SlideShare a Scribd company logo
1 of 45
Page 1
Risk Management in BankingRisk Management in Banking
Page 2
An Introduction to RiskAn Introduction to Risk
Risk Management is the process ofRisk Management is the process of
measuring or assessing the actual ormeasuring or assessing the actual or
potential dangers of a particularpotential dangers of a particular
situation.situation.
Page 3
Risk Has Two ComponentsRisk Has Two Components
 Uncertainty.Uncertainty.
 Exposure.Exposure.
Page 4
Types of RiskTypes of Risk
 Operational.Operational.
 Credit.Credit.
 Reputational.Reputational.
Page 5
Operational RiskOperational Risk
The risk of loss resulting fromThe risk of loss resulting from
inadequate or failed internal processes,inadequate or failed internal processes,
people and systems, or from externalpeople and systems, or from external
events.events.
Page 6
Operational Risks IncludeOperational Risks Include
 Internal Fraud.Internal Fraud.
 External Fraud.External Fraud.
 Employment Practices and Workplace Safety.Employment Practices and Workplace Safety.
 Clients, Products and Business Practices.Clients, Products and Business Practices.
 Damage to Physical Assets.Damage to Physical Assets.
 Business Disruption and System Failures.Business Disruption and System Failures.
 Execution, Delivery and Process Management.Execution, Delivery and Process Management.
Page 7
Internal FraudInternal Fraud
 Unauthorized Activity.Unauthorized Activity.
 Transactions not reported.Transactions not reported.
 Transaction type unauthorized.Transaction type unauthorized.
 Mismarking of position.Mismarking of position.
 Theft and Fraud.Theft and Fraud.
 Fraud/credit fraud/worthless deposits.Fraud/credit fraud/worthless deposits.
 Theft/extortion/embezzlement/robbery.Theft/extortion/embezzlement/robbery.
 Misappropriation of assets.Misappropriation of assets.
 Forgery.Forgery.
 Account take-over/impersonation.Account take-over/impersonation.
 Bribes/kickbacks.Bribes/kickbacks.
 Insider trading.Insider trading.
 Money laundering.Money laundering.
 Willful blindness.Willful blindness.
Page 8
External FraudExternal Fraud
 Theft and Fraud.Theft and Fraud.
 Theft/robbery.Theft/robbery.
 Forgery.Forgery.
 Check kiting.Check kiting.
 Identity theft.Identity theft.
 Elder financial abuse.Elder financial abuse.
 Systems Security.Systems Security.
 Hacking damage.Hacking damage.
 Theft of information (with monetary loss).Theft of information (with monetary loss).
Page 9
Employment Practices and WorkplaceEmployment Practices and Workplace
SafetySafety
 Employee Relations.Employee Relations.
 Compensation, benefit, termination issues.Compensation, benefit, termination issues.
 Organized labor issues.Organized labor issues.
 Safe Environment.Safe Environment.
 General liability (slips and falls).General liability (slips and falls).
 Employee health and safety rules.Employee health and safety rules.
 Workers’ compensation.Workers’ compensation.
 Diversity and Discrimination.Diversity and Discrimination.
 All discrimination types.All discrimination types.
 Harassment.Harassment.
 Equal Employment Opportunity (EEO).Equal Employment Opportunity (EEO).
Page 10
Clients, Products and Business PracticesClients, Products and Business Practices
 Suitability, Disclosure and Fiduciary.Suitability, Disclosure and Fiduciary.
 Fiduciary breaches/guideline violations.Fiduciary breaches/guideline violations.
 Suitability/disclosure issues.Suitability/disclosure issues.
 Retail consumer disclosure violations.Retail consumer disclosure violations.
 Breach of privacy.Breach of privacy.
 Aggressive sales.Aggressive sales.
 Inadequate product offerings.Inadequate product offerings.
 Account churning.Account churning.
 Misuse of confidential information.Misuse of confidential information.
 Lender liability.Lender liability.
Page 11
Clients, Products and Business PracticesClients, Products and Business Practices
((CONTINUEDCONTINUED))
 Improper Business or Market Practices .Improper Business or Market Practices .
 Antitrust.Antitrust.
 Improper trade/market practice.Improper trade/market practice.
 Market manipulation.Market manipulation.
 Insider trading (on firm’s account).Insider trading (on firm’s account).
 Unlicensed activity.Unlicensed activity.
 Money laundering.Money laundering.
Page 12
Clients, Products and Business PracticesClients, Products and Business Practices
((CONTINUEDCONTINUED))
 Selection, Sponsorship and Exposure.Selection, Sponsorship and Exposure.
 Failure to investigate client per guidelines.Failure to investigate client per guidelines.
 Exceeding client exposure limits.Exceeding client exposure limits.
 Advisory Activities.Advisory Activities.
 Disputes over performance or advisory activities.Disputes over performance or advisory activities.
Page 13
Damage to Physical AssetsDamage to Physical Assets
 Disasters and Other Events.Disasters and Other Events.
 Natural disaster losses.Natural disaster losses.
 Human losses from external sources (terrorism,Human losses from external sources (terrorism,
vandalism).vandalism).
Page 14
Business Disruption and System FailuresBusiness Disruption and System Failures
 Systems.Systems.
 Hardware.Hardware.
 Software.Software.
 Telecommunications.Telecommunications.
 Utility outage/disruptions.Utility outage/disruptions.
Page 15
Execution, Delivery and ProcessExecution, Delivery and Process
ManagementManagement
 Transaction Capture, Execution and Maintenance.Transaction Capture, Execution and Maintenance.
 Miscommunication.Miscommunication.
 Data entry, maintenance or loading errors.Data entry, maintenance or loading errors.
 Missed deadline or responsibility.Missed deadline or responsibility.
 Model/system misoperation.Model/system misoperation.
 Accounting error/entity attribution error.Accounting error/entity attribution error.
 Other task misperformance.Other task misperformance.
 Record retention.Record retention.
 Documentation maintenance.Documentation maintenance.
 Delivery failure.Delivery failure.
 Collateral management failure.Collateral management failure.
 Reference data maintenance.Reference data maintenance.
Page 16
Execution, Delivery and ProcessExecution, Delivery and Process
ManagementManagement (CONTINUED)(CONTINUED)
 Monitoring and Reporting.Monitoring and Reporting.
 Failed mandatory reporting obligations.Failed mandatory reporting obligations.
 Inaccurate external loss (loss incurred).Inaccurate external loss (loss incurred).
 Customer Intake and Documentation.Customer Intake and Documentation.
 Unapproved access given to accounts.Unapproved access given to accounts.
 Incorrect client records (loss incurred).Incorrect client records (loss incurred).
 Negligent loss or damage of client assets.Negligent loss or damage of client assets.
Page 17
Execution, Delivery and ProcessExecution, Delivery and Process
ManagementManagement (CONTINUED)(CONTINUED)
 Customer/Client Account Management.Customer/Client Account Management.
