(ICAEW - BTF) Chapter 5
(ICAEW - BTF) Chapter 5
ni
CHAPTER 5
ar
Introduction to risk
e
ce am L
management
en tn in
s
ie
er ie er
op
ef V rtn
C
Pa
W
Introduction
Introduction
Assessment context context
Examination
AE
Topic List
TOPIC LIST
1 Introduction to risk
1 Introduction to risk
2 Risks for businesses and their investors
IC
4 Cyber risk
4 Cyber risk
5 Risk concepts
5 Risk concepts
6 The objectives of risk management
6 The objectives of risk management
7 The risk management process
7 The risk management process
8 Crisis management
8 Crisis management
9 Disaster recovery
9 Business resilience
Summary and Self-test
10 Disaster recovery and business continuity planning
Answers to Interactive questions
Summary and Self-test
Answers to Self-test
Technical references
Answers to Interactive questions
Answers to Self-test
Introduction
Identify the main components of the risk management process and show how they
operate
Identify the key issues in relation to risk and crisis management, business resilience,
business continuity planning and disaster recovery
Specify different types of cyber risk and attack and the steps organisations can take
ng
to improve cyber security
ni
Syllabus links
ar
The topics covered in this introduction to risk management are developed as well in Assurance
e
at Certificate level, in Audit and Assurance, Business Strategy and Technology, and Financial
Management at Professional level, and in the Advanced level assessments.
ce am L
en tn in
Assessment context
s
Questions on risk management will be set in the assessment in either MCQ or multiple response
ie
er ie er
C
Pa
W
AE
IC
Section overview
Risk means that something can turn out differently to what you expected, or wanted.
Risk exists in any situation, while uncertainty arises only because there is inadequate
information.
Pure risk is the possibility that something will go wrong, and speculative risk is the
possibility that it will go well.
Downside or pure risk represents a threat: things may turn out worse than expected.
ng
Upside or speculative risk represents an opportunity: things may turn out better than
expected.
ni
ar
1.1 What is risk?
You know what risk is in everyday terms. You know it is risky to climb a tall ladder, no matter
e
what you may think there is at the top. You know it is risky to bet your life savings on a horse
ce am L
race, no matter how much you think you might win.
These things are risky because at the point when you decide to do them you cannot be sure
en tn in
how bad the outcome will be. You may fall off the ladder and injure yourself when you are half-
s
way up. The horse you back may be beaten at the winning post.
ie
er ie er
On the other hand, you cannot be sure how good the outcome may be, either: you cannot be
sure that the opportunities won't ever amount to anything. If you don't risk climbing the ladder
op
you will never be the owner of whatever it is at the top. Most people would think it is too risky to
ef V rtn
throw away their life savings on a race, but there is always the chance that your horse will win. If
C
you don't place the bet you will miss the opportunity.
Pa
Risks and opportunities exist because nobody knows what will happen in the future, and nobody
can control it. Of course you can control whether or not you climb the ladder, but you cannot
stop others from doing so, and you cannot stop entirely unexpected things from happening.
W
Definition
Risk: The possible variation in an outcome from what is expected to happen.
IC
We can break this definition down to highlight the following issues to do with risk:
R
You can never avoid this uncertainty, in anything you do: it is something that you have to make
decisions about, or something you need to manage. If you decide to take a risk, or follow up an
opportunity, the outcome may be hugely beneficial – or it may ruin you.
ng
way risk or symmetrical risk.
The risk that something will go wrong is called 'downside risk', if it is likely that things will go
ni
right the term 'upside risk' is used.
ar
1.4 How far does risk affect a business achieving its objectives?
When considering whether a business will be successful and achieve its objectives, the term
e
'pure risk' describes the possibility that something will go wrong, speculative risk is the
ce am L
possibility that something could go better than expected (though it could go worse). If we all
focused on pure risk then there would be little point in taking a risk; the fact that something
en tn in
could go well is the basis on which business flourishes. It is helpful for businesses to think about
s
risk in the context of managing events with an eye on achieving objectives.
ie
er ie er
Definitions
op
ef V rtn
Downside risk: The possibility that an event will occur and adversely affect the achievement of
objectives.
C
Upside risk (opportunity): The possibility that an event will occur and positively affect the
Pa
achievement of objectives.
Section overview
IC
Risks for a business include poor market conditions, poor control and poor outcomes of
R
investments. Often businesses look particularly at the risks that they will fail to achieve their
critical success factors (CSFs). How far the business is prepared to take on these risks is a
measure of its risk appetite.
The risk to those who finance the business (owners and lenders) is that they will suffer poor
rather than high returns on their investment.
Both businesses and financiers have particular attitudes to the level of risk they are
prepared to endure: risk averse, risk neutral and risk seeking.
ng
There is a risk that inadequate controls (quality controls, administrative controls, controls
over people etc) within the business may result in losses through inefficiency, damage to
ni
business reputation, or deliberate fraud.
ar
A business might face risks of a financial nature, and losses might occur because of the way
it has financed an operation.
e
The larger the business, the more varied are the risks.
ce am L
Interactive question 1: Business risk
en tn in
s
Try to identify a small business with which you have some familiarity, such as an audit client or
one you have worked for in a vacation. What risks does the business, as opposed to its owner(s),
ie
face?
er ie er
op
See Answer at the end of this chapter.
ef V rtn
C
Pa
Shareholders are the ultimate bearers of risk. If a company becomes insolvent, they will lose all
their investment. More important, if company profits fall, dividends and the share price are also
likely to fall. Lenders are entitled to interest before any profits can be paid as dividend, so that
the risk to income is much less for lenders than for equity shareholders.
