Risk Management Class Notes
Risk Management Class Notes
Risk Management
by: Asif Masood Ahmad
Risk
Management
For MBA/M.Com/BBA Students
2 | Page
Risk Management
by: Asif Masood Ahmad
What is Risk?
Introduction
Every business faces risks that could present threats to its success.
Risk is defined as the probability of an event and its consequences. Risk management is the
practice of using processes, methods and tools for managing these risks.
Risk management focuses on identifying what could go wrong, evaluating which risks should be
dealt with and implementing strategies to deal with those risks. Businesses that have identified the
risks will be better prepared and have a more cost-effective way of dealing with them.
This guide sets out how to identify the risks your business may face. It also looks at how to
implement an effective risk management policy and program which can increase your business'
chances of success and reduce the possibility of failure.
Compliance, for example responding to the introduction of new health and safety
legislation
3 | Page
Risk Management
by: Asif Masood Ahmad
Others, for example natural disaster (floods) and others depend upon the nature and scale
of the industry.
These categories are not rigid and some parts of your business may fall into more than one
category. The risks attached to data protection, for example, could be considered when reviewing
both your operations and your business' compliance.
Strategic risks
Strategic risks are those risks associated with operating in a particular industry.
They include risks arising from:
industry changes
For example you might consider the strategic risks of the possibility of a US company buying one
of your European competitors. This could give the US Company a distribution arm in the UK. In
this situation you might want to consider:
whether there are any US companies which have the cash/share price to do this
whether there are any European competitors who could be a takeover target, perhaps because
of financial difficulties
whether the US company would lower prices or invest more in research and development
Where there's a strong possibility of this happening, you should prepare some sort of response.
Compliance risk
Compliance risks are those associated with the need to comply with laws and regulations. They
also apply to the need to act in a manner which investors and customers expect, for example, by
ensuring proper corporate governance.
You may need to consider whether employment or health and safety legislation could add to your
overheads or force changes in your established ways of working. For advice on how to manage
health and safety risks, read our guide on how to set up a health and safety management system.
You may also want to consider legislative risks to your business. You should ask yourself whether
the products or services you offer could be made less marketable by legislation or taxation - as
4 | Page
Risk Management
by: Asif Masood Ahmad
has happened with tobacco and asbestos products. For example, concerns about the increase in
obesity may prompt tougher food labeling regulations, which may push up costs or reduce the
appeal of certain types of food.
Financial risks
Financial risks are associated with your business' financial structure and systems and the
transactions your business makes.
Identifying financial risk involves examining your daily financial operations, especially cash-flow. If
your business is too dependent on a single customer and they became unable to pay you, this
could have serious implications for your business' viability. See our guide on how to identify
potential cash-flow problems.
You might examine:
Financial risk assessment should take into account external factors such as interest rates and
foreign exchange rates.
Rate changes will affect your debt repayments and the competitiveness of your goods and
services compared with those produced abroad.
If you are involved in international trade, you will be exposed to even greater financial risks. It can
be more difficult to assess the creditworthiness of an overseas client and to recoup unpaid debts.
You may also be adversely affected by movements in the currency markets. In addition,
depending on the trading terms you choose, it may take longer to receive payment when
compared with a UK client. For more information on managing the financial implications of
international trade see our guides on getting paid when selling overseas and foreign currency and
exchange risks.
Operational risks
Operational risks are associated with your business' operational and administrative procedures.
These include:
recruitment
supply chain
transportation
accounting controls
IT systems
regulations
5 | Page
Risk Management
by: Asif Masood Ahmad
board composition
You should examine these operations in turn, prioritize the risks and make necessary provisions.
For example, if you rely on one supplier for a key component you could source other suppliers to
help you minimize the risk.
If your business makes and receives regular deliveries, consider drawing up a continuity plan to
help you maintain operations in the event of a fuel strike or shortage.
IT risk and data protection are increasingly important to business. If hackers break into your IT
systems, they could steal valuable data and even money from your bank account which at best
would be embarrassing and at worst could put you out of business. A secure IT system employing
encryption will safeguard commercial and customer information.
Other risks
Other risks include:
employee risk management, such as maintaining sufficient staff numbers and cover,
employee safety and up-to-date skills
political and economic instability in any foreign markets you export goods to
6 | Page
Risk Management
by: Asif Masood Ahmad
allows you to anticipate what may go wrong, minimizing the amount of fire-fighting you
have to do or, in a worst-case scenario, preventing a disaster or serious financial loss
significantly improves the probability that you will deliver your business plan on time and to
budget
Risk management becomes even more important if your business decides to try something new,
for example launch a new product or enter new markets. Competitors following you into these
markets, or breakthroughs in technology which make your product redundant, are two risks you
may want to consider in cases such as these.
1. Risk Identification
1. Introduction
Risk identification is a deliberate and systematic effort to identify and document the Institutions
key risks. The objective of risk identification is to understand what is at risk within the context of
the Institutions explicit and implicit objectives and to generate a comprehensive inventory of risks
based on the threats and events that might prevent, degrade, delay or enhance the achievement
of the objectives. This necessitated the development of risk identification guidelines to ensure that
Institutions manage risk effectively and efficiently.