 Unapproved access given to accounts.Unapproved access given to accounts.
 Incorrect client records (loss incurred).Incorrect client records (loss incurred).
 Negligent loss or damage of client assets.Negligent loss or damage of client assets.
 Trade Counterparties.Trade Counterparties.
 Non-client counterparty misperformance.Non-client counterparty misperformance.
 Vendors and Suppliers.Vendors and Suppliers.
 Outsourcing.Outsourcing.
 Vendor disputes.Vendor disputes.
Page 18
Operational Risk ChecklistOperational Risk Checklist
 Employee training.Employee training.
 Close management oversight.Close management oversight.
 Segregation of duties.Segregation of duties.
 Employee background checks.Employee background checks.
 Procedures and process.Procedures and process.
 Purchase of insurance.Purchase of insurance.
 Exiting certain businesses.Exiting certain businesses.
 Capitalization of risks.Capitalization of risks.
Page 19
Credit RiskCredit Risk
Risk due to an uncertainty in aRisk due to an uncertainty in a
counterparty’s ability to meet itscounterparty’s ability to meet its
obligations in accordance with agreedobligations in accordance with agreed
upon terms.upon terms.
Page 20
Credit Risks Include:Credit Risks Include:
 Loans.Loans.
 Acceptances.Acceptances.
 Interbank transactions.Interbank transactions.
 Trade financing.Trade financing.
 FX transactions.FX transactions.
 Futures.Futures.
 Swaps.Swaps.
 Equities.Equities.
 Letters of credit.Letters of credit.
 Options.Options.
Page 21
Sound Practices for ManagingSound Practices for Managing
Credit RiskCredit Risk
 Establish an appropriate credit risk environment.Establish an appropriate credit risk environment.
 Operate under a sound credit-granting process.Operate under a sound credit-granting process.
 Maintain an appropriate credit administration,Maintain an appropriate credit administration,
measurement and monitoring process.measurement and monitoring process.
 Ensure adequate controls over credit risk.Ensure adequate controls over credit risk.
Page 22
Establish an Appropriate Credit RiskEstablish an Appropriate Credit Risk
EnvironmentEnvironment
 Board of Directors should review credit risk strategyBoard of Directors should review credit risk strategy
periodically.periodically.
 Senior management should implement credit riskSenior management should implement credit risk
strategy approved by the Board.strategy approved by the Board.
Page 23
Operate Under a Sound Credit GrantingOperate Under a Sound Credit Granting
ProcessProcess
 Criteria should include thorough understanding ofCriteria should include thorough understanding of
the borrower, purpose/structure of credit and itsthe borrower, purpose/structure of credit and its
source of repayment.source of repayment.
 Establish overall credit limits at the level of individualEstablish overall credit limits at the level of individual
borrowers/connected counterparties.borrowers/connected counterparties.
 Have a clearly established process for approvingHave a clearly established process for approving
new credits/extension of existing credits.new credits/extension of existing credits.
 Extension of credit must be made on an arm’sExtension of credit must be made on an arm’s
length basis.length basis.
Page 24
Maintain a Credit Administration,Maintain a Credit Administration,
Measurement and Monitoring ProcessMeasurement and Monitoring Process
 Have in place a system for ongoing administration ofHave in place a system for ongoing administration of
various risk-bearing portfolios.various risk-bearing portfolios.
 Develop an internal risk rating system for managingDevelop an internal risk rating system for managing
credit risk.credit risk.
 Have an information system and analyticalHave an information system and analytical
techniques that enable management to measuretechniques that enable management to measure
credit risk of on/off balance sheet activities.credit risk of on/off balance sheet activities.
Page 25
Maintain a Credit Administration, MeasurementMaintain a Credit Administration, Measurement
and Monitoring Processand Monitoring Process (CONTINUED)(CONTINUED)
 System for monitoring overall composition andSystem for monitoring overall composition and
quality of the credit portfolio.quality of the credit portfolio.
 Consider future changes in economic conditionsConsider future changes in economic conditions
when assessing individual credits.when assessing individual credits.
Page 26
Ensure Adequate Controls Over Credit RiskEnsure Adequate Controls Over Credit Risk
 System of independent, ongoing credit review.System of independent, ongoing credit review.
 Credit granting function is properly handled andCredit granting function is properly handled and
credit exposures are within limits.credit exposures are within limits.
 System for managing problem credits.System for managing problem credits.
Page 27
Credit Risk ChecklistCredit Risk Checklist
 Stringent credit standards for borrowers andStringent credit standards for borrowers and
counterparties.counterparties.
 Strict portfolio risk management.Strict portfolio risk management.
 Constant focus on changes in economic or otherConstant focus on changes in economic or other
circumstances that can lead to a deterioration in thecircumstances that can lead to a deterioration in the
credit standing of a bank’s counterparties.credit standing of a bank’s counterparties.
Page 28
Reputational RiskReputational Risk
Reputational risk is the potential thatReputational risk is the potential that
negative publicity, whether true or not, willnegative publicity, whether true or not, will
result in loss of customers, severing ofresult in loss of customers, severing of
corporate affiliations, decrease incorporate affiliations, decrease in
revenues and increase in costs.revenues and increase in costs.
Page 29
Benefits of Effective ReputationBenefits of Effective Reputation
ManagementManagement
 Improving relations with shareholders.Improving relations with shareholders.
 Creating a more favorable environment forCreating a more favorable environment for
investment.investment.
 Recruiting/retaining the best employees.Recruiting/retaining the best employees.
 Reducing barriers to development in new markets.Reducing barriers to development in new markets.
 Securing premium prices for products.Securing premium prices for products.
 Minimizing threats of litigation.Minimizing threats of litigation.
Page 30
The key to managing reputational risk isThe key to managing reputational risk is
sound risk management, coupled withsound risk management, coupled with
straightforward communication about thestraightforward communication about the
problem the bank is facing.problem the bank is facing.
Page 31
Re-establishing a firm’sRe-establishing a firm’s
reputation takes a long time.reputation takes a long time.
Page 32
Reputational Risk CasesReputational Risk Cases
 Perrier – Toluene traces.Perrier – Toluene traces.
 Exxon – Valdez spill.Exxon – Valdez spill.