IC
Risk for shareholders is two-way: there is the possibility of poor returns (no dividends or low
R
dividends, and a fall in the share price), or profits and dividends might be higher than expected,
and the share price might rise by more than anticipated. Risk is greater for shareholders when
there is a greater possibility of wide variations in profits, dividends and share prices from year to C
year. The range of potential variation in returns is known as the volatility of returns. H
A
P
2.3 Risk and strategic planning T
E
In the strategic planning analysis process it is important to focus on risks that are specific to the R
business, or the industry sector in which it operates, rather than general ones. They should be
5
mapped to the relevant threats and opportunities that they represent to the business. A plan for
managing each specific risk can then be formulated.
It is often useful to relate risks to the business's critical success factors (CSFs), as a significant risk
is one that would create an obstacle to any of the CSFs.
ng
Definition
ni
Risk appetite: The extent to which a business is prepared to take on risks in order to achieve its
objectives.
e ar
The approach should be as follows.
1
2 ce am L
Decide what the business wants to achieve (the strategic objective).
Decide what the business's 'risk appetite' is, in other words the extent to which it is
en tn in
prepared to take on risks in order to achieve its objective.
s
ie
3 Find strategies to achieve the objectives that do not involve more risk than the business is
er ie er
willing to accept.
4
op
If there are no methods of reducing the risk to an acceptable level, the objective needs to
ef V rtn
be amended.
C
2.3.2 Attitudes to risk
Pa
A risk averse attitude is that an investment would be chosen if it has a more certain but
possibly lower return than an alternative less certain, potentially higher return investment.
A risk neutral attitude is that an investment would be chosen according to its expected
W
higher levels of risk, even if its expected return is lower than an alternative no-risk
investment with a higher expected return.
IC
When a business looks at an investment it has to judge what return is expected from it. For
instance, an investment of £100,000 at a rate of 5% has an expected return of £5,000.
When the business starts considering risk in relation to an investment it is also likely to derive a
range of possible returns from the investment, given best-case, worst case and most likely
scenarios. These can be combined in a weighted average to give the overall expected return.
ng
Annual return
Probability under the Expected return
ni
scenario (probability return)
£ £
ar
Worst case scenario 0.3 2,000 600
Most likely scenario 0.6 5,000 3,000
Best case scenario 0.1 10,000 1,000
e
Expected return 4,600
ce am L
Note that the expected return of £4,600 is not actually predicted as a return; it is used instead as
an overall measure of the investment for decision-making and risk evaluation purposes.
en tn in
s
ie
er ie er
3 Types of risk
op
ef V rtn
Section overview
C
Business risk arises from the business's nature, industry and environment.
Pa
operates in. Business risk is willingly taken by the business as part of its objective of making a
return.
Business risk includes:
IC
Strategy risk: The risk that the business's objectives will not be achieved because it chooses
R
the wrong corporate, business or functional strategy. A key strategy risk in the current era of
rapid technological change is to fail to keep up with technological developments.
C
Enterprise risk: The chance that a strategy will succeed or fail, and therefore whether the
H
business should have undertaken it in the first place. A
P
Product risk: The chance that customers will not buy the company's products or services in T
the expected quantities. E
R
Financial risk arises in part from how the business is financed and in part from changes in
the financial markets such as to interest rates and exchange rates (see section 3.2). 5
ng
– How far the business chooses to finance itself by debt rather than shares (gearing risk).
High borrowing, in relation to the amount of shareholders' capital in the business,
ni
increases the risk of volatility in earnings, and insolvency
– How far the business deals with customers who end up not paying (credit risk)
ar
– How far the business's costs are incurred in such a way that there is increased
likelihood of it running short of cash (liquidity risk). A business is exposed to greater
e
liquidity risk if, for instance, it has a high proportion of fixed costs which must be paid
ce am L
whatever its level of revenue
Uncontrollable financial risk is financial risk arising from factors that operate independently
en tn in
s
of the business. The key factor here is market risk, that is the risk of losses resulting from
changes in market prices or rates that the entity itself cannot control but can deal with or
ie
manage. These include share prices, commodity prices, interest rates and foreign exchange
er ie er
rates. Management of these financial risks is a key role for accountants using hedging and
other techniques
op
ef V rtn
Financial risk is assessed in greater detail in Financial Management at the Professional Level.
C
Pa
Definition
Operational risk: The risk that actual losses, incurred because of inadequate or failed internal
processes, people and systems, or because of external events, differ from expected losses.
IC
Process risk is the risk that a business's processes may be ineffective (fail to achieve their
objectives) or inefficient (achieve their objectives but at excessive cost).
People risk is the risk arising from staff constraints (for example insufficient staff, or inability
to pay good enough wages to attract the right quality of staff), incompetence, dishonesty,
or a corporate culture that does not cultivate risk awareness, or encourages profits without
regard to the methods used to make them.
Systems risk is the risk arising from information and communication systems such as
systems capacity, security and availability, data integrity, and unauthorised access and use.