7 | Page
Risk Management
by: Asif Masood Ahmad
Comprehensive identification and recording of risks is critical, because a risk that is not identified
at this stage may be excluded from further analysis. In order to manage risks effectively,
Institutions have to know what risks they are faced with. The risk identification process should
cover all risks, regardless of whether or not such risks are within the direct control of the
Institution. Institutions should adopt a rigorous and on-going process of risk identification that also
includes mechanisms to identify new and emerging risks timeously.
Risk identification should be inclusive, not overly rely on the inputs of a few senior officials and
should also draw as much as possible on unbiased independent sources, including the
perspectives of important stakeholders.
2.1 Risk workshops and interviews
Risk workshops and interviews are useful for identifying, filtering and screening risks but it is
important that these judgment based techniques be supplemented by more robust and
sophisticated methods where possible, including quantitative techniques.
Risk identification should be strengthened by supplementing Managements perceptions of risks,
inter alia, with:
review of the reports of the Standing Committee on Public Accounts and the relevant
Parliamentary Committee(s);
financial analyses;
strategic risk identification should precede the finalization of strategic choices to ensure that
potential risk issues are factored into the decision making process for selecting the strategic
options;
risks inherent to the selected strategic choices should be documented, assessed and
managed through the normal functioning of the system of risk management; and
8 | Page
Risk Management
by: Asif Masood Ahmad
Operational risk identification should be repeated when changes occur, or at least once a
year, to identify new and emerging risks.
2.2.3 Project risk identification
Project risk identification to identify risks inherent to particular projects:
project risks should be identified for all major projects, covering the whole lifecycle; and
for long term projects, the project risk register should be reviewed at least once a year to
identify new and emerging risks.
9 | Page
Risk Management
by: Asif Masood Ahmad
they have provided their input to the risk list. If the interview(s) are completed after the
brainstorming session has been completed, the list of risks should be provided to all participants
for comment before they are added to the risk list.
3.4 Working Groups are great way to analyze a particular area or topic in a discussion process to
identify risks that may not be obvious to the risk identification group. The working group is usually
a separate group of people working a particular area within the project that is conducting the risk
identification.
3.5 Experiential Knowledge is the collection of information that a person has obtained through
their experience. Caution must be used when using any knowledge based information to ensure it
is relevant and applicable to the current situation.
3.6 Documented Knowledge is the collection of information or data that has been documented
about a particular subject. This is a source of information that provides insight into the risks in a
particular area of concern. Caution must be used when using any knowledge based information
to ensure it is relevant and applicable to the current situation
3.7 Risk Lists are usually lists of risks that have been found in similar municipalities and/or similar
situations. Caution must be used when using this type of information to ensure it is relevant and
applicable to the current situation.
3.8 Risk Trigger Questions are lists of situations or events in a particular area of a municipality
that can lead to risk identification. These are situations or areas where risks have been
discovered within the organization. These trigger questions may be grouped by areas such as
performance, cost, schedule, software, etc.
3.9 Lessons Learned is experiential knowledge that has been organized into information that
may be relevant to the different areas within the organization. This source of information may
guide you in identifying risk in your municipality. Caution must be used when using this type of
information to ensure it is relevant and applicable to the current situation.
3.10 Outputs from Risk-Oriented Analysis - There are various types of risk oriented
analysis. Two such techniques are fault tree analysis and event tree analysis. These are top
down analysis approaches that attempt to determine what events, conditions, or faults could lead
to a specific top level undesirable event. This event with the associated consequence could be a
risk for your program.
3.11 Historical Information is basically the same as documented knowledge. The difference is
that historical information is usually widely accepted as fact.
3.12 Engineering Templates are a set of flow charts for various aspects of the development
process. These templates are preliminary in nature and are intended as general guidance to
accomplish a top down assessment of activities.
10 | Page
Risk Management
by: Asif Masood Ahmad
those risks.
Risk identification starts with understanding the Institutional objectives, both implicit and
explicit. The risk identification process must identify unwanted events, undesirable outcomes,
emerging threats, as well as existing and emerging opportunities. By virtue of an Institution's
existence, risks will always prevail, whether the Institution has controls or not.
When identifying risks, it is also important to bear in mind that "risk" also has an opportunity
component. This means that there should also be a deliberate attention to identifying potential
opportunities that could be exploited to improve Institutional performance. In identifying risks,
consideration should be given to risks associated with not pursuing an opportunity, e.g. failure to
implement an IT system to collect municipal rates.
Risk identification exercise should not get bogged down in conceptual or theoretical detail. It
should also not limit itself to a fixed list of risk categories, although such a list may be helpful.
The following are key steps necessary to effectively identify risks from across the Institution:
11 | Page
Risk Management
by: Asif Masood Ahmad
The approach used will depend on the nature of the activities under review, types of risks,
the Institutional context, and the purpose of the risk management exercise.
Structured techniques such as flow charting, system design review, systems analysis,
Hazard and Operability (HAZOP) studies and operational modeling should be used where the
potential consequences are catastrophic and the use of such intensive techniques are cost
effective.
