List four important corporate governance roles with risk
DMCC
List four Business Risks
List four Governance Risks
SIPP
1.Structure – from boards and steering groups to business models and policy frameworks.
2. Processes – from new product processes and communication channels to operations, strategic planning and risk appetite.
3. Information – from financial performance and audit reporting to management, risk and compliance reporting.
4. People and culture – from leadership at the top to accountability and transparency throughout the organisation, including relationships with regulators.
What are the three main types of Internal Controls
What are the five stages for the development of a Risk Management System
DARM-R
List the six categories of risk used for purpose of identification
What is the formula to calculate a risk assessment
Risk Assessment = Likelihood Rating X Impact Rating
List 5 benefits of a risk management system?
OMPVC
What are examples of Corporate Governance roles within Risk
List 4 benefits of a company having a risk committee
What is the recommended constitution for a Risk Committee?
Provide five functions of a Risk Committee
List 5 tasks of Internal Audit
What are five benefits of an internal Audit function
List five areas of illicit activity is a whistleblowing policy designed to uncover?
What are the six procedures for the introduction of a whistleblowing procedure
PPPPRM
1.Identify purpose, scope and coverage
2.Develop procedures for reporting a matter
3.Develop process for dealing with, ensuring anonymity and protection of the whistleblower, whilst ensuring ongoing communication
4.Create policy and circulate throughout company
5.Provide reports to to the board (or audit committee)?
6.Ongoing monitoring of procedure
Define Risk
the effective of uncertainty on objectives, whether positive or negative.’
International Standard ISO31000
Risk refers to the possibility that something unexpected or not planned for will happen.
How should you respond to Risk?
ARTA
1. Avoidance: responses which reduce the likelihood of the risk occurring. This usually means that the organisation shuts down or sells that part of the business that is causing the risk.
2. Reduction: responses that reduce the negative impact or take advantage of opportunities for positive impact.
3. Transfer: responses that transfer the risk somewhere else.
5. Acceptance: responses that retain the risk because it is deemed to be not a significant threat or the organisation has no control over it.
What the ways to identify risk?
What Steps should you put in place for a disaster recovery plan?
Identifying the team of employees who are responsible for dealing with
the breach and for putting the disaster recovery plan in place.
Identifying the key company operations that are reliant on IT systems and which are essential to the company’s business continuity.
Having a back-up IT system which is ring-fenced and could operate as a replacement whilst the IT systems are down and considering how and where employees will be able to access that system.
Setting out the process for identifying the source and impact of the cyber-attack and how it can be halted or contained.
Setting out immediate steps that are needed to control and contain the
incident in the first 24 hours.
Setting out the longer-term steps needed to respond to the incident.
Procedures and protocols for immediate and on-going internal communications to relevant stakeholders
What Steps should you put in place for a disaster recovery plan?
Identifying the team of employees who are responsible for dealing with
the breach and for putting the disaster recovery plan in place.
Identifying the key company operations that are reliant on IT systems and which are essential to the company’s business continuity.
Having a back-up IT system which is ring-fenced and could operate as a replacement whilst the IT systems are down and considering how and where employees will be able to access that system.
Setting out the process for identifying the source and impact of the cyber-attack and how it can be halted or contained.
Setting out immediate steps that are needed to control and contain the
incident in the first 24 hours.
Setting out the longer-term steps needed to respond to the incident.
Procedures and protocols for immediate and on-going internal communications to relevant stakeholders
What Steps should you put in place for a disaster recovery plan?
Identifying the team of employees who are responsible for dealing with
the breach and for putting the disaster recovery plan in place.
Identifying the key company operations that are reliant on IT systems and which are essential to the company’s business continuity.
Having a back-up IT system which is ring-fenced and could operate as a replacement whilst the IT systems are down and considering how and where employees will be able to access that system.
Setting out the process for identifying the source and impact of the cyber-attack and how it can be halted or contained.
Setting out immediate steps that are needed to control and contain the
incident in the first 24 hours.
Setting out the longer-term steps needed to respond to the incident.
Procedures and protocols for immediate and on-going internal communications to relevant stakeholders