
an event and allocating causes to generic causal categories. But the most important
information in reports of loss events is to identify the controls which have failed. At least a
primary control failure should be identified, although firms should identify secondary control
failures as well. A single event is often the result of a number of control failures. Careful
causal analysis will identify priorities to enhance or improve controls.
Since a single cause can trigger a number of different risk events, linked risks can also be
identified by recording causes, as well as any risk indicators which relate to the event. This
will enable a holistic analysis of events to be easily undertaken, which will link together the
three fundamental operational risk management processes of risk and control assessments,
indicators and event causal analysis.
One final issue is where a number of events, possibly relatively small in value, are linked by
a single cause, but in aggregate amount to a significant figure. Let us return to the
unauthorised trading losses incurred by Barings and Société Générale, through the activities
of Nick Leeson and Jérôme Kerviel, totalling as they did US$1bn and €5bn respectively. Did
each false trade reflect the failure of a particular – or possibly the same – control, or were
they the result of a general cause, ‘unauthorised, or fictitious, trading’ by the individuals
concerned? Do you choose one aggregate amount, which is way down the tail of your loss
curve – how the events are often portrayed publicly – or record each of the much smaller
events, representing the individual control failures which occurred?
Actions
The actions recorded can be divided into two types: immediate actions and correct or
improve actions. For example, when a laptop is lost, an immediate action will be to disable
the laptop’s access to the firm’s network. This is typical of an immediate reaction to the
detection of an event. Following causal analysis of the event, correct or improve actions may
be:
a staff note reminding staff to lock all laptops in the boot of their car when transporting them
a redrafted policy regarding to whom laptops will be issued
the purchase of encryption software to be installed on all laptops used within the firm.
There is a clear difference between the two types of actions: immediate damage limitation,
followed by considered further action at amending and reinforcing controls or the
implementation of additional controls.
Additional information
It is helpful to allocate an owner to the loss so that there is clear responsibility for achieving
the actions necessary to ensure that the event does not happen to the firm again. Where a
transaction or trade is involved, the unique transaction or trade number is recorded, together
with any relevant client details. This is, of course, important if the event has a loss attached
to it which may be passed back to the client.
Internal and external notifications may also be necessary: internally to the firm’s compliance,
fraud or health and safety department, for instance; or externally, to a regulator or
government authority, depending on the type of event that has occurred. And, of course,
operational risk management must be notified if they are not already aware. All of these
various elements come together in the type of loss reporting form shown in Figure 6.2.
In a firm with the right operational risk culture, it is understood that reporting events is not
about blame, but about learning. As Andrew Hughes puts it in his book on the BP Texas City
oil refinery disaster, Failure to Learn, ‘Blame is the enemy of understanding’.1 Many firms
have a loss reporting form on their intranet which is available to all staff. In this case, staff
are encouraged to report events as they happen.
An alternative is for the operational risk leader or champion within the detecting department
or business line to make the report. The advantage of this approach is that an operational
risk leader will have some training in operational risk and will probably be a user of
operational loss data. This should mean that the data will be of a higher quality compared
with data submitted by an untrained person. However, there may be a time delay compared
with a submission by the employee who discovers the event.
Reconciling losses to the general ledger (or an audit) will provide valuable confirmation and
validation of the accuracy of reporting. However, it will not identify events where there is no
financial impact or, of course, events which have not been reported – the lost data
mentioned earlier.
REPORTING THRESHOLD
The reporting threshold, the level down to which a firm seeks to capture operational risk
events, is a cost–benefit decision. The Basel Committee has set a threshold of €10,000 for
loss reporting by banks. It is interesting that, in a recent survey of over 100 banks from
around the world, most had a threshold of €5000 or below.2 A number of firms, including
banks, have a policy to report all losses, no matter what size.
The operational risk management departments of many firms which have set a size limit
generally monitor losses down to a lower level, since several smaller losses can add up to
one larger loss which is above the reporting threshold. In this way continual small control
failures are captured before they turn into a significant value. Weak signals can often
demand strong action.
Many firms believe that capturing small losses costs more than the benefit achieved.
However, a reporting threshold above zero will prevent a significant amount of control failure
being captured, including the majority of operational loss events which in fact have a zero
financial impact. These, and events where there have been small losses, will be picked up
by successfully implementing a zero reporting threshold. Although large losses will still be
captured and can be analysed, it is easily arguable that the firm will miss data today which
could prevent a large loss from happening tomorrow.
Setting the reporting threshold is therefore a significant issue, the consequences of which
should be properly understood by at least the risk committee and preferably the board.
USE OF EVENTS
Causal analysis of events is critical for effective operational risk management. The analysis
can be used to challenge risk assessments and control assessments, to validate indicators
and to assist in the production of scenarios and stress tests. Additionally, losses can be used
in mathematical modelling for economic capital allocation and for regulatory capital
calculation.
The analysis of an event, whether or not a financial loss has occurred, will also assist in
challenging and validating the likely scoring of a risk in a risk and control assessment.
Looking at impact, it may be that an event has occurred, but there has been no apparent
impact. A check should nevertheless be made to confirm both the impact and impact
assessment shown in the risk and control assessment and the risk owner asked to justify
their assessment.
On the other hand, if there have been a series of impacts of similar value, this is a good
indication that the impact of the risk should be assessed at that level. The risk owner may,
however, feel that the firm has been fortunate in managing the impact of the risk well and
that a higher value is justified; or that the firm has for a variety of reasons been poor at
managing the risk recently and that a lower value remains appropriate because systems and
controls have been tightened. Either way, the firm has challenged the subjective risk
assessment scores and created greater awareness of the value of both event causal
analysis and risk and control assessments.
Turning to the frequency or likelihood assessment, if three events of a certain risk have
occurred in the past five months and the likelihood of the risk has been assessed as low, it is
important that the owner of the risk is challenged. It can often be easy simply to say that the
firm, at least in relation to this particular risk, has been experiencing a period of bad luck.
However, it is more likely that the assessment of likelihood has been unduly optimistic and
that the scoring of the likelihood should be revised upward.
Luck is a seductive and dangerous concept, which has no place in the cold light of risk
management. An event may be extremely random, and a concatenation of events even
more so, but they nevertheless happened. That may feel as if the gods are against you, and
it’s all unfair and unreasonable, but all events need to be recorded and your assessments
adjusted. Don’t ignore an event because ‘it was a one in a thousand year event’ or a ‘once in
a lifetime’ event. ‘Once in a lifetime’ events have a nasty habit of happening rather more
often than that. Outliers may not in reality lie as far out as we would like them to.
Indicators
Events and losses can also be used to validate indicators. If an indicator shows that a
control is starting to fail or that a risk is more likely to happen, some events will be expected
to occur. If the events do not occur, the indicator must be challenged in case it is not as
relevant to the risk as was originally thought. It should be borne in mind that a failure of one
control will not necessarily cause a risk to occur, as other preventative controls may be in
place and working. Whether or not this is the case can easily be seen from the risk and
control assessment.
Equally, events and losses can be used to validate indicators of detective controls. In a
similar way to the validation of preventative controls, the size of the events and losses is a
guide to how well the detective control indicators are performing. This is shown in more
detail in the discussion on Figure 9.6 in Detective and corrective control testing in Chapter 9,
Modelling.
Dealing first with information from competitors, a number of consortia exist which capture the
internal losses of a number of firms, on a sectoral, national or international basis. Each
consortium manager then anonymises the data and redistributes the anonymised data to all
its members. The oldest such consortium in the financial services sector is the British
Bankers’ Association’s Global Operational Loss Database (GOLD) loss database, which
started in 2000.3 Consortium databases are a good example of the art of the possible. They
often comprise only hard, direct losses, rather than indirect loss amounts, because that
increases consistency and eliminates internal subjective assessments, including information
which may be price sensitive. But they provide valuable additional events, especially towards
the tail of the loss curve.
This type of data is inevitably of a similar type to a firm’s own loss data in that it ranges from
high-frequency/low-impact to medium-frequency/medium-impact events. As such, it provides
valuable validation and confirmation of a firm’s own loss data. In addition, it can provide an
early warning of losses which have occurred to a competitor but are not yet occurring to your
firm. Given this warning, a firm is able to reassess its own controls in relation to the risks
being suffered by its peers and possibly reduce or even eliminate the approaching losses
relating to those risks.
Figure 6.3 Sources of losses
A different type of loss database captures publicly available loss and event data. These
events are typically reported on the internet or in the media and are of such a size or
consequence that they are impossible to hide. Such data is, by its nature, relatively rare,
although it is the most valuable source of data as losses of this size will rarely appear in a
firm’s own data but are of a size which could cause a firm to collapse. You can collect the
data yourself, or save some of the effort by subscribing to a firm offering that service and
which may be able to investigate further and provide a more objective analysis than the
information given in the press.
Finally, government agencies, such as the Health and Safety Executive, or industry bodies,
provide industry-wide information on events. As with all the other external information, this is
useful in helping firms to benchmark their own performance and the quality of their controls.
Data completeness
The completeness of data in an external loss database is a major challenge to anyone using
the data for causal analysis. In a database consisting of competitors’ internal losses, it is
worth bearing in mind that the quality of reporting by competitors may not be up to your
standard. Although most firms belonging to a consortium try hard to report all of their losses,
no firm can be certain that it has captured all losses above the consortium reporting
threshold.
In addition, the larger the loss to be reported the greater the temptation to reduce the size of
the loss in case it is discovered which firm has incurred the loss (despite the anonymisation
of the data). There is also the temptation to report only public knowledge, which may be very
different from reality. One final problem concerns losses which are subject to a court or
insurance settlement. The terms of the settlement often prohibit its publication in any form
beyond the parties concerned – another example of lost data.
Given that a legally binding obligation to report a loss to the consortium is almost impossible
to enforce, most consortia impose a moral obligation on a firm rather than a contractual
obligation. But, as we said above, we are dealing with the art of the possible.
In a public loss database there will never be complete capture of data, because the range of
media from which reports are gleaned is worldwide, but it will nevertheless provide
information about large losses which, by definition, are outside your experience.
Data consistency
A linked problem is the quality and consistency of the data. Even if the data approaches
completeness (which is highly unlikely), it is important that the data is of good quality. It is
inevitable that the quality of the data will vary by consortium member with some members
contributing the minimum required and others giving significant amounts of information. It is
not uncommon for a significant percentage of data initially submitted to the data consolidator
to be returned to consortium members because the data requires cleaning or further
enhancement before it can be used by the consortium.
In a loss database recording public losses, knowledge of the control environment relating to
each loss is very variable. This inevitably leads to a problematic quality of data, when using it
for causal analysis or modelling purposes, as data consistency is vital to a meaningful
analysis of either causes or capital assessments. Public information is also unlikely to tell the
whole causal story, if only for good competitive or reputational reasons.
Scaling
One of the most significant problems with external loss data is how to scale the loss with
respect to another firm. For example, the Barings loss was in the order of US$1bn. Barings
was a well-respected City of London bank with a strong pedigree, although not large by
international standards. It had a number of offices (although, again, not a large number)
around the world and dealt in a wide variety of financial instruments. How should Deutsche
Bank, for example, consider the loss that Barings suffered? Clearly, Deutsche Bank is a
much larger bank than Barings and so could possibly suffer a much larger loss. But how
much larger? What multiplier should Deutsche Bank use? Should it be based on the
comparative number of staff, gross revenues, profitability or something else which is in the
public domain?
On the other hand, Deutsche Bank has more resources to hand, as it is a very much larger
bank. Maybe the loss that it could suffer from poor segregation of duties should be smaller
than US$1bn. After all, segregation of duties is a fundamental control that is an absolute
requirement for the boards of many firms whatever the industry. Additionally, large banks’
operational risk controls are generally perceived to be better than those of smaller banks,
notwithstanding the large operational losses suffered by a number of large banks over the
years. In which case, how much smaller? Possibly an inverse of the ratio of the number of
staff, gross revenues or profitability?
A pragmatic approach is to scale each loss with respect to the particular factors that
influenced the loss, if these are known. For the Barings loss, a firm might first take into
account the number of its branches which are small enough to have a segregation of duties
problem. This is because, in a small unit, it is often impossible for complete segregation of
duties; they tend to be concentrated on the unit manager as there is no one else who has
the experience and authority to carry out supervisory controls. Having established the
number of relevant branches, a further analysis is then made of the types of products
handled in those branches and their value. By combining the two factors, it is possible to
assess the likely effect of a similar incident on the firm concerned.
Using this method demands little detailed research about the precise size or financials of the
loss suffering firm, information which will probably be historic and of little relevance. It avoids
using probably spurious correlations between firms by simple numeric multipliers of sales
turnover or staff. It also has the advantage that changes to the risk environment of the firm,
such as more or less small branches in the future or changes in the product range, will
naturally be reflected in the value of the potential risk impact. It doesn’t even require
knowledge of the precise amount lost by Barings. You only need to know that the risk event
happened and apply this knowledge to the firm’s risk and control profile, from which a value
is easily deduced. Go back to the causes, not the numbers.
The main disadvantage of the pragmatic approach is that you need to examine each loss in
order to determine what the relevant risk factors are. However, the relevance of the result far
outweighs the time required for this additional work, which will be required anyway if several
high-level factors are captured for each loss such as number of staff, gross revenues and
profitability. Such an examination is required only once for each loss and then additionally for
new losses as they are captured.
SUMMARY
Events, being what has actually happened, are probably the only hard facts we have in
operational risk to make judgements about the future. However, as we have seen, the
information we gain from them comes with a number of health warnings. The data will never
be complete. As events occur, they inevitably affect behaviour, whether individual or
corporate, which means that even if we have captured information comprehensively and
accurately, its usefulness degrades over time.
The information gained from events validates and supports risk and control assessments,
the levels of indicators and scenarios, and is fundamental to assessing capital requirements.
But we should be careful that it does not bear too great a load of expectation.
Notes
1 Andrew Hughes, Failure to Learn (Sydney: CCH Australia Limited), 2009.
3 www.bba.org.uk/content/1/c4/65/05/GOLD_Brochure.pdf
7
Indicators
What do we mean by key?
Periodicity
Action plans
Dashboards
Summary
Many firms have identified several hundred indicators and are trying to manage their
businesses by using this number of KRIs. However, it is highly questionable whether any
business can truly have or indeed manage that number of indicators of key risks – or have
the number of key risks which will give rise to several hundred indicators.
Other firms have striven for a very small number of indicators which will tell them about the
well-being of the firm overall. This approach brings to mind a doctor trying to assess the
complete state of your health only by taking your blood pressure, by measuring your pulse
and by listening to your heart – clearly a good place to start, but definitely not to finish.
As can be seen in Figure 7.1 indicators are one of the three fundamental processes of
operational risk management. Indicators of risks which are key can provide vital early
warning signs to enable threats to the business and its objectives to be managed before they
happen. Such indicators are typically called leading or predictive indicators. They give the
current risk and control levels, as opposed to historic or future values.
Figure 7.1 Typical operational risk framework, showing position of indicators
As indicators give today’s levels of risk, they also enable trends in risks and their associated
controls to be investigated and analysed. This trend analysis can help to predict events
before they happen. It can also signal that escalation criteria have been breached and so
trigger management action.
Figure 7.2 shows how KPIs and KRIs relate to each other and also how they relate to a third
set of key indicators, key control indicators (KCIs). KCIs tell us about the change in the
design or performance of controls and again can be linked to a risk and control assessment.
KCIs fall into two categories: indicators of those controls which mitigate individual key risks
and indicators of those controls which mitigate a number of risks.
Approaches to identification
Management support is essential for establishing indicators of risks which are key. There are
various approaches to identifying indicators of key risks and key controls. Some of these are
more likely than others to attract management support and drive. They are:
Given that senior management should have been involved in the production of the relevant
risk and control assessments, this approach sends a clear message that the risk and control
assessment is of limited and narrow value, rather than being one of the three linked and
fundamental operational risk management processes.
It also makes it difficult to identify which indicators are the best to manage the key business
risks. Additionally, the indicators are identified in isolation and are not directly related to a
risk.
It uses business metrics which are well known and understood. This means that senior
management will be comfortable with the indicators and more willing to take decisions based
on them.
The data is more likely to be accurate as it is in current use.
There is an implicit link to identified risks and controls as most managers intuitively know
their major risks and the controls that mitigate them. This intuitive knowledge leads to a
natural match between the information used to control the business and the risk profile of the
business, as represented by the risk and control assessments.
However, there is no explicit link to specific key risks. It is therefore harder to identify the
indicators of key risks from indicators of normal risks. This approach also makes it difficult to
identify which indicators are significant, although it can be argued that all metrics which are
used on a monthly basis by senior management should be significant.
Identification of key risks is relatively easy with this approach. Typically, a key risk is
identified as a risk with a gross/inherent high-impact score and a gross/inherent
high-likelihood score. If this approach identifies only a few key risks, it is often expanded to
include all risks which have a high impact, with no attention being paid to the likelihood
score.
Having defined the key risks, it is also easy to identify one category of key controls, i.e. any
control which mitigates a key risk. Another category of key controls is any control which
mitigates several risks, since the failure of this control may have a significant effect on the
firm. In Figure 7.3, a firm may consider the key risks to be risks 1 to 3, although 4 to 7 may
also be counted as key. Then 11, 17 and 18 are also assessed as having a high impact, but
their likelihood is considered low, so it is probable that the firm will not consider them as
being key. All controls of risks 1, 2 and 3 will be considered as key controls. Additionally,
‘Appraisals’ and ‘Staff training’ mitigate more than one risk and so may also be considered
key.
Having identified the key risks, it is now relatively easy, using knowledge of the business, to
identify indicators of the key risks which tell you about the changes to their likelihood or
impact and to the design or performance of a key control. A good indicator will be easy to
access and easy to understand. Many risk indicators, typically around 60–70% of indicators
of key risks, are already being tracked somewhere in the firm. Although getting access to the
relevant Excel spreadsheet or database can initially be difficult, it is worth persevering as
data already in use is generally of a far better quality than new data.
It is common to identify a considerable number of indicators for each key risk. The challenge
is to find a small number of indicators which convey information that is useful to the
business, preferably using existing management information. Ideally, there will be one or two
indicators for the likelihood and impact of a key risk and one indicator for each control which
mitigates the key risk. In this way it is possible to achieve a manageable number of
indicators which will give a good picture of the current risk profile of the firm, such as the one
given in Figure 7.4.
In the example shown in Figure 7.5 a mean target has been set of 5 with a green band of 4
to 6. The indicator has bands on both sides with an amber band of 3 or 2 on the lower side
and a value of 7 on the upper side. These bands represent a breach of risk appetite. 1 or
below is in the lower red band and 8 or above is in the upper red band. At this level there
has been a significant breach of risk appetite. This is an example of an indicator which is
bounded on both sides and which has uneven bands.
Figure 7.5 Threshold setting
It is also common for indicators to have one-sided bands, for example a green band of 0 and
1, an amber band of 2 or 3, and a red band of 4 and above. Indicators can also be binary,
that is, they move directly from a green band to a red band. An example of this type of
indicator might be the number of fatalities on a construction site where the contractor will
have a green level of 0 and a red level of 1 or more.
Clearly these bands should be linked to the appetite of a firm. For example, for the key risk
‘Loss of key staff’ an indicator may be ‘Key staff turnover’ and the bands agreed as in Figure
7.6.
Figure 7.6 Thresholds for ‘Loss of key staff’ risk and risk appetite for ‘Key staff turnover’
A firm may be willing to accept a key staff turnover of between 10% and 15%. The
management of key staff turnover at this level may be delegated to the relevant head of
business. This level is considered to be normal and acceptable for the business.
Key staff turnover between 5% and 9% and between 16% and 20% may be regarded by the
business as inconvenient and, for the upper range, expensive but nevertheless tolerable.
These levels of key staff turnover may be notified to an appropriate senior manager or
group, such as the risk committee, so that action can be taken to bring key staff turnover
back to the green band, if this is considered appropriate.
Key staff turnover over 20% may be regarded as too expensive for the business, both in
terms of loss of corporate knowledge and of recruitment costs. It will probably also result in
disruption to the business and mean that some months go by before stability and cohesion
are restored to senior management. Key staff turnover under 5%, though, may also be
considered to be a ‘red’ indicator, as being at too low a level for the business, since fresh
ideas and new approaches are often brought in by new key staff. Low key staff turnover can
also be a reflection of a senior management cadre which is relatively overpaid and
complacent. These levels of key staff turnover would probably be notified to the board as
well as the risk committee.
When looking at validation data, however, remember to allow for data which changes in
different periods. For example, the number of non-productive days due to staff absence will
be higher in the summer, when holidays are traditionally taken, than in the spring or autumn.
PERIODICITY
Indicators can be tracked over various lengths of time (e.g. daily, weekly, monthly or
annually). Most typically, risk indicators are recorded on a monthly basis although indicators
of risks which are at a transaction level are often daily or even intra-day. The periodicity of an
indicator is largely irrelevant to using it for managing a risk. Much more important is how
frequently the risk changes.
An indicator linking a risk to a daily process or activity clearly requires recording on a daily
basis, for example an indicator which records whether or not daily reconciliations of a bank
account have been completed. Equally, an indicator linked to a risk which is annual in nature
needs recording only on an annual basis, for example an indicator linked to the completion
of an annual regulatory return. However, the majority of indicators are recorded on a monthly
basis as this frequency gives the best balance between the effort required to record the
indicator and good management of the risk. Examples are staff turnover and staff attendance
at training courses, each of which may reflect the level of competence of the workforce.
Directive controls – controls which mitigate a risk through direction (e.g. policies, procedures,
terms of reference).
Preventative controls – controls which mitigate a risk through preventing it happening (e.g.
guards round a piece of machinery).
Detective controls – controls which mitigate the impact of a risk (e.g. fire alarms or
accounting reconciliations).
Corrective controls – controls which mitigate the impact of a risk through correcting the
effects of an event (e.g. disaster recovery site).
It is clear that indicators of preventative controls are leading indicators, whereas indicators of
detective controls will provide information about the likely size of an event and are lagging
indicators. The good risk management practice of having a balance of directive,
preventative, detective and corrective controls to mitigate a risk is therefore very helpful in
identifying leading and predictive control indicators. This technique also provides a valuable
challenge to the management of risks in that the risk owner is able to see whether or not the
mitigation of the risk is balanced with a similar number of controls operating before and after
the event has occurred (see Identifying controls in Chapter 5, Risk and control assessment).
ACTION PLANS
Collecting and monitoring indicators is of no use unless action is subsequently taken. A firm
will clearly wish to take action if a leading indicator shows that the risk is more likely to occur.
Action plans raised by indicators will be similar to other management action plans in that
they will include the objective to be achieved through completion of the action plan, the
expected date of completion, the owner of the action plan and other typical items. However,
there will also be reference to the control which is failing (if applicable), the risk which has
been identified as more likely to occur and the possible impact to the firm if the risk does
occur. These points, which are linked explicitly to an indicator, will be helpful in preparing a
cost–benefit analysis for the action plan.
DASHBOARDS
Indicators are commonly reported on dashboards, an example of which is given in Figure
7.7. As can be seen, a Red (R)/Amber (A)/Green (G) status column is very common together
with a trend indicator. These two columns provide a quick view and guide the dashboard
user as to which indicators to focus on first. It is also common to record the most recent
three periods and to have an average of the most recent three in order to smooth the
volatilities in the indicators.
In Figure 7.7, the ‘Overtime hours’ has a ‘red’ status and is of concern because of its actual
level, although it is at least trending down. ‘Complaints received’ requires attention because,
although it is at ‘amber’, it has doubled in this period. Additionally, although the ‘Temporary
staff’ percentage is trending down, the change from the last period is relatively small.
Combinations of indicators can also tell stories. For example although the risk of ‘Accounts
not KYC [Know Your Customer] compliant’ is stable and within the green band, the number
of customers has increased significantly in this period whilst the ‘Overtime hours’ and
‘Temporary staff’ percentage are both trending down. These last two indicators may be
indicators of how well the control of ‘Operations KYC review’ is performing in mitigating the
risk of ‘Accounts not KYC compliant’. This leads to the conclusion that ‘Overtime hours’ and
‘Temporary staff’ are likely to be leading indicators for the risk of ‘Accounts not KYC
compliant’.
A firm may be willing to accept a key staff turnover of between 10% and 15%. The
management of key staff turnover at this level may be delegated to the relevant head of
business. This level is considered to be normal and acceptable for the business.
