Describe a six step process designed to produce and maintain a comprehensive identification and initial assessment of the risks faced by a business.
What are the benefits of risk identification and assessment?
Outline necessary conditions to gain benefits from risk identification and assessment.
Outline six tools used in the risk identification process.
Stage a potential advantage and disadvantage of each of the six risk identification tools.
They all provide a clear structure for the risk identification process. This may improve the quality of the output, but the result may still not be comprehensive.
Outline techniques used in the risk identification process. Provide a disadvantage of each technique.
Brainstorming - gather a group of people together and generate ideas in a freeform way. Often facilitated by an external consultant, this requires all participants to be in the same room at the same time.
D: Poorly run sessions run the risk of convergent thinking or incomplete or biased identification of risks. Diversity of participants should exist to counter this.
Independent group analysis - each risk is presented by a member of the group and then discussed by the group. An agreed list of risks is ranked independently by each member and combined to form an overall ranking.
D: An unbalanced group (e.g. all marketing execs) could provide a biased list of risks and rankings.
Surveys - rather than gathering people together, using online or postal surveys can generate a wide range of ideas cheaply and without collusion of participants.
D: The risk of framing, whereby the way the question is asked influence responses.
Surveys also suffer from poor response rates,
The quality of the survey is only as good as the quality of design and response data. Multi-choice surveys are easier to analyse but limit the range of responses.
Gap analysis - particular type of questionnaire designed to identify the company’s current and desired risk exposures. Although the board is best placed to identify desired risk exposures, line management may be best placed to identify current risk exposures.
D: May be difficult and costly to engage the board and line management in such an exercise consistently.
Delphi technique - structured communication technique where questions are answered in two or more rounds. After each round a facilitator provides a summary of the output from the previous round as well as reasons for this judgement. Participants then revise their answers in light of the reply, in the hope that the range of answers will decrease and the group will converge to a common consensus.
D: Time consuming and therefore costly, especially if an external facilitator is required.
Interviews - individuals are interviewed and results collated, normally by an independent, external reviewer.
D: Can be time-consuming, leading to restrictions on the number of interviews that can be conducted. Involving multiple interviewers can lead to inconsistencies.
Working groups - small number of interested individuals are tasked with considering a specific risk or group of risks.
D: If members are specialists, as is normal, then identification can be narrow rather than comprehensive. Specialists may also work at a higher level of precision than is cost justified.
Describe the key elements of a risk register.
Outline the seven risk concepts
Outline initial risk assessment techniques for likelihood/severity.
Categorisation - decide whether the probability of an event occurring falls within some pre-set categories. Number of categories defined depends upon the level of accuracy required and the extent to which they can be accurately estimated. e.g. 0-25/25-50, low/medium/high
Probability distribution - specify a probability distribution for certain events. Maximal data will allow fairly sophisticated distributions e.g. exponential, while minimal data will allow simple distributions e.g. triangular or uniform.
Risk mapping - technique used to illustrate the effect a risk might have on an organisation. Each risk is plotted on a graph known as a risk map, with axes measuring the likelihood and severity of risks. It is important to include all risks faced by the whole enterprise and bring them together on a consistent basis for a fully comprehensive risk map.
What are emerging risks, and why are they so important?
Emerging risks are developing or already known risks which are subject to uncertainty and ambiguity and are therefore difficult to quantify using traditional risk assessment techniques. It can represent a change in nature of an existing or known risk, or the development of a new risk.
They are important since knowledge of these risks will influence corporate strategy, may affect the profitability of the organisation, and may yield opportunities for a new product.
Outline four key inter-related trends that give rise to RM challenges.
Give examples of potential emerging risks in the current environment.
Outline cyber risk.
Any risk of financial loss, disruption or damage to the reputation of an organisation from some sort of failure in its information technology systems.
Risks include hacking, security breaches, espionage, data theft, extortion, privacy breaches and cyber terrorism.
Implications can include business interruption, reputational damage and legal liability, with associated costs of communication, resolution, compensation, loss of business and possibly fines and legal costs.
Controls include having strong IT security, including firewalls and malware protection, clear policies and governance for users, and incident management processes. It may be possible to purchase cyber insurance to cover losses relating to damage to, or loss of information from, IT systems and networks.
Outline key factors in the identification and analysis of emerging trends.
How might bias arise?
How and why may bias be introduced into project appraisal?
Often due to a less than optimal culture, bias can arise in project appraisal, for example, where project champions may tend to minimise the risks in hoping of getting a project approved.
Other ways include:
- insufficient care devoted to identification and analysis of risk
- key risks accidentally or deliberately omitted
- incorrect assumptions that risks are independent of one another which may have concealed a chain reaction of events
- likelihood of disasters occurring in the future underestimated due to inadequate past experience
- cashflows may have been guessed or deliberately biased towards optimism
- insufficient account may have been taken of future ups and downs of the economic cycle
- risks associated with new technologies may have been given inadequate attention
- not all effects of a project’s sponsors other business may have been considered
- credit may have been taken for benefits not directly attributed to the project
- assumptions on which estimates are based may not correspond with senior management’s view on the world
- arithmetic or spreadsheets may contain errors that lead to substantially incorrect evaluation, or there may be failures of logic in building the model.
Describe three types of behavioural biases.
Outline ways in which bias is avoided.