Since risk workshops are useful only for filtering and screening of possible risks, it is
important that the workshops are supplemented by more sophisticated or structured techniques
described above.
For less clearly defined situations, such as the identification of strategic risks, processes
with a more general structure, such as 'what-if' and scenario analysis could be used.
Where resources available for risk identification and analysis are constrained, the structure
and approach may have to be adapted to achieve efficient outcomes within budget limitations. For
example, where less time is available, a smaller number of key elements may be considered at a
higher level, or a checklist may be used.
4.4 Document the risks identified
The risks identified during the risk identification are typically documented in a risk register that,
includes (at this stage):
risk description;
how and why the risk can happen (i.e. causes and consequences); and
the existing internal controls that may reduce the likelihood or consequences of the risks.
It is essential when identifying a risk to consider the following three elements:
description/event - an occurrence or a particular set of circumstances;
causes - the factors that may contribute to a risk occurring or increase;
the likelihood of a risk occurring; and
consequences - the outcome(s) or impact(s) of an event.
It is the combination of these elements that make up a risk and this level of detail will enable an
Institution to better understand its risks.
4.5 Document your risk identification process
12 | Page
Risk Management
by: Asif Masood Ahmad
In addition to documenting identified risks, it is also necessary to document the risk identification
process to help guide future risk identification exercises and to ensure good practices are
maintained by drawing on lessons learned through previous exercises. Documentation of this
step should include:
Experience has shown that management often disregards well controlled risks when documenting
the risk profile of the Institution. It is stressed that a well-controlled risk must still be recorded in
the risk profile of the Institution. The reason for this logic is that the processes for identifying risks
should ignore at that point any mitigating factors (these will be considered when the risk is being
assessed).
It is a source of information to report the key risks throughout the Institution, as well as to key stakeholders.
Management uses the risk register to focus their priorities risks.
It is to help the auditors to focus their plans on the Institution's top risks.
the risk;
risk category;
how will the risk impact the Institution if it materializes "impact on Institution";
the existing internal controls that may minimize the likelihood of the risk occurring;
accountability for risk treatment (may be part of the risk treatment plan); and
13 | Page
Risk Management
by: Asif Masood Ahmad
2. Risk assessment
Businesses face many risks; therefore risk management should be a central part of any business'
strategic management.
Risk management helps you to identify and address the risks facing your business and in doing so
increase the likelihood of successfully achieving your businesses objectives.
A risk management process involves:
allows you to anticipate what may go wrong, minimizing the amount of fire-fighting you have to do
or, in a worst-case scenario, preventing a disaster or serious financial loss
significantly improves the probability that you will deliver your business plan on time and to budget
Risk management becomes even more important if your business decides to try something new,
for example launch a new product or enter new markets. Competitors following you into these
markets, or breakthroughs in technology which make your product redundant, are two risks you
may want to consider in cases such as these.
14 | Page
Risk Management
by: Asif Masood Ahmad
industries control risks and perform risk assessments on a continual basis. Methods for
assessment of risk may differ between industries and whether it pertains to general financial
decisions or environmental, ecological, or public health risk assessment.
Explanation
Risk assessment consists of an objective evaluation of risk in which assumptions and
uncertainties are clearly considered and presented. Part of the difficulty in risk management is that
measurement of both of the quantities in which risk assessment is concerned potential loss and
probability of occurrence can be very difficult to measure. The chance of error in measuring
these two concepts is high. Risk with a large potential loss and a low probability of occurrence, is
often treated differently from one with a low potential loss and a high likelihood of occurrence. In
theory, both are of near equal priority, but in practice it can be very difficult to manage when faced
with the scarcity of resources, especially time, in which to conduct the risk management process.
Expressed mathematically,
If the risk estimate takes into account information on the number of individuals exposed, it is
termed a "population risk" and is in units of expected increased cases per a time period. If the risk
15 | Page
Risk Management
by: Asif Masood Ahmad
estimate does not take into account the number of individuals exposed, it is termed an "individual
risk" and is in units of incidence rate per a time period. Population risks are of more use for
cost/benefit analysis; individual risks are of more use for evaluating whether risks to individuals
are "acceptable".
Risk Assessment?
Essential steps for performing a risk assessment
16 | Page
Risk Management
by: Asif Masood Ahmad
Operational risk assessment. Evaluation of the risk of loss (including risks to financial
performance and condition) resulting from inadequate or failed internal processes, people, and
systems, or from external events. In certain industries, regulators have imposed the requirement
that companies regularly identify and quantify their exposure to such risks. While responsibility for
managing the risk lies with the business, an independent function often acts in an advisory
capacity to help assess these risks.
Compliance risk assessment. Evaluation of risk factors relative to the organizations
compliance obligations, considering laws and regulations, policies and procedures, ethics and
business conduct standards, and contracts, as well as strategic voluntary standards and best
practices to which the organization has committed. This type of assessment is typically performed
by the compliance function with input from business areas.