Key staff turnover between 5% and 9% and between 16% and 20% may be regarded by the
business as inconvenient and, for the upper range, expensive but nevertheless tolerable. These
levels of key staff turnover may be notified to an appropriate senior manager or group, such
as the risk committee, so that action can be taken to bring key staff turnover back to the green
Key staff turnover over 20% may be regarded as too expensive for the business, both in terms
of loss of corporate knowledge and of recruitment costs. It will probably also result in
disruption to the business and mean that some months go by before stability and cohesion are
restored to senior management. Key staff turnover under 5%, though, may also be considered
to be a ‘red’ indicator, as being at too low a level for the business, since fresh ideas and new
approaches are often brought in by new key staff. Low key staff turnover can also be a
reflection of a senior management cadre which is relatively overpaid and complacent. These
levels of key staff turnover would probably be notified to the board as well as the risk
committee.
Validation of thresholds through experience
Thresholds can be validated through reviewing previous indicator data, where it is available,
and through a review of the losses incurred by the firm which are relevant to the specific risk
or competitors’ losses.
When looking at validation data, however, remember to allow for data which changes in
different periods. For example, the number of non-productive days due to staff absence will
be higher in the summer, when holidays are traditionally taken, than in the spring or autumn.
PERIODICITY
Indicators can be tracked over various lengths of time (e.g. daily, weekly, monthly or
annually). Most typically, risk indicators are recorded on a monthly basis although indicators
of risks which are at a transaction level are often daily or even intra-day. The periodicity of an
indicator is largely irrelevant to using it for managing a risk. Much more important is how
An indicator linking a risk to a daily process or activity clearly requires recording on a daily
basis, for example an indicator which records whether or not daily reconciliations of a bank
account have been completed. Equally, an indicator linked to a risk which is annual in nature
needs recording only on an annual basis, for example an indicator linked to the completion of
an annual regulatory return. However, the majority of indicators are recorded on a monthly
basis as this frequency gives the best balance between the effort required to record the
indicator and good management of the risk. Examples are staff turnover and staff attendance
at training courses, each of which may reflect the level of competence of the workforce.
risks are more likely to occur; they can give early warning signals before risks happen. The
challenge for operational risk management is to identify which indicators are most likely to
give the early warning signals, in other words the ones which act as effective leading
indicators. Clearly, indicators that the risk is more likely to happen, likelihood indicators, are
a good place to start as these provide warnings before the risk event has occurred. Equally,
indicators about the impact of a risk event are lagging indicators and will tell you about the
effect of the risk when it has happened, and the likely size of the impact. However, there is
not necessarily a correlation between an indicator’s numeric value and the final size of the
impact. Indicators tell you that the world may have become riskier, but not by how much.
1. Directive controls – controls which mitigate a risk through direction (e.g. policies,
3. Detective controls – controls which mitigate the impact of a risk (e.g. fire alarms
or accounting reconciliations).
It is clear that indicators of preventative controls are leading indicators, whereas indicators of
detective controls will provide information about the likely size of an event and are lagging
indicators. The good risk management practice of having a balance of directive, preventative,
detective and corrective controls to mitigate a risk is therefore very helpful in identifying
leading and predictive control indicators. This technique also provides a valuable challenge to
the management of risks in that the risk owner is able to see whether or not the mitigation of
the risk is balanced with a similar number of controls operating before and after the event has
ACTION PLANS
Collecting and monitoring indicators is of no use unless action is subsequently taken. A firm
will clearly wish to take action if a leading indicator shows that the risk is more likely to
occur. Action plans raised by indicators will be similar to other management action plans in
that they will include the objective to be achieved through completion of the action plan, the
expected date of completion, the owner of the action plan and other typical items. However,
there will also be reference to the control which is failing (if applicable), the risk which has
been identified as more likely to occur and the possible impact to the firm if the risk does
occur. These points, which are linked explicitly to an indicator, will be helpful in preparing a
DASHBOARDS
Indicators are commonly reported on dashboards, an example of which is given in Figure 7.7.
As can be seen, a Red (R)/Amber (A)/Green (G) status column is very common together with
a trend indicator. These two columns provide a quick view and guide the dashboard user as to
which indicators to focus on first. It is also common to record the most recent three periods
and to have an average of the most recent three in order to smooth the volatilities in the
indicators.
In Figure 7.7, the ‘Overtime hours’ has a ‘red’ status and is of concern because of its actual
level, although it is at least trending down. ‘Complaints received’ requires attention because,
although it is at ‘amber’, it has doubled in this period. Additionally, although the ‘Temporary
staff’ percentage is trending down, the change from the last period is relatively small.
Combinations of indicators can also tell stories. For example although the risk of ‘Accounts
not KYC [Know Your Customer] compliant’ is stable and within the green band, the number
of customers has increased significantly in this period whilst the ‘Overtime hours’ and
‘Temporary staff’ percentage are both trending down. These last two indicators may be
indicators of how well the control of ‘Operations KYC review’ is performing in mitigating
the risk of ‘Accounts not KYC compliant’. This leads to the conclusion that ‘Overtime hours’
and ‘Temporary staff’ are likely to be leading indicators for the risk of ‘Accounts not KYC
compliant’.
SUMMARY
Indicators are valuable not only in monitoring business performance, but in identifying
changes in a firm’s risk environment and in the effectiveness of risk controls. They are a
fundamental part of the operational risk management process and an essential part of
monitoring operational risk appetite.
The important thing to remember is that a KRI is an indicator of a key risk and a KCI an
indicator of a control which relates to a key risk. If that is understood, the number of
indicators will be manageable and the business will see them as valuable, thus helping to
achieve buy-in for the whole operational risk management process. Another tip to encourage
buy-in is to use, as far as possible, indicators which are already being used by the business.
Inventing new ones, or failing to involve the business in identifying and establishing
indicators, will be counter-productive and a waste of energy and goodwill.
Part 3
ADVANCING THE FRAMEWORK
8. Reporting
9. Modelling
10. Stress tests and scenarios
Reporting
Why reporting matters
Common issues
Basic principles
Report definition
Reporting styles and techniques
Dashboard reporting
Summary
COMMON ISSUES
BASIC PRINCIPLES
Timely reporting
A report is only useful if it is produced in a timely fashion. If a report frequency is set as
monthly, it is likely that the values in the report will or may change on a month-by-month
basis. It is therefore no good producing a monthly report three or four weeks after the end of
the month as it will have relatively little value. Time has moved on and it is almost time for
new values to be calculated for the end of the following month. Equally, there is no point
setting a report frequency of daily or weekly if the values only change on a monthly basis.
Untimely reports like this will be ignored by management and will actively work against
embedding good operational risk management in a firm.
Risk ownership
Any risk report should enable management to take ownership of the information. This may
be done explicitly, with a risk owner clearly identified, or implicitly through the identification of
a department or business line. Either way, and linking with the point above about identifying
actions, a good operational risk report will precipitate effort to correct or enhance the
operational risk profile of the firm by the person who owns the risk which requires action. An
alternative, of course, is that the report shows that all risks are within the firm’s risk appetite
and that no action is required. If this is the case, it is debatable as to whether or not the risk
appetite of the firm is too conservative. Even a report indicating that no action is required can
prompt a useful challenge.
Further context can be given in terms of percentages for each slice – see Figure 8.3 –
together with clearer labelling – see Figure 8.4 – which makes for much easier reading.
Figure 8.3 Enhanced pie chart
In Figure 8.6, a great deal of information is obscured by the columns in the front. In Figure
8.7, information is again difficult to access. This is in contrast to Figure 8.8 which is a 2D line
chart.
Figure 8.8 2D line chart
Although there is a considerable amount of information in this chart, it is still possible to
understand it quickly and therefore be able to draw an informed conclusion as a basis for
action.
Shading
It is easy to shade a table to indicate the status of a cell and to include possibly spurious
accuracy through decimal values. Figure 8.9 is more cluttered and more difficult to extract
information from than Figure 8.10.
Figure 8.9 Losses for six months, showing thresholds
Figure 8.10 Losses for six months, highlighting red cells only
In Figure 8.9, the eye is pulled to the masses of light and medium shaded cells, rather than
to the important information highlighted in dark tint, which stands for red cells. In Figure 8.10,
loss amounts have been reduced to round £ thousands and only the dark-tinted (red) cells
are highlighted, the information which most concerns the reader.
DASHBOARD REPORTING
Many reports feature in other chapters of this book. These focus on the chapter topic, for
instance risk and control assessment, indicators, events and losses. However, it is important
to draw the threads together so that a comprehensive and cohesive approach can be taken
to managing operational risk. Such a report will show the major items of interest to the
reader (and as noted above these will be different for different readers). A report giving a
range of information, often in different formats to suit the particular topics being reported, is
usually called a dashboard. Two examples of a dashboard report are given in Figures 8.11
and 8.12.
The risk performance report in Figure 8.11 gives the top four risks for the firm. (This is
commonly produced for the top 10 or top 15 risks.) The indicators and events/losses for
these top risks are given too, so that an overall operational risk picture is available. Actions
and overall rating (on the right-hand side) can be agreed at the risk committee. This report
can then be distributed to board members as a summary of the firm’s operational risk status
for its top risks.
Figure 8.12 provides summary risk information on the top operational risks of the firm at a
more detailed level of loss event type and extends the analysis in Figure 8.11 to include
more complete data on indicators and losses, as well as more information on risk and control
assessments. Whilst there may be a loss of detail in any summary, salient information is
brought out by different display formats. The summary table at top left provides a good use
of colour which draws attention to risks which require action, as well as providing a clear
indication of indicator trends, which is developed in the bar chart at top right. The spidergram
at bottom left is an effective way of highlighting relative levels of risks and controls. The
column and line chart at bottom right provides a clear visual summary of the more detailed
loss information just above it. In addition, this report provides directional information in terms
of arrows relating to the KRIs. It is, however, important to remember that, for particular KRIs,
down can be good or bad. So, arrows are often coloured green or red to indicate whether the
direction of travel is good or bad.
Looking in more detail at Figure 8.12, we can see that the first four risk categories are all at
the same high inherent level. However, closer examination shows that, although the first two
categories have a relatively small number of losses and indicators which are entirely
acceptable, the third category, External Fraud – System Security, has a low level of losses
but has three indicators which are at a stressed level. Furthermore, there is no action
outstanding against this category. The fourth risk category, Business Process Failures –
Account intake/Acquisition, has seven losses although its indicators are also all acceptable.
For the set of the first four risk categories, numbers three and four require further
investigation.
Figure 8.11 Dashboard report: risk performance
The fifth risk category number 5.2, Financial & Regulatory Reporting – Internal Reporting,
has a lower level of inherent risk but 15 losses totalling 3.3 million. In addition, its indicators
are totally unacceptable with 7 being red, 12 being yellow and only 4 being green. The one
redeeming feature of this risk category is that there is at least an action outstanding.
However, there is clearly considerable remedial work to be actioned urgently for this risk
category.
SUMMARY
Good reports are essential to good operational risk management. Key information must be
easily accessible and delivered in such a way as to support informed business decisions on
the firm’s operational risk profile. That sounds easy and obvious, but is not so easy in
practice. It is only too easy to be overwhelmed by information which is not focused on
readers’ needs. That can include too much information, information which is not relevant to
the reader and information which may be relevant, but is not presented in a way which is
readily understandable. With operational risk, readers can be at every level of the firm, so
the range is wide.
All of those issues of communication and understanding are just as pertinent when it comes
to modelling operational risk, the subject of the next chapter.
Modelling
About operational risk modelling
Previous approaches to operational risk modelling
Towards an inclusive approach
Distributions and correlations
Practical problems in combining internal and external data
Confidence levels and ratings
Obtaining business benefits from capital modelling
Modelling qualitative data
Obtaining business benefits from qualitative modelling
Summary
Modelling of operational risk can be used to determine the economic capital required to
support the operational risks to which a firm is subject, as well as to calculate regulatory
capital requirements. By calculating capital by business line and loss event type, modelling
enables the capital to be allocated to business units easily and fairly and supports a risk
adjusted return on capital approach to business management.
In using mathematical models care has to be taken to understand the limitations of both the
input to and the output from the model, which are considered in detail in the next section.
The Basel Committee extended this approach by dividing impacts into seven loss event
types and eight business lines (see also Chapter 6, Events and losses), giving a 56-cell
matrix. Additionally, each firm was required to identify an exposure indicator which related to
the scale of the firm’s activities in a particular business line. The regulator provided a factor
which translated the firm’s expected loss into a capital charge for each cell. This factor was
based on industry-wide data and would in effect take each expected loss and increase it,
such that it became an unexpected loss. The combination of the factors of this approach
resulted in a formula which was summed for each cell in the matrix, i.e.
Σ(PE × LGE × El × γ)
where PE is the probability of an event over some future horizon, LGE is the average loss
given an event occurs, EI is the exposure indicator for that particular firm and γ (gamma) is
the expected/unexpected translation factor supplied by the regulator.
This is broadly consistent with the credit risk approach of using the PD (probability of default)
and LGD (loss given default) together with an EAD (exposure at default).
This approach also neatly removes the IMA disadvantage of the assumption of the
relationship between expected and unexpected losses, by deriving distributions directly from
the data, from a combination of the data and simulations of the data, or from prior
knowledge, perhaps gained through knowledge of the experience of other firms.
A capital charge is derived from the value at a high centile of each of the 56 distributions
which is to produce an overall capital figure. Mention was made of the potential to use
less-than-full correlations as it was recognised that simple summing assumes a perfect
correlation. The values from all cells relevant to the firm are then added together.
Mathematically:
where VaRle,bl is the value at the required centile of the selected loss event (le) and
business line (bl) cell.
One serious flaw of the LDA is that it did not recognise that it is mathematically incorrect to
sum VaRs from different (and possibly very different) distributions. However, the approach
could be mathematically correct if an expected shortfall figure was used instead of the VaR,
as the expected shortfall is an average of all the VaRs at and past the relevant quantile.
The first five disadvantages for the IMA (see p. 168) are equally valid for the LDA.
Scorecard approach
This is named after the balanced scorecard approach to management practised by a number
of large firms. It takes a more qualitative view of operational risk capital than the IMA and
LDA. It is intended to reflect improvements in the control environment which may reduce the
frequency and/or the severity of future operational risk losses. Changes to the risk profile
may be reflected through indicators of particular risks or the results of, for example, risk and
control assessments. Given the use of qualitative data, the results of this approach must be
rigorously challenged through the use of both internal and external loss data.
A fundamental difference between a scorecard approach and the two approaches above
(based solely on loss data) is the inclusion of forward-looking data derived from discussions
with business line staff and reviewed by a central risk function. The discussions and review
often form part of the risk and control assessments, as it is these which can easily be used
to identify expected risks to the firm in the future and its control environment.
A further difference using the scorecard approach is that the capital is calculated from a
single VaR value taken at the required quantile from a single distribution created using the
firm’s or the business unit’s entire data. This has the advantage that it does not sum VaRs.
The advantages to this approach include the following:
• If a firm acquires or disposes of a business or commences or ceases trading in a new
product, an assessment of the risks (and the capital required) can be included immediately
due to the forward-looking element of this approach.
• Forward-looking risk and control data can be used to compensate for a lack of loss data.
• There is, in theory, no need to wait for a number of years in order to collect sufficient
data. The inherent nature of this qualitative forward-looking data is that it is refined and
modified over time as management becomes more confident with its risk methodology and
as the firm’s risk profile changes.
• Although the data is subject to business judgement assumptions, the assessment of
risks and controls is often performed on a realistic worst-case basis. This yields data that is
significantly towards the high centiles and therefore the data used in a scorecard approach is
inherently more representative of data which can severely damage a firm, than data solely
from losses.
There are, however, a number of drawbacks to this approach:
• The major assumption that business judgement is a good indicator of the future capital
requirements of the firm: the events of 2007–9, particularly in the banking part of the
financial services sector, show that this assumption is just as flawed as the assumption that
the past is a good guide to the future. (See also Recognising and mitigating natural biases in
Chapter 10, Stress tests and scenarios.)
• The quality of the forward-looking data can vary widely depending on the extent of line
management commitment. Some management can be very willing to dedicate time and
effort to determining a comprehensive set of risks and controls. Others will view it as an
intrusion into their everyday work and may delegate the risk and control assessment to
inappropriate or inexperienced junior personnel. This is, of course, a reflection of an
unacceptable risk culture in the firm.
• Whilst the two loss data based approaches derive distributions from the data, the
scorecard approach often requires a distribution to be assumed for the probabilistic
modelling. Distributions have different sizes and shapes and this can affect the capital
requirement. This drawback can be overcome by taking capital requirement readings at
whatever quantile is used from a variety of distributions, as the modelling can be repeated
using as many different distributions as the firm sees fit.
As can be seen in Table 9.1, the assumption that the past is a guide to the future is clearly
made in both the IMA and LDA. However, the scorecard approach could also be challenged
in that whenever the future is assessed, there is at least an inherent bias towards what has
happened in the past. Equally, the assumption that ‘business judgement is a guide to the
future’ is clearly made in the scorecard approach although the only way that the other two
approaches could be accused of making this assumption is through the derived capital
requirement which of course applies to the future.
As the data for the IMA and LDA are from losses experienced by the firm, there is a clear
assumption that those losses are recorded in an analysis by the firm (most usually in the
accounts/general ledger of the firm) and that this analysis is accurate. The scorecard
approach is likely to use losses suffered by the firm as a form of back-testing and therefore
the assumption of accuracy is considerably less important.
As the IMA explicitly assumes a fixed and stable relationship between the firm’s loss data
and capital requirement, the use of low-frequency/high-impact data is less important,
although it will add to the accuracy of the capital requirement if it exists. In contrast, the LDA
makes no such assumption in terms of a fixed and stable relationship and therefore the
availability of low-frequency/high-impact data is of much more significance. Again, although
the scorecard approach does not use loss data directly, its availability for back-testing is
useful and therefore sufficient high-quantile data will again add to the accuracy of the
derived capital requirement.
The only approach which assumes a fixed relationship between existing losses and
unexpected losses is the IMA. In terms of distribution assumptions, the IMA does not use a
distribution, being a deterministic method for calculating capital, whereas the scorecard
approach definitely assumes distributions in its probabilistic modelling. The LDA may
assume distributions in the higher quantiles and also may assume a particular distribution is
the best fit for a particular loss event type/business line cell.
Table 9.2 Data analysis
Table 9.2 analyses the characteristics of the data in the three approaches. Clearly, the IMA
and LDA both use objective (i.e. past) data and the scorecard approach may use it in
assessing the future. Equally clearly, the scorecard approach uses a subjective analysis of
the risks that may be suffered by the firm and of the controls that may be used to mitigate
the risks. Both of these are forward-looking although possibly influenced by past events.
Any quality assurance on the data will probably be provided by internal audit for the IMA and
LDA loss data whereas quality assurance on scorecard data can only be provided by internal
audit at a process level.
Although some cells in the Basel 56-cell matrix will have considerable loss data, other cells
will have very little loss data, if any. This means that the statistical analysis in the LDA in
particular may be poor due to a low quantity of data. In comparison, the scorecard approach
data will be tailored to that which is required if line management can be engaged in the
process.
To have sufficient data for loss event modelling you need at least 30 data points for each
risk, or combination of risks, which you are trying to model. The time it takes to collect that
amount of data is therefore as long as you need, but could well be at least five years or
longer for relatively rare risks. Timescales such as these significantly affect the ability of a
firm to start using advanced modelling. And, of course, even five years of benign activity tells
you little, as we have seen with credit data in the period preceding the 2007–8 sub-prime
problems. On top of which, old data can be largely irrelevant, since the internal and external
environments will almost certainly have changed.
Although the collection time for scorecard data is much shorter (as long as it takes to
complete sufficient risk and control assessments), the need to challenge the scorecard data
through the use of appropriate and sufficient loss data means that the scorecard approach is
similarly constrained to a five year minimum period as with the IMA and LDA. However, the
scorecard approach can be used by the business to gain significant benefit before this time
has elapsed (see Obtaining business benefits from qualitative modelling later in this
chapter).
The source of losses will ultimately be a value which is recorded in the accounts in the IMA
and LDA whereas management will provide the data for the scorecard approach.
The use of external data can be either direct or indirect in the LDA or IMA, whereas the
scorecard approach will use external data both for back-testing and possibly for the
generation of relevant high-quantile risks. Direct use of external data in the LDA or IMA is
dependent on appropriate conditioning of the data, such as scaling (see Chapter 6, Events
and losses).
Other factors come into play, apart from the nature and quality of assumptions and data.
These are shown in Table 9.3. The capital charge calculation in the IMA is deterministic and
uses a standard factor. In the LDA, individual VaR values are used and then summed to
produce an overall capital figure for the firm. In the scorecard approach, a single value is
taken from the overall distribution for the firm.
The efficiency of controls is tested indirectly through the IMA and the LDA as control failures
lead to losses and therefore there is an implicit link to the capital required. As the scorecard
approach directly assesses the quality of the controls, it can also be used to challenge the
efficiency of the controls by comparing the mitigating effect to the cost of controls (see later
in this chapter, Obtaining business benefits from qualitative modelling).
In the same way the IMA and LDA can be used indirectly to support cost reduction, whereas
the scorecard approach can be used directly to support reduction.
The transparency of the three approaches is hotly debated. It can be argued that the IMA
has a low transparency because of the use of exposure indicators (determined by the firm)
and translation factors (determined by the regulator or an industry body). Equally, the LDA
uses the firm’s own losses (albeit probabilistically) and it can therefore be said to be
transparent. Whilst the scorecard uses management’s own view of its forward-looking risks
and of its controls, the probabilistic approach may be viewed as lacking transparency.
It can clearly be seen that most of the qualitative governance standards which are essential
in inclusive modelling are also essential good operational risk practice. It is true that the
depth of analysis may differ, for example, in the external operational risk measurement
validation where it will be less detailed in good operational risk practice than in inclusive
modelling. The capital allocation and incentives for good risk management will also be to a
different depth and rigour. However, the only major item which stands separately in inclusive
modelling is integrated scenario analysis. It is arguable that any well-run firm will include this
in its business practices anyway.
Gaps
There are often gaps in the internal loss data. It is very common, for instance, in banking for
there to be a significant quantity of loss data in the loss event type ‘Execution, delivery and
process management’ for all firms and, for retail banking institutions, in the loss event type
‘External fraud’. This may be because senior management gets to know about fraud losses
or because they come directly from the general ledger. Either of these reasons means that
fraud loss reporting is not reliant on individual staff reporting the loss. However, some loss
event types such as ‘Damage to physical assets’ have a historically low data count. In order
for data to be significant, there must be sufficient data points for reliable statistical modelling.
For these purposes, at least 30 independent sets of data are required.
Scaling
Such gaps can be partially filled by external loss data. However, there is considerable
debate around how to scale external data for a particular firm. For example, what scaling
factor should be used in order to adjust the loss suffered by a Barings or BCCI to a particular
firm’s risk profile? A number of commentators have suggested metrics such as number of
staff, gross revenues or the number of trading tickets processed. However, there is no
evidence to show that losses can be scaled using such metrics. The answer, as we saw in
the section on Scaling in Chapter 6, Events and losses, is that precise scaling is not
possible, but an assessment can be made by identifying common factors between the
loss-suffering firm and your own and extrapolating an answer on that basis.
Data cleansing
It is very clear that models using external data are particularly sensitive to the data, as its
principal impact will be on the extreme right-hand end of the curve from which a capital
figure is taken. As such, cleansing of external loss data is vitally important when it is used for
modelling. The term ‘cleansing’ denotes the process of checking that the losses are relevant
to the firm and determining an appropriate size of the loss with respect to the firm.
Whilst the appropriate size can be determined through some form of scaling, as discussed
above and in Chapter 6, the relevance of the loss to the firm is the first step in the process,
as there is no point scaling a loss which is not relevant. To understand the relevance, it is
important to have a narrative in the external data which comments on the cause of the loss.
Additionally, there may be losses made by firms outside the financial services sector which
are directly relevant to a financial services firm. For example, the British Airways and Gate
Gourmet outsourcing case (mentioned in Chapter 14, Outsourcing) is directly relevant to
almost all financial services firms, as outsourcing is significant in their industry.
It is therefore important for external data to be carefully challenged, both in terms of
relevance and size, before putting such data into a model. This challenge does not have to
be carried out every time the model is run, although it is appropriate to review previous
challenges on a periodic basis, such as an annual review. Similarly, it is also appropriate to
challenge internal data when the firm’s business model changes, when there are significant
changes in the marketplace and as it degrades over time and may become only partially
relevant.
Fat tails
The term ‘fat tails’ is sometimes used, often somewhat disparagingly, during a discussion
about modelling operational risk events and losses. This refers to the higher quantiles in a
distribution and to the seeming paradox that a considerable number of high-quantile events
have occurred within the last 15 to 20 years.
Mathematically, very large events are supposed to happen only once in many lifetimes. Yet
any operational risk manager can name at least half a dozen very large events they have
experienced or been aware of, without even touching the events of the financial crisis of
2007–9. To have a very large number happening in such a relatively short timescale means
that at least one of the assumptions underlying modelling must be incorrect. The most
obvious assumption to challenge is that the shape of the curve is correct. The response of
many mathematicians involved in operational risk has been to increase the size of the tail
above that which is demanded by the standard shape for a distribution (see Figure 9.2). This
inevitably increases the size of the capital required, but it makes the model appear more in
touch with reality, as higher losses demand more capital.
