Managing Business Risk



Similar documents
Foreword, by Steve Fowler, Chief Executive, The Institute of Risk Management (IRM) Contributors notes. Introduction 1

A NEW APPROACH TO CYBER SECURITY

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Figure 1: Global Aggregates: Industrial Production (% MoM Ann., 3M moving average)

Accenture Risk Management. Industry Report. Life Sciences

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

Corporate Portfolio Management

Introduction to Business Continuity Planning

This is a sample chapter from A Manager's Guide to Service Management. To read more and buy, visit BSI British

IT Governance Charter

IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS

Aegon Global Compliance

Commonwealth Risk Management Policy

International Diploma in Risk Management Syllabus

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com

DATA PROTECTION OFFICER PROGRAMME

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Business Continuity Planning and Management for Law Firms

Agenda. The world out there it matters. Insurance realities managing the business. Risk.oh no. Measuring things. We need to invest? And Eat.

9:00-9:05 Welcoming Remarks: Conference Organizer

IFAD Policy on Enterprise Risk Management

E-commerce and Development Key Trends and Issues

Cyber Risk & Insurance

Safer food supply chains why assessments are great news for your business

Enterprise Risk Management

2015 Global venture capital confidence survey results How confident are investors? September 15, 2015

Enterprise-Wide Risk Assessment

State of the Art: Risk Management. Jeff M. Spivey, CPP President Security Risk Management

Overview of Asian Insurance Markets

Digital Transformation In The Age Of The Customer: A Spotlight On B2C

Placing a Value on Enterprise Risk Management ADVISORY

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

MBA Dissertation Summary

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR

Internal Audit Landscape 2014

Cyber Security Risks for Banking Institutions.

CYBER SECURITY FOUNDATION - OUTLINE

UBIQUITY, INC. FORM 8-K. (Current report filing) Filed 08/12/14 for the Period Ending 07/18/14

NIST Cybersecurity Framework & A Tale of Two Criticalities

Accreditation Application Forms

PROTIVITI FLASH REPORT

Risk Considerations for Internal Audit

DISCLOSEABLE TRANSACTION STRATEGIC DIVESTMENT OF ASIA CONSUMER AND HEALTHCARE DISTRIBUTION BUSINESS

TAX MANAGEMENT CONSULTING. How can you be more efficient at managing tax?

Board oversight of risk: Defining risk appetite in plain English

Cyber crime risk management protecting your business 4 November 2015

for the Entire Organization

Chief Risk Officers in the Mutual Fund Industry: Who Are They and What Is Their Role Within the Organization?

This is a licensed product of Ken Research and should not be copied

Global Security Program Overview

Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010

Report of the Audit and Risk Committee

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Risk Management Framework

Building trust in the cloud. Alastair McAulay PA Consulting Group

Infrastructure Asset Management Report

PRIORITIZING CYBERSECURITY

Partnering Against Corruption Initiative (PACI) Heat Maps as Collective Action Tools

Outsourcing: driving efficiency and growth. Grant Thornton International Business Report 2014

Management in an Uncertain. David A.J. Axson

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Secure Your Cloud and Outsourced Business with Privileged Identity Management

ELECTRONIC GOVERNMENT MANAGEMENT (EGM) TRAINING SERIES

Operational security for online services overview

Business Architecture

The Global Cyber Security Market

How To Understand And Implement Pas 55

Digital Transformation In The Age Of The Customer: A Spotlight On B2B

Optimizing Global Engineering Efficiency With a Holistic Project Approach

2nd Edition Board Effectiveness What Works Best

Cyber Risk and Insurance What companies need to know

Executive Cyber Security Training. One Day Training Course

Il nuovo standard ISO sulla Business Continuity Scenari ed opportunità

Model Risk, A company perspective Peter K. Reilly, FSA Valuation Actuary & Head of Actuarial Strategic Initiatives Aetna, Inc

Matthew E. Breecher Breecher & Company PC November 12, 2008

Target Date Funds: Debating To Versus Through

Q1 REVENUES. Paris April 27th, 2015

2014 Audit of the Board s Information Security Program

Supply Chain Talent: The Missing Link?

Transcription:

Managing Business Risk A practical guide to protecting your business Consultant editor: Jonathan Reuvid KoganPage

CONTENTS Foreword, by Steve Fowler, Chief Executive, Institute of Risk Management xiii Contributors' notes xv Introduction 1 Jonathan Reuvid PART ONE Boardroom focus on risk issues 3 1.1 Risk recognition in the boardroom and its management 5 Chris Hodge, Financial Reporting Council Introduction 5 The role of the board 6 The changing nature of risk 7 1.2 Risk appetite: cut through the hype 11 Allan Gifford, DNV KEMA Introduction 11 The challenges 11 Designing a risk appetite 17 Expressing risk appetite 18 Using risk appetite as the basis for risk control 20 References 23 1.3 Capital project risk management: foundations to mastery 25 Ben Cattaneo, Accenture Risk Management Capital project risk management and its benefits 27 Mastery - capital project risk management to drive capital effectiveness 31 Copyright and disclaimer 32 Notes 33 Sources and references 33