A key aspect of systems risk arises from the interconnectedness of computer systems via the
internet, known as cyber risk (see section 4).
ng
Another way of classifying event risks is according to their sources in the environment:
– Physical risks: such as climate and geology
ni
– Social risks: changes in tastes, attitudes and demography
ar
– Political risks: changes determined by government, or by a change of government
– Legal risks: the consequences of being unable to enforce contracts, of breaking the
e
law or otherwise of failing to meet legal duties or obligations. Legal risk can also arise
– ce am L
from changes in legislation and regulations
Economic risks: changing economic conditions such as a recession
en tn in
s
– Technology risks: changes in production or delivery technology and from the threat of
ie
cyber attack
er ie er
4 Cyber risk op
ef V rtn
C
Section overview
Pa
Cyber risk is a type of operational risk that has become increasingly relevant to businesses
over the last few years. It is important to understand cyber risks and how they can be
mitigated.
W
Cyber risk is the risk of financial loss, disruption or damage to the reputation of an
organisation from failure of its information technology systems due to accidents, breach of
security, cyber attacks or poor systems integrity.
AE
Cyber attacks are deliberate actions against an organisation. They include some low level
cyber threats (eg, phishing) as well as more serious attacks (hacking and DDoS).
IC
Definition
Cyber risk: Cyber risk is the risk of financial loss, disruption or damage to the reputation of an C
organisation from failure of its information technology systems due to accidents, breach of H
security, cyber attacks or poor systems integrity. A
P
T
E
Such a risk could materialise in the following ways: R
• Deliberate and unauthorised breaches of security to gain access to information systems for 5
the purposes of espionage, extortion or embarrassment (cyber attacks).
• Unintentional or accidental breaches of security, which nevertheless may still constitute an
exposure that needs to be addressed
• Poor systems integrity resulting in incomplete or corrupted data or processing
Definition
Cyber attack: A deliberate action through the Internet against an organisation with the intention
of causing loss, damage or disruption to activities.
The National Crime Agency (NCA) website identifies the following as the most common
cyber-attacks and threats to computer systems:
Hacking: using specialist software and tools to gain unauthorised access to systems
ng
(especially social media and email accounts) – see below
Phishing: bogus emails that ask the user for security information and personal details
ni
Malicious software (such as file hijacker/ransomware): where criminals hijack a user's files
and hold them to ransom
ar
Distributed denial of service (DDoS) attacks: overwhelming websites and other online
services with vast amounts of internet traffic which is designed to crash, or stop the system
e
from working – see below
ce am L
Other types of cyber-attack, which are less common include:
en tn in
Webcam manager: where the user's webcam is taken over
s
Keylogging: where criminals record what the user types onto their keyboard
ie
Screenshot manager: where screenshots are taken of the user's computer screen
er ie er
op
We shall explore the concept of cyber resilience (an organisation's ability to prepare for,
ef V rtn
respond to and recover from cyber-attacks) later in this chapter when we consider business
C
resilience.
Pa
4.2 Hacking
Hacking is one of the main methods that attackers use to gain access to computer networks. This
W
is achieved by the use of specialist software and other tools. The intruders are able to gain
unauthorised access to the network and take administrative control. This means they are able to
amend, copy and delete records, or even stop the network from operating.
AE
The main risk of hacking is that data stored on the network could be compromised. Personal
data (such as HR or customer records) as well as strategic and other sensitive data can be used
by the attackers to make money, usually through its sale to third parties, or to achieve some
IC
Another risk is that damage to computer networks could put the business's physical
infrastructure in danger, compromising its ability to operate. For example, if a travel company's
computer network goes down there is a risk that day-to-day business activities, such as booking
new holidays and managing existing ones, will cease with major implications for both the
business and its suppliers and customers.
ng
Report cyber attacks/incidents If cyber attacks and other cyber incidents are
reported, it allows law enforcement agencies
to investigate. This improves their
ni
understanding of the scale of cyber attacks
and helps shape future responses to them, as
ar
well as making sure that their resourcing and
funding as appropriate.
e
Cyber risk mitigation The more devices that an organisation
ce am L
connects to the internet, the more exposed it is
to potential attack. Cyber security is the main
method of mitigating cyber risk and is vital to
en tn in
s
protect the business' operating capability,
finances and reputation. Even basic cyber
ie
er ie er
op attacks.
ef V rtn
Definitions
Cyber security: The protection of systems, networks and data in cyberspace; the procedures
used by a business to protect its information system (hardware, software and information) from
damage, disruption, theft or other loss.
Critical information assets: Assets which are fundamental to an organisation's core activities and
their performance, as well as its overall capability and viability.
ng
It is a legal obligation under data protection law and other regulations to protect certain
types of data in a computerised system.
ni
Information accessed, stored, processed and made available online is of vital strategic and
commercial importance.
ar
The connectedness of computer systems makes the threat of external attack ever more
likely.
e
ICAEW's Audit Insights, cyber security report (ICAEW, 2018) explains that many organisations
ce am L
have legacy IT systems. These are often fragmented, non-standard systems that are often
supported just by spreadsheets. In the long-term, organisations with such systems will need to
invest in technology in order to reduce complexity and to have resilience, recovery and
en tn in
s
responses to cyber breaches in place.
ie
In the first of the Audit Insights, cyber security reports (ICAEW, 2013), the following key
er ie er
challenges and priorities for boards in managing cyber risks were identified.
op
Businesses should consider cyber risk in all their activities: the challenge here is to move
ef V rtn
cyber risk from being pigeon-holed as ‘IT’ to be seen as an integral part of all business risks.