However, it is also possible that another distribution exists in the higher quantiles which is
largely separate from the distribution which covers expected losses in the
high-frequency/low-to-medium impact part of the curve. The challenge for modellers is to
model a bimodal distribution with one mode in the expected losses area and a second in the
low-frequency/high-impact area (see Figure 9.3). Resolving this challenge is a significant
mathematical exercise and is beyond the scope of this book.
Figure 9.2 Lognormal distribution and ‘fattened’ tail
Similarly, in the ‘Business Disruption & System Failures’ column there is a very small capital
requirement against Agency Services. Either very good controls (perhaps a hot standby
computer system) exist in Agency Services for Business Disruption & System Failures or
Agency Services is very dilatory in reporting events and losses and also has assessed its
business and internal control environment as excellent (i.e. its risks are very low and its
controls are very good). If good controls exist then it will be worthwhile investigating whether
these controls can be replicated in, for instance, Retail Banking or Retail Brokerage where a
substantial reduction in capital could be achieved.
Linking model data and reports
It can also be helpful to look at the number of losses reported and to link these with the value
of capital required. Figure 9.5 gives the numbers of internal losses recorded relating to the
capital figures given in Figure 9.4.
Figure 9.5 Model input example: number of internal losses (part of the data used to generate
the output in Figure 9.4)
Source: Courtesy of Chase Cooper Limited
Linking the number of losses in the ‘Employment Practices & Workplace Safety’ column for
Corporate Finance and Trading & Sales to the capital requirements in Figure 9.4 gives a
clearer picture of which of the three possibilities above are more likely. Given that Trading &
Sales has only reported 39 events against Corporate Finance’s 95 events, it would appear
that the second possibility is more likely, i.e. Trading & Sales has not reported all of its
events and losses, whereas Corporate Finance has been very diligent. However, the third
possibility remains feasible and clearly the next step is a short investigation of Trading &
Sales to see which of these two remaining possibilities has actually occurred.
In much the same way, Agency Services having only one event reported requires further
investigation. In both cases, the firm will benefit from either better reporting of losses and
therefore better data on which to manage the businesses or from good controls in one
business being developed and implemented in other businesses. Either way the firm’s
operational risk profile will be better managed and potentially significantly reduced.
A large standard deviation indicates that the detective and corrective controls are poor as
the impact of a risk has a wide number of values. In contrast, a small standard deviation
indicates that the controls contain the impact of the risk event to a relatively small range of
values around the average. Figure 9.6 shows this in graphical terms.
A standard deviation of a set of losses, typically represented by the losses relating to a
single cell in the 56-cell matrix, is a common input to or output from a model. Examination of
the standard deviations will yield conceptually similar challenges and business benefits to
those noted above in the examinations of capital requirements and numbers of losses.
Figure 9.6 Small, medium and large standard deviations
Source: Courtesy of Chase Cooper Limited
A fourth objection to qualitative data is that it is only good for broad adjustments as it is
inherently unstable. However, although management’s view of the future does change it
tends to be remarkably consistent given a stable environment. Internal and external losses
(that is the so-called hard quantitative data) will also change to reflect changes in the
business environment.
Some of the general problems with modelling are also equally applicable to the modelling of
qualitative data. For example, an entirely incredulous look can be achieved by telling a board
member that 2 + 2 does not equal 4 but is equal to somewhere between 3.9 and 4.1
approximately 95% of the time. This is of course simply a lack of understanding of the
difference between probabilistic modelling and deterministic mathematics. Senior
management should be looking for a range of results, and not a single figure. However, the
true casualty in modelling is that the many assumptions underlying modelling are either
forgotten or conveniently ignored.
Risks
Risk and control assessment data can be modelled through using standard Monte Carlo
simulation techniques. An output example for risks is shown in Figure 9.7. A risk and control
assessment model will take the risk and control scores assigned during an assessment and
model these through simulating the potential losses using a given distribution.
Figure 9.7 Risk and control assessment model output example: potential gross and net
losses
As can be seen from the histogram in Figure 9.7 there are several risks, in particular R01,
R03 and R13, which have significant modelled net losses (pale bars). Their net values of
approximately £12m, £9m and £9m respectively can be read from the detailed spreadsheet
below the histogram.
It is not surprising that most risks have a net loss as the data has been modelled at a
confidence level of 99.9%. What is surprising is that one risk, R12, Failure to detect and
eliminate internal fraud, still has zero net risk even at the 99.9 quantile. It is most unlikely,
although possible, that the controls mitigating this risk are so good that they are still
operating perfectly at the average of the worst year in 1000 years. It is far more likely that:
• the quality of the controls has been overstated
• the number of controls mitigating the risk has been overstated, or
• the independence of the mitigating controls has been overstated.
Clearly, if the controls are all scored with a top score for both design and performance they
are most unlikely to fail together and cause a net loss, particularly if there are two or three
controls all with maximum scores. Equally, if there are a number of controls, perhaps six or
seven, it is very unlikely that sufficient will fail in order to generate a net loss, even if some
are rated below maximum. The positive effect of having many controls can be compounded
if the controls identified are not independent. One of the fundamental assumptions
underpinning all operational risk models which use control scoring is that the controls are
independent. If this is not the case, the model will overstate the mitigating effect of the
controls.
Controls
An alternative way to look at a risk and control assessment is through the controls. Rather
than have the model aggregate results by risks it is also of business benefit to have the
model aggregate results by controls, particularly as one control may mitigate several risks.
Figure 9.8 gives the reduction in risk exposure achieved by each control and, taking into
account the cost of each control, gives the net benefit of the control. This enables a firm to
see the net reduction that a control gives in risk exposure. It can be seen at the top of Figure
9.8 that Retention packages for key staff and long-term incentive plans give high values of
control benefit after cost with Group Survey (remuneration) giving the highest benefit. It is
interesting that ‘Retention packages for key staff’ gives the highest control benefit but only
the second-highest benefit after taking costs into account.
Figure 9.8 Risk and control assessment model output example: potential control benefits
At the other end of the scale, shared P&L and shared bonus pool are both controls which
cost considerably more than the value that they bring to reducing the risk profile. The
business question to be asked now is whether these two controls can be operated at a lower
cost, whilst still achieving an acceptable mitigation of risk. In other words, is the firm willing to
spend that level of money in order to achieve a relatively small reduction in risk profile? In
some cases such a spend may be acceptable for controls related to, for example, a
regulatory risk which has to be mitigated in order to comply with regulations. In other cases
the choice will be much more up to management to determine whether or not the reduction
in risk justifies the spend.
Risk owners
Figure 9.9 shows a comparison between the risk owners who were captured during the risk
and control assessment for gross loss, control benefit and net loss. It is interesting to note
that the highest net loss is risk owner SG, followed by risk owner FT. It is to be expected that
SG is the CEO of the firm and that FT is one of the senior business heads. If this is not the
case the firm should ask itself whether it wants someone other than the CEO to be the
largest risk owner by value. It is also worth noting that risk owner JC has the lowest gross
loss exposure and also the lowest net loss, i.e. the controls for JC’s risks mitigate the highest
value risks in the firm. Is, perhaps, JC being over-optimistic in his/her control assessment
and risk assessment? And, therefore, is the firm more exposed to JC’s risks than it has
previously thought?
Figure 9.9 Risk and control assessment model output example: risk owner results
Clearly these questions are dependent on management having faith in the risk and control
assessments, although the questions will inevitably challenge the scores in those
assessments. This has the effect of a virtuous circle where scoring, modelling and
challenging generate real business benefit through modifying the risk and control
environment to fit the risk appetite of the firm.
SUMMARY
Modelling operational risk can be, but should not be, an abstruse ‘black box’ approach
accessible only, literally, to rocket scientists. It can and should be rooted in the core
operational risk framework processes of risk and control assessments, loss events and
indicators, as we have shown in this chapter. And its assumptions and principles should be
understood by the board and senior management. Since it is used for capital modelling it can
have a direct impact on reports on both product and business line performance.
Within operational risk, as with most things, there is no one methodology, let alone a limited
set of distributions which can be applied. As was said in the early days of operational risk,
‘let a thousand models bloom’. But even if the assumptions are understood and the
methodology is thoroughly and independently validated, the nature of operational risk means
that its modelling should be hedged with health warnings. The greatest danger is to take the
number at a particular point and not the range of possibilities.
10
INTRODUCTION
Stress testing and scenario analysis are essential tools for a firm’s planning and operational
risk management processes. They are rooted in the firm’s business and strategic objectives
and should form part of the process of identifying those objectives. They alert the firm’s
management to adverse unexpected outcomes, beyond those which have been identified in
risk and control assessments (RCAs) or modelling, and supplement other operational risk
management approaches and measures. Stress tests and scenarios are not forecasts of
what is likely to happen; they are deliberately designed to provide severe, but plausible,
possible outcomes. They are necessarily forward-looking and therefore involve an element
of judgement. Finally, they are invaluable during periods of expansion, by providing a useful
basis for decisions when none is available from other sources.
Stress testing and scenario analysis interact with the three fundamental processes of
operational risk (see Figure 10.1) and are also a natural part of modelling. As we have seen,
events and indicators can be used to develop scenarios, which are then applied to risk and
control assessments.
Figure 10.1 Typical operational risk framework, showing position of stress tests and
scenarios
WHAT ARE THEY AND WHAT’S THE DIFFERENCE BETWEEN THEM?
A typical description of stress testing and scenario analysis is the identification and analysis
of the potential vulnerability of a firm to exceptional but plausible events. Other descriptions
mention events, or combinations of events, which have a low probability of occurrence, but
are realistic.
Stress testing is generally described as the shifting of a single parameter (often involving a
number of standard deviation movements). In an operational risk context, this can be taken
to refer to either the occurrence of a single risk, such as internal fraud or a system failure, or
to the movement of a factor which may affect or does affect the firm as a whole, such as a
significant increase in interest rates or a significant equity market downturn.
By contrast, scenario analysis is about simultaneously moving a number of parameters by a
predetermined amount, based on statistical results, expert knowledge and/or historically
observed events. Alternatively, scenarios can be described as multiple stress tests occurring
within a reasonable period of time.
In reality, firms use both approaches in order to ensure a comprehensive analysis (see
Figure 10.2). For the sake of brevity, the term scenario will be used in this chapter to cover
both stress testing and scenario analysis. As has been shown, stress testing is simply a
special case of scenario analysis, in which only one parameter changes.
Figure 10.2 Combining stress testing and scenario analysis
Mechanical, point-of-time
Scenarios have also often been conducted as a mechanical and point-of-time exercise, with
little thought for the reaction of the board or senior management to the unfolding scenario. In
reality, as scenarios unfold, management takes action over a period of time (which could be
as long as 18 months) to mitigate the effect of the scenario on the firm. This point is often
overlooked. Additionally, a mechanical and point-of-time approach does not tend to take
account of changing business conditions or incorporate qualitative judgements from different
areas of the firm.
The identification of risks which correlate, for example supply risk and production risk, or
equity risk and interest rate risk, should be enhanced and how those risks aggregate should
be considered. In addition, correlations between risks are often underestimated. It is either
forgotten or ignored that correlations frequently break down under stress, and that different,
probably unforeseen, correlations emerge.
Feedback effects across industries or markets, whether positive or negative, should also be
considered, as should appropriate time horizons, rather than simply looking at the one-off
effect of a scenario. For instance, the failure of Lehman Brothers, which could have been
treated simply as the failure of a major counterparty, led to a significant feedback effect
across the liquidity markets.
GOVERNANCE
As with any operational risk methodology or procedure, it is vital to ensure that the
governance relating to the methodology is documented and understood. Good governance
will enable the board and senior management to guide and direct the operational risk
scenario strategy and to review its effectiveness. From a practical perspective, this will
involve setting the scenario objectives; defining the scenarios; discussing and promoting the
discussion of the results of the scenarios; assessing potential actions and making clear
decisions based on the results; fostering internal debate on the results of the stress tests
and scenarios programme as a whole; and challenging prior assumptions such as cost, risk
and speed for raising new capital or hedging/selling positions. All of these governance points
may be taken up by the board in its meetings or may be delegated to a board scenario
sub-committee which reports back to the full board.
An example of scenario governance came in a paper from the Basel Committee in May
2009. The headline principles are shown in the example below. Although they were written
for banks, they apply equally to any industry.
Example
Principles for sound stress-testing and scenario governance
Stress-testing should:
1. form an integral part of governance;
2. promote risk identification and control;
3. take account of views from across the firm;
4. have written policies and procedures;
5. have a robust infrastructure which is also sufficiently flexible to be capable of;
6. be speedily re-run as circumstances are rapidly changing;
7. regularly maintain and update the scenarios framework; regularly and independently;
8. assess the effectiveness of the scenarios programme;
9. cover a range of risks/business areas, including firm-wide;
10. cover a range of scenarios;
11. feature a range of severities, including ones which could challenge the viability of the
bank;
12. take account of simultaneous pressures in different markets;
13. systematically challenge the effectiveness of risk mitigation techniques;
14. explicitly cover complex and bespoke products;
15. cover pipeline (supply) and warehousing (product) risks;
16. capture the effect of reputational risk;
17. consider highly leveraged counterparties and the firm’s vulnerability to them.
Source: Basel Committee, Principles for sound stress-testing and supervision, May 2009
On the face of it, principles 15 and 17 can be said to be not applicable to operational risk.
However it is easily arguable that pipeline and warehousing risks and the firm’s vulnerability
to highly leveraged counterparties include a significant element of operational risk and
therefore should be included in any operational risk exposure review such as scenarios.
Operational risk scenarios should enable a firm to understand the sensitivities of all of the
elements of the firm’s operational risk exposure, as set out in the operational risk framework
we have described in this book. This includes:
• clarifying interactions and causal relationships between risks and controls
• acting as a challenge to the subjective nature of risk and control assessments
• compensating for the lack of internal loss data
• allowing adjustments to the likelihood and impact assumptions in risk assessments
• allowing adjustments to the design and performance assumptions in control
assessments.
Example
Principles for sound stress-testing and scenario governance
Stress-testing should:
The answer is around 70 million, but the first group will give answers near to 30 million and
the second will give answers near to 100 million. Try it at your next party and amaze your
guests!
The use of external loss data can help in inspiring scenarios which might otherwise have
been overlooked and can therefore mitigate availability bias. However, availability bias can
also affect the frequency assessments. The likelihood or frequency of an event may be
overstated if the relevant event has occurred recently or if it has been personal experience.
Conversely, the likelihood may be underestimated if the event has not been previously
experienced. For example, someone who has previously been involved in a fire is more
likely to overestimate the risk of a fire. On the other hand, firms often significantly
underestimate the frequency of internal fraud since relatively few internal frauds are actually
detected. It is therefore important to bear in mind availability bias and, if necessary, adjust for
it, especially when using external loss data. Taking in this data may give a false sense of
having covered most eventualities.
Motivational bias arises when a participant has an interest in influencing the result. It can
lead to the understatement of frequency and impact, the understatement of the effectiveness
of controls, and the understatement of the uncertainty surrounding the assessment made. It
is very common, for example, for control owners to overstate the efficiency and effectiveness
of the controls for which they are responsible. When a control assessment is presented to
the risk owner and business line manager, a very different view of the capability of the
controls mitigating that risk often emerges. There is also, of course, an incentive to
understate potential losses in order to reduce the capital required to run the business line or
the firm; or simply to provide a rosier view of the riskiness of the business line to the firm.
Making scenarios subject to peer review, in addition to the formal challenge process carried
out by risk management, is a good way to reduce the influence of motivational bias.
The influences of these biases can be seen in likelihood assessments. Estimates for
likelihood can be particularly difficult when considering rare events. It is, for instance, difficult
to distinguish between a 1 in 1000 chance in one year for the event, and a 1 in 10,000
chance. Both events are beyond most people’s comprehension. Availability bias is almost
inevitable in these circumstances, particularly when using external likelihood data, of which
there will be relatively little. Examples of how likelihood and impact can be assessed are
shown in Tables 10.1 and 10.2.
Impact assessments of scenarios are also prone to problems as most people find it difficult
to think in terms of probability distributions. Ideally, several impact values for the scenario will
be helpful at specified percentiles along the distribution. This is known as the percentile
approach.
From a practical perspective, the assessment quantile for the scenario is likely to be agreed
as the 95th, 99th, 99.9th or ‘worst case’ (which is often subsequently defined as one of the
extreme quantiles). This will give one impact estimate, say £5m, linked with a single
likelihood of occurrence, say 1 in 100 chance, and is known as the individual approach.
However, the single value estimate it produces can introduce a spurious accuracy.
Table 10.1 Alternative likelihood terms and possible weaknesses
An alternative but more difficult approach is the interval approach, which consists of
frequency estimates for a series of distinct impact ranges. This is conceptually similar to a
risk and control assessment approach, although obviously different in detail.
Assumptions
Scenarios will be used in conjunction with the other techniques used by the firm such as risk
and control assessments, forecasting and strategic analysis, resource allocation and
business planning. As a result, the assumptions which form the base case for the scenarios
should be consistent with the assumptions in the other techniques and should broadly reflect
events envisaged in the long-term plans made by the firm.
Environment
Scenarios should also take account of the broader business environment. Political,
financial/economic, social, technological, environmental and legal factors will inevitably affect
the scenarios over the period they cover. The scenarios should be challenged by each of
these factors to ensure they have been fully incorporated.
Historic or hypothetical data
Scenarios can be developed using either historical real data or hypothetical data. When
using historical data, care must be taken to reflect changes to the internal and external
environment within which the scenario is planned. A good starting point is to use the factors
mentioned in the paragraph above. When using a hypothetical approach, care must be taken
to devise a scenario which is sufficiently extreme but still plausible. Either way, the scenarios
must be consistent with the firm’s risk and control profile as there is no value in analysing
stresses which will not apply to the firm.
Random words
At the other end of the scenario development spectrum lies the random word methodology.
Using random words is a surprisingly powerful way of generating scenarios. It consists of
taking a number of scenario-related words or phrases which may apply to the firm (such as
fire, flood, utility failure, outsourcer failure, money laundering, internal fraud, terrorist attack)
and choosing two or three at random. A scenario is then constructed around the chosen
words or phrases which is relevant to the firm. It can be surprising how randomly chosen
words are a powerful and imaginative way to construct credible and relevant scenarios.
These were used by a wide variety of business lines within the banks concerned. As a
comparison, the most common scenarios used by retail banks were:
• cyber crime
• cheque fraud
• theft of information/data
• regulatory breach
• mis-selling practices.
The retail banking scenarios are clearly more focused on a particular line of business, whilst
the broader, more general, scenarios are just that.
Another example is the significant earthquake experienced by the UK in 2008. It was the
biggest in the UK for nearly 25 years. This brought into focus the fact that the UK has
suffered a number of earthquakes (albeit only moderate to significant) and is situated at the
boundaries of minor plates. Even moderate to significant earthquakes can cause damage, in
particular to sensitive electronic equipment. However, it is very unusual for UK firms to
include an earthquake within their scenarios.
Common scenario outcomes
However the scenarios are generated, a number of common themes emerge in the
outcomes. These are often:
• failure of the firm to meet its objectives (whether these are profit, market share, staff
retention or some other objective)
• funding difficulties
• exposure to fraud
• inability to maintain business volume
• lack of building access
• impact on ratings
• reputational damage
• adverse environmental impact
• supply chain disruption
• major competitor win.
Risk appetite
Knowing and understanding the firm’s risk appetite and its thresholds may also help the firm
reduce the impact of a stress event. Although it is very likely that the firm’s risk appetite will
be exceeded during a period of stress, there is more likely to be a defined escalation
procedure and understanding of the sensitivities of the firm’s risk profile if consideration is
given to the risk appetite.
If a firm does have a developed risk appetite, it is more likely that it will have a full set of risk
and control assessments and a realistic view of the risk and control profile of the firm.
Challenges to the assessments and the resulting profile need to be made during normal
times for this particular defensive approach to be valuable. If such challenges form a routine
part of the firm’s governance, the resulting information is much more likely to have the
confidence of senior management and therefore to be used in a period of stress.
Paralysis
Sometimes the scenario result is so awful that the conclusion is drawn that little can be done
to prepare for it. Even in the event of the scenario showing that the firm would be liquidated,
action can always be taken, including drawing up a ‘living will’, similar to the recent
proposals for internationally active banks discussed in the next section.
As with normal scenarios, senior management should be involved in the design of the
reverse stress tests and in the actions which the firm decides are appropriate as responses
to the reverse stress tests. A good place to start the development of reverse stress tests is to
take severe scenarios and then stress these through the inclusion of a reputation event.
Such events may be a natural consequence of the media discovering that an extreme but
plausible series of events have happened to a firm, or reputation damage may occur to the
firm through another stress event (unconnected with the original scenario).
Recovery plans
Reverse stress tests look at the stage shortly before collapse. Recovery plans are designed
to be activated when that point has been reached and will be triggered when certain
pre-defined events occur or criteria are met. The recovery plan will specify in some detail
how the firm will downsize and completely restructure its business; allow itself to be acquired
or its business to be transferred; or wind itself down in an orderly fashion over a relatively
short period of time.
In short, the recovery plan is the firm’s set of options for addressing extreme financial stress
impacting its business. This stress may be caused either by problems unique to the firm, or
by wider economic problems (or both). The recovery plan will address options for recovering
from liquidity and capital difficulties as well as the practical points relating to the challenges
and interdependencies which the firm may foresee in implementing the recovery plan.
Governance
As with all other operational risk matters, it is important to have appropriate internal
governance relating to recovery plans. The board of directors (or another senior governance
committee) should review and approve the recovery plan, including the firm’s assessment of
the probable success of each option considered in the recovery plan. The key executives
and managers of the firm who will be involved in each recovery action should know the roles
that they will play.
One frequent challenge around the recovery plan is the collection of sufficient (but not too
much) information to enable the plan to be judged relevant and appropriate. The information
required will include detailed information on the various types of assets held by the firm and
its various liabilities. This will include contingent, as well as actual, assets and liabilities. A
firm must know, at a minimum, when and how it can realise its assets and under what
conditions its liabilities become payable.
Triggers
As well as specifying the detail of how the recovery plan works, it is equally important to
decide on realistic trigger(s) for activating it. If a trigger point is not realistic, there is the
danger that the point will be reached, and management will refuse to acknowledge reality
and hope that something may turn up. It is, however, difficult to develop triggers that strike
an appropriate balance between triggering a recovery plan too early or too late. There are a
number of elements to effective triggers, which include:
• it should be clear when the triggers have been breached
• the triggers should be capable of being easily monitored
• the triggers should be effective for both firm specific as well as wider economic
disruption
• the triggers will contain a combination of qualitative, as well as quantitative, indicators.
Whilst some of the triggers will inevitably measure the adequacy of the firm’s financial
resources, others will relate to items such as an unexpected drop in the firm’s credit rating or
negative market sentiment or perception towards the firm. Triggers should also be predictive
or forward-looking (see Chapter 7, Indicators, Identifying the leading and lagging indicators)
to enable an early start to discussions within the firm on pre-emptive actions to reduce the
impact of the event on the firm.
Communication plan
A communication plan is another important part of the overall recovery plan. The
communication plan will address both internal and external issues. The intention of the plan
is to prevent doubts on the viability of the firm and to preserve the confidence of the markets
and all other stakeholders (see also Chapter 16, Reputation risk).
Resolution plan
In certain industries (most notably the financial services industry), firms are also expected to
contribute to a resolution plan. This is prepared by the authorities and provides a strategy
and detailed roadmap to resolve a failed firm in a manner that minimises the impact on
financial stability without needing to resort to public sector solvency support. However, for
the resolution plan to be effective, it obviously requires the provision of up-to-date
information on the firm’s operations, structures and critical economic functions. This sort of
analysis is best prepared by the firm itself.
APPLYING SCENARIOS TO OPERATIONAL RISK MANAGEMENT DATA
There are two main approaches to applying scenarios to operational risk management data:
• A deterministic approach, which uses a simple and straightforward approach although it
is sometimes difficult to relate to reality. It is far less rigorous and relies on assumptions to a
much greater extent.
• A probabilistic approach, which uses a statistical methodology for modelling risks and
controls although it is sometimes difficult to understand due to the underlying complex
mathematics.
Deterministic approach
This takes the scenarios which have been developed and tests the relevant risk and control
assessment with the scenario outcomes. The testing is carried out through the analysis of
which controls have failed for the scenario to occur and therefore which risks have happened
and what is the impact of those risks.