 Union Carbide – Bhopal, India.Union Carbide – Bhopal, India.
 Arthur Andersen – Enron shredding.Arthur Andersen – Enron shredding.
 Firestone – Tires.Firestone – Tires.
Page 33
Reputational Risk ChecklistReputational Risk Checklist
 Processes for crisis management are planned andProcesses for crisis management are planned and
documented.documented.
 External perceptions of the bank are regularly measured.External perceptions of the bank are regularly measured.
 Reputational threats are systematically tracked.Reputational threats are systematically tracked.
 Employees are trained to identify and manage reputationalEmployees are trained to identify and manage reputational
risks.risks.
 Standards on environmental, human rights and laborStandards on environmental, human rights and labor
practices are set publically.practices are set publically.
 Relationships and trust with pressure groups and otherRelationships and trust with pressure groups and other
potential critics are established.potential critics are established.
Page 34
True or False?True or False?
 Corporate reputation is one of the primary assets ofCorporate reputation is one of the primary assets of
my bank.my bank.
 The risks involving a bank’s reputation haveThe risks involving a bank’s reputation have
increased significantly over the past five years.increased significantly over the past five years.
 Reputational risk is harder to manage than otherReputational risk is harder to manage than other
forms of risk.forms of risk.
 My bank is proactive in enhancing and protecting itsMy bank is proactive in enhancing and protecting its
reputation.reputation.
Page 35
True or False?True or False?
 It is impossible to quantify the impact of reputationalIt is impossible to quantify the impact of reputational
risks.risks.
 My bank usually thinks about its reputation onlyMy bank usually thinks about its reputation only
when things go wrong.when things go wrong.
 A well run bank doesn’t need to invest extraA well run bank doesn’t need to invest extra
resources into guarding against reputational risk.resources into guarding against reputational risk.
Page 36
Risk ManagementRisk Management
Risk management is the process ofRisk management is the process of
monitoring and addressing the potentialmonitoring and addressing the potential
for loss.for loss.
Page 37
Evolution of Risk ManagementEvolution of Risk Management
 Emerged as a discipline during the early 1990s.Emerged as a discipline during the early 1990s.
 Used long before (1960s).Used long before (1960s).
 Typically used to describe techniques for addressingTypically used to describe techniques for addressing
insurable risks.insurable risks.
Page 38
““Old” Risk ManagementOld” Risk Management
 Risk reduction through safety, quality control andRisk reduction through safety, quality control and
hazard education.hazard education.
 Alternative risk financing, including self-insuranceAlternative risk financing, including self-insurance
and captive insurance.and captive insurance.
 The purchase of traditional insurance products.The purchase of traditional insurance products.
 Use of derivatives to hedge or customize market riskUse of derivatives to hedge or customize market risk
exposures.exposures.
Page 39
““New” Risk ManagementNew” Risk Management
 Treats derivatives as a problem as much as aTreats derivatives as a problem as much as a
solution.solution.
 Focuses on reporting, oversight and segregation ofFocuses on reporting, oversight and segregation of
duties within the organization.duties within the organization.
Page 40
By the Mid-1990sBy the Mid-1990s
 Regulatory initiatives.Regulatory initiatives.
 Concerns about derivatives.Concerns about derivatives.
 Release of RiskMetrics.Release of RiskMetrics.
 Published losses.Published losses.
Page 41
Enron’s Experience with Risk ManagementEnron’s Experience with Risk Management
 Maintained a risk management function.Maintained a risk management function.
 Lines of reporting were reasonably independent.Lines of reporting were reasonably independent.
 Mark-to-market valuations were subject toMark-to-market valuations were subject to
adjustments by management.adjustments by management.
 Few career risk managers.Few career risk managers.
 Fluid workforce.Fluid workforce.
 Employees constantly looking for next transfer.Employees constantly looking for next transfer.
Page 42
Regulatory Responses from the FinancialRegulatory Responses from the Financial
Services CommunityServices Community
 Basel II.Basel II.
 Sarbanes-Oxley Act of 2002.Sarbanes-Oxley Act of 2002.
 Graam-Leach-Bliley Act.Graam-Leach-Bliley Act.
 Bank Secrecy Act/Anti-Money Laundering.Bank Secrecy Act/Anti-Money Laundering.
 Insider Trading Rules.Insider Trading Rules.
 Bank Bribery Act.Bank Bribery Act.
 Fair and Accurate Credit Transactions Act (FACTA)Fair and Accurate Credit Transactions Act (FACTA)
 Fair LendingFair Lending
 Federal Conflicts of Interest Statutes.Federal Conflicts of Interest Statutes.
 Various record retention and reporting requirements.Various record retention and reporting requirements.
Page 43
Success Depends UponSuccess Depends Upon
 A positive corporate culture.A positive corporate culture.
 Actively observed policies and procedures.Actively observed policies and procedures.
 Effective use of technology.Effective use of technology.
 Independence of risk management professionals.Independence of risk management professionals.
Page 44
When risk management is doneWhen risk management is done
correctly you CAN sleep at night!correctly you CAN sleep at night!
Page 45
Thank you for your interest in The Edcomm Group Banker‘s Academy.Thank you for your interest in The Edcomm Group Banker‘s Academy.
We are the #1 financial services training company in the world for threeWe are the #1 financial services training company in the world for three
reasons:reasons:
We are so committed to our clients that we offer a complete money-backWe are so committed to our clients that we offer a complete money-back
quality guarantee.quality guarantee.
Our PledgeOur Pledge
 Our ExpertiseOur Expertise – We have been proudly serving the global financial– We have been proudly serving the global financial
community for over 20 years.community for over 20 years.
 Our ProductsOur Products – The breadth and depth of our products assures you– The breadth and depth of our products assures you
that we will provide you with a solution that meets your business needs.that we will provide you with a solution that meets your business needs.
 Our ServiceOur Service – The excellent service we provide demonstrates that we– The excellent service we provide demonstrates that we
are your partner.are your partner.
Dr. Linda EagleDr. Linda Eagle
Founder & PresidentFounder & President
The Edcomm Group Banker's AcademyThe Edcomm Group Banker's Academy
+1 212 631 9400+1 212 631 9400
+1 917 318 6650+1 917 318 6650
linda.eagle@edcomm.comlinda.eagle@edcomm.com

