Lecture Notes Risk Management Process
Lecture Notes Risk Management Process
Risk management is the process of identifying, assessing and controlling threats to an organization's
capital and earnings. These threats, or risks, could stem from a wide variety of sources, including financial
uncertainty, legal liabilities, strategic management errors, accidents and natural disasters. IT security threats
and data-related risks, and the risk management strategies to alleviate them, have become a top priority for
digitized companies. As a result, a risk management plan increasingly includes companies' processes for
identifying and controlling threats to its digital assets, including proprietary corporate data, a customer's
Personally Identifiable Information (PII) and intellectual property.
Every business and organization face the risk of unexpected, harmful events that cancost the
company money or cause it to permanently close. Risk management allows organizations to attempt to
prepare for the unexpected by minimizing risks and extra costs beforethey happen.
The importance of combining risk management with patient safety has also been revealed. In most
hospitals and organizations, the risk management and patient safety departments are separated; they
incorporate different leadership, goals and scope. However, some hospitals are recognizing that the
ability to provide safe, high-quality patient care is necessary to the protection of financial assets and,
as a result, should be incorporated with riskmanagement.
Establish context. Understand the circumstances in which the rest of the process will take place.
The criteria that will be used to evaluate risk should also be established and the structure of the analysis
should be defined.
Risk identification. The company identifies and defines potential risks that may negatively
influence a specific company process or project.
Risk analysis. Once specific types of risk are identified, the company then determinesthe odds
of them occurring, as well as their consequences. The goal of risk analysis is to further understand each
specific instance of risk, and how it could influence the company's projects and objectives.
Risk assessment and evaluation. The risk is then further evaluated after determining therisk's
overall likelihood of occurrence combined with its overall consequence. The company can then make
decisions on whether the risk is acceptable and whether the company is willing to takeit on based on its risk
appetite.
Risk mitigation. During this step, companies assess their highest-ranked risks and develop a plan
to alleviate them using specific risk controls. These plans include risk mitigation processes, risk prevention
tactics and contingency plans in the event the risk comes to fruition.
Risk monitoring. Part of the mitigation plan includes following up on both the risks and the overall
plan to continuously monitor and track new and existing risks. The overall risk management process should
also be reviewed and updated accordingly.
Risk avoidance. While the complete elimination of all risk is rarely possible, a risk avoidance strategy is
designed to deflect as many threats as possible in order to avoid the costly and disruptive consequences of
a damaging event.
Risk reduction. Companies are sometimes able to reduce the amount of damage certain riskscan have
on company processes. This is achieved by adjusting certain aspects of an overall project plan or company
process, or by reducing its scope.
Risk sharing. Sometimes, the consequences of a risk are shared, or distributed among several of the
project's participants or business departments. The risk could also be shared with a thirdparty, such as
a vendor or business partner.
Risk retaining. Sometimes, companies decide a risk is worth it from a business standpoint, and decide to
keep the risk and deal with any potential fallout. Companies will often retain a certain level of risk if a
project's anticipated profit is greater than the costs of its potential risk.
Limitations
While risk management can be an extremely beneficial practice for organizations, its limitations
should also be considered. Many risk analysis techniques -- such as creating a model or simulation -- require
gathering large amounts of data. This extensive data collection can be expensive and is not guaranteed to
be reliable.
Furthermore, the use of data in decision making processes may have poor outcomes if simple
indicators are used to reflect the much more complex realities of the situation. Similarly, adopting a decision
throughout the whole project that was intended for one small aspect can lead to unexpected results.
Another limitation is the lack of analysis expertise and time. Computer software programs have
been developed to simulate events that might have a negative impact on the company. While cost effective,
these complex programs require trained personnel with comprehensive skills and knowledge in order to
accurately understand the generated results. Analyzing historical data to identify risks also requires highly
trained personnel. These individuals may not always be assigned to the project. Even if they are, there
frequently is not enough time to gather all their findings, thus resulting in conflicts.
The illusion of control. Risk models can give organizations the false belief that they can quantify
and regulate every potential risk. This may cause an organization to neglect the possibility of novel or
unexpected risks. Furthermore, there is no historical data for new products, so there's no experience to base
models on.
Failure to see the big picture. It's difficult to see and understand the complete picture of
cumulative risk.
Risk management standards have been developed by several organizations, including the National
Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO).
These standards are designed to help organizations identify specific threats, assess unique vulnerabilities
to determine their risk, identify ways to reduce these risks and then implement risk reduction efforts
according to organizational strategy.
The ISO 31000 principles, for example, provide frameworks for risk management process
improvements that can be used by companies, regardless of the organization's size or target sector. The ISO
31000 is designed to "increase the likelihood of achieving objectives, improve the identification of
opportunities and threats, and effectively allocate and use resources for risk treatment," according to the
ISO website. Although ISO 31000 cannot be used for certification purposes, it can help provide guidance
for internal or external risk audit, and it allows organizations to compare their risk management practices
with the internationally recognized benchmarks.
The ISO recommends the following target areas, or principles, should be part of theoverall
risk management process:
a. The process should create value for the organization.
b. It should be an integral part of the overall organizational process.
c. It should factor into the company's overall decision-making process.
d. It must explicitly address any uncertainty.
e. It should be systematic and structured.
f. It should be based on the best available information.
g. It should be tailored to the project.
h. It must consider human factors, including potential errors.
i. It should be transparent and all-inclusive.
j. It should be adaptable to change.
k. It should be continuously monitored and improved upon.