Internal audit risk assessment. Evaluation of risks related to the value drivers of the
organization, covering strategic, financial, operational, and compliance objectives. The
assessment considers the impact of risks to shareholder value as a basis to define the audit plan
and monitor key risks. This top-down approach enables the coverage of internal audit activities to
be driven by issues that directly impact shareholder and customer value, with clear and explicit
linkage to strategic drivers for the organization.
Financial statement risk assessment. Evaluation of risks related to a material misstatement of
the organizations financial statements through input from various parties such as the controller,
internal audit, and operations. This evaluation, typically performed by the finance function,
considers the characteristics of the financial reporting elements (e.g., materiality and susceptibility
of the underlying accounts, transactions, or related support to material misstatement) and the
effectiveness of the key controls (e.g., likelihood that a control might fail to operate as intended,
and the resultant impact).
Fraud risk assessment. Evaluation of potential instances of fraud that could impact the
organizations ethics and compliance standards, business practice requirements, financial
reporting integrity, and other objectives. This is typically performed as part of Sarbanes-Oxley
compliance or during a broader organization-wide risk assessment, and involves subject matter
experts from key business functions where fraud could occur (e.g., procurement, accounting, and
sales) as well as forensic specialists.
Market risk assessment. Evaluation of market movements that could affect the organizations
performance or risk exposure, considering interest rate risk, currency risk, option risk, and
commodity risk. This is typically performed by market risk specialists.
Credit risk assessment. Evaluation of the potential that a borrower or counterparty will fail to
meet its obligations in accordance with agreed terms. This considers credit risk inherent to the
entire portfolio as well as the risk in individual credits or transactions, and is typically performed by
credit risk specialists.
Customer risk assessment. Evaluation of the risk profile of customers that could potentially
impact the organizations reputation and financial position. This assessment weighs the
customers intent, creditworthiness, affiliations, and other relevant factors. This is typically
performed by account managers, using a common set of criteria and a central repository for the
assessment data.
17 | Page
Risk Management
by: Asif Masood Ahmad
Supply chain risk assessment. Evaluation of the risks associated with identifying the inputs
and logistics needed to support the creation of products and services, including selection and
management of suppliers (e.g., up-front due diligence to qualify the supplier, and ongoing quality
assurance reviews to assess any changes that could impact the achievement of the organizations
business objectives).
Small sub-populations
When risks apply mainly to small sub-populations, there is uncertainty at which point intervention
is necessary. For example, there may be a risk that is very low for everyone, other than 0.1% of
the population. It is necessary to determine whether this 0.1% is represented by:
18 | Page
Risk Management
by: Asif Masood Ahmad
If the risk is higher for a particular sub-population because of abnormal exposure rather than
susceptibility, strategies to further reduce the exposure of that subgroup are considered. If an
identifiable sub-population is more susceptible due to inherent genetic or other factors, public
policy choices must be made. The choices are:
to set policies for protecting the general population that are protective of such groups, e.g. for
children when data exists, the Clean Air Act for populations such as asthmatics or
not to set policies, because the group is too small, or the costs too high.
19 | Page
Risk Management
by: Asif Masood Ahmad
than 1 in a million over a lifetime. The US Environmental Protection Agency provides basic
information about environmental risk assessments for the public via its risk assessment
portal. The Stockholm Convention on persistent organic pollutants (POPs) supports a qualitative
risk framework for public health protection from chemicals that display environmental and
biological persistence, bioaccumulation, toxicity (PBT) and long range transport; most global
chemicals that meet this criteria have been previously assessed quantitatively by national and
international health agencies.
In auditing
For audits performed by an outside audit firm, risk assessment is a very crucial stage before
accepting an audit engagement. According to ISA315 Understanding the Entity and its
Environment and Assessing the Risks of Material Misstatement, "the auditor should perform risk
assessment procedures to obtain an understanding of the entity and its environment, including its
internal control. Evidence relating to the auditors risk assessment of a material misstatement in
the clients financial statements. Then, the auditor obtains initial evidence regarding the classes of
transactions at the client and the operating effectiveness of the clients internal controls. In
auditing, audit risk is defined as the risk that the auditor will issue a clean unmodified opinion
regarding the financial statements, when in fact the financial statements are materially misstated,
and therefor do not qualify for a clean unmodified opinion. As a formula, audit risk is the product of
two other risks: Risk of Material Misstatement and Detection risk. This formula can be further
broken down as follows: (inherent risk X control risk X detection risk).
Human health
There are many resources that provide health risk information.
The National Library of Medicine provides risk assessment and regulation information tools for a
varied audience. These include:
The United States Environmental Protection Agency provides basic information about
environmental risk assessments for the public.
In information security
IT risk assessment can be performed by a qualitative or quantitative approach, following different
methodologies.
20 | Page
Risk Management
by: Asif Masood Ahmad
In project management
In project management, risk assessment is an integral part of the risk management plan, studying
the probability, the impact, and the effect of every known risk on the project, as well as the
corrective action to take should that risk occur. Of special consideration in this area is the relevant
codes of practice that are enforce in the specific jurisdiction. Understanding the regime of
regulations that risk management must abide by is integral to formulating safe and compliant risk
assessment practices.