More Related Content

What's hot

Analyzing and managing reputational risk
Analyzing and managing reputational riskAnalyzing and managing reputational risk
Analyzing and managing reputational riskDawn Simpson
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSMichel Rochette
 
EDUB.610 Integrated Safety Management Jan16 V11
EDUB.610 Integrated Safety Management Jan16 V11EDUB.610 Integrated Safety Management Jan16 V11
EDUB.610 Integrated Safety Management Jan16 V11Stephen Barry
 
ORM Operational Risks Management
ORM Operational Risks ManagementORM Operational Risks Management
ORM Operational Risks ManagementTariq minhas
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Marc S. Sokol
 
Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...David Cunningham
 

What's hot (7)

Analyzing and managing reputational risk
Analyzing and managing reputational riskAnalyzing and managing reputational risk
Analyzing and managing reputational risk
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORS
 
EDUB.610 Integrated Safety Management Jan16 V11
EDUB.610 Integrated Safety Management Jan16 V11EDUB.610 Integrated Safety Management Jan16 V11
EDUB.610 Integrated Safety Management Jan16 V11
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
ORM Operational Risks Management
ORM Operational Risks ManagementORM Operational Risks Management
ORM Operational Risks Management
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
 
Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...Ilta06 developing and selling an enterprise risk management approach by dave ...
Ilta06 developing and selling an enterprise risk management approach by dave ...
 

Similar to Risk managementinbanking 102708 (1)

management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online bankingRanjeet Patel
 
Operational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory ExpectationsOperational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory ExpectationsColleen Beck-Domanico
 
Ilta09 Law Firm Risk Management D Cunningham
Ilta09 Law Firm Risk Management  D CunninghamIlta09 Law Firm Risk Management  D Cunningham
Ilta09 Law Firm Risk Management D CunninghamBaker Robbins & Company
 
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Placesaafdn
 
How to Instill Ethics in Commercial Lending: Understanding Due Diligence
How to Instill Ethics in Commercial Lending: Understanding Due DiligenceHow to Instill Ethics in Commercial Lending: Understanding Due Diligence
How to Instill Ethics in Commercial Lending: Understanding Due DiligenceColleen Beck-Domanico
 
Operation risk management in Private Equity firms
Operation risk management in Private Equity firmsOperation risk management in Private Equity firms
Operation risk management in Private Equity firmsJoseph Kariuki
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsAbhishek Bali
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...Data Con LA
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewSteven Lane
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
A Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening ProgramA Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening ProgramW. Barry Nixon, SPHR
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 

Similar to Risk managementinbanking 102708 (1) (20)

management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online banking
 
Operational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory ExpectationsOperational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory Expectations
 
Ilta09 Law Firm Risk Management D Cunningham
Ilta09 Law Firm Risk Management  D CunninghamIlta09 Law Firm Risk Management  D Cunningham
Ilta09 Law Firm Risk Management D Cunningham
 
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
 
How to Instill Ethics in Commercial Lending: Understanding Due Diligence
How to Instill Ethics in Commercial Lending: Understanding Due DiligenceHow to Instill Ethics in Commercial Lending: Understanding Due Diligence
How to Instill Ethics in Commercial Lending: Understanding Due Diligence
 
Operation risk management in Private Equity firms
Operation risk management in Private Equity firmsOperation risk management in Private Equity firms
Operation risk management in Private Equity firms
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules Overview
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
A Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening ProgramA Guide for Employers to Implementing a Continuous Screening Program
A Guide for Employers to Implementing a Continuous Screening Program
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 

More from Sowie Althea

Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 
Recruitment, Selection, and Placement
Recruitment, Selection, and PlacementRecruitment, Selection, and Placement
Recruitment, Selection, and PlacementSowie Althea
 
home loans in Philippines
home loans in Philippineshome loans in Philippines
home loans in PhilippinesSowie Althea
 
Leadership and empowerment
Leadership and empowermentLeadership and empowerment
Leadership and empowermentSowie Althea
 
