What is Operational Risk?
|
|
|
- Diane Gallagher
- 9 years ago
- Views:
Transcription
1 Operational Risk Management DeMP Workshop with E St. Kitts & Nevis March 18-20, 2009 What is Operational Risk? Traditional View Market Risk IR & FX redit Risk Operational Risk Everything Else asel II Definition: The risk of direct or indirect loss resulting from inadequate or failed internal processes, people and systems or from external events. 1
2 Sources of Operational Risk Processes People Sytems Internal Fraudulent ctivities Operational Risk in Execution Policies and Guidelines External Natural Disasters/ Terrorist ttacks Laws and Regulations utomated vs Manual Processes utomated Processes PROS Reduce opportunities for human error Fast Less need for staff (Free staff to do other things) ONS Fewer opportunities for detective controls Heavy reliance on having right systems/system security Greater Systemic Risk OMPUTER LETS YOU MKE MORE MISTKE FSTER THN NY INVENTION IN HUMN HISTORY - Mitch Ratliffe 2
3 Systems dequate and well functioning systems are at the core of a good control environment High level of dependence on spreadsheets outside of core systems introduces high level of risk Inability to trace and track the history of changes Restricting access to spreadsheets Selecting a Debt System: Develop in-house or purchase one off-the-shelf? Systems apacity Planning Hardware and software selection should be considered during growth projections Over/under utilization Scalability 3
4 People - Staffing Related Risks Staff person is unusually bad. Mitigated by: Existence of clear written procedures Two-person sign-offs for important functions Mentoring and regular training Staff person is unusually good Key Person Risk: dependence and repository of institutional memory Mitigated by: Encouraging key people to record processes/past experiences in writing in accessible form Working in teams People - Internal Fraud Internal Fraud Generally for direct financial gain (embezzlement) or to cover losses Nick Leeson arings ank ase Other reasons Royal ank of Scotland ase: GP 21 million fraud at Royal ank of Scotland in 2006 employee created 1,400 false accounts to be named business manager of the year. Defenses gainst Internal Fraud Restricting access to information and systems to need to know staff Segregation of duties Requiring two-person sign-offs Proper audit trail Required 2 week leave policies (NSD, JSD) Establish culture where staff feel comfortable reporting errors 4
5 External Fraud External Fraud ccess of systems/corruption of system by external parties: robbery, computer hacking ollusion of staff with external parties: bribery Fraud by dealers or other market intermediaries Defenses gainst External Fraud uild adequate security and controls in the financial systems that interfaces with external vendors or counterparties uild awareness among staff of the importance of safeguarding the institutions' systems (no downloading of programs on external sites) External Events Damage to Physical ssets Terrorism, Vandalism, Earthquakes, Fires, Hurricanes, Floods, etc Systems Failures Hardware and Software Failures, Telecommunication Problems May be Low Probability but Very High Severity Events Need usiness ontinuity Plans lternative Work Sites ack-up Systems Ensure that Key Market ounterparties also have such plans in place 5
6 World ank HQ Position Legal & Regulatory Environment pproval by Local Securities Regulator ( Registration ) On-going disclosure Requirements nti-fraud Provisions 6
7 nti-fraud Provisions Liability (penal/civil) for materially false statements or omissions Meaning: information that would influence a reasonable investor s decision to purchase or sell the security. INTERNL PROEDURES RE KEY The DeMP scoring methodology emphasizes Debt administration and data security (DPI 12) Segregation of duties, staff capacity, and business continuity (DPI 13) 14 7
8 Debt dministration and Data Security Dim1 Procedures manual for processing debt service Updated every 2 Years Electronic Payment Orders STP Payment Systems DeM Entity Procedures manual for debt recording and validation Independent confirmation of data conducted annually External reditors Major Investors Dim2 Updated every 2 years 15 Debt dministration and Data Security Dim3 Procedures for accessing debt and payment systems Updated when staff changes occur udit Trails of System ccess DeM Entity Daily data back-ups Monthly data back-ups Dim4 Secure Fireproof Location Weekly data back-ups 16 8
9 Segregation of Duties, Staff apacity, and usiness ontinuity Dedicated compliance monitoring staff Risk Monitoring and ompliance Unit Dim1 Payments ccounting reditors Market One compliance monitoring staff Payment and ccounting Staff Debt Recordin g System Negotiating and ontracting Staff DeM Entity Data Entry and hecking Staff 17 Segregation of Duties, Staff apacity, and usiness ontinuity Dim2 ode-of-conduct and conflict-ofinterest guidelines Job descriptions DeM Entity Training and development plans, plus yearly performance assessments DR/ plan Dim3 Tested in past 3 years Recovery Site nnual testing Operational risk management procedures 18 9
10 Thank you! World ank 19 10
Operational Risk Management Policy
Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well
How To Improve Your Salary At The Finance Sector Union Of Ustralia
Secure PY @ FSU Summary Proposed lassification and Pay Model: Improved Proposal During 2013/14 enterprise bargaining negotiations FSU members raised concerns with the broken pay model at. In the 2014 greement,
RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT
RESERVE BANK OF VANUATU DOMESTIC BANK PRUDENTIAL GUIDELINE NO 12 OPERATIONAL RISK MANAGEMENT 1. This Guideline outlines a set of principles that provide a framework for the effective management of operational
Circular to All Licensed Corporations on Information Technology Management
Circular 16 March 2010 Circular to All Licensed Corporations on Information Technology Management In the course of our supervision, it has recently come to our attention that certain deficiencies in information
Vendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
BUSINESS CONTINUITY PLAN (BCP)
BUSINESS CONTINUITY PLAN (BCP) This is the Business Continuity Plan ( BCP ) for Wolfe Research Securities (the Firm ). Emergency Contact Persons The Firm s two emergency contact persons are: David Malat
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster
Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc.