The ISO standards and others like it have been developed worldwide to help organizations
systematically implement risk management best practices. The ultimate goal for these standards is to
establish common frameworks and processes to effectively implement risk management strategies.
These standards are often recognized by international regulatory bodies, or by target industry
groups. They are also regularly supplemented and updated to reflect rapidly changing sources of business
risk. Although following these standards is usually voluntary, adherence may be required by industry
regulators or through business contracts.
Yet another example could be an investor buying stock in an exciting new company with high
valuation even though they know the stock could significantly drop. In this situation, risk acceptance is
displayed as the investor buys despite the threat, feeling the potential of the large reward outweighs the
risk.
The key factors to consider when determining internal auditing’s role are whether the activity
raises any threats to the internal audit activity’s independence and objectivity and whether it is likely to
improve the organization’s risk management, control and governance processes. They form part of the
wider objective of giving assurance on risk management. An internal audit activity complying with the
International Standards for theProfessional Practice of Internal Auditing can and should perform at least
some of these activities.
Internal auditing may provide consulting services that improve an organization’s governance, risk
management, and control processes. The extent of internal auditor’s consulting in risk management will
depend on the other resources, internal and external, available to the board and on the risk maturity of the
organization and it is likely to vary over time. Internal auditor’s expertise in considering risks, in
understanding the connections between risks and governance and in facilitation mean that the internal audit
activity is well qualified to act as champion and even project manager for risk management, especially in
the early stages of its introduction. As the organization’s risk maturity increases and risk management
becomes more embedded in the operations of the business, internal auditing’s role in championing risk
management may reduce. Similarly, if an organization employs the services of a risk management
specialist or function, internal auditing is more likely to give value by concentratingon its assurance role,
than by undertaking the more consulting activities. However, if internal auditing has not yet adopted the
risk-based approach represented by the assurance activities, it is unlikely to be equipped to undertake the
consulting activities.
Consulting Roles
Consulting roles, shows that internal auditing may undertake in relation to risk management. In
general, the further to the right of the dial that internal auditing ventures, the greater are the safeguards that
are required to ensure that its independence and objectivity are maintained. Some of the consulting roles
that the internal audit activity may undertake are:
1. Making available to management tools and techniques used by internal auditing to
analyze risks and controls;
2. Being a champion for introducing risk management into the organization, leveragingits
expertise in risk management and control and its overall knowledge of the organization;
3. Providing advice, facilitating workshops, coaching the organization on risk andcontrol
and promoting the development of a common language, framework andunderstanding;
4. Acting as the central point for coordinating, monitoring and reporting on risks; and
5. Supporting managers as they work to identify the best way to mitigate a risk.
The key factor in deciding whether consulting services are compatible with the assurance role is to
determine whether the internal auditor is assuming any management responsibility. In the case of risk
management, internal auditing can provide consulting services so long as it has no role in actually
managing risks – that is management’s responsibility – and so long as senior management actively endorses
and supports risk management. We recommend that, wheneverthe internal audit activity acts to help the
management team to set up or to improve riskmanagement processes, its plan of work should include a
clear strategy and timeline for migrating the responsibility for these services to members of the
management team.
Safeguards
Internal auditing may extend its involvement in risk management, provided certainconditions
apply. The conditions are:
1. It should be clear that management remains responsible for risk management.
2. The nature of internal auditor’s responsibilities should be documented in the
internal audit charter and approved by the audit committee.
3. Internal auditing should not manage any of the risks on behalf of management.
4. Internal auditing should provide advice, challenge and support to
management’s decision making, as opposed to taking risk management
decisions themselves.
5. Internal auditing cannot also give objective assurance on any part of the risk
management framework for which it is responsible. Such assurance should be
provided by other suitably qualified parties.
6. Any work beyond the assurance activities should be recognized as a consulting
engagement and the implementation standards related to such engagements should be
followed.
In aviation SMS programs they are ubiquitous. They use “probability” and “severity”to quantify
the scope of a real or hypothetical safety scenario. The quantification is generally broken into 3 categories:
✓ Acceptable risk;
✓ Unacceptable risk; and
✓ Ideally risk that is as low as reasonably possible (ALARP) (yellow), though riskin
this middle section should be monitored carefully to ensure that reasonable
controls are in place.
Some organizations use more colors, such as light green and/or orange. Extra colors only provide
further “aesthetic” rather than quantification. Risk matrix are ultimately used risk management tools used
to rank risks with the risk grid.
A Risk Register is a tool for documenting risks, and actions to manage each risk. TheRisk
Register is essential to the successful management of risk. As risks are identified they are logged on the
register and actions are taken to respond to the risk.
Risk is evident in everything we do. When it comes to project management, understanding risk and
knowing how to minimize its impacts (or take full advantage of its opportunities) on you project is essential
for success.
The Risk Register is essential to the management of risk. As risks are identified they should be
logged on the register and actions should be taken to respond to the risk.
Most frequently Risk Managers attempt to reduce the likelihood of the risk occurring or the impact
if the risk does occur.
The responses are documented on the Risk Register and the register should regularly reviewed tomonitor
progress. Ideally the Risk Register should be reviewed in every project team meeting. It should certainly
be review at the end of each phase of the project lifecycle.
Management of risk should be a constant ongoing process with the project team raising risks with
the Risk Manager or Project Manager who then logs the risk and identifies actions that can be taken to
mitigate the risk. To properly respond to a risk the Risk Manager may need to bring in experts to understand
the actions that can be taken to reduce the likelihood of the risk occurring or the impact if the risk does
occur. Read more on the possible responses to risk.