Sources and uses of funds
Sources and uses of fundsSources and uses of funds
Sources and uses of fundsSowie Althea
 
Role of banks in financial market
Role of banks in financial marketRole of banks in financial market
Role of banks in financial marketSowie Althea
 
Philippine financial-system.......
Philippine financial-system.......Philippine financial-system.......
Philippine financial-system.......Sowie Althea
 
Negotiable instruments law
Negotiable instruments lawNegotiable instruments law
Negotiable instruments lawSowie Althea
 
Introduction to situational leadership (1)
Introduction to situational leadership (1)Introduction to situational leadership (1)
Introduction to situational leadership (1)Sowie Althea
 
Cash operation and mobilization 1
Cash operation and mobilization 1Cash operation and mobilization 1
Cash operation and mobilization 1Sowie Althea
 
1 banking laws rules and regulations
1 banking laws rules and regulations1 banking laws rules and regulations
1 banking laws rules and regulationsSowie Althea
 
Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)Sowie Althea
 
Technical writing nature and outputs
Technical writing nature and outputsTechnical writing nature and outputs
Technical writing nature and outputsSowie Althea
 
Rules in capitalization w o
Rules in capitalization w oRules in capitalization w o
Rules in capitalization w oSowie Althea
 
Introductory acctg review chap 1, 2
Introductory acctg   review chap 1, 2Introductory acctg   review chap 1, 2
Introductory acctg review chap 1, 2Sowie Althea
 
Introduction to finance
Introduction to financeIntroduction to finance
Introduction to financeSowie Althea
 
The principle of intermediation.ppt copy
The principle of intermediation.ppt   copyThe principle of intermediation.ppt   copy
The principle of intermediation.ppt copySowie Althea
 
Role of banks in financial market
Role of banks in financial marketRole of banks in financial market
Role of banks in financial marketSowie Althea
 

More from Sowie Althea (20)

Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Recruitment, Selection, and Placement
Recruitment, Selection, and PlacementRecruitment, Selection, and Placement
Recruitment, Selection, and Placement
 
home loans in Philippines
home loans in Philippineshome loans in Philippines
home loans in Philippines
 
Leadership and empowerment
Leadership and empowermentLeadership and empowerment
Leadership and empowerment
 
Sources and uses of funds
Sources and uses of fundsSources and uses of funds
Sources and uses of funds
 
Role of banks in financial market
Role of banks in financial marketRole of banks in financial market
Role of banks in financial market
 
Philippine financial-system.......
Philippine financial-system.......Philippine financial-system.......
Philippine financial-system.......
 
Negotiable instruments law
Negotiable instruments lawNegotiable instruments law
Negotiable instruments law
 
Introduction to situational leadership (1)
Introduction to situational leadership (1)Introduction to situational leadership (1)
Introduction to situational leadership (1)
 
Cash operation and mobilization 1
Cash operation and mobilization 1Cash operation and mobilization 1
Cash operation and mobilization 1
 
1 banking laws rules and regulations
1 banking laws rules and regulations1 banking laws rules and regulations
1 banking laws rules and regulations
 
1 bank operation
1 bank operation1 bank operation
1 bank operation
 
Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)
 
Technical writing nature and outputs
Technical writing nature and outputsTechnical writing nature and outputs
Technical writing nature and outputs
 
Rules in capitalization w o
Rules in capitalization w oRules in capitalization w o
Rules in capitalization w o
 
Introductory acctg review chap 1, 2
Introductory acctg   review chap 1, 2Introductory acctg   review chap 1, 2
Introductory acctg review chap 1, 2
 
Introduction to finance
Introduction to financeIntroduction to finance
Introduction to finance
 
Trust investment
Trust investmentTrust investment
Trust investment
 
The principle of intermediation.ppt copy
The principle of intermediation.ppt   copyThe principle of intermediation.ppt   copy
The principle of intermediation.ppt copy
 
Role of banks in financial market
Role of banks in financial marketRole of banks in financial market
Role of banks in financial market
 

Recently uploaded

rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 

Recently uploaded (20)

rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 

Risk managementinbanking 102708 (1)