C
Businesses need to accept their security will be compromised: this emphasised a different
Pa
show organisations how to protect themselves against low-level cyber risks. It lists five controls,
in simple terms, that an organisation should have in place. Each of these controls are supported
by technical protections:
Use a firewall to secure its internet connection Boundary firewalls and internet gateways –
software that intercepts network traffic in and
out of a system
Choose the most secure settings for its devices Secure configuration – ensuring the system is
and software set up with cyber security as a priority
Control who has access to data and services Access control – physical and network
procedures to restrict access to a system
Protect itself from viruses and other malware Malware protection – software that prevents
and removes unwanted programs from a
system such as anti-virus software
Keep devices and software up to date (also Patch management – ensuring the latest
known as 'patching') updates to software are installed
These minimum cyber security controls should be applied to all areas of the business, such as
ng
cloud services, business and personal devices or specific technologies used in the organisation.
We shall look at information security in more detail in Chapter 6.
ni
5 Risk concepts
ar
Section overview
e
How big a risk a business is facing is measured in terms of exposure, volatility, impact and
probability.
ce am L
en tn in
The scale of any risk for a business depends upon four key risk concepts.
s
Exposure is the measure of the way in which a business is faced by risks. Some businesses
ie
er ie er
will by their very nature be less exposed than others. A transport company such as an airline
or a railway operator is considerably more exposed to the risk that its customers will be
op
injured while using its services than is a bank or a firm of accountants. A business that has
ef V rtn
minimal debt finance and no overseas customers or suppliers has little or no exposure to
the risks of either interest rate movements or exchange rate movements.
C
Pa
Volatility is how the factor to which a business is exposed is likely to alter. A coffee
producer is dependent on good weather; businesses like fashion and music are subject to
changes in public taste. Some businesses operate in regions that are politically unstable.
Impact (or consequence) refers to measures of the amount of the loss if the undesired
W
outcome occurs. Impact might be measured purely in financial terms, or in terms of delay,
injuries/loss of life or other ways depending on the risk being faced.
AE
Probability (or likelihood) means how likely it is that a particular outcome will occur. In some
cases it is possible to estimate probability on the basis of past experience (historical
records) combined with information about all the factors involved and how they interact. In
IC
others it is much harder to estimate probability because no historical data exists. The
development of an entirely new product is an example.
R
Section overview
Risk management involves identifying, analysing and controlling those risks that threaten
the assets or earning capacity of the business so as to reduce the business's exposure by
either reducing the probability or limiting the impact, or both.
ng
Definition
Risk management: The identification, analysis and economic control of risks which threaten the
ni
assets or earning capacity of a business.
ar
Risk management is actively used by many businesses, some of which employ risk managers.
Smaller businesses and individuals may not recognise a specific task of risk management but will
e
nevertheless have developed their own methods of analysing and managing risk.
ce am L
The purpose of risk management is to understand and then to minimise cost-effectively the
business's exposure to risk and the adverse effect of risks, by:
en tn in
s
reducing the probability of risks occurring in the first place, and then if they do occur
ie
limiting the impact they will have on the business
er ie er
6.2 op
When is risk management necessary?
ef V rtn
There may be legal requirements to manage risk; you are required by law to insure your
C
car, for instance.
Pa
Risk management (in the form of insurance) may be required by licensing authorities and
regulatory bodies. For example a football stadium would not be allowed to operate if it did
not have public liability insurance: ICAEW members in public practice must have
W
Find out, if you can, the basis of the requirement that chartered accountants should have to have
professional indemnity insurance (PII), and what it is designed to achieve.
R
Large listed companies in the UK are required to determine the nature and extent of their
significant risks and to maintain sound risk management systems.
A risk-based management approach is a requirement for all UK companies with a premium
listing under the UK Corporate Governance Code. We shall see more about this in Chapter 12.
Section overview
Risk management involves identifying risk, assessing and measuring it in terms of
exposure, volatility, impact and probability, controlling it by means of avoidance, transfer
and reduction, accepting what remains and then monitoring and reporting on events.
Risks can be identified by considering what losses would ensue: property, liability,
personnel, pecuniary and interruption loss.
Once identified, the gross risk is measured by multiplying its probability (a value between
ng
0 and 1) by the impact (the value of the loss that would arise). The aim of risk management
is to minimise gross risk.
ni
Some risk can be avoided by not doing the risky activity, and some can be reduced by
taking precautionary measures. Some of what remains of the gross risk can be transferred
ar
to someone else, especially by insurance. The remaining gross risk must be accepted or
retained.
e
All the elements of the risk management process must be monitored and reported on to
an appropriate person.
ce am L
en tn in
s
7.1 What is involved in the risk management process?
ie
er ie er
op Awareness and
ef V rtn
identification
C
Pa
Analysis: assessment
and measurement
W
Acceptance Reduction
IC
ng
Suppose a UK business was considering launching a new product in China but knew absolutely
nothing about doing business in China. It is highly likely that it will not be aware of the many
risks to which the business could be exposed because of factors such as different regulations,
ni
different ways of approaching customers, differences in disposable income and so on. The risks
remain to be identified.
ar
Definition
e
Risk identification: Identifying the whole range of possible risks and the likelihood of losses
ce am L
occurring as a result of these risks.
en tn in
s
Risk identification must be a continuous process, based on awareness and knowledge that:
ie
potential new risks may arise
er ie er
op
Exposure to both new and altered risks must be identified quickly and managed appropriately.
ef V rtn
There are two approaches to identifying risks, which operate most effectively when combined.