For megaprojects
Megaprojects (sometimes also called "major programs") are extremely large-scale investment
projects, typically costing more than US$1 billion per project. Megaprojects include bridges,
tunnels, highways, railways, airports, seaports, power plants, dams, wastewater projects, coastal
flood protection, oil and natural gas extraction projects, public buildings, information technology
systems, aerospace projects, and defence systems. Megaprojects have been shown to be
particularly risky in terms of finance, safety, and social and environmental impacts.
In software evolution
Studies have shown that early parts of the system development cycle such as requirements and
design specifications are especially prone to error. This effect is particularly notorious in projects
involving multiple stakeholders with different points of view. Evolutionary software processes offer
an iterative approach to requirement engineering to alleviate the problems of uncertainty,
ambiguity and inconsistency inherent in software developments.
In shipping industry
In July 2010, shipping companies agreed to use standardized procedures in order to assess risk
in key shipboard operations. These procedures were implemented as part of the amended ISM
code.
3. Risk Prioritization
21 | Page
Risk Management
by: Asif Masood Ahmad
how likely it is that a hazard will cause harm (e.g. whether it is improbable, possible but not
very likely, probable, or inevitable over time)
how serious that harm is likely to be (e.g. resulting in minor damage, a non-injury incident,
a minor injury (bruise, laceration), a serious injury (fracture, amputation, chronic ill-health), a
fatality, or a multiple-fatality)
Evaluate Risk
In the risk analysis stage, each risk has been assigned a level based on likelihood and
consequences. The purpose of evaluation is to compare the levels of risk and decide whether the
level of each risk is acceptable or not. There may also be a number of risks that fall into the same
level where each of them would not be treated equally.
In determining whether a risk is acceptable or not, the evaluation would take into account a
number of factors:
How does the level of each risk (from the analysis step in 'Analyse risks') stand up
against the level of acceptable risk in 'About establishing the context'?
Is the level of the risk so low that treatment is not appropriate? (As Low As
Reasonably Practicable - ALARP)
Do the opportunities outweigh the threats to such a degree that the risk is justified?
22 | Page
Risk Management
by: Asif Masood Ahmad
If the risk is not acceptable, then the risk assessment process would continue to determine
appropriate treatment options in order that the risk is reduced to As Low as Reasonably
Practicable (ALARP).
Level of risk
Severe risk
High risk
Major risk
Low risk
Trivial risk
risk is negligible and can be accepted without specific treatment other than
monitoring
risk is intolerable and the activity must cease, unless risk can be reduced.
Between these levels is a region where costs and benefits are taken into account. When risk is
close to the intolerable level the expectation is that risk will be reduced unless the cost of reducing
the risk is grossly disproportionate to the benefits gained. Where risks are close to the negligible
level then action may only be taken to reduce risk where benefits exceed the costs of reduction.
23 | Page
Risk Management
by: Asif Masood Ahmad
Prioritizing Risk
Once the level of risk has been determined for each risk, this information can be entered onto a
risk register showing the level of risks. The evaluation will decide the risk priority, showing which
risk must be managed first in order to reduce the exposure of the organisation to serious loss. Of
course, small or insignificant risks might be treated immediately where it would be quick and / or
low cost to do so.
Once the priority is determined and risks are to be treated, those will then be included on a risk
treatment schedule where they can be tracked until the risks are treated.
Risk Register
Risk Register Definition
A Risk Register, also referred to as a Risk Log, is a master document which is created during the early
stages of your project. It is a tool that plays an important part in your Risk Management Plan, helping
you to track issues and address problems as they arise.
The Risk Register will generally be shared between project stakeholders, allowing those involved in
the project to be kept aware of issues and providing a means of tracking the response to issues. It can
be used to flag new project risks and to make suggestions on what course of action to take to resolve
any issues.
All corporate and organizational projects face risk at one time or another. Having a Risk Register in
place simply provides a better means of responding to problems as they arise. The Risk Register is
there to help with the decisions making process and enables managers and project stakeholders to
handle risk in the most appropriate way. A risk needn't be a threat to your project, it is simply an issue
that can arise during the project; if effectively managed, it shouldn't prevent your project from attaining
its goals and objectives. The Risk Register is a document that contains information about identified
project risks, analysis of risk severity and evaluations of the possible solutions to be applied.
24 | Page
Risk Management
by: Asif Masood Ahmad
Presenting this in a spreadsheet if often the easiest way to manage things, so that key information can
be found and applied quickly and easily.
25 | Page
Risk Management
by: Asif Masood Ahmad
Qualitative Rating
Risk Risk
Category
Risk Response
Risk
Ranking
Risk
Response
Trigger Risk
Owner
Serious injury
Risk Matrix
A Risk Matrix is a matrix that is used during Risk Assessment to define the various levels of risk
as the product of the harm probability categories and harm severity categories. This is a simple
mechanism to increase visibility of risks and assist management decision making.
Although many standard risk matrices exist in different contexts (US DoD, NASA, ISO), individual
projects and organizations may need to create their own or tailor an existing risk matrix.