  • 1. Page 1 Risk Management in BankingRisk Management in Banking
  • 2. Page 2 An Introduction to RiskAn Introduction to Risk Risk Management is the process ofRisk Management is the process of measuring or assessing the actual ormeasuring or assessing the actual or potential dangers of a particularpotential dangers of a particular situation.situation.
  • 3. Page 3 Risk Has Two ComponentsRisk Has Two Components  Uncertainty.Uncertainty.  Exposure.Exposure.
  • 4. Page 4 Types of RiskTypes of Risk  Operational.Operational.  Credit.Credit.  Reputational.Reputational.
  • 5. Page 5 Operational RiskOperational Risk The risk of loss resulting fromThe risk of loss resulting from inadequate or failed internal processes,inadequate or failed internal processes, people and systems, or from externalpeople and systems, or from external events.events.
  • 6. Page 6 Operational Risks IncludeOperational Risks Include  Internal Fraud.Internal Fraud.  External Fraud.External Fraud.  Employment Practices and Workplace Safety.Employment Practices and Workplace Safety.  Clients, Products and Business Practices.Clients, Products and Business Practices.  Damage to Physical Assets.Damage to Physical Assets.  Business Disruption and System Failures.Business Disruption and System Failures.  Execution, Delivery and Process Management.Execution, Delivery and Process Management.
  • 7. Page 7 Internal FraudInternal Fraud  Unauthorized Activity.Unauthorized Activity.  Transactions not reported.Transactions not reported.  Transaction type unauthorized.Transaction type unauthorized.  Mismarking of position.Mismarking of position.  Theft and Fraud.Theft and Fraud.  Fraud/credit fraud/worthless deposits.Fraud/credit fraud/worthless deposits.  Theft/extortion/embezzlement/robbery.Theft/extortion/embezzlement/robbery.  Misappropriation of assets.Misappropriation of assets.  Forgery.Forgery.  Account take-over/impersonation.Account take-over/impersonation.  Bribes/kickbacks.Bribes/kickbacks.  Insider trading.Insider trading.  Money laundering.Money laundering.  Willful blindness.Willful blindness.
  • 8. Page 8 External FraudExternal Fraud  Theft and Fraud.Theft and Fraud.  Theft/robbery.Theft/robbery.  Forgery.Forgery.  Check kiting.Check kiting.  Identity theft.Identity theft.  Elder financial abuse.Elder financial abuse.  Systems Security.Systems Security.  Hacking damage.Hacking damage.  Theft of information (with monetary loss).Theft of information (with monetary loss).
  • 9. Page 9 Employment Practices and WorkplaceEmployment Practices and Workplace SafetySafety  Employee Relations.Employee Relations.  Compensation, benefit, termination issues.Compensation, benefit, termination issues.  Organized labor issues.Organized labor issues.  Safe Environment.Safe Environment.  General liability (slips and falls).General liability (slips and falls).  Employee health and safety rules.Employee health and safety rules.  Workers’ compensation.Workers’ compensation.  Diversity and Discrimination.Diversity and Discrimination.  All discrimination types.All discrimination types.  Harassment.Harassment.  Equal Employment Opportunity (EEO).Equal Employment Opportunity (EEO).
  • 10. Page 10 Clients, Products and Business PracticesClients, Products and Business Practices  Suitability, Disclosure and Fiduciary.Suitability, Disclosure and Fiduciary.  Fiduciary breaches/guideline violations.Fiduciary breaches/guideline violations.  Suitability/disclosure issues.Suitability/disclosure issues.  Retail consumer disclosure violations.Retail consumer disclosure violations.  Breach of privacy.Breach of privacy.  Aggressive sales.Aggressive sales.  Inadequate product offerings.Inadequate product offerings.  Account churning.Account churning.  Misuse of confidential information.Misuse of confidential information.  Lender liability.Lender liability.
  • 11. Page 11 Clients, Products and Business PracticesClients, Products and Business Practices ((CONTINUEDCONTINUED))  Improper Business or Market Practices .Improper Business or Market Practices .  Antitrust.Antitrust.  Improper trade/market practice.Improper trade/market practice.  Market manipulation.Market manipulation.  Insider trading (on firm’s account).Insider trading (on firm’s account).  Unlicensed activity.Unlicensed activity.  Money laundering.Money laundering.
  • 12. Page 12 Clients, Products and Business PracticesClients, Products and Business Practices ((CONTINUEDCONTINUED))  Selection, Sponsorship and Exposure.Selection, Sponsorship and Exposure.  Failure to investigate client per guidelines.Failure to investigate client per guidelines.  Exceeding client exposure limits.Exceeding client exposure limits.  Advisory Activities.Advisory Activities.  Disputes over performance or advisory activities.Disputes over performance or advisory activities.
  • 13. Page 13 Damage to Physical AssetsDamage to Physical Assets  Disasters and Other Events.Disasters and Other Events.  Natural disaster losses.Natural disaster losses.  Human losses from external sources (terrorism,Human losses from external sources (terrorism, vandalism).vandalism).
  • 14. Page 14 Business Disruption and System FailuresBusiness Disruption and System Failures  Systems.Systems.  Hardware.Hardware.  Software.Software.  Telecommunications.Telecommunications.  Utility outage/disruptions.Utility outage/disruptions.
  • 15. Page 15 Execution, Delivery and ProcessExecution, Delivery and Process ManagementManagement  Transaction Capture, Execution and Maintenance.Transaction Capture, Execution and Maintenance.  Miscommunication.Miscommunication.  Data entry, maintenance or loading errors.Data entry, maintenance or loading errors.  Missed deadline or responsibility.Missed deadline or responsibility.  Model/system misoperation.Model/system misoperation.  Accounting error/entity attribution error.Accounting error/entity attribution error.  Other task misperformance.Other task misperformance.  Record retention.Record retention.  Documentation maintenance.Documentation maintenance.  Delivery failure.Delivery failure.  Collateral management failure.Collateral management failure.  Reference data maintenance.Reference data maintenance.
  • 16. Page 16 Execution, Delivery and ProcessExecution, Delivery and Process ManagementManagement (CONTINUED)(CONTINUED)  Monitoring and Reporting.Monitoring and Reporting.  Failed mandatory reporting obligations.Failed mandatory reporting obligations.  Inaccurate external loss (loss incurred).Inaccurate external loss (loss incurred).  Customer Intake and Documentation.Customer Intake and Documentation.  Unapproved access given to accounts.Unapproved access given to accounts.  Incorrect client records (loss incurred).Incorrect client records (loss incurred).  Negligent loss or damage of client assets.Negligent loss or damage of client assets.