C
A top-down approach is led by the senior management/board of the business, spending
Pa
time on attempting to identify key risks. Often, this is linked to the business's CSFs: what
might happen to prevent us from achieving each CSF?
A bottom-up approach involves a group of employees, with an expert in risk management,
W
Property loss – possible loss, theft or damage of any static or moveable assets
Liability loss – loss occurring from legal liability to third parties, personal injury or damage
to property
IC
ng
An aim of risk assessment should be to identify those risks that have the greatest significance,
and so should receive the closest management attention.
ni
Significance can be measured in terms of the potential loss arising as a result of the risk, that is
ar
its gross risk. This depends on:
The potential impact, quantified as an expected value (usually using weighted averages as
e
we saw earlier in relation to expected returns)
ce am L
The probability of occurrence, measured mathematically, as a decimal between 0 and 1
en tn in
Gross risk = Probability × Impact
s
A method that is frequently used to assess risks is to plot each one on a risk map, showing
ie
impact on a scale of 1 to 10 (or just low to high) on one axis, and probability on a similar scale on
er ie er
op
ef V rtn
High
C
High significance
IMPACT
Pa
Low significance
W
Low
Low High
AE
PROBABILITY
With regard to controlling risk the greatest attention may then be paid to risks that fall in the
R
high significance (high impact/high probability quadrant), bearing in mind that the quantum of
each in terms of gross risk should also be considered: a 'high significance' gross risk of only
£10,000 will probably draw less attention than a medium significance risk of £1 million, for C
example. H
A
In Chapter 12 we shall look at corporate governance and risk assessment relevant to large listed P
companies in the UK (the UK Corporate Governance Code and the FRC's guidance on risk T
E
management, internal control and related financial and business reporting). R
5
7.4 Risk response and control
Measurement (qualitative or quantitative) and assessment establish priorities that determine the
amount of management time that should be spent developing and implementing a response to
ng
ventures, outsourcing arrangements and partnerships with suppliers are all examples).
Hedging is a means of sharing market risk. Risk sharing is sometimes called risk transfer,
but it is rare to be able to transfer all the risk.
ni
Acceptance (sometimes called retention): this should only be considered if the other
ar
options are not viable, for example if the costs of extra control activities and the costs of
insuring against the risk are greater than the cost of the losses that will occur if the event
e
happens. The concept of materiality should apply: immaterial risks can be accepted.
Nevertheless, risks that have been accepted should still be kept under review: new
ce am L
developments may mean that a different response becomes more appropriate.
en tn in
The risk map can be expanded to include risk responses depending on the assessment and
s
measurement of the risk.
ie
er ie er
op
These risks might be shared using
These risks must be controlled,
ef V rtn
sharing
that insurance premiums are lower
Pa
Low High
PROBABILITY
Figure 5.3: Risk responses
IC
The controls that are put in place in response to risks can take a variety of forms.
R
Physical controls such as locks, speed limits and clothing protect people, assets and money
Financial controls such as credit checks, credit limits and customer deposits protect money
and other financial assets
System controls include procedural controls, so that processes are carried out in the right
way, software controls in computer systems, and organisation controls on people so that,
for instance, they do not exceed their authority. Together system controls protect the
business's ability to perform its work
Management controls include all aspects of management that ensure the business is
properly planned, controlled and led, such as the organisation's structure, and the annual
budget
We shall see more about controls later in this Study Manual.
ng
necessary?
All identified risk management problems that could affect the organisation's ability to achieve its
ni
objectives should be reported to those in a position to take necessary action.
The chief executive regarding serious problems
ar
Senior managers regarding risk management problems that affect their units
e
Managers in increasing levels of detail as the process moves down the organisational
structure
ce am L
The board of directors or audit committee should also be informed. The board or committee
en tn in
may ask to be made aware only of problems that meet a specified threshold of seriousness or
s
importance.
ie
er ie er
Premium listed companies (see Chapter 8, section 6) are required to follow the main principles
of the UK Corporate Governance Code so the board must:
op
ef V rtn
Carry out robust assessments of the company's emerging and principle risks
Monitor the company's risk management and internal control systems at least annually
C
Pa
State whether it is appropriate to adopt the going concern basis of accounting in annual
and half-yearly statements
Explain how the board assessed the prospects of the company in its annual report.
W
8 Crisis management
Section overview
IC
Three main types of crisis are financial, public relations and strategic.
Businesses need contingency plans to deal with a crisis should it occur.
C
H
8.1 What is a crisis? A
P
T
Definition E
Crisis: An unexpected event that threatens the wellbeing of a business, or a significant R
disruption to the business and its normal operations which impacts on its customers, employees, 5
investors and other stakeholders.
Definition
Crisis management: Identifying a crisis, planning a response to the crisis and confronting and
resolving the crisis.
ng
crises better.
Society is more litigious than it used to be, and businesses are expected to be able to deal
ni
better with crises now than in the past.
Better IT and other technology systems allow businesses to be able to do more to avert
ar
and/or manage a crisis.
Social media means that publicity surrounding any sort of crisis is widespread and can feed
e
on itself, raising the potential for very severe reputational consequences if damage
ce am L
limitation does not swing into action quickly.
en tn in
8.3 Types of crisis
s
ie
There are three main types of crisis in terms of their effects on the business:
er ie er
Financial crisis – short-term liquidity or cash flow problems, and long-term solvency
problems
op
ef V rtn
Public relations crisis – negative publicity that could adversely affect the success of the
C
business
Pa
Strategic crisis – changes in the business environment that call the viability of the business
into question, such as new technology making old products or processes obsolete
There are many types of crisis in terms of their cause.
