CHAPTER 14

OPERATIONAL RISK MANAGEMENT (ORM) BEST PRACTICES

Anthony Tarantino, PhD

14.1 INTRODUCTION

14.2 DEFINING OPERATIONAL RISK

14.3 TONE AT THE TOP AND CORPORATE CULTURE

14.4 DOCUMENTATION

14.5 POLICIES AND PROCEDURES

14.6 INDEPENDENT AUDIT

(a) Business Resiliency Planning (BRP)

14.7 MANAGEMENT OVERSIGHT

14.1 INTRODUCTION

Risk and opportunity go hand in hand—two sides of the same coin. There are risks in all activities, and opportunities always come with inherent risks. It is not possible to completely eliminate risks. The goal is to identify, manage, and mitigate risks, and do so in a cost-effective manner. Operational risk is caused by the failure of internal controls over people, process, technology, and external events. It can include a wide variety of problems: external fraud, internal fraud, inadvertent errors, technology failures, incorrect data entry, natural disasters, regulatory changes, terrorism, and so on.

Interest in operational risk management (ORM) best practices will continue to grow in importance as organizations realize the limitations of the Committee of Sponsoring Organizations (COSO) framework, which lacks a means to measure and quantify risk. The 1992 COSO framework was updated in 2004 with Enterprise Risk Management (ERM), also know as COSO II. ERM would appear on the surface to have addressed operational risk, but falls short in not providing a means to quantify and measure risk. Both COSO I and II provide only a simple pass-fail evaluation of risk. ...

Get Governance, Risk, and Compliance Handbook: Technology, Finance, Environmental, and International Guidance and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.