^^ Contents 1.4 Asset integrity risk management 35 Allan Gifford, DNV KEMA Introduction 35 Overall approach to asset integrity management 35 Resources 42 The link and alignment of asset risk management with ISO 31000 52 Note 53 Reference 53 1.5 Piercing the corporate veil: liability of parent companies for the actions of their subsidiaries 55 Paul Eccles, Rachel Reeves and Jocelyn Kirkwood, Shoosmiths The principles of the corporate veil 55 When a claim might be made against a parent company instead of its subsidiary 56 Parental responsibility 57 Practical steps to protect or reduce a parent company's liability to its subsidiary - the corporate angle 59 Practical steps to protect or reduce a parent company's liability to its subsidiary - the insurance angle 60 Summary 61 1.6 A new dawn for board oversight 63 Amanda Morrison, KPMG LLP Corporate governance developments 63 Has it all gone horribly wrong? 64 What are we trying to achieve? 64 Do we understand who is doing what? 65 Has risk management been properly embedded into our business processes? 65 Have we considered our risk appetite? 66 Do we view risks in isolation? 66 Have we factored scenario planning into our risk management processes? 67

Contents 1.7 Positive risk: the upside issues 69 Simon King, DNV KEMA Introduction 69 Organizational challenges 70 How do we see positive risk? 70 Positive risk terminology 72 Reinforcing the paradigm of downside risk 74 Think like an entrepreneur? 74 What we can do in practice 74 Notes 75 References 75 PART TWO Approaches to operational risk management 77 2.1 Risk-based security 79 Dr Morten Bremer Maerli, DNV KEMA Characteristics of security risks 80 Components of security risks 81 Reduction of security risk 83 Conclusion 84 Notes 85 References 85 2.2 Preparing for uncertainty: using scenarios 87 Hans Laess0e, The LEGO Group Introduction 87 The first approach 87 Defining 'scenarios version 2' 89 Preparing for the scenario process 89 Preparing for the future: the process 91 Preparing for the future: the value 94

jm Contents 2.3 Operational risk in finance: lessons learned from safety-critical industries 95 Gunnar Hauland and Sverre Danielsen, DNV The evolution of a systems perspective on safety 95 What is human error? 96 Controls as barriers 97 Learning from incident registration and investigation 98 Learning from risk analyses 98 Organizational culture 99 Conclusion 102 2.4 Managing risks in the supply chain: reaching new standards 103 Eric E Lehmann, Accenture Introduction 103 Improving the management of risks in the supply chain 106 Taking risk management live 108 2.5 Software and Cloud escrow: an effective tool for managing risk and new business opportunities in Stephan Peters, Deposix Software Escrow GmbH Introduction 111 What can go wrong: negative examples and risky situations 112 What can go right - positive examples and opportunities gained 113 Escrow explained 114 Risk and opportunity management with software escrow 118 Conclusion 121 Notes 122 Reference 123 2.6 Frugal enterprise risk management and ISO 31000 125 Steven Shackleford, Peter Maggs and Irvine Lauder, WMSNT Limited Introduction 125 The context for frugal risk management in the present decade 125 The application of ISO 31000 to the charity 126 The benefits of frugal risk management 133 References 134

Contents PART THREE Risk management applications 135 3.1 Understanding cyber security risk 137 Martin Sutherland, BAE Systems Detica The new threats 137 Businesses are at risk 139 Managing the risk 140 Developing a strategy 142 3.2 Managing business risk in the life sciences industry 143 Mukadder Erdonmez, XL Group Introduction and overview of the life sciences sector 143 Risks and challenges associated with innovation 144 3.3 Independent assessment and certification: good for food safety - good for business 149 Cor Groenveld, Lloyd's Register Quality Assurance (LRQA) How it all began - the emergence of food safety 149, The drive to harmonization 151 Where we are today 152 The role of independent third-party certification 153 Key components of a robust assessment process 154 Summary 155 3.4 Opportunities and pitfalls of distance learning 157 Eric Lynn, mylifeqs Attractions of distance learning 159 Ideal vs less suitable contexts for distance learning 159 Organization-specific learning programmes 160 Risks of distance learning programmes 161 Overcoming the challenges 162 3.5 Current risk issues in employment 165 Kevin McCavish, Shoosmiths When an employee resigns without notice, what is the effective date of dismissal? 165 TUPE service provision changes: how to spot an 'activity' 167

^0 Contents PART FOUR Risk assessments of high-growth emerging markets 171 4.1 Managing business risks in Brazil 173 Geert Aalbers and Thomaz Favaro, Control Risks Introduction 173 The changing face of risk management in the BRICs 174 Business risks in Brazil 175 Closing remarks 180 4.2 China: balancing opportunity and threat 181 Jonathan Reuvid, Hethe Management Services Political risk 182 Economic risk 184 Business environment risk 186 Summary 187 References 188 4.3 Russia: business risk in 2013 189 Carlo Gallo Political risk 190 Operational risk 192 Security risk 194 Conclusion 196 Acknowledgement 196 4.4 India: the risk environment 197 Chietigj Bajpaee, Vivekananda International Foundation Reform agenda on the back burner 198 Corruption reborn 199 Political pressures take precedence 202 Notes 203 References 204

Contents 4.5 Thailand: manageable business risk 205 Eric Lynn, mylifeqs Background 205 Business regulations for investors 207 Buildings 208 Political risk 208 People and everyday life 209 Summing up 210 4.6 South-East Asia: managing risk regionally through delegation 213 Stephen Gill, Stephen Gill Associates Geography and population 213 South-East Asia's economics 214 Political landscape 214 Social, cultural and spiritual diversity 215 Business approach and risk 215 Authority, responsibility and accountability 216 Delegation of authority 216 Effective delegation of authority implementation 217 Corruption risk and managing corruption risk 217 A final word of caution 219 Appendix: Contributors' contact list 221 Index 225 Index of advertisers 231