W
Natural event – physical, especially environmental, destruction due to natural causes such
as earthquake
AE
Industrial accident – buildings collapse, fire, release of toxic fumes, sinking or leaking of a
ship
Product or service failure – product recall of faulty or dangerous goods; communications,
IC
systems or machine failure causing massive reduction in capacity; health scare related to
R
ng
The business should make a contingency plan for the worst and/or most likely crises to occur.
This must be kept up to date, and staff should be trained in how it should be implemented in the
event of a crisis.
ni
8.4.3 Effective action in the event of a crisis
ar
Assess objectively the cause(s) of the crisis
Determine whether the cause(s) will have a long-term or short-term effect
e
Project the most likely course of events
Focus resources on activities that mitigate or eliminate the crisis
ce am L
Look for opportunities
en tn in
In the event of a public relations crisis
s
Act immediately to prevent or counter the spread of negative information; this may require
ie
er ie er
negative publicity
C
Interactive question 3: Contingency planning
Pa
Consider what you would do if, at a time when your business has a small overdraft and very little
money expected in shortly, it is faced with a large demand from a government body which
requires settlement in one month.
W
9 Business resilience
IC
Section overview
R
Business resilience can be assessed using two factors: the processes and functions that
protect the organisation; and cross-cutting characteristics of the organisation that drive
resilience. C
H
There are a number of features that resilient organisations share as well as a number of A
challenges to building resilience. P
T
Organisations should measure their current levels of resilience in order to identify areas E
that can be improved. R
Definition
Business resilience: A business's ability to manage and survive against planned or unplanned
shocks and disruptions to its operations.
Organisations exist within the business environment. This environment is highly dynamic with
changes happening much of the time. Usually, these changes are small and unlikely to
significantly adversely affect most businesses (such as minor changes to legislation or tax rates).
However, from time-to-time, larger events can occur which shock organisations and can have
ng
significant detrimental effects on them (for example, strict new laws being enforced; economic
recessions and major uncertainties in the political or social contexts; new technologies and/or
new competitors disrupting an industry, as e-commerce has done to 'traditional' retailing).
ni
Other changes might be planned by the organisation itself. It may, for example, choose to make
ar
a major investment overseas, close down a significant operation, or stretch itself financially by
taking on high levels of debt.
e
Business resilience is the ability of an organisation to manage all of these changes and survive,
regardless of how disruptive these changes are.
ce am L
According to the ICSA Solutions report 'Building a resilient organisation', an organisation's
en tn in
resilience can be described on two axis.
s
Axis 1: Processes and functions that protect the organisation
ie
er ie er
Risk management
Business continuity planning
Security op
ef V rtn
IT disaster recovery
Health and safety
C
Crisis management
Pa
Internal audit
Governance
Axis 2: More general ('cross-cutting') characteristics of the organisation that drive resilience
W
The level of trust employees have in the organisation and its management
The level of trust of customers in the organisation
AE
ng
Challenge Explanation
ni
greater degree of expertise is required to
ensure that approaches and activities used are
ar
robust and result in an appropriate level of
resilience.
e
Lack of input from senior management Directors delegate delivery of resilience
s
Siloes for delivery Implementation of resilience programmes may
ie
lack cross-organisational collaboration, with
er ie er
Limited sharing of risk information Siloes also limit information sharing. Rather
than sharing the outputs of their work on
resilience, functions tend to keep the
information to themselves. Therefore the
W
Because an organisation's environment is constantly changing, the level of its resilience will also
change. For example, it might have procedures in place to ensure that if interest rates rise, to say
R
5%, that it can cope financially, but what happens if interest rates rise to 10%?
Therefore it is important that organisations have a means of measuring their resilience, so that it
can adapt if necessary. C
H
The ICSA report identifies the following four metrics that can be used to measure resilience: A
P
Compliance – how well the organisation complies with its standards and policies T
Completeness – the scope of resilience (ie how wide a range of issues is the organisation E
R
prepared for)
Value – qualitative and quantitative measures of how well the organisation can meet specific 5
outcomes
Capability – evidence, collected through exercises and reviews, of the extent to which the
organisation has put resilience processes and procedures in place
Definition
Cyber-resilience is the ability of an organisation to ensure that its data and information are
reliable, available, has integrity and is adequately protected from unauthorised access.
ng
that do get through the defences.
As well as cyber security, organisations should also have appropriate IT disaster recovery
ni
procedures set up. Such systems provide back-ups of the data and information held by the
organisation that can be used to replace data and information lost in a cyber-attack.
ar
According to the ICAEW report, Developing a cyber-resilience strategy (2014), the following are
threats to an organisation's cyber-resilience:
e
Mobile threats – this is the risk that mobile devices containing information, data and
ce am L
connections to an organisation's system are lost or stolen.
Networking and cloud considerations – this is the risk that broadband, wi-fi and other
en tn in
network connections become unavailable and therefore users working remotely or via the
s
cloud cannot access the organisation's systems or data.
ie
er ie er
Access controls in the mobile world – this is the threat that access controls to the
op
organisation's main system are compromised due to inferior controls being in place on
mobile devices. In some instances, the organisation does not have control over access if this
ef V rtn
websites, social media and email. There are also threats such as fire, hardware failure and
burglary that will also prevent access to company systems.