Useful guidance is given in terms of the size of the likely impacts through the impact ranges
which were developed during the risk and control assessment process. These impact
ranges, though, should be considered as guidance only and should not be slavishly adhered
to. For example, some controls which mitigate a particular risk may still exist and be
operable during a scenario and therefore the impact may be significantly less than is given
by the risk’s impact range. However, the upper value of the range should only be exceeded
after significant debate, as this will have already been considered and discussed during the
risk and control assessments.
Having assessed the impacts of the risk events which occur during a scenario, it is possible
to calculate (through simple addition) the extra impact of the scenario on the firm’s risk
profile. Action can then be taken in terms of a cost–benefit analysis of the controls which
were affected by the scenario. This is combined with a review of the firm’s risk appetite in
order to determine whether or not control enhancement is required. Additionally, the
application of the scenario and tests may uncover controls which were previously thought to
be adequate and which now require action.
Probabilistic approach
This approach transforms qualitative and subjective risk assessment to monetary values
through probabilistic modelling. It uses the same initial step as the deterministic approach,
that is the existing risk and control assessment is tested with the scenario outcomes in order
to determine which controls have failed. The revised, scenario-adjusted risk and control
assessment is then subjected to risk event occurrence through control failure simulation (as
we saw in Chapter 9, Modelling, Obtaining business benefits from qualitative modelling).
A worked example
A firm develops a scenario which involves internal fraud (due to an employee having
gambling debts) occurring at the same time as IT system failure. The firm’s current risk and
control assessment contains, inter alia, the risks, controls and assessments shown in Figure
10.3.
Figure 10.3 Extract from current risk and control assessment
The first step is to review the controls and identify those which are assumed to have failed
for the purposes of the scenario, as the firm is then exposed to the risks which were
mitigated by the failed controls. These are identified in Figure 10.4:
• criminal background check, which did not identify the fraudster
• training and mentoring schemes, which have not identified that the employee was at risk
• business/strategic planning, which has failed to provide enough focus on an appropriate
IT system
• IT system performance and capability monitoring, which has not detected that the
system was about to fail
• segregation of duties, which has failed to prevent fraud
• training and mentoring schemes, which have also failed to prevent fraud.
Consideration is then given to improving these controls to ensure that the firm’s operational
risk exposure is maintained within its risk appetite.
Fraud monitoring is a detective control and will not prevent this risk from occurring, but it will
detect it when it does occur. For the sake of completeness, the controls which are unaffected
by the scenario, although they are still relevant to the risks that have occurred, are salary
surveys, retention packages for key staff, manual workarounds and whistle blowing.
The deterministic approach
The deterministic approach involves simply estimating the average loss for each risk using
the risk and control assessment data. For the scenario above, we have three risks which
occur:
1.
failure to attract, recruit and retain key staff (Staff)
12.
inadequate or insufficient IT infrastructure to achieve business object-ives (IT)
16.
failure to sense and eliminate internal fraud (Fraud).
Figure 10.4 Extract from risk and control assessment, showing failed controls and
subsequent improved controls with new assessment scores
It can be seen that the maximum deterministic values are at a similar level to the modelled
99.9% confidence level.
SUMMARY
Scenarios are all about imagination and not being afraid to think the unthinkable. Indeed,
they are totally concerned with the unthinkable. They are not a mathematical exercise but a
practical one, aimed at identifying events or, more precisely, combinations of events which
could threaten a firm’s objectives and even its existence. As a practical exercise, they are
the glue which binds the other elements of the framework together and test whether the
operational risk framework is robust and fit for purpose. However they do contemplate
threats to the existence of the firm. If those threats appear, the immediate remedy is a well
thought out and fully tested business continuity plan, which we shall consider in the next
chapter.
Notes
1 www.lloyds.com
2 Australian Prudential Regulation Authority, Applying a structured approach to operational
risk scenario analysis in Australia, September 2007; www.apra.gov.au
3 www.bis.org/publ/bcbs160.htm
4 Senior Supervisors Group, Observations on risk management practices during the recent
market turbulence, March 2008; www.financialstabilityboard.org
11
Business continuity
Ensuring survival
ENSURING SURVIVAL
It is a fact of life that ‘stuff happens’. Dealing with it is much of what operational risk
management is all about. Many operational risks can be managed and mitigated down to
acceptable levels, as this book has shown. Some things, however, cannot be prevented. The
best we can do is to have in place contingency plans which will mitigate the effects as best
we can.
To that extent operational risk is rather like politics. When Harold Macmillan, British Prime
Minister from 1957 to 1963, was asked by a journalist what was most likely to blow a
government off course, he is alleged to have replied, ‘Events, dear boy, events’. Business
continuity is about coping with the unforeseen events, some of them apparently undramatic,
which nevertheless threaten a business’s survival. Attitudes such as ‘It won’t happen to us’,
‘We will cope – we always do’, ‘We’re not a terrorist target’ are unrealistic and, from a
business point of view, life-threatening.
After an event, firms fall into two categories – ‘recoverers’ and ‘non-recoverers’. Research
regularly shows that firms which successfully deal with a crisis see their share value
increase. Similarly, firms which invest and budget most on risk, business continuity and
governance are the most profitable in their sector. Business continuity planning is an
investment, not a cost.1 Another survey has shown that each year nearly one in five
businesses suffers from a major disruption and that, through lack of an adequate business
continuity plan, 80% of them close within 18 months.2
Many people questioned the huge amounts of money and resource which went into coping
with the potential disaster of the Millennium Bug (Y2K). The effort and investment repaid
itself many times over when the planes hit the Twin Towers of the World Trade Center, New
York on 11 September 2001. The enormous amount of work which had gone into cleaning up
the spaghetti of systems which firms were running, understanding infrastructure
dependencies and developing and testing comprehensive business continuity plans,
prevented the 9/11 attack from being much more disastrous. Despite the tragic and
horrendous loss of life and disruption, it was business as usual after a brief four days,
including a weekend. Perhaps business continuity’s finest hour.
Table 11.1 Differences between risk management and business continuity management
Business continuity deals with the management of incidents which will cause significant
disruption to the business. It deals with low-likelihood events but is mainly dealing with their
impact. The impact of an incident, as well as recovery from it, is measured primarily by time
so that disruption to customers and suppliers is kept to a minimum and business as usual is
restored as quickly as possible. To ensure that happens, firms need to develop and test
business continuity plans, working their way through the business continuity life cycle. In
practical terms this means:
Policy statement
The policy statement is the benchmark against which all business continuity activity should
be continually checked. Since confusion is often the major obstacle to an effective response
to an operational disruption, the policy statement should clearly set out the level of business
continuity the firm sets out to achieve.
It should include:
Keep it brief – and achievable. Unrealistic policy statements such as ‘zero downtime’ render
the whole document meaningless. What is a realistic recovery time? Which activities
genuinely need to be prioritised? What are the short-term workarounds?
Governance
Business continuity is not an IT issue. Like operational risk, it concerns the whole business
and threats to its existence. It therefore needs to be owned by all parts of the firm, with a
central point of accountability on the board. That director will sponsor the ‘project’ and be
responsible for ensuring that adequate plans are in place and are regularly tested and
reviewed.
Developing, reviewing and invoking the business continuity plan will involve a steering
committee which should be chaired by the board sponsor. This should include senior
stakeholders from business, risk, IT and other support management. Joining the group
should mean a serious time commitment. Apart from the time which is needed to develop a
business continuity plan, which is rarely trivial, members should be prepared to meet
regularly during the development and implementation phases of the project.
Both the plan and any testing of it should be independently reviewed and audited, perhaps
by the internal or external auditor. Whoever does it, reports should go to the board, who are
ultimately accountable for the project and, more importantly, for business availability.
The business impact analysis looks at the impact of given events on business activities over
time. With business continuity, ‘If in doubt, prepare for the worst’. It should therefore look at
worst case scenarios, such as where a department or service line is completely stopped.
This will identify the realistic, as well as essential, recovery time objective – the time by
which critical systems and business processes must be up and running after the occurrence
of an incident.
This phase is a good time also to gather other details such as call trees (essential people
networks to spread information) and existing recovery arrangements.
What is business critical?
The test of criticality is what value is lost over time. For some activities, value lost will
increase, perhaps exponentially, as time goes by. For others, the impact may not be felt until
perhaps a week later.
It can be difficult to assess costs over time. One way is to use financial targets or budgets
and divide the relevant weekly or monthly target into agreed time periods – hourly, daily, etc.
In doing this, remember to split out revenue expected from existing and new business. New
business is likely to be lost during a disruption.
Finally, don’t forget indirect costs such as regulatory fines or client and intermediary
compensation. Added together with direct losses, they will give an estimate of the worst case
financial impact – over time.
At this point you should have identified your business critical activities, recovery priorities
and the resources needed to maintain them, itemised over time – now, day 1, 2–6 days,
week 1, 2, 3 and so on.
The next step is to think about what might happen and the effect on the business critical
activities.
Threats
Before they actually happen, incidents are threats. The risk lies in the likelihood of their
becoming incidents and the potential impact if they do.
The incidents which are likely to trigger invocation of the plan are often external threats or
causes and largely outside your control. Where controls can make a difference, the incident
is likely to happen when those controls have failed.
Each organisation will need to determine the threats which it believes have both sufficient
impact and are likely to occur at some point as to be worth considering. The list needs to be
reviewed regularly to check the current assessment of likelihood and to add newly identified
threats. For example, a few years ago only a handful of organisations in the USA or EU
would have been worried about infectious diseases or pandemics as a business continuity
event. Then came SARS in 2003, avian flu (the H5N1 virus) in 2004 and H1N1 flu (swine flu)
in 2009 so that pandemics have risen to the top of everybody’s list of threats.
Impact assessment
Essentially, the method of assessment is the same as that used for building and evaluating
scenarios in the previous chapter, with the proviso that, with business continuity, time is the
critical measure of impact – how long will an interruption have to last to be intolerable, if not
catastrophic?
In risk assessment terms, the threats should be at the extreme end of the spectrum in the
low-likelihood, very-high-impact section, as measured against a firm’s risk appetite. If the
likelihood of a high (residual or net) impact event occurring is considered to be greater than
‘low’ then it is not a suitable case for business continuity. It needs to be dealt with now by a
review of controls and probably the introduction of new ones to reduce both its likelihood (if
possible) and its impact.
Response triggers
When a threat turns into an incident, it will generate a response. The business continuity
plan formulates those responses. Response triggers usually come down to half a dozen or
so, that are typically variations on loss of premises, staff, equipment, systems, a production
line, key suppliers or outsourced activity.
One of the lessons of the London bombings in July 2005 was that the firms which were able
to respond best had concentrated their business recovery on impacts and decision making,
rather than the nature of a disruption and its possible causes. As a result, following a more
generic-based approach, they had the flexibility to respond to a broad range of potential
scenarios. The key point about scenarios is not to get into too much detail with them. As with
much of business continuity planning – keep it simple.
Two tips:
Make sure everybody understands the primary objectives – what needs to be achieved must
be fully understood. Be pragmatic.
The biggest risk is generated by doing things differently. Stick as closely as possible to
normal practice.
Once you have agreed your approach and got everybody together, the next step is to list the
response options that are currently available and then consider for each trigger which ones
are suitable, and whether there is a risk of failure of the countermeasures you may wish to
use.
In thinking about the options it is important to consider whether each one – people, place or
systems – will be available, given a particular trigger. That’s where you need to think about
threats. A bomb or transport strike may not just make your building unusable, but also your
alternative site.
It is probably helpful to consider the options under headings, such as those in the example
below:
Example
Thinking about the response options
Business activity levels
What levels of business activity are acceptable, for what periods of time? Use a series of
levels starting with ‘business as usual’, through one or more ‘emergency levels’ down to ‘no
business’.
Staffing
Business continuity critically involves human issues (including families of staff). In
considering your strategy, always remember that human safety is paramount.
Will there be sufficient staffing in the event of a pandemic, when significant numbers may be
quarantined? Will there be sufficient staff in the event of no transport or very limited
communications, such as mobile phones? Does everybody know and understand their role
in the event of an incident? Are sufficient staff trained to carry out critical functions?
The SARS pandemic and 9/11 have emphasised the importance of planning on the basis of
there being no people available in a location. Are succession plans adequate?
Locations
What alternative locations are there? These could range from a mirrored site for immediate
use with minimum downtime to working from home. For most, it will probably involve
relocating to a different site, often a syndicated site. If you have chosen syndicated backup
facilities, will they be available for all the people who might need them in the event of a
‘wide-area’ event? How many times has each seat been contracted out in the event of an
emergency? How does the provider assess priorities? Is there an exclusion zone in the
contract that means that you are the only user of the syndicated facilities within, say, 400
metres?
For each kind of alternative site the important thing is for it to be outside the risk zone of the
primary site, and with separate sources of critical supplies of telecommunications, power and
water. However, if it is too far outside the risk zone, significant travel by large numbers of
staff may be required. The expense of this travel (and possibly accommodation) can lead to
a potentially fatal delay in invoking the plan.
Communications
Another lesson from major, wide-area incidents such as 9/11 is that mobile phone networks
cannot handle the concentrated traffic. That means considering the whole range of
alternatives: digital and analogue land line telephones, mobile phones (with a reserve of
spare batteries), satellite phones, websites, etc.
Where can phone lines be diverted to? What other switchboard/reception facilities could be
used? Importantly, how will you communicate with staff away from the main site – whether at
the alternative site or at home? Or with key stakeholders such as suppliers, customers,
service providers or, if appropriate, regulators?
And, probably more importantly, how will the crisis management team keep themselves up to
date? It became apparent at the time of the London bombings in 2005 that the best news of
what was happening was coming from satellite news channels. However, crisis management
teams were in locations without access to them, so that at times staff at the front desk were
better informed than they were.
Infrastructure – power
Will there be sufficient backup power? That problem was highlighted during the major power
grid failures in the NE United States and eastern Canada in 2003. The American Stock
Exchange appeared to have sufficient backup electrical power. However, the utility provided
steam power which worked the air conditioning system which began to fail as a result of the
general lack of electrical power, by which time there was insufficient time to relocate to an
alternative site. In the end, a backup steam generation boiler was installed, with the
avoidable loss of nearly a day’s trading.
Infrastructure – utilities
In the event of an incident will we be able to rely on utilities such as power, transport and
telecommunications? Are there alternatives? If we depend on them, have we tested the
availability of supporting infrastructure such as clearing or money transmission facilities,
whether we’re a bank or not?
The best way to develop the plan is to sit down with staff and walk through the various
activities, asking ‘why?’ as well as ‘how?’ When the plan is invoked, it is quite possible that
different people will have to put it into action from those you speak to at this stage. However,
if you’ve asked the simple questions you will end up with a plan which is relatively
jargon-free and easy to implement when it is needed.
Take time over this so that you and your interlocutors have gone through everything in detail.
The aim must be to get it right first time. There is always the chance that an incident will
occur and the plan will have to be invoked before it has been fully tested and reviewed.
However you document – Word file, iPad or sophisticated software tool – make sure that it is
manageable and readily accessible for all those who will need it. Not everybody needs the
whole plan. Work on a ‘need to know’ basis and plan at all levels, from enterprise-wide to
individual departments, so that staff have what they need at their level and understand their
role in the event of an incident. There is no definitive list of the types of information which a
department may find useful during a crisis, but remember that the more that is included, the
more work will be needed to keep it up to date.
When a department has an alternative location to relocate to, it can usually store whatever it
may need there in the way of specialised equipment and paper documentation. This is often
referred to as a contingency box (or battle-box). A list of its contents, together with the last
time they were checked or updated is a vital part of the plan.
Why test?
As the military often say, no plan survives contact with the enemy.4 Having said that,
thorough planning and training will give you a better chance of succeeding and your
business surviving and being available as soon as possible for business as usual.
As a result of the Hanshin-Awaji earthquake which struck Kobe and the surrounding area in
January 1995, Japan, including its financial system, spent considerable effort refining
business continuity plans in the light of the lessons learnt from the earthquake. When the
Niigata Chuūetsu earthquake, 6.8 on the Richter scale, struck the Chūetsu region in October
2004, there was minimal disruption to financial services, despite the considerable structural
damage. Frequent lightning strikes in the region had also led to resilient plans to cope with
loss of telecommunications, power, water and transport.
Rather than endure an emergency, it is essential to test the plan – or exercise it, as business
continuity professionals prefer to say, echoing the military – and learn the lessons. The point
of a test is to practise and to learn. The more you test, the more you can continuously
improve.
It is often said that a business continuity plan is like a fire extinguisher – it sits inert, possibly
for years, but must be there and working when needed. And as a plan must work under all
circumstances, not just ideal ones which, by definition, will not exist at the time, it needs to
be tested as fully as possible – to the limit in critical areas.
a backup and restoration test – the process and timeframe for backing up data and restoring
it onto contingency servers
a connectivity test – reconnecting sites after a tele- or data failure
a full technology restoration test
and all the way to a
full enterprise-wide test in which a firm relocates to its recovery site for one or two days
carrying out business as usual.
You should also seriously consider testing with critical industry participants, as well as local
authorities, utilities and other organisations on which your business may depend. It’s the only
way of finding out whether your plan will in fact work, since it will inevitably be dependent on
these organisations.
The choice is yours, but whatever you choose, the key will be good planning.
Once you’ve agreed the objectives and scope of the exercise, it’s time to establish:
a date
who will be involved
that your test will be based on a plan which is up to date
that facilities will be available
a system of independent review and evaluation before, during and after the test.
The review before the test could be vital in ensuring that all dependencies have been
allowed for.
Finally, build in sufficient contingency time to restore systems back to the real-world
environment after the test is concluded. This is often under-estimated so that there is real
disruption to business-as-usual, which is not the point of the exercise and simply brings the
business continuity effort into disrepute.
The test
The idea is to validate a process and identify weaknesses or errors in the plan. It’s a learning
experience. The key to a good test – and a good plan – is documentation. Good
documentation should be kept before, during and after the test to form a basis for reviews
and for the next test.
During the test, have an independent observer (or more than one, depending on the scale of
the test and resources available) to provide objective feedback on how the test works,
including the effectiveness of communication between staff, the crisis team and others – and
to note where things went well.
And keep the report readily available for next time. Otherwise, all those valuable lessons will
be lost and the next exercise will just repeat the mistakes of the past.
Another element which ensures the firm will be prepared for any eventuality is training. It is
essential to ensure that staff are familiar with the plan. Training, in addition to testing, is an
effective way of ensuring cooperation between recovery team members. It needs to be
reviewed, because staff frequently change, as do intra-business relationships.
In the end, it will all be down to communication (which training is designed to enhance) and
documentation, without which the whole exercise will be undertaken in an atmosphere of
ignorant bliss. Documentation at every stage means that lessons can be learnt and that the
process will be capable of being audited and properly reviewed by business line
management.
and
Keep it simple.
The simpler it is, the easier it will be to follow in a crisis and the sooner business availability
will be restored.
Notes
1 See Knight, RF and Pretty, DJ, The Impact of Catastrophes on Shareholder Value,
(Oxford: Metrica 1996), and www.thebci.org
4 As frequently adapted from the statement of German Field Marshal Helmuth, Graf von
Moltke (1800–91) that ‘No plan of operations extends with certainty beyond the first
encounter with the enemy’s main strength’ (Militarische Werke. vol. 2, part 2, 1892).
12
Insurance
Operational risk and insurance
Buying insurance
Conclusion
For when they insure, it is sweet to them to take the monies; but when disaster comes it is
otherwise and each man draws his rump back, and strives not to pay.1
And, of course, some operational risks are simply uninsurable, either because it is illegal,
impossible or morally hazardous to insure the particular risk, or because of the financial
limits of insurance available. In fact, it has been estimated that when allowance is made for
uninsurable risks and the levels of deductibles and limits in insurance policies, only 30% of
operational risks in financial services are probably eligible to be insured. However, even at
30%, it is the most direct way of mitigating operational risk losses and, if approached
properly, a cost-effective way of reducing risk exposure.
It can also mitigate reputation risk when, for instance, there has been a major robbery. And
insurers can bring their claims expertise to reducing an operational risk loss. But essentially
insurance acts as an operational risk transfer mechanism – to the insurer – at a price.
Operational risk often (perhaps too often) concerns itself with identifying and measuring
events. Insurance is also triggered by an event, but it then looks to why the event occurred.
A fire policy will pay for the damage caused by a fire, but not if it is shown that the cause was
arson on the part of the policyholder; or if a sprinkler system on which the insurance was
conditional had not been installed. Insurance will pay for a theft, but possibly not if the alarm
system had knowingly been allowed to remain inactive for a period of time, or security
controls had lapsed.
The reason why will also determine which kind of policy will respond to an event. Take fraud,
for instance. In the case of a bank, it may be covered under a Bankers’ Blanket Bond,
assuming it was caused by employee dishonesty. Non-banks will have similar policies
covering employee dishonesty. However, if it involved computer crime by somebody outside
the firm, then a specialist Electronic and Computer Crime policy might come in to play. A
Professional Indemnity policy’s fraud extension might be relevant if a third party is harmed or
suffers loss. And finally, in a case like Enron, it could be that the company and non-negligent
directors will seek to claim under the company’s own Directors’ and Officers’ policy. In all of
these, cause is the critical issue.
BUYING INSURANCE
Too often risk buying comes out of procurement or premises management – presumably on
the basis that it is seen as having to do with property and cars – or at best finds itself parked
(possibly with the management of the car fleet) in the company secretary’s office. So first
make sure insurance buying is either part of the operational risk function, which is where the
relevant risk reports are being captured, or at least has close contact with it.
Buying centrally also helps to ensure that cover is consistent and not duplicated. Too often
insurance buying is undertaken in the silos of the various business units, wasting resource
and money and probably not getting the best insurance coverage.
There will inevitably be exclusions to the policy. Sometimes they simply state what would be
expected good practice, such as the sprinkler system example mentioned earlier. Insurers
assume that people will take sensible precautions to protect themselves and their property.
In other cases, exclusions clarify intent and make sure that a risk (or peril) is placed in the
right kind of policy. In the Enron case, should the claim go against a crime or liability class of
policy? The policy makes sure there is no confusion.
In the case of emerging risks, such as cyber-terrorism or terrorism generally, they could
affect a number of classes of insurance and render historic pricing models obsolete. Similar
considerations apply to historic operational risk data which can become less relevant or
degrade if the internal or external risk and control environment changes. When new risks
emerge, insurers often introduce an exclusion initially from the standard policies, but then
design a new product specifically to deal with the risk, which is what has happened in the
case of terrorism.
However, insurers have learnt painfully over the years about the times when the risk–reward
ratio goes against them across the cycle and why. Premiums are as much market driven as
risk driven. Price is not entirely elastic, so insurers’ real protection, especially if market rates
are soft, is to restrict coverage.
Risk-pricing depends on information. In the case of an insurance buyer and seller, the
asymmetry of information is hugely biased in favour of the buyer. Insurers will often rely
primarily on fairly simple parameters such as number of employees, size of assets and
where they are based, as well as splits by business type. And of course on historical claims
data, where at least they have industry-wide experience to go on. Surprisingly, they often do
not ask for details of risk and audit assessments or of losses which fall below the level of the
deductible in a policy, the amount which the policy-holder has to bear. Having said that, the
intelligent insurance buyer will provide operational risk information which will encourage
insurers to improve their offer. There should be a dialogue, so that each side understands
where the other is coming from and gets the best deal it can.
So the good risk manager should be armed with detailed information with which to assess
the value of the insurance offered. Historical data and/or modelling should point to a
reasonable level of deductible, especially for attritional losses which are effectively ‘the cost
of doing business’. In the same way, using historic data and resulting estimates of severity,
the risk manager should be able to work out a suitable limit or cap to the amount of cover he
or she wishes to buy. Figure 12.1 shows this in diagrammatic form.
Figure 12.1 Using the loss distribution curve for insurance buying: lognormal curve showing
insurance portion
Mapping
In order to evaluate whether it is worth buying insurance, you must first assess how far it
covers the risks you have identified. That’s not too difficult where the class of insurance
maps neatly onto your loss event type, such as with fire and property damage. But that’s a
minority of operational loss events.
With operational risk, a number of causes can lead to a particular type of loss event and a
particular cause can trigger a number of different types of loss event. In the same way, as we
saw above with the internal fraud example, different types of policy will respond to a
particular loss event, depending on the cause, and a particular class of policy may respond
to a range of loss events. The Bankers’ Blanket Bond, which is essentially a crime policy, will
cover fraud and theft, for instance, two major classes of operational risk. But other policies
such as Electronic and Computer Crime, Directors’ and Officers’ liability and Professional
Indemnity policies may also respond. Similarly, with theft from banks, the Bankers’ Blanket
Bond covers theft of physical property such as computers, cash or artwork, but does not
cover theft of intellectual property. For that, again depending on cause, you may have to turn
to a Fidelity Guarantee policy (covering your own loss) or a Professional Indemnity policy if a
third party has suffered loss and the firm was unaware of the theft.