  • 17. Page 17 Execution, Delivery and ProcessExecution, Delivery and Process ManagementManagement (CONTINUED)(CONTINUED)  Customer/Client Account Management.Customer/Client Account Management.  Unapproved access given to accounts.Unapproved access given to accounts.  Incorrect client records (loss incurred).Incorrect client records (loss incurred).  Negligent loss or damage of client assets.Negligent loss or damage of client assets.  Trade Counterparties.Trade Counterparties.  Non-client counterparty misperformance.Non-client counterparty misperformance.  Vendors and Suppliers.Vendors and Suppliers.  Outsourcing.Outsourcing.  Vendor disputes.Vendor disputes.
  • 18. Page 18 Operational Risk ChecklistOperational Risk Checklist  Employee training.Employee training.  Close management oversight.Close management oversight.  Segregation of duties.Segregation of duties.  Employee background checks.Employee background checks.  Procedures and process.Procedures and process.  Purchase of insurance.Purchase of insurance.  Exiting certain businesses.Exiting certain businesses.  Capitalization of risks.Capitalization of risks.
  • 19. Page 19 Credit RiskCredit Risk Risk due to an uncertainty in aRisk due to an uncertainty in a counterparty’s ability to meet itscounterparty’s ability to meet its obligations in accordance with agreedobligations in accordance with agreed upon terms.upon terms.
  • 20. Page 20 Credit Risks Include:Credit Risks Include:  Loans.Loans.  Acceptances.Acceptances.  Interbank transactions.Interbank transactions.  Trade financing.Trade financing.  FX transactions.FX transactions.  Futures.Futures.  Swaps.Swaps.  Equities.Equities.  Letters of credit.Letters of credit.  Options.Options.
  • 21. Page 21 Sound Practices for ManagingSound Practices for Managing Credit RiskCredit Risk  Establish an appropriate credit risk environment.Establish an appropriate credit risk environment.  Operate under a sound credit-granting process.Operate under a sound credit-granting process.  Maintain an appropriate credit administration,Maintain an appropriate credit administration, measurement and monitoring process.measurement and monitoring process.  Ensure adequate controls over credit risk.Ensure adequate controls over credit risk.
  • 22. Page 22 Establish an Appropriate Credit RiskEstablish an Appropriate Credit Risk EnvironmentEnvironment  Board of Directors should review credit risk strategyBoard of Directors should review credit risk strategy periodically.periodically.  Senior management should implement credit riskSenior management should implement credit risk strategy approved by the Board.strategy approved by the Board.
  • 23. Page 23 Operate Under a Sound Credit GrantingOperate Under a Sound Credit Granting ProcessProcess  Criteria should include thorough understanding ofCriteria should include thorough understanding of the borrower, purpose/structure of credit and itsthe borrower, purpose/structure of credit and its source of repayment.source of repayment.  Establish overall credit limits at the level of individualEstablish overall credit limits at the level of individual borrowers/connected counterparties.borrowers/connected counterparties.  Have a clearly established process for approvingHave a clearly established process for approving new credits/extension of existing credits.new credits/extension of existing credits.  Extension of credit must be made on an arm’sExtension of credit must be made on an arm’s length basis.length basis.
  • 24. Page 24 Maintain a Credit Administration,Maintain a Credit Administration, Measurement and Monitoring ProcessMeasurement and Monitoring Process  Have in place a system for ongoing administration ofHave in place a system for ongoing administration of various risk-bearing portfolios.various risk-bearing portfolios.  Develop an internal risk rating system for managingDevelop an internal risk rating system for managing credit risk.credit risk.  Have an information system and analyticalHave an information system and analytical techniques that enable management to measuretechniques that enable management to measure credit risk of on/off balance sheet activities.credit risk of on/off balance sheet activities.
  • 25. Page 25 Maintain a Credit Administration, MeasurementMaintain a Credit Administration, Measurement and Monitoring Processand Monitoring Process (CONTINUED)(CONTINUED)  System for monitoring overall composition andSystem for monitoring overall composition and quality of the credit portfolio.quality of the credit portfolio.  Consider future changes in economic conditionsConsider future changes in economic conditions when assessing individual credits.when assessing individual credits.
  • 26. Page 26 Ensure Adequate Controls Over Credit RiskEnsure Adequate Controls Over Credit Risk  System of independent, ongoing credit review.System of independent, ongoing credit review.  Credit granting function is properly handled andCredit granting function is properly handled and credit exposures are within limits.credit exposures are within limits.  System for managing problem credits.System for managing problem credits.
  • 27. Page 27 Credit Risk ChecklistCredit Risk Checklist  Stringent credit standards for borrowers andStringent credit standards for borrowers and counterparties.counterparties.  Strict portfolio risk management.Strict portfolio risk management.  Constant focus on changes in economic or otherConstant focus on changes in economic or other circumstances that can lead to a deterioration in thecircumstances that can lead to a deterioration in the credit standing of a bank’s counterparties.credit standing of a bank’s counterparties.
  • 28. Page 28 Reputational RiskReputational Risk Reputational risk is the potential thatReputational risk is the potential that negative publicity, whether true or not, willnegative publicity, whether true or not, will result in loss of customers, severing ofresult in loss of customers, severing of corporate affiliations, decrease incorporate affiliations, decrease in revenues and increase in costs.revenues and increase in costs.
  • 29. Page 29 Benefits of Effective ReputationBenefits of Effective Reputation ManagementManagement  Improving relations with shareholders.Improving relations with shareholders.  Creating a more favorable environment forCreating a more favorable environment for investment.investment.  Recruiting/retaining the best employees.Recruiting/retaining the best employees.  Reducing barriers to development in new markets.Reducing barriers to development in new markets.  Securing premium prices for products.Securing premium prices for products.  Minimizing threats of litigation.Minimizing threats of litigation.
  • 30. Page 30 The key to managing reputational risk isThe key to managing reputational risk is sound risk management, coupled withsound risk management, coupled with straightforward communication about thestraightforward communication about the problem the bank is facing.problem the bank is facing.
  • 31. Page 31 Re-establishing a firm’sRe-establishing a firm’s reputation takes a long time.reputation takes a long time.