To counter cyber-resilience threats, organisations should develop an information security plan.
W
Whilst the contents and details of a company's plan will depend on its business and systems, it
should cover the following areas.
AE
ng
Address third party relationships – where systems are provided by third parties the
relationship should be managed. In some instances (such as where a bespoke system is
provided) this can be set out in a contract and a degree of control achieved. However, for
ni
some systems (such as email services) this is not always possible and the organisation
should set out policies and procedures to control how such services are selected.
ar
Conformance assessment and penetration testing – the organisation should set out policies
to control the extent to which systems conform to certain security profiles. These
e
assessments should be regular in order to determine whether systems are meeting security
criteria.
ce am L
In-house versus external managed security services – organisations may establish in-house
en tn in
s
data security teams and this allows maximum control over data security. However, smaller
organisations may need to outsource security due to the costs of resourcing it. If this is the
ie
er ie er
case then it is important for the organisation to retain as much control over it as possible.
op
Define specific responsibilities – policies should establish where responsibility for the
ef V rtn
various aspects of cyber-resilience lie. Users should be aware of what should happen if
threats to cyber-resilience occur.
C
Monitoring and review – policies and procedures in relation to cyber-resilience should be
Pa
regaularly monitored and reviewed. They should be revised in order for the business to
maintain an acceptable risk profile.
Cyber risk and resilience has prompted a number of cyber security standards. ICAEW's report
W
Standard Description
AE
NIST (National Institute of Standards and This is a US framework that incorporates risk-
Technology) based cyber security standards based on
different industry sectors. They are also often
pushed down supply chains, such as defence,
and are fairly prescriptive in nature.
PCI-DSS (Payment Card Industry Data Security This is a standard that is specific to payment
Standard) cards – anyone processing payment card
transactions has to pass the assessment and
show compliance. This is a highly prescriptive
ng
standard, identifying the controls to be
adopted with regard to payment card data.
SOC for Cybersecurity This was published by the AICPA (American
ni
Institute of CPAs). It is for the reporting of
cyber risk management, and for providing
ar
assurance opinions on the cyber risk
management programme and associated
e
controls. While it is US-centric, it shows the
s
9.5 Supply chain resilience
ie
er ie er
Supply chain disruption is a particular issue for companies that adopt a just-in-time approach to
op
inventory management. Such organisations receive deliveries almost at the point when the
ef V rtn
materials are needed in the production process and very little if any, spare inventory is held.
Therefore any disruption to the supply chain (such as late deliveries or the failure of a supplier)
C
will have a major impact on production.
Pa
Additionally, the more that companies outsource or work with partners (such as virtual
organisations) the more they depend on, and therefore must be able to rely on, their supply
chain. In a similar way to just-in-time organisations, virtual organisations will feel a great impact
from any disruption to their supply chain. Disruption in this case may relate to the failure of IT
W
systems to transfer data or information, as well as the failure of suppliers to meet deadlines or if
they cease operations.
AE
In response to this potential supply chain disruption, the FM Global Resilience Index is a
data-driven tool and repository that ranks business resilience in 130 countries. The purpose of
the index is to help executives evaluate and manage supply chain risk.
IC
Section overview
A disaster is a major crisis or event which causes a breakdown in the business's operations
and resultant losses.
A business needs to recover from a disaster as quickly as possible. This is helped if the
business has a business continuity plan in place.
Definition
Disaster: The business's operations, or a significant part of them, break down for some reason,
leading to potential losses of equipment, data or funds.
We have seen that event risk is the operational risk of loss due to single events that are unlikely
but that may have serious consequences. Political risk is one example and is often associated
especially with less developed countries where events such as wars or military coups may result
in an industry or a business being taken over by the government and having its assets seized.
ng
Here are some examples, along with some responses and controls, based on reduction and
sharing of the risk of the disaster where it cannot be avoided.
ni
A fire safety plan is an essential feature of security procedures, in order to prevent fire,
detect fire and put out the fire. Fire safety includes:
ar
– Site preparation (for example, appropriate building materials, fire doors)
e
– Detection (for example, smoke detectors)
– Extinguishing (for example, sprinklers)
–
ce am L
Training for staff in observing fire safety procedures
en tn in
Flooding and water damage can be countered by the use of waterproof ceilings and floors
s
together with the provision of adequate drainage.
ie
Keeping up maintenance programmes can counter the leaking roofs or dripping pipes that
er ie er
result from adverse weather conditions. The problems caused by power surges resulting
op
from lightning can be countered by the use of uninterruptible (protected) power supplies.
ef V rtn
This will protect equipment from fluctuations in the supply. Power failure can be protected
against by the use of a separate generator.
C
Pa
Threats from terrorism can be countered by physical access controls and consultation with
police and fire authorities.
Accidental damage can be avoided by sensible attitudes to behaviour while at work and
good layout of workspaces.
W
Any system which has suffered a disaster must recover as soon as possible so that further losses
are not incurred, and current losses can be rectified.