26 | Page
Risk Management
by: Asif Masood Ahmad
The matrix below is adapted from the Risk Management Standard. It can be used to record a
priority rating for each risk identified in the risk audit. Each risk identified must be evaluated in
terms of:
A risk exposure that has both a high likelihood and a high severity of consequence should be
given the greatest consideration for elimination or control. A risk that is both low in likelihood and
low in severity can easily be retained and self-funded.
If an evaluation of a risk gives rise to a rating of "Extreme", it must be dealt with straight away.
Legend
Extreme Risk
High Risk
Moderate Risk
Low Risk
27 | Page
Risk Management
by: Asif Masood Ahmad
28 | Page
Risk Management
by: Asif Masood Ahmad
identified risks, identifying new risks, and evaluating risk process effectiveness throughout the
project.
Background
Risk mitigation planning, implementation, and progress monitoring are depicted in Figure 1. As
part of an iterative process, the risk tracking tool is used to record the results of risk prioritization
analysis (step 3) that provides input to both risk mitigation (step 4) and risk impact assessment
(step 2).
29 | Page
Risk Management
by: Asif Masood Ahmad
Watch/Monitor: Monitor the environment for changes that affect the nature and/or
the impact of the risk.
Each of these options requires developing a plan that is implemented and monitored for
effectiveness. More information on handling options is discussed under best practices and lessons
learned below.
From a systems engineering perspective, common methods of risk reduction or mitigation with
identified program risks include the following, listed in order of increasing seriousness of the risk:
1.
2.
3.
4.
5.
6.
30 | Page
Risk Management
by: Asif Masood Ahmad
When determining the method for risk mitigation, the MITRE SE can help the customer assess the
performance, schedule, and cost impacts of one mitigation strategy over another. For something
like "parallel" development mitigation, MITRE SEs could help the government determine whether
the cost could more than double, while time might not be extended by much (e.g., double the cost
for parallel effort, but also added cost for additional program office and user engagement). For
conducting rapid prototyping or changing operational requirements, MITRE SEs can use
knowledge in creating prototypes and using prototyping and experimenting (see SE Guide article
on Special Considerations for Conditions of Uncertainty: Prototyping and Experimentation and
the Requirements Engineering topic) for projecting the cost and time to conduct a prototype to
help mitigate particular risks (e.g., requirements). Implementing more engineering reviews and
special oversight and testing may require changes to contractual agreements. MITRE systems
engineers can help the government assess these (schedule and cost) by helping determine the
basis of estimates for additional contractor efforts and providing a reality check for these
estimates. MITRE's CASA [Center for Acquisition and Systems Analysis] and the CCG [Center for
Connected Government] Investment Management practice department have experience and a
knowledge base in many development activities across a wide spectrum of methods and can help
with realistic assessments of mitigation alternatives.
For related information, refer to the other articles in this Risk Management topic area of the SE
Guide.
Best Practices and Lessons Learned
What actions are needed?
When must actions be completed?
Handling Options
o
Assume/Accept. Collaborate with the operational users to create a collective
understanding of risks and their implications. Risks can be characterized as
impacting traditional cost, schedule, and performance parameters. Risks should also
be characterized as impact to mission performance resulting from reduced technical
performance or capability. Develop an understanding of all these impacts. Bringing
users into the mission impact characterization is particularly important to selecting
which "assume/accept" option is ultimately chosen. Users will decide whether
accepting the consequences of a risk is acceptable. Provide the users with the
vulnerabilities affecting a risk, countermeasures that can be performed, and residual
risk that may occur. Help the users understand the costs in terms of time and
money.
o
Avoid. Again, work with users to achieve a collective understanding of the
implications of risks. Provide users with projections of schedule adjustments needed
to reduce risk associated with technology maturity or additional development to
improve performance. Identify capabilities that will be delayed and any impacts
resulting from dependencies on other efforts. This information better enables users
to interpret the operational implications of an "avoid" option.
o
Control. Help control risks by performing analyses of various mitigation
options. For example, one option is to use a commercially available capability
instead of a contractor developed one. In developing options for controlling risk in
31 | Page
Risk Management
by: Asif Masood Ahmad
your program, seek out potential solutions from similar risk situations of other MITRE
customers, industry, and academia. When considering a solution from another
organization, take special care in assessing any architectural changes needed and
their implications.
o
Transfer. Reassigning accountability, responsibility, or authority for a risk area
to another organization can be a double-edged sword. It may make sense when the
risk involves a narrow specialized area of expertise not normally found in program
offices. But, transferring a risk to another organization can result in dependencies
and loss of control that may have their own complications. Position yourself and your
customer to consider a transfer option by acquiring and maintaining awareness of
organizations within your customer space that focus on specialized needs and their
solutions. Acquire this awareness as early in the program acquisition cycle as
possible, when transfer options are more easily implemented.
o
Watch/Monitor. Once a risk has been identified and a plan put in place to
manage it, there can be a tendency to adopt a "heads down" attitude, particularly if
the execution of the mitigation appears to be operating on "cruise control." Resist
that inclination. Periodically revisit the basic assumptions and premises of the risk.
