Risk Management 2
Risk Management 2
Risk Management 2
Management
1
Introduction
• Risk Management
• Benefits of Risk Management
• PDCA Cycle
• Risk Framework Design
- Process of RisM
• Risk Criteria
• Risk Identification
• Risk Analysis
• Risk Treatment
•
What is Risk
Threat-‐-‐-‐a
poten,al
cause
of
an
incident
that
may
result
in
harm
to
a
system
or
organisa,on
Vulnerability-‐
a
weakness
of
an
asset
(resource)
that
can
be
exploited
by
one
or
more
threats
Risk-‐
poten,al
for
loss,
damage,
or
destruc,on
of
an
asset
as
a
result
of
a
threat
exploi,ng
a
vulnerability
Vulnerability
Risk Management
“Process
of
iden-fying,
controlling
and
minimising
or
elimina-ng
security
risks
that
may
affect
informa-on
systems,
for
an
acceptable
cost.”
-‐-‐-‐
assessment
of
risk
and
the
implementa-on
of
procedures
and
prac-ces
designed
to
control
the
level
of
risk
Risk
assessment
Risk
iden,fica,on-‐-‐-‐decision
driver
analysis,
assump,on
analysis,
decomposi,on
Risk
analysis-‐-‐-‐cost
models,
network
analysis,
decision
analysis,
quality
factor
analysis
Risk
priori,sa,on-‐-‐-‐risk
leverage,
component
risk
reduc,on
Risk
control
Risk
management
planning-‐-‐-‐risk
avoidance,
transfer,
reduc,on,
element
planning,
plan
integra,on
Risk
resolu,on-‐-‐-‐Simula,ons,
benchmarks,
analysis,
staffing
Risk
monitoring-‐-‐-‐Top
Risk
tracking,
Key
Risk
Indicator,
Assessing risk and stakes
What is the business value of others having our information?
What is the business impact of information leaks?
What is the business impact of unavailability of information to legitimate users?
What are the other consequences of information leaks like reputational damage,
regulatory fines, etc.?
How likely is the risk to materialize?
How should we handle the risk (avoid, mitigate, transfer, accept)?
How should we treat accepted risk (ignore, budget, insure)?
Who owns the risk (governance, process, financial)?
Approach to information
What do we have?
What do we need to have?
What do we no longer need to have?
What value does it have to us?
How do we store and archive it?
Who owns and inherits it? 7
What can be purged?
10
PDCA Cycle
11
Risk Framework
set of components that provide the foundations and organizational
arrangements for designing, implementing, monitoring, reviewing
and continually improving risk management throughout the
organization
NOTE 1 The foundations include the policy, objectives, mandate
and commitment to manage risk
NOTE 2 The organizational arrangements include plans,
relationships, accountabilities, resources, processes and activities
NOTE 3 The risk management framework is embedded within the
organization's overall strategic and operational policies and
practices “
(ISO 31000)
12
Components to the ERM Framework
1. Mandate and commitment to 3. Integration into the
the framework (step 1) Organization
a. Agreement in principle to 4. Risk Management Process
proceed 5. Communications and
b. Gap analysis Reporting
c. Context for framework 6. Accountability
d. Design of framework • a. Risk ownership and risk
e. Implementation plan register
2. Risk management policy • b. Managers’ performance
a. Policies for the framework, its evaluation
processes and procedures 7. Monitoring, Review and
b. Policies for risk management Continuous improvement
decisions; a. Responsibility for maintaining
o i. Risk Appetite and improving framework
b. Risk Maturity and continuous
o ii. Risk Criteria
improvement of framework
o iii. Internal Risk Reporting
13
Commit
and
Mandate
Framework
Implementa,on
Communicate
&
Train
• Policy
Statement
• Stakeholder
analysis
• Standards
• Training
needs
analysis
• Guidelines
• Communica-on
strategy
• RM
Plan
and
RM
Process
• Training
strategy
• Assurance
Plan
Establish
context
• Roles
and
Repor-ng
Implementa,on
Framework
Framework
Con,nuous
Improvement
Cycle
Analyse risks
Evaluate risks
Treat risks
15
Step 1.Communicate and consult
16
-As such, communication and consultation will be reflected in
each step of the process described here.