Where simple direct mapping from a risk category such as fire is not possible to help assess
the value of insurance, the best answer is to use scenarios (see Chapter 10, Stress tests
and scenarios). That is what the insurance industry does, not only to understand its own
underwriting risk exposure, but also to evaluate its operational risk, as was noted in Chapter
10. If you use scenarios to assess your operational risk exposure, use them to test your
insurance coverage. Whether you are assessing insurance or operational risk exposures, a
severe enough scenario is generally produced by considering a number of serious events
happening over an appropriate time. In assessing insurance coverage, an appropriate time
could be the 12 month term of most insurance policies.
Evaluating the scenarios will lead to an estimate of loss which can then be matched against
the relevant coverage and insurance premiums being offered. By tweaking deductibles,
limits and exclusions, from the information you have and the assumptions you make in
modelling your scenarios, you can find out how that would affect premiums.
After that, it is a question of comparing the cost of capital to support the relevant operational
risk against the premium you are being asked to pay. If the operational risk capital multiplied
by the internal cost of capital is greater than the premium asked, it sounds like you have a
good deal. In many ways, the sums should add up because the basis of insurance is to
spread the risk and so be able to charge a competitive premium. Signor Datini worked that
out in the fourteenth century and so gathered his merchant colleagues into a form of mutual
insurance. And, of course, the same principle applied to those who met in Edward Lloyd’s
Coffee House in the City of London in the seventeenth century. By pooling their risks, they
were able to spread the cost.
This is perhaps the point to remember that insurance is not about capital replacement – at
least not in the short term – even if its value can be assessed against the cost of capital.
Cause has to be established before an insurance claim can be progressed. An event may
happen in 2001 which gives rise to, say, a claim of negligence. Whilst you will notify your
insurer of the possibility of a claim, it may take years before negligence is ascribed to you,
the insured. Once it is, you can go to your insurance company and provide proof of loss. But
that, too, may lead to further time being spent whilst it is determined that the specific
circumstances are covered by your policy, or whether and to what extent you may have
contributed to the loss. Once everything is agreed, the insurer will pay. But that can be years
after the operational risk event occurred.
That points also to the importance of having data which enables you to assess the net
present value of the amount which is finally paid, allowing for the time value of money – the
time between an event occurring and the amount and timing of an insurance settlement.
Types of policy
In this connection it is worth remembering that there are broadly three types of policy: losses
occurring, claims made and losses discovered (or discovery based).
With a losses occurring policy, the loss must occur during the period covered by the policy.
These are the types of policy with which most of us are familiar in our private lives –
property, motor and so on.
With a claims made policy, the insured must notify a circumstance, accepted by the insurer,
during the term of the policy, even though the event may have taken place before that
period. Into this category fall the various liability policies such as Directors’ and Officers’ or
Professional Indemnity.
With a discovery-based policy, the policy responds to an event discovered during the policy
period, again even though the event itself happened some years before. A good example
would be an Unauthorised Trading policy. As a class of insurance it was not available until
some time after the Barings case in 1995, but it would have covered the Allfirst Financial
case in 2001, where the deceptions practised by trader John Rusnak went back over four
years before they finally came to light.
Table 12.1 gives some idea of the range of policies which a firm might consider buying and
how the policies fit in to the three broad categories of policy.
So evaluating the security of the insurer is important, whatever size of company you or they
are, and it may be prudent, depending on the importance of insurance to the firm, to have a
system of credit limits in place as a check against over-reliance on one particular insurer. Of
course, one way of reducing exposure is to take a leaf out of the insurer’s book and spread
the credit risk through co-insurance with a number of insurers. But that’s a discussion for you
and your insurance broker.
Captives can be an efficient way of obtaining insurance cover. For a traditional insurer, up to
35% of its premium cost may have to be charged to cover expenses whereas, for a captive,
the charge can come down to 5%. This is driven in part by the growth of captive
management companies, which enable the parent to benefit from not having to staff a fully
functioning insurance company.
it may be the only way in which a parent can obtain cover for certain risks, or at least cover
at a reasonable price
being able to take a share of the more attractive layers of an insurance programme
premiums paid to a captive, as well as its reserves, are available for investment – until they
are needed to pay for claims
reasonable premiums paid to a captive are tax deductible, whereas reserves maintained to
cover losses in the form of self-insurance are not
reinsurers may quote lower premiums to a captive due to the fact that the parent is
financially involved with its own risk: however, reinsurance requirements can also be
different from a traditional insurer, since risk will be much less diversified
direct access to the reinsurance market should also mean lower premiums since the costs
have been avoided of going to the direct insurance market.
It is not uncommon for some captive structures to use a ‘fronting’ insurance company, with
the captive taking on the role of reinsurer.
Whether to use a captive or not depends on: a clear understanding of the parent group’s
risks and risk management; the true cost savings involved; and the effect on earnings
volatility of replacing the range of external insurances with a substantial degree of
self-financing, just as with self-insurance considered below.
However, for specialist needs, captives can be a more stable source of insurance for a firm
than traditional carriers – provided effective reinsurance can be obtained.
The advantage of mutuals is that they are non-profit making and so can produce better
returns or lower premium rates than other insurers. They may also have specialist
knowledge of the risks being underwritten, and so can produce better underwriting results
and secure better reinsurance cover and terms. They are particularly useful as a concept for
mitigating operational risk, since they can enable industries to free themselves from the
general market when that market has either closed the door to them or is only offering penal
rates and conditions. The disadvantage is that members face the possibility of a call in the
event of a serious claim made by any one of them.
Capital markets
For a number of years, capital markets and insurance professionals have been working to
see if a capital market instrument could be devised which would protect against a firm’s
overall level of operational risk. If so, it could mean that investors outside the insurance
market could be brought in and so increase capacity for protection.
Such thoughts were prompted by the success of catastrophe bonds and other instruments.
Catastrophe bonds were developed following Hurricane Andrew in 1992 which, at a cost of
around US$30bn, was the most expensive hurricane in US history, until it was surpassed by
Hurricane Katrina in 2005. The market really began in earnest in 1997 when over US$500m
of bonds were issued, rising steadily to US$2bn in 2005 and then rapidly to US$7bn in
2007.3
Catastrophe bonds are issued by an insurer or other organisation. They are neither
insurance nor reinsurance but are structured as investments. There is no requirement for an
insurable interest. They provide for normal redemption at term, but in the event of a
catastrophe within predetermined limits of geography, type and size of loss, the investors in
the bonds contribute to the loss by forfeiting their interest and/or principal. A typical example
of a qualifying event would be an earthquake occurring of a particular size on the Richter
scale and within a certain radius of a predetermined point, such as the centre of Tokyo.
It is perhaps no accident that these instruments cover specific events such as hurricanes or
earthquakes in a particular geographic location, since there is a large body of historic data to
support assessment of the frequency and severity of an event. Operational risk, however, is
business-wide and, as we have shown repeatedly in this book, is difficult to assess to the
level of confidence which could create a benchmark index which would sustain a deep and
liquid capital trading market.
There is one area, though, where firms can protect themselves against the effects of a
particular threat to their business – weather derivatives. Whilst general insurance (and
catastrophe bonds) offer protection against low-probability catastrophic risks, firms can buy
protection against higher-probability weather events. Weather derivatives were first traded
on the Chicago Mercantile Exchange in 1999. They trade against an index of temperatures
over a particular period at a particular location and pay if temperatures are so many degrees
above or below the benchmark index – depending on the time of year. Principal users are
energy-related companies, but agricultural businesses and those involved in transport and
tourism are also beginning to protect themselves against above average hot summers or
cold winters.
Capital markets are extending the alternatives available for mitigating certain operational
risks, but we are still a long way from a capital market alternative to insurance to protect
against the general range of operational risks.
Self-insurance
The one option which is available to everybody is self-insurance – or not buying insurance.
Self-insurance is a perfectly reasonable choice, provided the risks have been fully assessed
and managed. So the best form of self-insurance is good internal controls. Self-insurance
can, of course, be inadvertent – or even deliberate, but badly thought out. For our purposes,
let’s assume rational behaviour and good operational risk management.
Insurance removes an element of financial uncertainty and replaces a possible unknown
large loss by a series of smaller known premium payments. The rationale for self-insurance
is that the cost of insurance in the form of premiums is removed, as is the loss of the time
value of money between paying the premiums and receiving a claims payment. And of
course the money saved is available for investment. However, these benefits are offset by
the volatility of losses which may occur if insurable operational risk events occur.
If we return to the curve shown in Figure 12.1, it is highly likely that firms will self-insure for
the attritional losses, the cost of doing business. Where the discussion becomes more
interesting is the extent to which a firm is prepared to self-insure as it moves along the curve.
As with the cost evaluation described above, the fundamental rationale is to look at the cost
of loss and the cost of controls which maintain losses at an acceptable level and then
consider whether the cost of insurance shows a benefit. Once you get further along the
curve either in relative or in absolute terms, the debate becomes more difficult. It will depend
on the confidence you have in the firm’s ability to assess and manage its risk exposure, as
well as its risk culture and risk appetite.
In some cases, of course, a very large firm may be prepared to suffer individual losses of,
say, US$500m and find that the cost of only buying insurance above this level is penal or
even find that there is little or no market. To that extent the market may force firms to
self-insure – or spend more on controls to offset the possible volatility in results which could
follow a major loss.
CONCLUSION
Insurance is probably the commonest form of operational risk transfer. It is, however, one
which is not well understood. If the right person is put in charge of buying it across the firm –
somebody who knows how it works and who works closely with operational risk
management to understand the firm’s risk profile – then it can be a hugely business
beneficial exercise. However, if you fully understand your operational risk profile and what
insurance offers, you can also make an intelligent and informed decision to self-insure,
which might be just as business beneficial.
Notes
1 Iris Origo, The Merchant of Prato (London: Jonathan Cape), 1957.
4 www.thomsonreuters.com
13
INDEPENDENT ASSURANCE
Independence
In order to fulfil its function, internal audit must be functionally independent from the activities
it audits. Clearly it must be independent of the business lines. Whilst it may have a direct line
to the CEO or CFO for pay or rations, they should not be its functional reports. Nor should
the head of internal audit report to the CRO. Since internal audit is required to provide
assurance on the risk management process, reporting to the CRO presents an obvious
conflict of interest. That conflict is not resolved by dotted line reporting elsewhere. Dotted
lines, like dual lines, are a fudge. Delete them.
Assuming there is an audit committee, it should report to the chair of that committee. If there
is no audit committee, it should report to the non-executive chairman or senior non-executive
director. The point of reporting to the non-executive directors is that internal audit must have
a direct functional line to those who are there to oversee management and to assess the firm
independently and objectively on behalf of shareholders.
The approach of an audit committee should be trust, with verification. Internal audit provides
that independent verification. Reporting to the audit committee will protect internal audit’s
organisational independence and objectivity. If internal audit reports only to the CFO, or
another senior executive, its independence is immediately called into question. In this
chapter we shall assume that the function to which internal audit reports is the audit
committee.
Maintaining independence is easier said than done, especially in the face of some regulatory
demands. The Sarbanes–Oxley legislation in the USA, for instance, requires independent
verification of information and for senior management sign-off. Ideally, an independent team
should fulfil this function. There is a danger that if internal audit provides the independent
verification of the information, it may be seen as effectively the ‘owner’ of the information
rather than management.1 That can present an immediate conflict with the need for internal
audit to be independent of the design, inputs and outputs of the process and to provide
appropriate assurance.
Assurance
From a risk perspective, internal auditors will normally provide assurance on:
• risk governance and the risk management processes from board level down, looking at
their design and how well they are working
• the management and oversight process for risks, including the effectiveness of controls
and other responses to them
• the accuracy and reliability of the components of the risk assessment and reporting
process.
Whilst management, and especially those providing risk management oversight, will
challenge the accuracy of risk assessments provided by the business, there needs to be an
independent review to ensure the reliability and robustness of the assessment process,
including data inputs, assumptions and outputs.
There is no single method, partly because the nature of assessment processes, especially
with operational risk, is so various. Assurance concerns all aspects of the process. It tests
processes to ensure that information is complete, accurate and valid. In this context, valid
means that the information is genuine and not fictitious.
A good example is the auditing of scenarios and stress tests, which we discussed in Chapter
10. Scenarios rely on judgemental and expert decisions, so that independent review plays a
key role in reviewing the process. Here are some of the qualitative questions that could be
asked about the process:
• Were all the right people involved in the assessment?
• Challenge by risk managers and others is an important part of the process, but were the
challenges consistent across the various scenarios?
• Since they involve a significant degree of subjective judgement, scenarios are
notoriously open to human biases (as outlined in Chapter 10). Have these been adequately
considered and mitigated?
• Have all the causes, events and consequences been included, and included
appropriately?
• Has the process been adequately documented, so that it could be replicated in a
consistent manner?
In summary, business line management creates the scenarios and assumptions; risk
management challenges the assumptions made in the scenarios and the outcomes; internal
audit provides assurance on the process and the process by which the assumptions are
derived.
Internal audit provides assurance to the board on the first and second lines of defence.
Regarding the first line, it provides assurance that controls are working effectively and are
appropriate to the risks of the organisation. As for the second line of defence, oversight
functions such as risk management ensure consistent application of the risk management
framework and provide a challenge to business operations. Internal audit provides
assurance that the oversight functions are working effectively, picking up on adverse
changes in the risk profile and that these are being reported. As can be seen from Figure
13.1, oversight covers both financial and non-financial controls, including the people risks
overseen by HR (see Chapter 15, Culture and people risk) and regulatory and statutory
compliance.
It is, of course, important that the second and third lines of defence work closely together,
leveraging each other’s expertise and experience. Whilst their activities are complementary,
there needs to be clear demarcation so that their respective roles are understood both by
themselves and by others in the firm. They also need to map sources of assurance over key
risks and controls, so that there are no underlaps or overlaps. Internal audit is part of the risk
management process but is not risk management. It should not set the risk appetite or in any
other way have accountability for risk management. Its role is to review and give assurance
on the process elements of the risk management framework.
Specifically, internal audit should not be responsible for operational risk management. In the
late 1990s, when few firms had a structure for operational risk management, let alone
designated operational risk managers, responsibility for operational risk often fell to internal
audit on the basis that operational risk was all about internal processes, and internal auditors
were the only people in the organisation who knew the processes and controls operating
throughout the firm. Times have moved on. Operational risk is recognised as going beyond
systems and process. Whilst auditors can and should provide guidance, responsibility for
risk rests with business line management.
As an independent assurer, internal audit is, in fact, especially valuable and necessary in
operational risk. Operational risk managers are usually intimately involved in the
development of the operational risk framework within a central team, or work in business
units where they can offer advice and guidance and are responsible for providing data inputs
and resulting reports. That effectively places them in the first and second lines of defence, a
confusing enough position. There therefore needs to be an independent assurance process
of the information they are providing and the methodologies used.
Where there is no risk management function, the internal auditor may act as a facilitator in
establishing a risk management strategy and framework. But it is important that they do not
compromise their independence or confuse their role by taking risk decisions or being
executive risk managers, however attractive that role may seem.
Risk
Controls
Failure to attract, recruit and retain key staff
Retention packages for key staff
Financial advisers misinterpret/fail to understand the complexities of ‘equity release’
products
Staff training Learning gained from previous deals Procedure manuals for processes
Failure to understand the law and/or regulations
Internal training courses
Insufficient funds/deposits to cater for lending activities
Liquidity risk policy
Over-selling credit cards
Credit scoring
Over-deployment of management resources on regulatory issues
Corporate governance
Status and resourcing
Risk Controls
Failure to attract, recruit and retain key staff Retention packages for key staff
Financial advisers misinterpret/fail to understand the complexities of ‘equity release’
products Staff training Learning gained from previous deals Procedure manuals for
processes
Failure to understand the law and/or regulations Internal training courses
Insufficient funds/deposits to cater for lending activities Liquidity risk policy
Over-selling credit cards Credit scoring
Over-deployment of management resources on regulatory issues Corporate governance
Audit, the third line of defence, is a critical part of a firm’s risk management framework, which
should be accepted and recognised as such by everybody in the firm. That is achieved partly
by the attitude of the board and partly by the behaviour of the internal auditors (see Effective
internal audit below).
Internal audit must be free to obtain all the information it needs, when it needs it, and not find
itself obstructed or ignored in any way. This will be less likely if it reports unequivocally to the
chair of the audit committee or the senior non-executive director. If it does not, that may
reflect its status within the organisation. The board, or its audit committee, must also ensure
that audit has the right number and quality of staff, another issue which is dealt with in the
section on Effective internal audit below.
Finally, a word about remuneration. As with those in an oversight role, remuneration should
not present the possibility of a conflict. Those in the second and third lines of defence
(oversight and independent assurance) should be remunerated on the basis of achieving
their own objectives rather than have their remuneration based on the firm’s financial
performance.
Reporting to management and the board
Having established the plan and put it into action, it is internal audit’s job to report its
progress and significant issues to the board and to senior management for action. Auditors
must be ready to report issues beyond the standard and agreed framework and, if they have
something especially sensitive to report, there must be a clear line of communication from
them to whoever is appropriate – the chairman, chair of the audit committee or senior
independent non-executive director.
To be an effective part of the risk management process, audit reports should be prompt and
concise, with issues prioritised according to their materiality and significance. Reporting is
not a comprehensive exercise in blame avoidance, but a pointer for the board and
management to take action. As with so much risk management activity, there is little point in
doing it unless it results in action.
Where internal audit does become responsible for some aspect of risk management, it
cannot then provide independent assurance for that aspect. This will have to be obtained
from a suitably qualified independent third party.
If everybody is satisfied that internal audit’s independence will not be compromised and it is
asked to undertake work beyond its standard and agreed assurance activities, this should be
recognised as a consulting engagement and appropriate terms of engagement agreed.
Investigations
Events continually occur which require investigation and assurance. If the request comes
from the chairman of the audit committee or the non-executive directors, there is no risk of
internal audit being conflicted.
If, however, the request comes from management, they should seriously consider using their
own resources wherever possible, probably from those in an oversight role (i.e. the second
line of defence), leaving audit to fulfil its proper role of independent reviewer and assurer.
AUDIT COMMITTEES
The audit committee, comprising as it does independent non-executive directors, performs a
key oversight role for the board and should be the critical link between the board and both
internal and external audit. In most financial sector firms, there will be a separate risk
committee. That was also a key recommendation by Sir David Walker in his report in 2009
on corporate governance issues in UK banks, which was undertaken in response to the
financial crisis.9 However, in many firms, the audit committee fulfils both functions. It
therefore acts as a catalyst for improving both oversight and risk management.
For its part, internal audit needs to have a clear understanding of the responsibilities and
operation of the audit committee and the expectations of both the committee and its
chairperson. In summary, the board, audit committee and internal audit need to have a
shared vision for internal audit.
14
Outsourcing
What is outsourcing?
Outsourcing – transforming operational risk
Deciding to outsource
The outsourcing project – getting it right at the start
Risk assessment
Some tips on the request for proposal
Selecting the provider
Some tips on service level agreements
Managing the project
Exit strategy
WHAT IS OUTSOURCING?
Outsourcing is the transfer of selected projects, functions or services and the delegation of
day-to-day management responsibility to third-party suppliers. It is not confined to IT, human
resource functions or offshore outsourcing. It could involve the transparent transfer of part of
the business to a third party, or the transfer of a service, by white-labelling, to a third party,
including another member of the same group. It involves all agency arrangements and could
be by way of a joint venture.
In all cases, if it is to work effectively, both parties will work as partners. Nearly all aspects of
outsourcing risk management, as we shall see, revolve around the need to establish a
balanced and fair partnership between the outsourcing client (or buyer) and the service
provider.
Although this chapter deals specifically with outsourcing, the principles and management
processes apply just as well to any major procurement or third-party dependency, such as
the supply chain. Third-party dependency is, in fact, a useful generic term to describe the
risk which we accept in any buyer–supplier relationship, of which outsourcing is but one.
DECIDING TO OUTSOURCE
Benefits of outsourcing
When people are asked in surveys what makes a successful outsourcing deal, it is
noticeable that cost savings come a long way behind features such as:
• concentrating management on core activities
• achieving higher activity levels
• improving customer service(s) and
• improving financial control.
All of these help to improve the buyer’s competitive advantage, something which should be a
fundamental test of whether to outsource or not.
Outsourcing makes business sense by improving both the speed and quality of customer
service. A service provider may, for instance, be able to handle a variety of
resource-consuming compliance tasks more cost-effectively, and free the buyer’s staff to
concentrate on a major systems project.
In the best deals, where there is a true partnership, the buyer passes on expertise derived
from its strengths and the supplier is proactive in coming to the buyer with innovative ideas.
New products can come to market more quickly.
At a higher level, outsourcing can be a force for cultural change if it is part of the
transformation to a differently shaped and focused organisation. It can also help in a merger,
when it is often difficult to combine two infrastructure cultures. Basing the future
infrastructure on a third-party provider can remove the problem and take it outside the
politics. Outsourcing can thus be a major force for changing and transforming the operational
risk environment.
It’s not about cutting costs
So the decision to outsource should be made on good business grounds, looking at the
overall value outsourcing can bring, and not solely, or even primarily, on grounds of saving
costs or improving return on investment. In 2007, Compass published a survey of 240 large
IT outsourcing deals which showed that 65% unravelled before their term because they did
not deliver anticipated cost savings.1 That was often because of the unrealistic pressure by
clients on providers to deliver a service at prices which were unsustainable in the long term.2
There should, of course, be appreciable cashflow benefits in outsourcing, but if cost-cutting
is the primary driver for deciding to outsource, the chances are that the outsourcing project
will be a failure. Cost reduction on its own brings little sustainable business advantage. In
any case, the cost savings can often be seductively more apparent than real. The Compass
survey also showed that although outsourcing providers were pricing contracts at a level
which showed immediate cost savings of up to 18% on the in-house operation being
replaced, costs then increased to an average of 30% above the original in-house cost by
year three of the contract. What is cheap is usually dear.
One of the biggest risks in deciding whether to outsource or not is to fail to assess the true
costs of the activity as it is currently run, and the costs, both financial and non-financial,
when it is outsourced. Without proper information on costs, you run the serious risk of
making the wrong decision in principle and of not assessing potential service providers
against a robust benchmark.
When considering outsourcing, ask yourself whether you have allowed fully at the outset for
the costs of:
• the activity in-house, including premises and supporting infrastructure
• start-up and the transition to the service provider
• ongoing management and monitoring of the contract, especially if the outsource provider
is offshore
• contingency plans if something should go wrong
• maintaining sufficient resource in staff and infrastructure to enable you to take the
activity back in-house should the contract be terminated.
If cost reduction is the priority, it tends to build short-term relationships that cannot stand the
test of time. You may have got a good deal at the outset, but that could be because you
squeezed your provider unduly, and you will suffer when things go wrong at their end. They
will feel little commitment to helping you with what is your problem as much as theirs.
But there are positive aspects to outsourcing and cashflow. For instance, outsourcing should
mean that future costs are more certain, which will help with planning and pricing.
Outsourcing can also bring flexibility, by turning fixed costs into variable costs and freeing up
capital which would otherwise have to be invested in non-core activities or large investment
projects. The service provider has already invested in the necessary process and can
provide the benefits of infrastructure and economies of scale. Even more positively, on the
question of cash, outsourcing may bring a cash infusion, if the provider buys assets such as
hardware or software, or increased opportunities for revenue generation.
Cash benefits such as these are positive reasons to outsource. Cash benefits based on
cost-cutting are not.
High-level principles and policy for outsourcing
A fundamental part of outsourcing risk governance is for the board, as with any other major
risk or control issue, to agree the principles and policy which will govern outsourcing within
the firm. The board, after all, retains responsibility for the policy, and ultimate responsibility
for activities undertaken under that policy. The policy should also outline:
• the principles to be followed in deciding whether to outsource and the internal approval
process
• how outsourcing projects are to be managed, including requirements for defining aims
and objectives, risk assessments, the assessment and selection process, reliance on and
dealings with sub-contractors, contractual terms and conditions, change management
protocols and ongoing service monitoring
• the governance arrangements which should apply.
At the level of a small firm, that may, for instance, mean outsourcing areas which are subject
to changing legislation, such as tax or accounting, because that is what the outsourcing firm
is expert at. In this way the firm can reduce its risks and save the costs of somebody
internally who is probably not able to keep as up to date as a professional firm whose
reputation depends on having that knowledge. Another example for a small firm is where it is
able to share state of the art technology which it could not otherwise afford, so that
outsourcing brings competitive advantage as well as a saving in costs.