Scan the environment to see whether the situation has changed in a way that affects
the nature or impact of the risk. The risk may have changed sufficiently so that the
current mitigation is ineffective and needs to be scrapped in favor of a different one.
On the other hand, the risk may have diminished in a way that allows resources
devoted to it to be redirected.
Determining Mitigation Plans
o
Understand the users and their needs. The users/operational decision makers
will be the decision authority for accepting and avoiding risks. Maintain a close
relationship with the user community throughout the system engineering life cycle.
Realize that mission accomplishment is paramount to the user community and
acceptance of residual risk should be firmly rooted in a mission decision.
o
Seek out the experts and use them. Seek out the experts within and outside
MITRE. MITRE's technical centers exist to provide support in their specialty areas.
They understand what's feasible, what's worked and been implemented, what's
easy, and what's hard. They have the knowledge and experience essential to risk
assessment in their area of expertise. Know our internal centers of excellence,
cultivate relationships with them, and know when and how to use them.
o
Recognize risks that recur. Identify and maintain awareness of the risks that
are "always there" interfaces, dependencies, changes in needs, environment and
requirements, information security, and gaps or holes in contractor and program
office skill sets. Help create an acceptance by the government that these risks will
occur and recur and that plans for mitigation are needed up front. Recommend
various mitigation approaches including adoption of an evolution strategy,
prototyping, experimentation, engagement with broader stakeholder community, and
the like.
o
Encourage risk taking. Given all that has been said in this article and its
companions, this may appear to be an odd piece of advice. The point is that there
are consequences of not taking risks, some of which may be negative. Help the
customer and users understand that reality and the potential consequences of being
32 | Page
Risk Management
by: Asif Masood Ahmad
overly timid and not taking certain risks in your program. An example of a negative
consequence for not taking a risk when delivering a full capability is that an
adversary might realize a gain against our operational users. Risks are not defeats,
but simply bumps in the road that need to be anticipated and dealt with.
o
Recognize opportunities. Help the government understand and see
opportunities that may arise from a risk. When considering alternatives for managing
a particular risk, be sure to assess whether they provide an opportunistic advantage
by improving performance, capacity, flexibility, or desirable attributes in other areas
not directly associated with the risk.
o
Encourage deliberate consideration of mitigation options. This piece of advice
is good anytime, but particularly when supporting a fast-paced, quick reaction
government program that is juggling many competing priorities. Carefully analyze
mitigation options and encourage thorough discussion by the program team. This is
the form of the wisdom "go slow to go fast."
o
Not all risks require mitigation plans. Risk events assessed as medium or
high criticality should go into risk mitigation planning and implementation. On the
other hand, consider whether some low criticality risks might just be tracked and
monitored on a watch list. Husband your risk-related resources.
Mitigation Plan Content
o
Determine the appropriate risk manager. The risk manager is responsible for
identifying and implementing the risk mitigation plan. He or she must have the
knowledge, authority, and resources to implement the plan. Risk mitigation activities
will not be effective without an engaged risk manager. It may be necessary to
engage higher levels in the customer organization to ensure the need for the risk
manager is addressed. This can be difficult and usually involves engaging more
senior levels of the MITRE team as well.
o
Develop a high-level mitigation strategy. This is an overall approach to reduce
the risk impact severity and/or probability of occurrence. It could affect a number of
risks and include, for example, increasing staffing or reducing scope.
o
Identify actions and steps needed to implement the mitigation strategy. Ask
these key questions:
What actions are needed?
o
Make sure you have the right exit criteria for each. For example, appropriate
decisions, agreements, and actions resulting from a meeting would be required for
exit, not merely the fact that the meeting was held.
o
Look for evaluation, proof, and validation of met criteria. Consider, for
example, metrics or test events.
o
Include only and all stakeholders relevant to the step, action, or decisions.
When must actions be completed?
o
Backward Planning: Evaluate the risk impact and schedule of need for the
successful completion of the program and evaluate test events, design
considerations, and more.
o
Forward Planning: Determine the time needed to complete each action step
and when the expected completion date should be.
o
Evaluate key decision points and determine when a move to a contingency
plan should be taken.
33 | Page
Risk Management
by: Asif Masood Ahmad
Develop a contingency plan ("fall back, plan B") for any high risk.
o
Are cues and triggers identified to activate contingency plans and risk
reviews?
o
Include decision point dates to move to fallback plans. The date to move must
allow time to
execute the contingency plan.
Evaluate the status of each action. Determine when each action is expected to be
completed successfully.
Integrate plans into IMS and program management baselines. Risk plans are
integral to the program, not something apart from it.
5.
34 | Page
Risk Management
by: Asif Masood Ahmad
Monitoring and review should be a planned part of the risk management process and involve
regular checking or surveillance. The results should be recorded and reported externally and
internally, as appropriate. The results should also be an input to the review and continuous
improvement of the firm's risk management framework.