-As an initial step, there are two main aspects that should be
identified in order to establish the requirements for the
remainder of the process.
17
Step 2. Establish the context
provides a five-step process to assist
with establishing the context
within which risk will be identified.
1-Establish the internal context
2-Establish the external context
3-Establish the risk management
context
4- Develop risk criteria
5- Define the structure for risk analysis
18
1- Establish the internal context
19
• In establishing the internal context, the
business owner may also ask themselves the
following questions:
20
2. Establish the external context
21
• A business owner may ask the following
questions when determining the external
context:
• What regulations and legislation must the business comply
with?
• Are there any other requirements the business needs to
comply with?
• What is the market within which the business operates? Who
are the competitors?
• Are there any social, cultural or political issues that need to
be considered?
22
• Tips for establishing internal and external contexts
23
3-‐‑ Establish the risk management context
24
• Tips for establishing the risk management context
• Define the objectives of the activity, task or function
• Identify any legislation, regulations, policies, standards and
operating procedures that need to be complied with
• Decide on the depth of analysis required and allocate
resources accordingly
• Decide what the output of the process will be, e.g. a risk
assessment, job safety analysis or a board presentation. The
output will determine the most appropriate structure and
type of documentation.
25
4. Develop risk criteria
26
• Tips for developing risk criteria
27
5. Define the structure for risk analysis
Isolate the categories of risk that you want to manage. This will
provide greater depth and accuracy in identifying
significant risks.
The chosen structure for risk analysis will depend upon the
type of activity or issue,
its complexity and the context of the risks.
28
Step 3. Identify the risks
29
• The aim of risk identification is to identify possible risks that
may affect, either negatively or positively, the objectives of
the business and the activity under analysis. Answering the
following questions identifies the risk:
30
• There are two main ways to identify risk:
1- Identifying retrospective risks
31
• There are many sources of information about
retrospective risk. These include:
32
2-Identifying prospective risks
33
• Methods for identifying prospective risks include:
34
Tips for effective risk identification
35
Step 4. Analyze the risks
During the risk identification step, a
business owner may have
identified many risks and it is often
not possible to try to address all
those identified.
The risk analysis step will assist in
determining which risks have a
greater consequence or impact
than others.
36
• What is risk analysis?
37
• Elements of risk analysis
The elements of risk analysis are as follows:
38
• Types of analysis
Three categories or types of analysis can be used to determine
level of risk:
• Qualitative
• Semi-quantitative
• Quantitative.
39
• Tips for effective risk analysis
40
Step 5. Evaluate the risks
Risk evaluation involves comparing the
level of risk found during the analysis
process with previously established risk
criteria, and deciding whether these
risks require treatment.
The result of a risk evaluation is a
prioritized list of risks that require further
action.
This step is about deciding whether risks
are acceptable or need treatment.
41
• Risk acceptance
A risk may be accepted for the following reasons:
42
Step 6. Treat the risks
43
• Options for risk treatment:
44
• Tips for implementing risk treatments
45
Step 7. Monitor and review
Monitor and review is an essential and
integral step in the risk management
process.
A business owner must monitor risks and
review the effectiveness of the
treatment plan, strategies and
management system that have been
set up to effectively manage risk.
46
Risks need to be monitored periodically to ensure changing
circumstances do not alter the risk priorities. Very few risks
will remain static, therefore the risk management process
needs to be regularly repeated, so that new risks are
captured in the process and effectively managed.
A risk management plan at a business level should be
reviewed at least on an annual basis. An effective way to
ensure that this occurs is to combine risk planning or risk
review with annual business planning.
47
Summary of risk management steps
48
Thank You
49