Case Study
Railtrack – the Potters Bar train crash (2002)
Railtrack, the group of companies which owned the track, signalling and stations of the
British railway system, was privatised in 1996. After two serious crashes in 1999 and 2000 it
failed to raise necessary funding of £700m and was placed into administration in October
2001. It was sold in October 2002 to Network Rail, a not-for-dividend company.
In May 2002, 7 people were killed and 70 injured when a faulty track caused a passenger
train to be de-railed. Railtrack, which was responsible for the line, had outsourced its
maintenance to Jarvis. Shortly before the crash, Jarvis employees had passed the track as
meeting relevant safety standards. Railtrack had therefore outsourced safety which, given its
history, might have been assumed to be one of its key risks and core activities.
In May 2011, Network Rail was fined £3m after admitting breaches of safety regulations and
being criminally guilty under the Health and Safety at Work Act.
To put it diagrammatically:
To make sure the risk assessment process for the project (2 and 3) is as comprehensive as
possible, involve everybody who may be affected. That will include HR, legal, PR, finance,
procurement, those whose functions are being considered for outsourcing, and those who
will interact with the function once it is outsourced – and of course, risk management. If you
have previous experience of outsourcing, draw on it. If this is the first time, remember that
fact when you consider the risks you will face. Outsourcing will produce new risks at each
stage of the project, especially when the project has gone live and you have little day-to-day
control. Here are a few:
• service delivery falls below expectation
• confidentiality and security are not respected
• contract is too rigid to accommodate change
• failure to devote enough time and energy to managing the relationship
• failure to provide sufficient resources in-house to safeguard the outsourced business
processes
• inadequate contingency planning by the provider
• management changes at the outsourcing company – a frequent problem which affects
both performance and communication
• the outsourcing company goes out of business.
As you consider these new risks, remember that a key mitigant is communication, both with
the service provider and especially with your employees. Communicate openly with them at
every stage. Not only will this mean that you get the best out of the outsourcing project, but
you will understand and be able to document the consequences for those who will be
affected – a fundamental part of the decision to outsource.
The risk assessment of the activity to be outsourced will guide you to what is required in the
RFP. The RFP will deal with the specifics which go into the service level agreement (see
Some tips on service level agreements below), but it will also provide the information with
which to identify:
• the management capability and resources of the provider
• how the provider handles relationship management
• processes for reporting and quality monitoring
• training requirements – on both sides
• technology requirements – and future scalability
• the transition timetable and resources needed during this period
• governance issues, to establish that the service provider shares your values.
The RFP establishes expectations and further qualifies providers on the shortlist. Because
clarity is essential, use quantitative rather than qualitative criteria wherever possible. And
don’t underestimate the work which will still be undertaken in your firm. The RFP should lead
to as clear a matrix of risk and other responsibilities as between you and the provider.
If the RFP has been framed well, it should ensure that you are able to narrow the selection
down to a small, manageable number of genuine and acceptable candidates.
Pricing
Pricing is another key risk. Is there sufficient transparency in the supplier’s pricing structure
to ensure that you obtain the best value for money? Is there absolute clarity about fixed,
upgrade and ongoing costs and their basis? Have price escalators or volume-related costs
been fully factored in? They may be differently priced from the base standard. What about
training costs and pass-through items? We noted earlier (see It’s not about cutting costs)
how final costs can far outstrip those imagined when the contract is awarded.
If an outsourcing arrangement is not set up well and managed carefully, it is not uncommon
to find that incremental add-ons can increase the original costs by as much as 50%. So do
the analysis thoroughly and then stretch the results through various activity scenarios. That
should point you to the true costs – and the true cost savings.
Data security
One risk which looms large in financial services, but also in other sectors such as
healthcare, is that confidentiality and security is not respected. What guarantees can the
provider give about data security and information relating to your customers? What security
measures do they have? Do they subscribe to and are audited against industry and, if
appropriate, international standards? Consider whether you need to run checks on their
staff. That may be where independent investigators reappear.
The chain of dependency
And just as they are going to be a third-party dependency risk for you, on whom do they
depend? Will they be doing everything themselves, be in a partnership or rely on other
suppliers?
The Gate Gourmet case at Heathrow in August 2005 provided a further slant on the question
of dependency.
Case study
British Airways and Gate Gourmet (2005)
In August 2005, Gate Gourmet, to whom British Airways had outsourced its in-flight catering
in 1997, sacked 650 staff who had stopped work to hold a canteen meeting in protest at a
restructuring. With that, 1000 British Airways staff at Heathrow, including baggage handlers
and other ground staff, came out on strike in sympathy. It then transpired that many of them,
as well as being in the same trade union, were related to the Gate Gourmet workers. The
strike forced BA to ground all its aircraft at Heathrow for over 24 hours. As a result it lost 700
flights and over £30m.
BA had failed to understand and make allowance for the links between Gate Gourmet staff
and their baggage handlers.
If there is going to be any sub-contracting, the same checks and requirements apply as were
applied to the primary provider. Any significant or material sub-contractor should be subject
to approval by the buyer – on the assumption that the definitions of ‘significant’ or ‘material’
have been clearly documented.
Finally, having done your best to achieve an SLA which covers all your needs, avoid
over-reliance on it. It is just possible that the provider may be meeting agreed service levels,
but the contract is not successful because the wrong things are being measured. Your
dashboards are always green, but your customers or staff are seeing red. Be prepared to go
back to the table. To help that happen, you need to make sure that the agreement allows for
flexibility and is not so rigid that it precludes change. If you are working with a real partner
that will not be difficult. After all, both sides want this to work long term.
Governance
Governance provides the set of guidelines for the relationship and a forum for dealing with
legal and service issues. Effective governance will help to ensure that the provider delivers
on what they have promised over the lifetime of the agreement. Absence of strong
governance results in a lack of clarity about the goals and results of the outsourcing.
As governance typically costs between 3% and 6% of contract value, at the higher end at
start-up and lower over time, make sure it is included in the original costings.5 It is not a
peripheral activity.
Change
All outsourcing contracts will change. They are never static. After all, the contract is probably
for three to five years or longer. That does not mean jumping about and over-reacting in
month 1. No outsourced operation is perfect from the start. There will be an efficiency dip in
the first two to three months, through inexperience and the additional checking required
initially. After that, regular monitoring should point to any aspects which require debate and,
if necessary, a change in the contract.
The governance team must be able to deal with change throughout the life of the contract.
Change control protocols are the administrative side of that. They will form part of a ‘ways of
working’ document, agreed at the outset, which will also clearly state the goals and
expectations of performance reporting and assessment. The human side is that the team
should be composed of people who are open-minded and not wedded to the old ways of
doing things.
Changes could relate to performance. But they could equally be about differences of
interpretation or changes in the environment for either buyer or provider. So keep both the
relationship and the contract up to date and make sure the contract works for both parties
and is flexible enough to cater for change.
Above all, document, document, document – throughout the duration of the contract and
immediately an event happens or a meeting takes place.
Offshoring
Because outsourcing is a partnership, there needs to be full collaboration between buyer
and service provider. That can be a particular challenge where collaboration has to be with
an offshore team, probably working within a different culture and with a different legal,
political, regulatory and socio-economic environment.
To make offshore outsourcing work as effectively as possible, you should first make sure that
you have a high-quality local leader for the offshore team. If you can then blend the offshore
team with effective onshore specialists, the benefits will be considerable and the risks much
lower.
Part of that blending process is training. To be most effective, train the offshore team at the
home office first, so that they can become trainers and leaders offshore. They will
understand and be able to transmit your values and culture – and, of course, the training will
give you a chance to understand theirs. The more onshore people you can involve, the
better. The whole team will become ambassadors for the project and make it work.
Partnering in this way will also help to overcome the linguistic and cultural barriers and risks
which are all part of offshore outsourcing. People risks such as these are a major element of
offshore outsourcing and, apart from language risk (both with the provider and involving local
laws and professionals), can include: different HR and employment law requirements; poor
communications; different data protection requirements; or different ethical standards
regarding bribery and corruption. Many firms have suffered reputational damage when it has
emerged that their expensive products have been produced by ‘sweatshop’ labour. You need
to establish in your SLA the standards you expect. In the case of data security, that may be
related to international standards, such as those published by BITS or ISO 27001. In other
cases you must spell out precisely what your standards are and then make sure that
monitoring them is part of your regular monitoring and auditing process.
Finally, and inevitably when considering offshore outsourcing, there is currency risk. In 2008,
for instance, the Indian rupee depreciated by over 23% against the US dollar. Since most
contracts with firms dealing in the dollar would have been fixed in dollars, that represented a
significant additional profit to the Indian provider. Of course, that could work the other way,
so where contracts involve volatile currencies – and which currency is not volatile, including
the US dollar – one answer may be to include a clause which shares profits arising purely
from currency movements above a certain percentage.
EXIT STRATEGY
The SLA will provide for contingency plans to cope with serious problems which arise during
the term of a contract. However, there will be times when the contract has to be terminated.
There can be many reasons why it may be necessary to exit the contract. Failure of the
provider or failure to deliver to the required standard or quality are the most obvious reasons.
Action by the provider which causes reputational damage can be another. Less easy to
predict – but something which should be monitored as part of regular risk reassessments –
is the acquisition of the provider by a company which then either sells it on or merges it with
another within the group. That could well justify and require breaking the contract and
bringing a process in-house.
Within financial services it is a regulatory requirement that a firm should be able to bring any
outsourced activity back in-house. That means, as we have seen above, maintaining
appropriate resources, both trained people and infrastructure, and having a clear plan to
enable them rapidly to assume the outsourced function. But all sectors must think about their
exit strategy. If you do not, you face the risks of becoming dependent on the provider, of
losing your negotiating power and of finding it difficult to move elsewhere.
You should also be able to exit for your own reasons and terminate with reasonable notice
under softer conditions than those resulting from breaches of the contract by the service
provider. That means being clear at the outset, and in the contract, about:
• the circumstances under which the contract may be terminated
• how the activity can be brought back in-house (or passed on to a third party)
• who owns what assets and
• when compensation is due.
Above all, outsourcing is a partnership. If you have managed the relationship as well as you
should, even termination can be a collaborative operation.
Notes
1 www.computerweekly.com, 17 April 2007.
2 John-Paul Kamath, Outsourcing ‘derailed by focus on ROI’, www.computerweekly.com,
April 2007.
3 Elizabeth Knight, ‘Myths on outsourcing – week 2’, www.articlesbase.com
4 Joe Leahy and James Fontanella-Khan, ‘Outsourcing clients on the lookout for red flags’,
Financial Times, 22 January 2009.
5 Bob Violino, ‘Outsourcing governance: A success story’, www.outsourcing.com, 21 March
2008; see also, same date and source, ‘Governance: A key to outsourcing success’, also by
Bob Violino, whose guidance is gratefully acknowledged.
Part 5 PRACTICAL OPERATIONAL RISK MANAGEMENT
14 Outsourcing
15 Culture and people risk
15
Culture and people risk
Why it’s all about people
Succession planning
There are two sides to people risk: employees and their managers. Take employees first.
People are essentially honest; they do not come to work to defraud or to cause disruption.
However, leaving aside risk factors such as individuals’ lack of competence, training and
experience, there are many aspects of their personal or domestic environment which will
affect their reliability from day to day, or even from minute to minute. Times of personal
stress – bereavement, relationship break-up, health problems, threats to income (many of
which feed off each other) – lead to behaviour, even criminal behaviour, which would be out
of character in stable times. Because people’s personal circumstances change from day to
day, assessing exposure to people risk is difficult. The skill is to manage effectively, rather
than to assess accurately, which brings us to the other side of people risk – managers.
People risk is as often caused by poor management and organisation within the workplace:
lack of clarity about what needs to be done; too little time to fulfil tasks; too many tasks; the
complexity of tasks and work processes; lack of support from colleagues or technology;
unreasonable managers. All of these add to stress and unreliability and increase risk. They
are symptomatic of an organisation which doesn’t rate people management as a priority.
We accept that our employees are not going to be with us ‘from cradle to grave’. As Charles
Handy has put it: ‘Organisations are never again going to stockpile people. The employee
society is on the wane.’1 But we need to ensure that we retain the best people and that all
perform to their best ability. If we can create the right environment to achieve that, we will at
the same time considerably minimise our people risks.
Definition
The shared beliefs and assumptions concerning risk and risk management which affect and
are affected by an organisation’s risk-taking and control decisions, and with the outcomes of
those decisions.
Ultimately, culture is a function of individual behaviours. And since ‘no man is an island’, as
poet and preacher John Donne once said,2 so our behaviours will be influenced by good
examples from the people around us, whether our family, friends or even the football crowd.
In a work context, our behaviour will be influenced by our colleagues and actual business
practice. Organisational behaviours will themselves be influenced by customers, competitors
and other stakeholders. It is similar to the way we manage stakeholders’ expectations when
we consider reputation risk (see Chapter 16, Reputation risk, A framework for reputation risk
management).
The important thing is that those values and behaviours are so ingrained that they lead us to
do the right thing even when no one is looking.3 Before we look at how to make sure that
happens, let’s first look at why risk culture matters.
Your corporate culture is akin to your DNA and is one of the main attributes which gives you
competitive advantage. Your technology and your products can be copied, but not your
culture.5
Like onions, firms which have an unhealthy risk culture go bad from the inside. That is well
understood by boards and senior managers. They understand the link between lapses of
ethical behaviour and loss of reputation, but it is surprising how little attention is paid by them
to the sources of behavioural risk and therefore how to prevent serious damage to
reputation. Indeed, few boards discuss standards of behaviour, codes of conduct or ethical
training, let alone undertake it themselves.
The lesson should have at least come home to the financial services industry following the
banking crisis of 2007–9. In January 2011 the US Congressional report on the crisis was
published. Its key conclusions were that the crisis was avoidable and that one of the primary
causes was a ‘systemic breakdown of accountability and ethics’.6 Effectively, a breakdown
of operational risk management. Instilling and maintaining a proper risk culture would have
avoided much of the subsequent pain.
Getting the culture right is also important when it comes to mergers. A huge percentage of
mergers fail to achieve their, often publicly, stated objectives. That is probably because the
merged board concentrates on financial aspects, synergies and headcounts, instead of first
establishing what the culture of the new firm is going to be. Once that has happened, there is
a clear context for strategic and management decisions, not least about risk.
Case study
Fukushima Dai-ichi nuclear disaster (2011)
The Fukushima disaster followed the Tōhoku earthquake and tsunami on 11 March 2011 and
resulted in a series of equipment failures, nuclear reactor meltdowns and releases of
radioactive materials at the Fukushima 1 Nuclear Power Plant. Immediately after the
earthquake the three operating reactors shut down automatically and emergency generators
came online to control electronics and coolant systems. However, the tsunami following the
earthquake flooded the low-lying rooms in which the emergency generators were housed,
causing them to fail and cutting power to the pumps which circulated coolant water to
prevent the reactors from melting down. Saltwater flooding of the reactors could have
prevented meltdown but the decision was delayed, partly because of a lack of information
about the scale of the disaster and partly because flooding with seawater would permanently
ruin the costly reactors. Eventually the Japanese government ordered flooding by seawater,
but it was too late to prevent meltdown.
In the intense heat several chemical explosions occurred. Concerns about the repeated
small explosions and the possibility of larger explosions led to a 20 km radius evacuation
around the plant. However, because Japanese government officials did not act on
information provided by external agencies, evacuees were in many cases sent to areas of
even higher radioactivity. Significant amounts of radioactive material were also released into
ground and ocean waters, leading the government to ban the sale of food grown in the area.
Japanese officials initially assessed the accident as level 4 on the International Nuclear
Event Scale. It was not until 11 April 2012 that the level was eventually raised to 7 by the
Japanese authorities, the highest possible, despite assessments of level 6 or 7 by
international agencies almost immediately after the disaster.
The operational risk failures identified by this and other reports included:
Committed leadership
Of course, it all starts with the tone from the top. And the top is where many of the biggest
operational risks in terms of impact can lie: a bad acquisition decision, losing the trust and
support of investors, lack of strategy or, if there is a strategy, failure to implement it
effectively.
To embed a risk culture successfully, there has to be commitment from the top to embrace
the values which have been agreed and good behaviour from the board and senior
management. Bad board behaviour soon cascades down through the organisation. Good
behaviour from the board and senior management means no infighting, no over-dominant
individuals or groups of individuals, no obfuscation – so that risks or products are too
complex to understand. These characteristics emerged when Equitable Life, the oldest
mutual insurer in the world, had to close to new business in 2000.
Case study
Equitable Life
The Equitable Life Assurance Society (Equitable Life) was founded in 1762. At its peak, it
had 1.5 million policyholders with funds worth £26 billion under management, but it had
allowed large unhedged liabilities to accumulate in respect of guaranteed fixed returns to
investors without making provision for adverse market changes. Following a House of Lords
ruling in July 2000, and failed attempts to find a buyer, it closed to new business in
December 2000 and reduced payouts to existing members.
As examples, key behaviours will almost certainly include teamwork and providing
high-quality client services. Teamwork can be expressed through actions such as:
cross-function collaboration; collective responsibility; and group decision making. Providing
high-quality client services may involve: establishing client relationships; responding to client
demands; aligning contact with client needs; monitoring client progress; and dealing with
problems and complaints.
Having established the basic headings, we can then detail what constitutes excellent
behaviour or performance. For collective responsibility, for instance, high performance might
be described as:
Promotes and supports the decisions of the group even when these may not fit with the
priorities of his or her own function or sector and accepts and encourages others to live out
collective responsibility.
High performance in dealing with client problems and complaints may be described as:
Acts as a highly trusted adviser/counsellor and client confidant – not only in good times – but
also when things go wrong for the client. Willing to go the extra mile – including ‘taking their
part’ to resolve difficulties or complaints.
Key behaviours will also specifically include ethical behaviours, which are fundamental to all
employee-related dealings both within and without the firm and should be written down in the
staff handbook. As an example, in February 2005, the Worshipful Company of International
Bankers in the City of London published Principles for Good Business Conduct, to which all
its members subscribe:
act honestly, fairly and with integrity at all times in dealings with colleagues, clients,
customers and counterparties;
observe applicable laws, regulations and professional standards;
manage fairly and effectively any conflicts of interest.
Ensuring that everybody in the firm understands and is comfortable with the values and
behaviours which are being encouraged has to go further than just writing them down.
Employees need to hear clear, strong and repeated messages on values and behaviours
from management, but there must also be the opportunity for feedback. Culture is an
organisational matter so feedback is important. Feedback may also discover values which
are important to customers or suppliers, or what might differentiate the firm from its
competitors and turn that into competitive advantage.
As we have frequently pointed out, every member of staff is involved in operational risk
management. Clarity of roles and responsibilities is a fundamental part of the risk
management framework. Clarity of roles and responsibilities is also key to making people
aware of their position and worth within the firm. Where people can explain how they
contribute to the organisation, they will make a positive contribution to its performance.
Remember the (perhaps apocryphal) janitor at NASA who, when asked what he did, replied
‘I’m helping to put a man on the moon’.
A healthy risk culture is one which encourages transparency and communication up and
down the firm. Not a place where the CEO ‘wouldn’t want to hear that’, but one where bad
news travels early and fast to where it’s needed for decisions. To that extent the mediaeval
monarch often had the advantage over the modern CEO in that he had a court jester to tell
him what his courtiers were too afraid to say. A culture of open communication is one where
there are no glass ceilings between, say, risk or audit and the C-suite and non-executive
directors. It is one where the management hierarchy is not an obstacle to the flow of truth up
and down the organisation.
One of the problems of operational risk is that events, and especially ‘near misses’, generally
have to be reported individually rather than through the financial reporting systems. As a
result, many events are not reported, which greatly diminishes the effectiveness of
operational risk assessment. So openness and transparency lie at the heart of good
operational risk management.
To overcome reluctance to report events and losses, a first step may mean establishing a
system where losses are reported anonymously. In a sense that is an admission of failure. In
a culture of trust, the reporting of losses, problems and potential risks is encouraged
because as a result future risks can be avoided and the control environment improved.
Extending this form of reporting to behavioural aspects also means that there should be
channels for ‘speaking up’. Whistle blowing is one thing, and is usually about serious crimes
and misdemeanours, but speaking up expresses a culture where poor behaviours can be
reported in a secure and trusting environment where no retaliation on the speaker is
tolerated. The system can be web-based, anonymous and either internally or externally run.
But there should be a guarantee that complaints will be handled and researched within a set
number of days, for example anything involving financial matters within 14 days and serious
ethical breaches or other ‘category A’ issues within 24 hours.
‘Speaking up’ is all part of a culture of active learning, such as that undertaken in the airline
industry. All errors on a flight whether on the flight deck or the galley, are placed in a log so
that they can be investigated and form the basis of future training or changes to procedures.
No blame is attached to somebody who reports their errors if they are the first to do so,
because all have a duty to ensure that processes are as safe as possible. It is said that on a
transatlantic flight as many as a hundred items may be logged. Some may be concerned at
that, but it is evidence of a wish to improve and to learn. It is part of an environment in which
everybody’s views are valued and they are encouraged to contribute ideas to improve their
own and other people’s performance.
Reward
A key element of embedding a healthy risk culture is to use the reward system to incentivise
good risk behaviour and to deter poor behaviour. We will have more to say on reward later in
the chapter, but in considering culture we will just emphasise that business is about
stewardship both of human and financial resources, the two key elements of risk
management. As regards financial resources, the aim should be to make money slowly
rather than to get rich quick. Similarly with human resources, firms should not rent human
capital over the short term. Human capital is being entrusted with the firm’s capital and brand
over the long term.
Another approach is The Competing Values Framework devised by Kim Cameron and
Robert Quinn.11 This allows respondents, via a questionnaire, to place either themselves or
their organisation in one of four quadrants: Collaborate (the clan), Create (the ‘adhocracy’),
Compete (the market) and Control (the hierarchy). Tools such as these allow the firm to
assess its current culture, identify where it wants its culture to be and also understand where
employees sit within the culture. Highly rated businesses such as General Electric or
Coca-Cola constantly reassess their culture and fine tune it to make the organisation more
adaptable and ready for change.
Testing need not be so systematic. Firms will already have a number of risk and
performance indicators which will give a rough guide as to the state of the firm’s risk culture
and its direction of travel. These might include:
on controls and quality: trends in audit issues, compliance matters, claims and legal cases,
bad debts
staff/external: customer comments, supplier feedback
staff/internal: staff turnover, absenteeism; staff surveys or focus groups; training records,
expenses reports.
As with so much work on operational risk indicators, many are already being used in the
business. There is no need to re-invent the wheel.
All of these factors mean a changing operational risk environment and operational risk
exposure which need to be constantly reassessed, as well as the effects on the operational
risk culture. From a people risk point of view, a changing risk profile and risk environment
may require different skills being developed or brought in. It is management’s job to be
aware of changed conditions and to be able to adapt quickly. In this way, risks can be
anticipated and their impact limited before they arise. Organisations need to keep fit to
remain healthy, just as the people within them.
The temptation at times of economic trouble is to cut staff, cut training and hope the storm
will blow over. It may well be that staff have to be made redundant, but losing trained and
skilled people will undermine future competitiveness and increase risk. It may be better to
devote time to managing people costs more efficiently, for example by: improving absence
management; being more rigorous with expenses; imaginative use of contractors,
secondments, or flexible and part-time working.
In any case, have you established a clear enough picture of where you want the firm to be in
two or three years’ time to be able to assess the skills you will need to get you through? And
do you have an assessment process which identifies those people with the requisite skills?
They may not be the people doing the best job today, but could be your salvation in the
future.
A healthy operational risk culture will encourage continuous improvement and be open to
change and flexibility. Employees should be encouraged to be creative and innovative and
not allow work processes and practices to be rigid, inflexible and stale – in other words unfit
for purpose, exposing the firm to more risk. The watchwords should be fitness and agility.
Selection
People risk often starts at the beginning with selection and choosing the wrong people. Poor
selection leads to cost and wasted management resource. Effective selection is an
opportunity to add benefit to the firm.
Who do we want?
Go for fit rather than capability. If you really want to place a piece of grit in the oyster
because you know you’re about to embark on a period of serious change and need
somebody who will effect that change, fine. Otherwise, consider behaviours and choose the
person who fits your culture, rather than the person who appears to tick all the boxes of
expertise and experience. You can teach people competencies, but you can’t change
personalities. Or as Peter Schutz, former President and CEO of Porsche AG, has put it, ‘Hire
character. Train skill’.12
Psychometric tests. They undoubtedly have value, especially if linked with the excellent
behaviours you identified at the outset, but they should be an aid to judgement, not a
substitute. If your gut instinct contradicts the test, go with your gut.
Recruit with one eye on the future. We are often too certain about what and who we are
looking for. Have we really thought about the future and where the firm and the industry is
going? The world and the firm will change – and sooner than we may think or like. Another
reason to go for fit – and flexibility.
The process
Develop selection processes which attract and identify candidates with high potential.
Employment may not be for life, but nor is it only for the immediate future or problem.