AE
What is considered a disaster is relative to the size of the business and the significance of the
item that breaks down. The failure of a hard drive in a single PC could be extremely serious for a
small business which depended on that one computer, but in a large business it might cause
IC
Minor breakdowns occur regularly and require short-term recovery plans such as agreements
with a maintenance company for same or next-day on site repairs. Disasters which result in the
destruction of a major facility or installation require a long-term plan. C
H
A
P
10.2 Business continuity plans T
A business continuity plan will typically provide for: E
R
Standby procedures so that some operations can be performed while normal services are
5
disrupted
Recovery procedures once the cause of the breakdown has been discovered or corrected
Personnel management policies to ensure that the above are implemented properly
Section Comment
ng
Priorities Limited resources may be available for processing. Some tasks
are more important than others. These must be established in
advance. Similarly, the recovery plan may indicate that certain
ni
areas must be tackled first.
ar
Backup and standby These may be with other installations, or with a business that
arrangements provides such services (eg, maybe the hardware vendor).
Alternatively, other processes may be possible, for instance
e
taking cash when credit/debit card processing is interrupted.
ce am L
Communication with staff The problems of a disaster can be compounded by poor
communication between members of staff.
en tn in
s
Public relations If the disaster has a public impact, the recovery team may come
ie
under pressure from the public or from the media.
er ie er
Risk assessment
op Some way must be found of assessing the particular
ef V rtn
The ICAEW has its own business continuity plan, details of which can be found on its website
www.icaew.com/about-icaew/regulation-and-the-public-interest/business-continuity-plan
The plan covers its operational sites in Milton Keynes and London and accepts that the ICAEW
W
may need to materially reduce its immediate operations if the disruptive event is major.
Initially, the focus will be on recovering key business-critical activities. These have already been
AE
recover mission critical systems and resume critical ICAEW business operational activities;
R
EITHER OR
Positive event may occur Adverse event may occur Classifying risk
= OPPORTUNITY = RISK
ng
Faced by Faced by Risk concept
business investor Risk management • Volatility
ni
Aim to: minimise • Exposure
limit • Impact
ar
reduce • Probability
Critical success factors
e
Risk management Business resilience
Risk
appetite
ce am L
Strategic planning
Chapter 4
process
• see Fig 5.2 Effects
en tn in
Crisis
s
Causes
ie
er ie er
• Risk-seeking planning
• Prevention
C
• Action Occurs
Pa
C
H
A
P
T
E
R
ng
2 Which of the following is a downside risk for a business?
A That costs might rise
ni
B That revenue might rise
C That controls may succeed
ar
D That quality might improve
3 Benbuck plc has had a wide range of returns to shareholders in recent years. This means
e
that as an investment Benbuck plc shares are:
A
B ce am L
volatile and low risk
non-volatile and low risk
en tn in
C volatile and high risk
s
D non-volatile and high risk
ie
er ie er
4 Strang plc is considering an investment in new production machinery. It has identified that
op
the machinery may soon become obsolete on the grounds of low productivity. This
ef V rtn
C an enterprise risk
D an event risk
5 Mimso Bank plc's staff appear to be unaware of the importance of risk. For Mimso Bank plc
W
this is:
A a business risk
AE
B an enterprise risk
C a financial risk
D an operational risk
IC
A
B impact exposure
C impact probability
D volatility probability
7 In terms of risk management, choosing to transfer some risk is part of:
A risk awareness
B risk response
C risk assessment
D risk monitoring
ng
On 15 June Mike walks out of the firm and provokes a serious crisis, which the firm's very
expensive PR consultants handle. The area of crisis management which Heller & Co has
neglected to address in their management of the crisis is:
ni
A crisis prevention
ar
B contingency planning
C analysis of the causes of Mike's actions on 15 June
e
D taking action to mitigate the crisis
ce am L
10 Klib plc operates in a politically unstable country. It has arranged that a consultancy firm
with access to similar facilities as Klib plc has a complete set of backup files for Klib plc. This
en tn in
strategy is part of Klib plc's:
s
A risk management
ie
B crisis management
er ie er
Now, go back to the Learning outcomes in the introduction. If you are satisfied you have
achieved these objectives, please tick them off.
AE
IC
C
H
A
P
T
E
R
ng
ni
e ar
ce am L
en tn in
s
ie
er ie er
op
ef V rtn
C
Pa
W
AE
IC
ng
most small business owners are very closely involved in the running of it and keep close control
of quality, administration and staff, but there are plenty of businesses which have gone under
due to one fraud, or one lapse of quality. Finance is also a serious risk; bank overdrafts can be
ni
called in on demand, and cash flow has often caused very severe problems, even winding up, in
otherwise successful businesses.
ar
Answer to Interactive question 2
e
PII is a requirement not of the law but of ICAEW itself, which acts as regulator of its members
ce am L
both in and out of public practice. The work of ICAEW in regulating members is overseen by
Financial Reporting Council, which we shall see more about in Chapter 10. PII is intended to
en tn in
s
provide funds to persons who have suffered financial loss as a result of the negligence of a
chartered accountant; this is paid to the injured party, not to the chartered accountant, but it is
ie
er ie er
an example of how a person (the chartered accountant) may transfer some of the risks they face
to another entity, in this case the insurance company.
op
ef V rtn
Reduce expenses:
– Eliminate non-essential expenses
– Sell surplus long-term assets
IC
ng
6 C
ni
7 B
8 A Reducing the number of staff is a form of avoidance; training the remaining ones is a
ar
form of risk reduction.
9 C
e
10 C
11 C
ce am L
Cyber attacks are deliberate and take place through the internet.
en tn in
s
ie
er ie er
op
ef V rtn
C
Pa
W
AE
IC