  • 32. Page 32 Reputational Risk CasesReputational Risk Cases  Perrier – Toluene traces.Perrier – Toluene traces.  Exxon – Valdez spill.Exxon – Valdez spill.  Union Carbide – Bhopal, India.Union Carbide – Bhopal, India.  Arthur Andersen – Enron shredding.Arthur Andersen – Enron shredding.  Firestone – Tires.Firestone – Tires.
  • 33. Page 33 Reputational Risk ChecklistReputational Risk Checklist  Processes for crisis management are planned andProcesses for crisis management are planned and documented.documented.  External perceptions of the bank are regularly measured.External perceptions of the bank are regularly measured.  Reputational threats are systematically tracked.Reputational threats are systematically tracked.  Employees are trained to identify and manage reputationalEmployees are trained to identify and manage reputational risks.risks.  Standards on environmental, human rights and laborStandards on environmental, human rights and labor practices are set publically.practices are set publically.  Relationships and trust with pressure groups and otherRelationships and trust with pressure groups and other potential critics are established.potential critics are established.
  • 34. Page 34 True or False?True or False?  Corporate reputation is one of the primary assets ofCorporate reputation is one of the primary assets of my bank.my bank.  The risks involving a bank’s reputation haveThe risks involving a bank’s reputation have increased significantly over the past five years.increased significantly over the past five years.  Reputational risk is harder to manage than otherReputational risk is harder to manage than other forms of risk.forms of risk.  My bank is proactive in enhancing and protecting itsMy bank is proactive in enhancing and protecting its reputation.reputation.
  • 35. Page 35 True or False?True or False?  It is impossible to quantify the impact of reputationalIt is impossible to quantify the impact of reputational risks.risks.  My bank usually thinks about its reputation onlyMy bank usually thinks about its reputation only when things go wrong.when things go wrong.  A well run bank doesn’t need to invest extraA well run bank doesn’t need to invest extra resources into guarding against reputational risk.resources into guarding against reputational risk.
  • 36. Page 36 Risk ManagementRisk Management Risk management is the process ofRisk management is the process of monitoring and addressing the potentialmonitoring and addressing the potential for loss.for loss.
  • 37. Page 37 Evolution of Risk ManagementEvolution of Risk Management  Emerged as a discipline during the early 1990s.Emerged as a discipline during the early 1990s.  Used long before (1960s).Used long before (1960s).  Typically used to describe techniques for addressingTypically used to describe techniques for addressing insurable risks.insurable risks.
  • 38. Page 38 ““Old” Risk ManagementOld” Risk Management  Risk reduction through safety, quality control andRisk reduction through safety, quality control and hazard education.hazard education.  Alternative risk financing, including self-insuranceAlternative risk financing, including self-insurance and captive insurance.and captive insurance.  The purchase of traditional insurance products.The purchase of traditional insurance products.  Use of derivatives to hedge or customize market riskUse of derivatives to hedge or customize market risk exposures.exposures.
  • 39. Page 39 ““New” Risk ManagementNew” Risk Management  Treats derivatives as a problem as much as aTreats derivatives as a problem as much as a solution.solution.  Focuses on reporting, oversight and segregation ofFocuses on reporting, oversight and segregation of duties within the organization.duties within the organization.
  • 40. Page 40 By the Mid-1990sBy the Mid-1990s  Regulatory initiatives.Regulatory initiatives.  Concerns about derivatives.Concerns about derivatives.  Release of RiskMetrics.Release of RiskMetrics.  Published losses.Published losses.
  • 41. Page 41 Enron’s Experience with Risk ManagementEnron’s Experience with Risk Management  Maintained a risk management function.Maintained a risk management function.  Lines of reporting were reasonably independent.Lines of reporting were reasonably independent.  Mark-to-market valuations were subject toMark-to-market valuations were subject to adjustments by management.adjustments by management.  Few career risk managers.Few career risk managers.  Fluid workforce.Fluid workforce.  Employees constantly looking for next transfer.Employees constantly looking for next transfer.
  • 42. Page 42 Regulatory Responses from the FinancialRegulatory Responses from the Financial Services CommunityServices Community  Basel II.Basel II.  Sarbanes-Oxley Act of 2002.Sarbanes-Oxley Act of 2002.  Graam-Leach-Bliley Act.Graam-Leach-Bliley Act.  Bank Secrecy Act/Anti-Money Laundering.Bank Secrecy Act/Anti-Money Laundering.  Insider Trading Rules.Insider Trading Rules.  Bank Bribery Act.Bank Bribery Act.  Fair and Accurate Credit Transactions Act (FACTA)Fair and Accurate Credit Transactions Act (FACTA)  Fair LendingFair Lending  Federal Conflicts of Interest Statutes.Federal Conflicts of Interest Statutes.  Various record retention and reporting requirements.Various record retention and reporting requirements.
  • 43. Page 43 Success Depends UponSuccess Depends Upon  A positive corporate culture.A positive corporate culture.  Actively observed policies and procedures.Actively observed policies and procedures.  Effective use of technology.Effective use of technology.  Independence of risk management professionals.Independence of risk management professionals.
  • 44. Page 44 When risk management is doneWhen risk management is done correctly you CAN sleep at night!correctly you CAN sleep at night!
  • 45. Page 45 Thank you for your interest in The Edcomm Group Banker‘s Academy.Thank you for your interest in The Edcomm Group Banker‘s Academy. We are the #1 financial services training company in the world for threeWe are the #1 financial services training company in the world for three reasons:reasons: We are so committed to our clients that we offer a complete money-backWe are so committed to our clients that we offer a complete money-back quality guarantee.quality guarantee. Our PledgeOur Pledge  Our ExpertiseOur Expertise – We have been proudly serving the global financial– We have been proudly serving the global financial community for over 20 years.community for over 20 years.  Our ProductsOur Products – The breadth and depth of our products assures you– The breadth and depth of our products assures you that we will provide you with a solution that meets your business needs.that we will provide you with a solution that meets your business needs.  Our ServiceOur Service – The excellent service we provide demonstrates that we– The excellent service we provide demonstrates that we are your partner.are your partner. Dr. Linda EagleDr. Linda Eagle Founder & PresidentFounder & President The Edcomm Group Banker's AcademyThe Edcomm Group Banker's Academy +1 212 631 9400+1 212 631 9400 +1 917 318 6650+1 917 318 6650 linda.eagle@edcomm.comlinda.eagle@edcomm.com