The process may include an outsourced recruiter. There’s nothing inherently wrong with
outsourcing aspects of selection. But if you do, make sure the search firm thoroughly
understands your business and doesn’t just rely on the specification given. If it’s a first
assignment – whether for the firm or a particular department – at least the first third of the
recruiter’s time should be spent inside the firm, working from there to get a clear
understanding of its culture, as well as the assignment itself. Only then can they go out to
the market (the next third) and sort through the candidates (the final third).
There is, of course, one other informal selection process, which goes back to the comment
about selecting for fit – that is referral, contacts or recommendation. You may not have a
current vacancy, but if you do come across somebody that way, create a role to get them on
board. As Henry Grunfeld, co-founder of bankers S.G. Warburg & Co, once said: ‘Recruiting
is like buying a tie – you buy one when you see one you like; you do not wait until you need
one.’ The selection process can be imperfect enough.
Appraisals and performance management
Appraisals are a critical part of performance management, reviewing performance against
agreed targets. Since risks are threats to objectives, the firm’s or unit’s objectives should
form the basis of the performance targets, which should be based on both financial and
non-financial behavioural factors. Appraisals are the opportunity to reinforce the excellent
behaviours which will increase the firm’s chances of sustained success and reduce its risks
by confronting poor behaviours.
To do that, they have to be fair and based on clear criteria. Fair appraisals reduce the
probability of a number of people risks occurring or, if they do occur, being resolved at an
early stage and reducing their impact. We have already emphasised the importance of trust
to support a culture of honesty and openness and so improve risk management. Fair
appraisals are part of that process.
But how do we ensure that appraisals are fair? Compare them. Does the department which
appears to have a remarkable cohort of A individuals actually outperform the one which
seems to be dominated by down-the-middle Cs? It’s more likely that the appraisers are
differently motivated than that the mix of individuals is so divergent. Appraisals are a control
on behaviour and part of the process of maintaining a good risk culture. That is why they
should be validated across the firm to ensure consistency of this vital control.
Do you genuinely check and analyse for gender or race bias? Once it’s known you do, it will
be surprising how quickly staff become confident in the system and maverick managers are
brought into line.
And are those above average scores really justified? Too often, when a department head
comes to HR to say that, for whatever reason, Mr X or Ms Y has to be fired, they invariably
find that the last couple of appraisals have been glowing to the point of excellent. How
strange that ‘good’ people become ‘bad’ when there are problems. Dishonest appraisals
disproportionately increase the cost of dismissal. If poor staff had been honestly appraised
and identified sooner, when times were good, the costs of dismissal would have been lower
and recruiting a replacement would have been easier than it will be in a downturn.
One reason for dishonest appraisals is that they continue, despite all the rhetoric, to be an
annual formal event. If so, they cannot provide a forum for criticism which should have been
made months before. We should be looking at our staff – and our superiors – all the time and
providing continuous feedback so that the firm benefits from the resulting openness. That
openness will improve performance and develop potential, not just for the individual, but
inevitably for the firm as a whole. It should also mean that the formal appraisal, when it
comes, will contain no surprises.
Finally, appraisals point to ways in which an individual can be developed further, which may
include training, to improve risk management or reduce risk exposure. Staff are like
diamonds; they require constant polishing.
Risk indicators are a critical part of risk assessment and can point to training and
development needs. Table 15.2 gives a few typical examples.
Risk Indicator
Poor throughput Error rates; productivity
Employment law failures; discrimination Claims by staff
Loss of talent (through poor people management/culture) Resignations of
experienced/senior staff
Training and development may involve courses, but can also mean changes in responsibility
or environment. You never know when somebody will be missing. At a higher level,
leadership should be developed within the firm. Firms which don’t nurture their talent will see
it leave to the competition, who have spotted new opportunities. If personal and professional
development is switched off, firms will find themselves with an even more desperate
shortage of talent when it is needed – whether for a downturn or an upturn.
But appraisals are not the only guide to personal development. The firm’s objectives over the
medium term will point to the skills required, so that a skills audit should be regularly
conducted to make sure the firm has a reservoir of the right kind of both technical and
leadership talent to fulfil its strategy and develop its human capital accordingly.
Reward – or what does your bonus system say about your values?
Given the reams which have been written about the impact of remuneration structures on
behaviours which appear, to the public and politicians at least, to have been at the heart of
the banking crisis, it would be hard to consider people risk without discussing reward and
remuneration.
Before we deal with bonuses, let’s establish a few principles of good reward policies.
Reward is not just about remuneration. Remuneration – base pay, variable pay, share
options, other benefits – is the financial aspect of reward. But there are non-financial aspects
of reward which can be just as important to employees: recognition, the opportunity to
develop skills, career opportunities, the quality of the work–life balance. They all form part of
the overall reward package and may be decisive in retaining a valued employee or recruiting
a new one – just one aspect of people risk mitigation.
But let’s return to the core of reward – remuneration. Remuneration, like appraisals, with
which it is obviously closely linked, should reinforce the performance and behaviours we
require and discourage unwanted behaviour. It should be based on what the firm considers
to be good performance and help the business achieve its strategic objectives, which should
themselves be rooted in sound risk management and a healthy risk culture.
If remuneration is linked to performance targets which are closely allied to business
objectives, you will have gone a long way to linking remuneration also to risk appetite. On an
oil rig, managers are rewarded primarily for the quality of their safety management. Hitting
production targets comes second.
Remuneration is not simply a market wage. It is also a balancing act between reward and
risk. In the recent financial crisis, did remuneration encourage ‘bad’ and overly risky
behaviour? Probably. But was that, in fact, the publicly visible reflection of a poor risk
management culture? Or even lack of any recognisable risk management culture? They
were evidence of a remuneration policy which had lost any connection with business
strategy and objectives which were allied to risk management, including especially the
people risks within operational risk.
Another reflection of the balance between reward and risk is the balance between fixed and
variable remuneration. Bonuses are not an evil in themselves, but they should be used to
drive non-financial behaviours and performance as much as respond to the achievement of
targets and profitability.
The word ‘bonus’ is, of course, itself emotive in the eyes of the public and politicians.
Following the banking crisis, guidelines were published on remuneration for banking and
financial services. In the guidelines, it was suggested that where a significant proportion of
remuneration is in the form of a performance-related bonus, the majority should be:
deferred for a minimum period (which will reflect the risks involved in the transactions giving
rise to the bonus)
subject to claw-back (on the deferred element)
risk-adjusted, through quantitative criteria and human judgement, and reflect all types of risk.
Incentives are intended to distort behaviour. As a result, they can be a force for bad as well
as good. In principle, awarding performance bonuses in the form of shares should align
reward with shareholder value, but it can mean that executives spend more time trying to
manipulate the share price than running the business properly and profitably over the
medium to long term. Management is about stewardship of the firm’s assets on behalf of the
owners, not an opportunity to get rich quick.
Deferring bonuses for an appropriate period should help to discourage short-term risk taking.
It also has the merit of aligning remuneration to actual ultimate performance, with that
performance based on the whole range of judgements, including risk.
Whether the post-crisis guidelines will improve the quality of risk management in financial
services remains to be seen. They should, however, lead to longer-term incentive plans,
which is a step in the right direction. Traditionally, incentives have been too short term. That
is partly because they tend to focus on things which are easy to measure and tie in with the
firm’s (usually) annual reporting cycle, whereas the effect of an employee on the firm’s future
performance is longer term and not easy to assess in the short term.
However, in times of crisis it may be more appropriate to call on the reservoir of trust you
have built up with your staff and revert to short-term plans. At such times you need tactics
rather than strategy. Longer-term plans can come when times are calmer.
One final point made in the guidelines is that there should be greatly increased public
disclosure of the basis for remuneration. Of far more importance from a people risk
management point of view is that the internal culture of openness and transparency should
extend to remuneration. People are entitled to know the basis on which they and their peers
will be remunerated so that they see the process as being fair and open. There has to be
differentiation in pay, otherwise remuneration loses its power to incentivise good
performance and drive out bad behaviours. The reaction is often to shroud remuneration in
secrecy. The risk of upsetting people by paying them at different levels is, however, dwarfed
by the negative impact of being secretive.
A clumsily managed or crudely applied remuneration policy risks losing staff and may be
seen as tolerating under-performance, under-rewarding people who have behaved
excellently or even of rewarding people who threaten to leave. Flexibility is important,
though. What counts as good performance in the future may be very different from what
counted as good performance in the past.
Finally, who polices remuneration and remuneration policies? Apart from externals such as
investors, the media and legislative committees – all of whom seem reasonably ineffectual –
there is, of course, the board and the remuneration committee. Ensuring that their senior
executives are in a top ‘quartile’ or similar cohort means that inflation is built into the system
and does little to ensure that reward is genuinely linked to the performance criteria which
reflect the particular circumstances of the firm at a particular point of time. Boards must tie
remuneration back to performance criteria which are transparent. Not only will that mean that
excellence will justifiably and publicly be rewarded, but poor performance, including that of
the CEO, can be immediately dealt with, again both justifiably and publicly.
SUCCESSION PLANNING
Staff retention
The simplest form of succession planning is, of course, not to lose staff in the first place.
Retaining trained and experienced staff is a key to excellent risk management. You cannot
afford to lose both the commitment and the intellectual capital of your best employees.
Since the human brain is the easiest way to carry information (and secrets) out of a firm, you
should look at how corporate knowledge has been developed, documented and converted
into intellectual capital. Has corporate knowledge been compared with competitor knowledge
to identify your intellectual as well as your competitive advantage – and the risks if you
should lose it? That’s one strategy to reduce the risks which an ex-employee can cause
either maliciously or if, for instance, they can exploit their knowledge of your systems or
strategy. Employment contracts and gardening leave can get you only so far. The opening of
Heathrow’s new Terminal 5 in March 2008 was a good example of how lack of a skills audit
and failure to retain people with knowledge caused untold financial and reputational damage.
Another risk mitigation strategy to reduce the possibility of losing staff is, wherever possible,
the exit interview. It may be too late for the employee who is leaving, but the interview may
be able to give pointers which will help you retain those who remain. What were the real
reasons for resignation? Which were inevitable or acceptable? Or avoidable?
Case study
Opening of Heathrow, Terminal Five (2008)
When Heathrow’s new terminal opened, the state of the art baggage handling system failed.
To exacerbate the problem, critical baggage handling staff were prevented from reaching
their work stations because of new security measures. What is less well known is that British
Airways had gone ahead with a redundancy programme which anticipated that the system
would work and took effect immediately before the terminal opening. The result was that
knowledge and experience which would be needed perhaps only once in 20 years were
unavailable just when they were needed. A skills audit conducted with the redundancy
programme, together with realistic scenario planning, would have significantly reduced the
impact on BA’s finances and the reputation of both BA and the UK in terms of industrial
relations.
Your best employees will always be in demand. If you do not nurture your talented people,
they will leave for competitors who spot new opportunities. Nor is it just the people
themselves who go. It is the valuable IP they take with them.
In the end, the best risk control technique is a pro-active human resources policy which
seeks to create an environment in which people are valued, and there is a strategy for
retaining talented employees and for minimising the damage that occurs when key people
leave.
Whilst that may represent a robust succession plan for your job, it’s of little use if the same
person has been pencilled in to fill a number of gaps around the firm. In fact, you should
have at least two people for each position because in practice only 40% of people actually fill
the roles for which they are pencilled in.
So, as senior executive, make sure you look across your area and have a plan which will
survive the loss of more than one of your key people. 9/11 was a tragic example of firms
losing a number of staff at the same time, just as they might, albeit temporarily, with a
virulent pandemic. And, of course, keep the plan under constant review. Almost by definition,
it may need to be activated at very short notice, whether from natural causes such as illness
or even death, or from the fact that a person or team simply resigns and walks out of the
door.
Crisis management is generally as far as most plans go. A crisis plan is fine, but a true
succession plan should be a plan for the longer term, not just an immediate crisis. Is the
crisis replacement expected to be the permanent replacement or merely a stop-gap? In any
case, if somebody leaves, will the job and skills required remain the same, or will a different
organisational or skills structure better reflect the firm’s strategy and objectives? Perhaps the
most sensible approach is to develop a pool of talent, because circumstances will almost
certainly be different when the event happens. That paid dividends for McDonald’s in 2004
when they managed to replace not one but two CEOs in 12 months from within the firm,
following the deaths of two CEOs within 9 months of each other.
True succession planning involves drawing up a skills matrix, performing a gap analysis and
then acting on what it tells you. That may mean re-thinking the firm’s medium-term strategy,
or it may mean re-thinking your view of current employees and whether they really are the
best people in the medium term. Succession planning is a classic control to minimise the
risks of a sudden absence of personnel.
HR should be the driver of good people management within the firm, promoting good – and
better – behaviours. It should be a critical friend to the board by providing guidance and
minimising reputational risk. It should also partner line managers to build resilience in to
workforce planning. They should be the experts in considering flexibility of contract, skills or
location to allow business to respond to changing circumstances.
In fact, HR should be seen as one of the key risk management functions. We expect the
head of risk management to put in place a risk framework which will cover all the standard
risks. Do we ask the HR director to put in place a ‘people risk’ management framework?
Perhaps we do not because, as with operational risk management, managing people is
‘what we do’.
HR needs to ensure there is a strong HR strategy and policy, allied to risk and business
objectives, and that the policy is fully communicated and implemented consistently
throughout the firm. Like risk management, much of people risk is delegated to line
managers but HR is there to maintain oversight of the process.
Again like risk management, HR will only add value if it is in tune with the firm’s commercial
needs and objectives. It does not need to be a large function. Indeed, in a well-run firm, it will
not be because line management operates good people management. But it should be
central to a firm’s management. In a survey by Mercer13 of 500 HR Directors in Europe, the
Middle East and Africa, 65% saw themselves as strategic partners to the business although
in practice only 15% of their activities related directly to strategy. To what extent do firms see
or develop their HR Directors as potential COOs?
That leads to one final question – does the head of HR have to be an HR professional, or
would a good line manager be able to do the job just as well? Given the scale of financial
and reputational risks of non-compliance with legislation – employment, discrimination,
health and safety and so on – it’s probably best that they should have extensive experience
of dealing with these issues and with all the ramifications of hiring and firing.
But with people, it’s not just about competence as expressed, say, by IT failures. We need to
dig into the softer environmental issues. Do we use staff morale surveys? Or count the times
the ‘speaking up’ hotline is used for significant governance failures? Do we use human
reliability assessments, of the kind used in ‘safety critical’ industries such as nuclear or
space? How do we monitor issues such as stress or bullying and all those other critical,
environmental factors? We can aggregate the marks given in appraisals for the various
behaviours mentioned earlier, and use them as a temperature gauge for whether the firm as
a whole is on target to meet its objectives or whether there are certain behaviours which are
not being met.
One good indicator of stress – or unhappiness with the working environment – is sickness.
The problem with sickness figures, as we shall see shortly with key staff turnover, is that the
raw number is not a good indicator. One of the problems with sickness in the UK’s National
Health Service is that much of it relates to experienced and dedicated staff whose
conscientiousness means that they exhaust themselves in the face of lack of adequate
support. So, as with all operational risk data, it is essential to get beneath the headlines and
discover the true cause.
Case study
National Health Service (2009)
In August 2009, Steve Boorman published his interim report on the UK’s National Health
Service, NHS Health and Wellbeing.14 In it he noted that sickness absence in the NHS, at
10.7 days a year on average, was greater than the public sector as a whole (9.7 days) and
the private sector (6.4 days). Reducing absence through sickness by a third would result in a
gain of 3.4 million days a year (14,900 whole-time equivalent staff) and an annual direct cost
saving of £555m.
More specifically, and related to risk management, hospitals with high staff sickness had
poor patient satisfaction rates and higher infection rates. The report concluded that reducing
reliance on transient agency staff by reducing NHS staff absence through sickness would
lead to a considerable improvement in patient satisfaction and patient outcomes.
Looking at some of the people risk mitigants discussed above, we can see that indicators
concerning training and development can be developed: how many staff have been
identified with training or development needs? How many of those needs have actually been
fulfilled?
As with all indicators, the key is to get to quality rather than mere numbers and to
understand what the numbers are telling you. Staff turnover is probably the most common
people risk indicator to appear on risk dashboards and management reports. But staff
turnover alone is a very blunt instrument. It is not the number of staff, but the quality of staff
leaving and the knowledge and experience they take with them which is the issue, so do the
turnover data indicate loss of staff by experience and by appraisal grading? Is there a target
for turnover? In some areas, we might be concerned by turnover of, say, less than six
months. In a new project area, we might be devastated by the loss of anybody in the team.
And what if we appear to be retaining more staff than we expect? Does that reflect our
excellent work environment and leadership – or are we retaining staff who are below
average, but who are being paid above the going rate for their competence so that there is
no incentive for them to leave?
Which brings us back to where we started – selection. If we choose the right people; make
sure they are clear about their role and the importance of their job; give them opportunities to
develop and learn; pay them according to clear and transparent performance criteria which
reflect the behaviours of the organisation; give them regular feedback and dialogue with their
superiors; and make sure there is effective internal employee communication, we shall have
a successful business in which our people risks are being successfully managed and
mitigated.
Notes
1 Charles Handy, Beyond Certainty (London: Hutchinson, Random House (UK) Limited),
1995.
2 John Donne, Meditations upon emergent occasions and seuerall steps in my sicknes,
Meditation XVII (1624).
3 Quoted in the Group of Thirty’s report, The 2008 Financial Crisis and its Aftermath:
Addressing the next debt challenge, June 2011.
4 Roger Steare, ‘The Board’s role in establishing the right corporate culture’, in Business
Risk: A practical guide for board members (London: Institute of Directors), 2012;
www.iod.com/mainwebsite/resources/document/iod-directors-guide-business-risk-june12.pdf
5 How do you embed a winning corporate culture?, Director, March 2011.
6 Financial Crisis Inquiry Commission, The Financial Crisis Inquiry Report: Final report of the
national commission on the causes of the financial and economic crisis in the United States
(Washington, DC: Government Printing Office), 27 January 2011.
9 Professor Richard Roberts, Did anyone learn anything from the Equitable?, Institute of
Contemporary British History, King’s College, 7 September 2012.
10 McKinsey working papers on risk no. 16, Taking control of organizational risk culture,
February 2010.
11 Kim Cameron, Robert Quinn and others, The Competing Values Framework: Creating
value through purpose, practices, and people, 1999/2009; http://competingvalues.com
12 Quoted in Roger Steare, Ethicability (Roger Steare Consulting Limited), 2009, p. 72.
14 www.nhshealthandwellbeing.or
Stakeholders
WHAT IS REPUTATION?
Good name in man and woman, dear my lord,
As ever, Shakespeare got it right. Iago may have been cynically manipulating Othello, but he
was right in the one key element of reputation – it is all about perception. It exists in the
minds of others, and you neither own nor control their perceptions – which makes it difficult
to manage.
PR can get you so far, but any reputation has to be genuine and based on reality. If the
credibility gap gets too wide between what a firm does and what those who deal with it
expect, its reputation will suffer and its business will inevitably decline. Reputation risk
management is about recognising the size of the gap.
People evaluate a firm’s reputation on the basis of available information. Some of that
information may be controlled by the organisation, such as annual reports or marketing
materials. Other information may take less obvious forms: a customer’s experience of
service; the opinions of customers in general; staff surveys; the views of all kinds of
commentators from parish-pump gossip, to blogger, to syndicated journalist, to campaigning
activist. Reputation is a subjective, composite assessment resulting from a number of
factors, amongst which trust will be the key ingredient.
As Morgen Witzel has put it: ‘A reputation is, in effect, the combined experiences that many
people have of an organisation over time.’1 Those experiences and perceptions are dynamic
and change all the time. Often that change is caused by the actions or attitudes of others. If
your peers and competitors raise their game, your relative reputation will decline. If one of
them behaves especially badly, your reputation may suffer through guilt by association. It
can also change in response to social and other trends affecting how key constituencies, the
reputational stakeholders, understand these actions. The perception you thought you had
given may turn out over time not to be the one the stakeholder sees.
STAKEHOLDERS
The stakeholders are not just those with whom you deal directly. They include others, such
as regulators and opinion formers, who effectively have in their hands your licence to
operate. They not only influence your direct stakeholders but also those who may potentially
become directly involved with you and, of course, they influence each other.
Consumer advocates
Local communities
Reputation is about meeting the expectations of all these people, many of whom you may
never meet. Whether it is good or bad depends on the comparison stakeholders make
between how a company and its employees are expected to behave and how they actually
do. That was the main reason behind the public outcry in a number of countries concerning
the phone-hacking scandal within News International.
Case study
News International phone-hacking scandal (2011)
The News International phone-hacking scandal had its origins in 2005–7 when voice-mail
relating to the British royal family was intercepted by a private investigator working for a
News of the World journalist. Investigations at the time concluded that the paper’s
phone-hacking activities were limited to celebrities, politicians and members of the British
royal family. However, in July 2011, it was revealed that the phones of murdered schoolgirl
Milly Dowler, relatives of deceased British soldiers and victims of the London bombings of 7
July 2005 were also accessed. Further revelations showed that phone hacking was far more
widespread than had at first been thought and included allegations that the newspaper had
bribed police.
Public outcry and advertising boycotts resulted in the closure of the News of the World in
July 2011 after 168 years of publication. Continued public pressure also forced News
Corporation to cancel its proposed takeover of the British telecommunications company
BSkyB. In the same month, British prime minister David Cameron asked Lord Leveson to
conduct two enquiries, one into the specific allegations of phone hacking and police bribery
by the News of the World and another to look into the culture and ethics of the wider British
media.
The affair led to a number of high-profile resignations including News International chief
executive Rebekah Brooks and the Commissioner of the Metropolitan Police Sir Paul
Stephenson.
This was demonstrated in the Sony PlayStation outage in 2011. On 20 April, Sony became
aware of a cyber-attack on its PlayStation network and closed down the service. After
forensic examination, it announced that credit details for 77 million accounts had been
compromised. Services began to be restored towards the end of May. Whilst Government
and other agencies were concerned about data protection, the overwhelming complaint from
PlayStation customers was that their games were not available for three to four weeks.
Of course stakeholders’ views also change over time, as do groups of stakeholders. They
are interest groups which may come and go. If you wish to build a new factory or office
block, the local planning department may appear as a stakeholder for the first and only time,
together with local residents, who may then remain as a critical group.
There are obvious parallels. Reputation and brand are driven by values and behaviour; both
depend on experience. However, with brand, the customer is key, whereas with reputation
the customer is a sub-set of the stakeholders, albeit a significant one.
A strong brand can protect a company against intensifying price competition and help to
protect its reputation. But brand alone will not protect a company from all the reputational
risks to which it is exposed. To understand this difference, we need now to look more closely
at reputation risk.
Is reputation risk a risk in its own right? It is, in the sense that a threat to its reputation has a
direct effect on an organisation and it consistently registers as one of the key risks a firm
faces. But reputational damage is almost always a consequence of a risk event, usually an
operational risk event, involving a failure to deliver products and services as promised or
behave as expected. Even if it is a second-order risk, reputation risk is nevertheless a critical
element of operational risk management.
We can look at various economic measures of the effect of reputational damage – drop in
sales, loss of earnings, the cost of managing the crisis or changes in share price and market
capitalisation, but it is difficult to make direct correlations between these and a perceived
loss of reputation or the long-term impact on trust. There are too many assumptions and
variables to make it meaningful. In any case, can behaviour and expectations be measured
in terms of money?
The simplest economic measure is probably the significant intangible, goodwill, a key
component of which will be reputation. For a service business it may even represent its total
value. As Alan Greenspan put it: ‘Manufactured goods often can be evaluated before the
completion of a transaction. Service providers, on the other hand, usually can offer only their
reputation.’3 But goodwill can be properly valued only when a business is sold and, even
then, reputation is just one of a number of factors in its valuation.
Another approach is to use a scorecard. Here again, the variables are many and their
weighting is notoriously subjective. As a basis for a scorecard, many firms use the factors
identified by Charles J. Fombrun, founder of the Reputation Institute, shown in Table 16.2.
Drivers Attributes
Emotional appeal Good feeling about the company
Admire and respect the company
Trust the company
Products/services Offers high-quality products/services
Offers good-value products/services
Develops innovative products/services
Stands behind its products/services
Vision and leadership Has excellent leadership
Has a clear vision of the future
Takes advantage of market opportunities
Workplace environment Is well managed
Looks like a good company to work for
Looks like it has good employees
Financial performance Record of profitability
Looks like a low-risk investment
Strong prospects for future growth
Tends to outperform its competitors
Social responsibility Supports good causes
Environmentally responsible
Treats people well
Source: Reputation Institute
Drivers Attributes
Emotional appeal Good feeling about the company
Environmentally responsible
Fombrun devised it as a ranking model, by which the Institute can assess and report publicly
either on the universe of companies or on those in a particular industry. It is therefore akin to
a rating system. As such, it is possible that it can be self-reinforcing and affect corporate
behaviour. Firms will game the system. But it does provide helpful questions with which a
firm can self-diagnose its perception in the eyes of its various stakeholders.