Responsibilities for monitoring and review should be clearly defined. The firm's monitoring and
review processes should encompass all aspects of the risk management process for the purposes
of:
Ensuring that controls are effective and efficient in both design and operation
Obtaining further information to improve risk assessment
Analysing and learning lessons from risk events, including near-misses, changes, trends,
successes and failures
Detecting changes in the external and internal context, including changes to risk criteria
and to the risks, which may require revision of risk treatments and priorities
35 | Page
Risk Management
by: Asif Masood Ahmad
Method
Status
OPEN
Monthly review at
Practitioner/Partner meeting
Loss of Practitioner
OPEN
Risk Reporting
The communication of risk information in all phases of the risk management process, namely
identification, measurement, management and monitoring. Risk reporting includes at least the
reporting of: aggregate exposures against targets/strategies; key issues for the key issues control
log; compliance with limit system; key risk indicators; and review findings.
Detailed information about the risk at individual level and at portfolio level are required to manage
effectively. It is also the task of risk reporting, an independent unit of the market division, to
consolidate and process the information related to risk controlling and to aggregate it into a risk
report covering the following four areas:
1. The report has to show the development of the total portfolio and sub-portfolios in terms of risk;
furthermore, important individual positions have to be elaborated on.
2. The report must foster the need for action, that is mainly risk mitigation measures, resulting from
the assessment of future market trends, the coordination with risk-bearing capacity and risk
strategy, as well as findings from analyzing the competition
3. The risk report has to explain how the measures will affect the institutions risk situation and
what the deadline for the implementation of the measures is.
4. The risk report must summarize the efficiency of risk identification, assessment and control, by
disclosing weak/problematic points to be processed in the future and a short term guideline for
concerns to be under the internal audit attention.
The risk department/sector prepares the risk report and submits it to the risk committee. The
reports level of detail has to be adapted to the information required by the recipient in each case.
This would require an analysis as to the needs of the respective decision-making levels, resulting
in the preparation of reports in accordance with those needs. In its final version, the credit risk
report should contain all levels of detail to ensure that the data communicated within the bank are
consistently available for all levels of detail should those data be required in the decision-making
process.
36 | Page
Risk Management
by: Asif Masood Ahmad
37 | Page
Risk Management
by: Asif Masood Ahmad
2. Identifying Risks: This includes the documentation of the material threats to the
organizations achievement of its objectives and the representation of areas that the
organization may exploit for competitive advantage.
3. Analyzing/Quantifying Risks: This includes the calibration and, if possible, creation of
probability distributions of outcomes for each material risk.
4. Integrating Risks: This includes the aggregation of all risk distributions, reflecting
correlations and portfolio effects, and the formulation of the results in terms of impact on the
organizations key performance metrics.
5. Assessing/Prioritizing Risks: This includes the determination of the contribution of each
risk to the aggregate risk profile, and appropriate prioritization.
6. Treating/Exploiting Risks: This includes the development of strategies for controlling and
exploiting the various risks.
7. Monitoring and Reviewing: This includes the continual measurement and monitoring of
the risk environment and the performance of the risk management strategies.
The model was published by the Risk and Insurance Management society and developed with the
support of co-developer Steven Minsky, CEO of Logic Manager. The Risk Maturity Model is based
on the Capability Maturity Model, a methodology founded by the Carnegie Mellon University
Software Engineering Institute (SEI) in the 1980s.
38 | Page
Risk Management
by: Asif Masood Ahmad
applied in strategy setting and across the enterprise, designed to identify potential events that may
affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance
regarding the achievement of entity objectives."
The COSO ERM Framework has eight Components and four objectives categories. It is an
expansion of the COSO Internal Control-Integrated Framework published in 1992 and amended in
1994. The eight components are:
Internal Environment
Objective Setting
Event Identification
Risk Assessment
Risk Response
Control Activities
Monitoring
Strategy - high-level goals, aligned with and supporting the organization's mission
39 | Page
Risk Management
by: Asif Masood Ahmad
to go beyond financial controls, and to consider control within the context of both the public and
private sectors. The outcome of those considerations, Guidance on Control, identifies 20 criteria of
control (CoCo) to help accountants and auditors make judgments about the effectiveness of
control.
Power is traditionally viewed in terms of getting one's way, despite resistance. Control is then
conceived of in terms of organizations realizing their objectives. While there is merit in this twopronged view, it neglects two important features of power. First, by ignoring how authority is
achieved, the view of control as the authorized power to achieve objectives fails to examine the
legitimacy of those in authority and how their power is sustained. The traditional view of power
confuses power, control and authority, thereby failing to ask why those in authority should have
the ability to determine the objectives of the organization. Second, by emphasizing overt
resistance (often in a form where those resisting authority are typically seen as uninformed or
mistaken), it fails to recognize that power is often most effective when it shapes people's interests
and there is no resistance. For example, the power of language (including the language of
accounting) rests in influencing the way people think, and what they see as problems and possible
solutions.
Guidance on Control classifies the criteria of control under four headings: (1) purpose, (2)
commitment, (3) capability, and (4) monitoring and learning. For each of those headings, we offer
a comparison of CoCo's basic assumptions to research findings, particularly those related to the
interrelation between power and control.