Advent Disaster Recovery: Options for Investment Managers A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. This communication is provided by Advent Software, Inc. for informational
ViewTrade Securities, Inc. Business Continuity Plan (BCP) 2015
ViewTrade Securities, Inc. Business Continuity Plan (BCP) 2015 I. Emergency Contact Persons Our firm s two emergency contact persons are: James St.Clair, President, (561) 703-6699, [email protected];
ICASAS505A Review and update disaster recovery and contingency plans
ICASAS505A Review and update disaster recovery and contingency plans Release: 1 ICASAS505A Review and update disaster recovery and contingency plans Modification History Release Release 1 Comments This
Module # 2 Management/Key Employee Assessment
Module # 2 Management/Key Employee Assessment The management/key employee assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Internal
Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC
Assessing Your Disaster Recovery Plans Gregory H. Soule, CPA, CISA, CISSP, CFE Andrews Hooper Pavlik PLC Andrews Hooper Pavlik PLC Agenda Business Continuity Concepts Impact Analysis Risk Assessment Risk
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP).
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP). Ed Fortin President Fortin Consulting Paul Godden Consultant & Quotation Author Friday 24 th February 2012 Business Continuity Planning
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
BARRAMUNDI L IMITED RISK MANAGEMENT POLICY
BARRAMUNDI L IMITED RISK MANAGEMENT POLICY Last updated: 25 August 2014 THE OBJECTIVES OF RISK MANAGEMENT Risk management is the systematic process of managing an organisation's risk exposures to achieve
Job title: Staff Accountant Receivables
Job title: Staff Accountant Receivables Our Firm Capsim Management Simulations Inc designs, builds and delivers the renowned Capstone Business Simulation and a suite of related business simulations to
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
Business Continuity Plan Summary
\ Business Continuity Plan Summary Emergency Contact Persons: Our firm's two emergency contact persons are Travis Hudak, owner (801-550-0387), e-mail: [email protected] and Michael Child, owner (801-518-
Balancing and Settlement Code BSC PROCEDURE BSCP537. QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs
Balancing and Settlement Code BSC PROCEDURE BSCP537 QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs APPENDIX 3 GUIDANCE NOTES ON COMPLETING THE SAD Version 2.0 Date: 10 September 2007
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: August 2010 LETTER NO.: 10-CU-15 TO: SUBJ: REF: Federally Insured Credit Unions Indirect Lending
JANSSEN PARTNERS, INC. Business Continuity Plan (BCP)
JANSSEN PARTNERS, INC. Business Continuity Plan (BCP) Emergency Contact Persons Our firm s two emergency contact persons are: Peter Janssen, President, Tel. 641-209-5940, Cell 516-456-7059, Fax 641-843-7036,
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS
SUPERVISORY AND REGULATORY GUIDELINES Guidelines Issued: 22 December 2015 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS 1. INTRODUCTION 1.1 The Central Bank of The Bahamas ( the Central
Introduction. Conducting a Security Review
Chapter 3 PHYSICAL SECURITY Introduction In elections, physical security refers to standards, procedures, and actions taken to protect voting systems and related facilities and equipment from natural and
a Disaster Recovery Plan
Construction of a Disaster Recovery Plan David Godwin, Sr. Sales Engineer March 18, 2014 Objectives Understand What Disaster Recovery is? Why is Disaster Recovery Needed? Effectively assist customers or
BERMUDA MONETARY AUTHORITY
BERMUDA MONETARY AUTHORITY INSURANCE DEPARTMENT GUIDANCE NOTE # 17 COMMERCIAL INSURER RISK ASSESSMENT Commercial Insurer Risk Assessment Page 1 of 17 Introduction 1. The ( the Authority ) is introducing
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
Internal Controls over Financial Reporting. Integrating in Business Processes & Key Lessons learned
Internal Controls over Financial Reporting Integrating in Business Processes & Key Lessons learned Introduction Stephen McIntyre, CA, CPA (Illinois) Senior Manager at Ernst & Young in the Risk Advisory
Risk Management guide
TABLE OF CONTENTS... 1 1. INTRODUCTION:... 2 2. 1.1 Acronyms/Abbreviations/Glossary.2 1.2 General Code of Conduct...2 1.3 Definitions...4 1.4 Risk Management Strategies...5 1.5 Types of risks:...6 2. ETHICS