In the end, the measure of reputation risk is the gap between stakeholder expectations and
actual performance. The value of reputation is, fundamentally, the cost of risk, which is the
cost of recovering the trust formerly enjoyed. That cost can be considerable. A survey by
Burson-Marsteller of business leaders, journalists and financial analysts in the US suggests
that it takes four years for a company to restore its reputation following a major incident.4
Drivers Attributes
Environmentally responsible
customers
intrusive regulation
Some of the problems which arise if reputational issues are poorly handled are given in
Table 16.3 (above). It requires a considerable amount of resource and effort to restore the
trust of the various stakeholder groups identified in that list. At worst, loss of reputation can
lead to the complete destruction of the business, as in the Enron/Andersen case.
Sadly, for some firms, the comfort of a filtered version of reality is preferable to the real thing.
One of the greatest threats to reputation risk is what might be called institutional
conditioning, a culture in which the organisation hardly knows it is moving the boundaries
between acceptable and unacceptable behaviour. Another description of it might be ‘ethical
creep’. Or firms behave badly, get away with it and so go on and do ‘it’ again. Of course, in
the case of Enron, some senior executives knew exactly what they were doing. It has been
argued that institutional conditioning was at the root of the NASA Challenger and Columbia
space shuttle disasters.7 In the case of the Columbia disaster, there was the added failure to
learn the lessons of Challenger, perhaps another symptom of institutional conditioning.
NASA, in common with other firms – and with UK Members of Parliament in 2009 – clung for
too long to the belief that its own interpretation of ‘acceptable behaviour’ was all that
mattered.
Case study
Enron/Andersen (2001)
Enron was founded in 1985 following the merger of two gas pipeline companies. It thrived on
the deregulation of the sale of natural gas in the USA in 1985. By 1992 it was the largest
merchant of natural gas in the USA and, by 2001, it had become a conglomerate that both
owned and operated gas pipelines, pulp and paper plants, broadband assets, electricity
plants and water plants internationally. The corporation also traded in financial markets for
the same types of products and services.
In achieving this, Enron accumulated a huge mountain of debt. It managed to hide this and
report artificially inflated profits through a complex web of special purpose entities and
accounting treatments which stretched the limits of accounting practice. Its audited
statements were famously opaque. Although it used derivatives to hedge its liabilities, the
hedges were predominantly with its own special purpose entities, so that it was effectively
entering hedges with itself.
The company failed to satisfy mounting concerns amongst analysts and investors during
2001 and confidence collapsed after the announcement of an SEC investigation into the
company following accounting restatements covering the previous four years of US$1.2bn,
and the discovery of a number of problematic transactions.
A sale of the company fell through and its paper was downgraded to junk status. It filed for
bankruptcy and sought Chapter 11 protection on 30 November 2001.
During the ensuing investigation, Arthur Andersen, its external auditor, was discovered to
have shredded tonnes of documents relating to its audit of Enron. Andersen collapsed with
the loss of around 80,000 jobs.
NASA safety regulations stated that strikes by foam or other debris were safety issues which
should abort a flight, but flights were often given the go-ahead despite foam shedding.
Earlier risk assessments had estimated the damage of small ice impacts, the only impacts
recognised as threats to the leading edge wing panels. It was considered that impact from
the less dense foam panels would be less. The risk of damage from foam, despite
engineering concerns, was reduced from ‘possible complete penetration’ to ‘slight damage’
in the risk assessment process.
Perhaps more significantly, the Columbia Accident Investigation Board (CAIB) concluded
that NASA had failed to learn many of the lessons of the Challenger disaster. In particular,
the agency had not set up a truly independent office for safety oversight, nor had it
maintained a culture and organisational structure which gave sufficient weight to safety
issues. The CAIB believed that ‘the causes of the institutional failure responsible for
Challenger have not been fixed,’ and that the same ‘flawed decision making process’ that
had resulted in the Challenger accident was responsible for Columbia’s destruction 17 years
later.
The Challenger disaster led to shuttle flights being put on hold for 32 months. The Columbia
disaster led to a further suspension of two years; construction of the International Space
Station was put on hold and depended on the Russian space agency for re-supply and crew
rotation.
In the cases of both NASA’s shuttle programme and UK parliamentarians’ expense claims,
deep reforms and public humiliation were perhaps the most obvious costs for those involved.
At a higher level, both episodes carried the greater, if less measurable, cost of lost public
faith in institutions which had been held in a position of trust which they abused. In
operational risk terms, the risk of loss of public trust resulted from a failure of the control of
behaving in an acceptable manner.
Assuming deception is not ingrained, where can it all go wrong? We might expect business
leaders to be most worried about hazards to reputation arising out of events beyond their
control. In fact, reputation risk is seen largely as a product of business operations – at least
in the shape of their performance or non-performance. When asked by the Economist
Intelligence Unit in 2005,8 international senior executives cited the following as their top
reputational risks:
To those directly controllable reputational risks can be added behavioural risks, such as:
accounting practices – are they appropriate and subject to truly independent review?
corporate governance – is the board and its committees truly independent? Are conflicts of
interest properly handled?
discrimination – in all its guises
data privacy/protection
employee relations.
Then there are areas which are only indirectly under a firm’s control but may at least be
managed through dealings with third parties:
client’s clients
agents
partners, suppliers, outsourcers
subsidiaries, affiliates
regulators and regulatory actions
or even third parties it does not wish to deal with, such as money launderers or hackers.
Finally, there are external events which cannot be controlled, but which can have a serious
reputational impact, for example:
the activities of a few fellow industry members which can have an impact on the industry as
a whole
unwarranted allegations, whether supported or not.
A key point to remember is that reputation is damaged by perceived failures, even if they are
not grounded in fact. Unfortunately, perception is reality. A firm can be punished not because
of any failure on its part, but simply because it is being held to the wrong standard or even to
one of which it is unaware. If public expectations are simply ‘wrong’, because of factual
misunderstanding or misinformation, you need to take the initiative to redress this. A word of
warning, however: managers of many a collapsed brand have blamed public
‘misunderstanding’ for their own demise. You may not find sympathy if you offer the public a
rationale which is deeply unpalatable, or seen as out of step with changing standards of
acceptable behaviour.
Given the myriad causes of reputation risk and its ever-changing nature, how do we manage
and mitigate it?
The other reason why reputation management is in the hands of all management and
employees is that, as we said earlier, the stakeholders are many and various. In the
Economist Intelligence Unit survey of international senior executives quoted above, the
question was asked: ‘Which of the following have major responsibility for managing
reputation risk within your company?’ Unsurprisingly, the top answer, with 84%, was
‘CEO/President/Chairman’. There was then a sharp drop to 40% where we find the board;
CRO/Head of Risk Management; heads of business units, and a further drop to 35% to find
the communications officer and compliance officer. Very surprisingly, when the individuals
were asked who in fact managed reputation risk, it emerged that few of the executives
surveyed took actual responsibility. There was no formal reputation risk management
process.
Perhaps that is because, although the CEO may personify the values and conduct which
ensure a company’s good standing, he or she should not have the sole responsibility for
reputation risk management. And nor should corporate communications for that matter.
Responsibility should lie with whoever is most responsible for the stakeholder group which
may be affected by reputational damage. Table 16.4 gives some examples.
The advantage of ascribing responsibilities for reputation across the firm is that everybody
takes the issue seriously. In fact, as BP will tell you, after the Deepwater Horizon disaster
there was as much pressure from employees as anybody else for the company to work to
protect its reputation.
The danger is that each part of the firm operates in its own silo. There needs to be
coordination. Given the number of areas which are directly involved in protecting a firm’s
reputation, it is probable that the CEO’s role – or better that of the board – is one of
coordination.
Reputational relationship
Stakeholder
managers
Employees HR
Suppliers Procurement
Regulators Compliance
Press Press and public relations; corporate
Trade unions HR
Of course, the CEO or chairperson can single-handedly destroy a firm’s reputation, either by
conduct or speech. One of the most salutary examples is probably retail jeweller Gerald
Ratner, who at a private dinner famously described one of his firm’s products as ‘crap’ and
suggested that some ear-rings were cheaper than a ‘Marks and Spencer prawn sandwich
but probably wouldn’t last as long’. The remarks were reported; the market value of Ratner’s
group plummeted £500m, nearly destroying it and Ratner was forced to leave.
An interesting follow-up to the incident came from Ratner himself in his book, Gerald Ratner:
The rise and fall … and rise again, where he pleads: ‘I had worked bloody hard for 30 years,
making millions of pounds for shareholders and creating thousands of jobs for the company I
loved, and I suddenly had it taken away from me. Not for doing anything criminal. I hadn’t
embezzled. I hadn’t lied. All I had done was say a sherry decanter was crap.’9 To which one
might say ‘Absolutely.’ If the gap between reality and perception is that great, the result can
be devastating.
Many firms have taken the issue of coordination to another level by establishing a senior
reputation and brand committee, whose mandate is to ensure that their brand is protected
and enhanced and to consider issues which might affect their reputation. It is, perhaps, ironic
that Barclays, which had been one of the first to establish such a committee in early 2004,
had disbanded it before the Libor-fixing scandal engulfed it in summer 2012.
A committee like that can become the place to hammer out policy on such issues as conflicts
of interest, counterparties with which the firm does not wish to be associated, and a code of
behaviour within and without the firm, especially if it operates in a variety of countries and
cultures. It will make decisions on policy and on conflicts, where a proposed transaction may
potentially contravene existing policy or guidance. If that kind of committee can be put in
place and supported by a reputation risk competence centre, so much the better.
A proper governance structure will mean that everybody directly responsible for reputation
risk management has clearly defined roles and responsibilities. Whether they are
customer-facing or back office, they will have well-defined criteria by which events can be
assessed, supported by appropriate policies and guidelines. They will also have a clear
structure to identify and escalate issues as they arise. And of course, the whole process
should be regularly audited.
Table 16.5 Using the risk register to identify possible reputation risks
Once you have identified who might be affected, you can assess the likely scale of
reputation risk. Since that represents the gap between expectation and reality, you first need
to have a thorough understanding of the awareness of your firm by all its various
stakeholders. How well known are you? How much do they trust you? How do they rate the
quality of what you offer? What expectations do they have of you? What promises do they
believe you are making?
When something happens which may harm your reputation, the impact will, in part, be
affected by the goodwill you have with the relevant stakeholder groups. So you need to
establish a benchmark against which to assess potential reputational damage. If you truly
know what all of your stakeholders are looking for in your business, you can reasonably
assess whether the reputational damage, if realised, is likely to be significant or not.
The best way to do that is to conduct surveys amongst your various stakeholder interest
groups. The surveys will establish not only your own reputation but also how you compare
with your competitors, since reputation varies as a result not only of your actions but also of
those of your competitors. The surveys can take a variety of forms – face-to-face interviews,
questionnaires, e-mails – depending on how many stakeholders you have, how many of
them are considered to be key, or how many you may need for a representative sample.
The next step is to establish your appetite for reputation risk, which is probably best done by
establishing a scale of damage to measure the impact of an event on your stakeholders.
One example, which evaluates trust, is given in Table 16.6.
Table 16.6 Levels of reputational damage (example 1)
Another example, which is used in the banking industry (see Table 16.7) focuses mainly on a
number of key stakeholders such as customers, regulators and investors.
The important thing is to establish a scale, involving your own key stakeholders, against
which to test both your risk appetite and potential reputational damage.
Having done the groundwork, you can now revisit the risk register and determine the
likelihood of suffering reputational damage, the adequacy of your controls and whether an
event would be likely to exceed your reputational risk appetite.
Using scenarios
A highly effective method of considering potential reputational damage is to use specific
reputation risk scenarios as an assessment tool. They could be one or a combination of
incidents such as:
loss of a licence
adverse media campaign
legal dispute
loss of employees’ trust (e.g. following a whistle-blower event)
adverse perception of selected products and services by customers
investigation by the regulator and resultant publicity.
In building scenario outcomes, consider each stakeholder and how they interact with each
other, as we did during the exercise on identifying reputation risks (see Table 16.5). What are
the information flows between them as well as the information flows between them and you?
Consider the incident or incidents against the background of your risk and control
assessment. A control failure which you identify in the scenario exercise may affect other
risks than those directly related to the incident itself. Either method – risk register or
scenarios – will produce a hierarchy of reputation risk events or scenarios and point to an
effective action plan.
As suggested earlier, the scale of possible reputational damage may well not present itself
solely as a financial number, although significant costs may be involved in restoring a
stakeholder group’s trust in the firm. Reputational impact is difficult to assess, since the
range of impacts is large and much will depend on the true causes, whether the problem is
systemic or individual and, crucially, on the speed and effectiveness of response to the
problem.
The corporate communications department is not the sole repository of reputation risk
management (see Table 16.4), but it nevertheless has a critical role to play in managing
expectations. Apart from press and similar communications, the annual report can be a
useful part in the process – or a source of reputation risk, given the increasing need to
articulate management of non-financial risks.
As was pointed out in Chapter 3, Governance, there is a reputational gain in explaining the
nature of risks which a company faces and the processes it has in place to manage those
risks. Against that, the prudent auditor may well suggest that the important thing is to release
into the public domain only that information which has to be revealed, and to make sure it is
relevant, reliable and accurate. Has the information been properly audited? Whatever is
released, however, it is important that there is a process which assesses the tone of the
reporting and its probable impact on stakeholder groups.
The threats to a firm’s reputation often come from the drip, drip of an accumulation of small
shifts in perception. A small event can be seen as symptomatic of a wider malaise.
Monitoring perceptions of a firm’s reputation is a critical part of reputation risk management.
So the surveys described earlier, which act as controls when they are used to assess the
changing perceptions of stakeholders, are also indicators of changing exposure to reputation
risk.
Apart from these ‘soft’ methods of tracking reputation risk, there are numerous ‘hard’
indicators which may point to a changing reputation and can be tracked over time. Amongst
them are:
decline in revenues
decline in market share
difference between the market value and liquidation value of the firm (effectively the
movement in the value of goodwill in the firm)
number of customer complaints
number of product recalls
increase in regulatory attention
firm’s position on a publicly recognised reputation index.
Finally, when it comes to reputational risk tracking, the social media are key.
Social media
The rise of social media means that stories and comments about you can be in the hands of
millions of people within seconds. Facebook has a billion active users each month and
Twitter over 200 million.10 News travels fast, especially bad news, but now it travels in
milliseconds. Trends develop very quickly.
So firms have got to follow the media, plug in to customer dissatisfaction or plain untruths,
and react quickly before the untruth becomes a ‘fact’ or the dissatisfaction becomes a
serious threat to the business. In 2011 Bank of America and Verizon Wireless introduced
‘convenience fees’, the bank for direct debit payments and the wireless operator for
telephone and online bill payments. Following storms in the social media, the decisions were
reversed within 24 hours.11
On the other hand, using the media can be a good way for businesses to provide an
excellent customer experience as was demonstrated by Domino’s Pizza.
Case study
Domino’s Pizza (2009)
In 2009, two Domino’s Pizza employees posted a video on YouTube of the ghastly things
they claimed they did to pizzas. Within 24 hours a million people had seen the video and the
story escaped the social media and into broadcast and print media, with devastating effects
on the company’s reputation and share price. Having thought the storm would pass, the
company quickly changed tack and responded by launching a transparency campaign, with
people saying how horrible the pizzas were. They announced that they had stopped
retouching photos of their products. Within a short while, the share price had risen by over
230%.11
The Domino Pizza story also highlights the reputation risk arising from employees, or even
family members of employees. Most companies now have a social media policy for
employees, which may mitigate risk to an extent, and certainly aims to ensure that the same
behavioural norms should be applied in social media as apply in normal human
interaction.12 However, given that recruiters and head-hunters routinely trawl the social
media when considering candidates, it’s not just your own Facebook page or Twitter account
which may be revealing, but also those of your friends and children, with those highly
embarrassing snaps of the prospective CEO.
So companies have to be better at listening and responding quickly to social media, whether
comments are being made from inside or outside the firm. But before dealing with what to do
if there is a reputational crisis, it’s worth looking for a moment at relations with third parties.
The key is to engage in thorough due diligence before you take on an intermediary, and then
to make sure you continually review progress through continuous dialogue and more formal
reporting. The following checklist provides a useful list of topics.
Checklist
Checklist for using intermediaries
Due diligence for new intermediaries
CVs of key individuals
professionalism, expertise and experience
business plan
financial standing
banking/credit control procedures
compliance procedures and controls, especially Treating Customers Fairly (if appropriate)
complaints and analysis
press and advertising
product information and marketing strategies
remuneration strategies
business continuity plan
previous audits.
Review of existing intermediaries
continuous review of most of the above
inaccurate or untimely reporting by intermediary
management information
business volumes
prospect types and volumes
business outside intermediary’s norm
business outside agreed business plan
cancellation rates
complaints – volume and analysis
audit
purpose: to enhance the intermediary’s performance and development
conducted by approved audit partners
consistent approach across all intermediaries.
But it’s not a one-way street. The intermediary also has a reputation to protect and needs to
ensure that any interaction with the product provider does nothing to harm it. The following is
a checklist for intermediaries.
Checklist
Checklist for intermediaries
The initial due diligence will be complementary, but in addition:
As with all aspects of reputation risk management, this is not only about the down-side.
Where providers and intermediaries work together, their reputation can be enhanced.
The reason for the problem may be operational, and that can be fixed, but reputational
damage is a separate effect, with potentially far more expensive consequences, which must
be treated separately – and fast. The impact of reputational damage is measured in time in a
similar way to business continuity planning (see Chapter 11, Business continuity, Business
impact analysis). How long will it take to restore trust and reputation? That partly depends on
existing goodwill, your prior state of trust with stakeholders, as well as the nature of the
event. To what extent was it foreseeable and preventable, or was it truly unpredictable?
These factors, as well as how not to handle a reputational crisis, were evident in the
Deepwater Horizon disaster in the Gulf of Mexico in 2010.
Case study
Deepwater Horizon (2010)
The Deepwater Horizon oil spill in the Gulf of Mexico followed an explosion on 20 April 2010
on Deepwater Horizon, a mobile off-shore drilling unit owned by Transocean which was
drilling from BP’s Macondo oil well. The explosion killed 11 men working on the unit and
injured 16 others. It also caused extensive damage to the Gulf’s tourism and fishing
industries as well as to marine and wildlife habitats. It took until 15 July for the well-head to
be capped. Although, by September 2010, the federal government declared the well
‘effectively dead’, in July 2011 the Louisiana Department of Environmental Quality had
extended the state of emergency and roughly 500 miles (800 kilometres) of coastline in
Louisiana, Mississippi, Alabama and Florida remained contaminated by oil.
After its own internal probe, BP admitted that it made mistakes which led to the Gulf of
Mexico oil spill and in June 2010 it set up a $20 billion fund to compensate victims. In
November 2012, BP was fined a record $4.5 billion for criminal failures and the US
Environmental Protection Agency announced that the company had been barred from
bidding for new contracts, citing ‘BP’s lack of business integrity’. Civil suits continue.
The commission appointed by President Obama, in its report in December 2010, stated that
the disaster could have been prevented and ‘can be traced to a series of identifiable
mistakes made by BP, Halliburton [which was responsible for capping the well with cement]
and Transocean that reveal such systematic failures in risk management that they place in
doubt the safety culture of the entire industry’. There were ‘recurring themes of missed
warning signals, failure to share information, and a general lack of appreciation for the risks
involved’.
They blamed BP and its partners for making a series of cost-cutting decisions and the lack of
a system to ensure well safety. They also concluded that the spill was not an isolated
incident, but that ‘the root causes are systemic and, absent of significant reform in both
industry practices and government policies, might well recur’. The commission believed that
their findings highlighted ‘the importance of organizational culture and a consistent
commitment to safety by industry, from the highest management levels on down’.
Sources: National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling,
11 January 2011; Deepwater Horizon Joint investigation, 4 April 2011; Financial Times, 29
November 2012.
The news media no longer report on a daily basis. Journalists are required to file stories
instantly, through blogs and websites, leaving less time than ever to think and challenge a
version of events. It is a sad truth of modern commercial news media that journalists now
have little, or even no, time to check a given version of the ‘facts’.13 News journalists are not
specialists. And yet they shape the agenda, often by framing the charge in the court of public
opinion. Unfortunately, in that court, lawyers are of little use. The lawyer’s advice to ‘admit
nothing’ is at best irrelevant, and at worst can significantly harm your business value. By all
means retain lawyers for legal advice, but do not make them your first source of counsel on
crisis communications matters.
In a crisis, when there is the threat of catastrophic loss of trust, you have limited time to start
communicating. If you leave a vacuum, other organisations and stakeholders will assert their
own agendas and write a script for you, which will rarely be flattering. At a time of crisis, all
parties involved will engage in a contest to stake a claim to ownership of the debate or issue,
to ‘frame the dialogue’. It is up to you to frame the debate. A good example was the
Democratic presidential primary campaign in 2008. The Obama team successfully framed
the debate about Hillary Clinton, the clear front runner, and used unprecedented means –
the Web, text messages – to get their message across. Another aspect of this approach is to
polarise the debate. ‘Only an unreasonable person would disagree with us’, or ‘if you’re not
for us you’re against us’, as George W. Bush did on the ‘war on terror’.
However, if you can at least communicate quickly, the chances are that those running the
business may get stakeholders to give them the benefit of the doubt, granting some valuable
extra time to exert control over the underlying problem. The worst thing executives can do is
to be afraid to speak to the media or make any public pronouncement in case their words
are misinterpreted or taken out of context.
So what do you say, when you’re in the eye of the storm? Be transparent. Be truthful. Tell it
all and tell it quickly. Media stories can come from whistle blowers and malicious tip-offs.
Companies that keep silent often become the subject of rumours and speculation. What are
they trying to hide? The longer it takes to deal fully and openly with a problem, the greater
the impression of foot-dragging, whilst a series of forced disclosures keeps the issue in the
media longer.
The BP Deepwater Horizon case is a good example. The lessons to be learnt from that and
other cases are:
Remember your own employees. They are key stakeholders and crucial advocates in
defining your reputation. So make sure they are involved in the communications exercise
from the start.
As to who does the communicating, you should ideally provide one spokesperson, with one
message, certainly in dealings with the media. Otherwise there is the danger of mixed or
conflicting messages which will only make the situation worse. Equally important is to make
sure that whoever appears for you knows what they’re talking about. Accept that for some
purposes a line manager simply will be a better communicator than the chairperson,
although the latter should be seen to be involved.
Certainly, the board will want to be kept aware of, and possibly involved in, the strategy for
responding to a crisis of reputation. But the most important thing is to keep an eye on the
various stakeholders, and to communicate with each of them in the way they would most
expect and appreciate, preferably through the relationship manager (see Table 16.4). Any
reputation crisis plan should ensure that crises are tackled by the appropriate person in the
firm, with a consistent message, and soon.
Finally, it is a fact of life that in the court of public opinion you have no right to remain silent –
although anything you say may, and probably will, be used against you. You must answer
the charges as presented, however unreasonable. The court of public opinion also operates
a harsher regime than a court of law: you are guilty until you can prove you are innocent.
Sentencing and punishment, in the shape of public vilification, start immediately. Regarding
the Enron case discussed earlier, Andersen eventually won its battle in the legal courts. But
by then the clients had long since deserted, and the firm and its reputation were destroyed;
the legal victory was hollow.15
Notes
1 Morgen Witzel, ‘The terrible cost of reputational loss’, Financial World, July/August 2009,
pp. 53–55.
2 Quoted in Stuart Fagg, ‘Reputation risk management beyond the spin’, Risk, 18 August
2006.
4 Alison Maitland, ‘Barclays banks on a good name’, Financial Times, 19 February 2004, p.
11.
7 See Diane Vaughan, The Challenger Launch Decision (Chicago and London: University of
Chicago Press), 1996.
8 Economist Intelligence Unit white paper, Reputation: Risk of risks (London: EIU), 2005.
9 Gerald Ratner, Gerald Ratner: The rise and fall … and rise again (Chichester: Capstone
Publishing), 2007.
14 The 3 Cs themselves are fully discussed in Judy Larkin, Strategic Reputation Risk
Management (Basingstoke: Palgrave Macmillan), 2003.
Skip to Content
Explore Skills
Start Learning
Featured
Search 50,000+ courses, events, titles, and more
Peter L. Bernstein (1998) Against the Gods, New York: J Wiley & Sons.
Tony Blunden and Tim Landsman (2003) The Business Continuity Lifecycle, Complinet,
www.complinet.com
Management, www.bba.org
Chapter 13 Outsourcing
Garry Honey (2009) A Short Guide to Reputation Risk, Farnham: Gower Publishing Limited.
Resources and further reading