Continuity of Operations Planning. A step by step guide for business
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
Risk Management. Risk Management Overview. Credit Risk
Risk Management Risk Management Overview Risk management is a cornerstone of prudent banking practice. A strong enterprise-wide risk management culture provides the foundation for the Bank s risk management
EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT
EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT 31 st December 2012 Introduction For the purposes of Directive DI144-2007-05
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK
SUPERVISORY AND REGULATORY GUIDELINES: PU-0412 Operational Risk 25 th November, 2013 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK 1. INTRODUCTION 1.1. The Central Bank of The Bahamas ( the Central
Business Continuity. Disaster Recovery Plan
Business Continuity Disaster Recovery Plan Emergency Contact Persons Phyllis Hollis, President & CEO O: (212) 916 3888 Cell: (917) 804 8021 Email: [email protected] Kinchen Bizzell, Managing Director,
Preparing for the Outsourcing Challenge: Legal Due Diligence to Ensure a Winning Service Provider Relationship
THE 4 TH NATIONAL CONFERENCE ON OUTSOURCING IN FINANCIAL SERVICES NEGOTIATING, MANAGING & TERMINATING OUTSOURCING RELATIONSHIPS WHILE ENSURING REGULATORY COMPLIANCE Renaissance Mayflower, Washington, DC
LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE
LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE The Comptroller s Economic Development and Analysis (EDA) Division provides education and direct assistance to local governments, helping
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Risk Management. Risk Policy and Procedures. Risk Management Framework
Risk Management Risk Policy and Procedures Risk management is attempting to identify and then manage threats that could severely impact or bring down the organization. Generally, this involves reviewing
SUPERVISORY AND REGULATORY GUIDELINES: PU19-0406 BUSINESS CONTINUITY GUIDELINES
SUPERVISORY AND REGULATORY GUIDELINES: PU19-0406 Business Continuity Issued: 1 st May, 2007 Revised: 14 th October 2008 BUSINESS CONTINUITY GUIDELINES I. INTRODUCTION The Central Bank of The Bahamas (
Relevant COSO Principles. Policies and procedures are maintained. Policies and Procedures. Roles and responsibilities are identified
Accountability is unable to govern service processes No consistent or communicated policies procedures structure is inadequate Policies procedures are maintained Roles responsibilities are identified Policies
Business Plan for Implementing Electronic Commerce
Introduction to Electronic Commerce Business Plan for Implementing Electronic Commerce Objectives In this chapter, you will learn about: Planning electronic commerce initiatives Strategies for developing
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
Operational risk in Basel II and Solvency II
Operational risk in Basel II and Solvency II John Thirlwell Royal Docks Business School, University of East London 14 October 2010 Operational risk and Basel II Defining operational risk Capital for operational
Hair and Beauty. Policy Summary
Hair and Beauty Policy Summary This leaflet provides a summary of the significant features, benefits and limitations of the cover provided by the Zurich Insurance plc Hair and Beauty Policy. The full terms,
Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management
Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care
Paper MA2. Managing Costs and Finance FOUNDATIONS IN ACCOUNTANCY. Specimen Exam applicable from June 2014
FOUNTIONS IN OUNTNY Managing osts and Finance Specimen Exam applicable from June 2014 Time allowed: 2 hours LL 50 questions are compulsory and MUST be attempted. Paper M2 o NOT open this paper until instructed
7Seven Things You Need to Know About Long-Term Document Storage and Compliance
7Seven Things You Need to Know About Long-Term Document Storage and Compliance Who Is Westbrook? Westbrook Technologies, based in Branford on the Connecticut coastline, is an innovative software company
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
Adopted by the Board of Directors on 23 April 2015 with entry into force as of 24 April 2015. OPERATIONAL RISK MANAGEMENT POLICY
Adopted by the Board of Directors on 23 April 2015 with entry into force as of 24 April 2015. OPERATIONAL RISK MANAGEMENT POLICY 1 Contents 1 Purpose... 3 2 Definition of operational risk and general approach...
Business Continuity Planning for Risk Reduction
Business Continuity Planning for Risk Reduction Ion PLUMB [email protected] Andreea ZAMFIR [email protected] Delia TUDOR [email protected] Faculty of Management Academy of Economic Studies
Planning and Implementing Disaster Recovery for DICOM Medical Images
Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data
Auditing Standard 5- Effective and Efficient SOX Compliance
Auditing Standard 5- Effective and Efficient SOX Compliance September 6, 2007 Presented to: The Dallas Chapter of the Institute of Internal Auditors These slides are incomplete without the benefit of the
HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
BCP (Business Continuity Plan)
(Translation) BCP (Business Continuity Plan) September 26, 2008 Tokyo Financial Exchange Inc. Tokyo Financial Exchange Inc. ( TFX ) has been committed in establishing a system which ensures stable and
Fundamentals Level Skills Module, F8 (IRL)
Answers Fundamentals Level Skills Module, F8 (IRL) Audit and Assurance (Irish) June 2008 Answers 1 (a) Prior year internal control questionnaires Obtain the audit file from last year s audit. Ensure that
Sound Practices for the Management of Operational Risk
1 Sound Practices for the Management of Operational Risk Authority 1.1 Section 316 (4) of the International Business Corporations Act (IBC Act) requires the Commission to take any necessary action required
Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report
Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report March 2007 promoting efficient & effective local government Introduction Software change involves modifications
Competing more effectively with a Managed Services Provider.
Competing more effectively with a Managed Services Provider. CIBER Whitepaper February 2012 1 Table of Contents Executive Summary...3 What is a Managed Services Provider?.. 5 Why Outsource?... 5 Total
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) 1 Introduction 1.1 Section 316 (4) of the International Business
OPERATIONAL RISK RISK ASSESSMENT
OPERATIONAL RISK RISK ASSESSMENT 1 OVERVIEW Inherent Risk Risk Management Composite or Net Residual Risk Trend 2 INHERENT RISK Definition Sources Identification Quantification 3 Definition OPERATIONAL
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
CROWDFUNDING WHAT IS CROWDFUNDING?
CROWDFUNDING PBI Business Lawyers Institute 5 November 2015 G. Philip Rutledge, Partner Bybel Rutledge LLP, Lemoyne, PA 17043 [email protected] WHAT IS CROWDFUNDING? Much over used term to describe
COLLEGE OF BUSINESS & ECONOMICS 2014 JOURNAL LIST
COLLEGE OF USINESS & ECONOMICS 2014 JOURNL LIST Rank Department : ccounting + ccounting Review (The) + Journal of ccounting & Economics + Journal of ccounting Research + Contemporary ccounting Research
Business Continuity Planning. Presentation and. Direction
Business Continuity Planning Presentation and Direction Thomas Bronack, president Data Center Assistance Group, Inc. 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Email: [email protected]
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION
LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION INSTRUCTIONS FOR COMPLETING APPLICATION: 1. Please answer all the questions. This information is required to make an underwriting and pricing evaluation.
Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)
Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite
Disaster Recovery 81 Success Secrets. Copyright by Michelle Stein
Disaster Recovery 81 Success Secrets Copyright by Michelle Stein Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical,
DEVELOPING A KRI PROGRAM: GUIDANCE FOR THE OPERATIONAL RISK MANAGER SEPTEMBER 2004. Mayowa BabatolaMayowa BabatolaBITS 2004 September 2
DEVELOPING A KRI PROGRAM: GUIDANCE FOR THE OPERATIONAL RISK MANAGER SEPTEMBER 2004 Mayowa BabatolaMayowa BabatolaBITS 2004 September 2 DEVELOPING A KRI PROGRAM: GUIDANCE FOR THE OPERATIONAL RISK MANAGER
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
CONTINUITY OF OPERATIONS PLANNING
University of North Carolina Wilmington CONTINUITY OF OPERATIONS PLANNING November 9, 2010 Lumina Theater, Fisher Student Center Development of Continuity Planning University of North Carolina Wilmington
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
