SlideShare a Scribd company logo
1 of 11
Introduction
to
Risk and
Compliance
Presentation by:
Ray Davies FCA; Chartered MCSI
Definitions - Risk Management and Compliance
Risk…
 Risk is defined as the probability / possibility of something bad happening – (A common definition)
 The effect of uncertainty on our ability to achieve our Objectives – (ISO31000 definition)
Compliance…..
 the process of making sure your company and employees follow all laws, regulations, standards,
and ethical practices that apply to your organisation which falls within governance
Development of Risk Management
Before the French mathematician Blaise Pascal’s probability theory, there was no means of measuring the
chance of potential outcomes
‘Preparing for the future was very much in the lap of the gods’
Risk Management has enabled significant improvements in Decision-making
Risk Management….
Encompasses the identification, analysis, and response to risk
factors that form part of the life of a business.
Effective risk management means attempting to control, as much
as possible, future outcomes by acting proactively rather than
reactively.
Corporate Finance Institute
Types of Risk
Types of
Risk
Regulatory
Compliance
Risk
IT Risk
People Risk
Credit Risk
Cybersecurity
Risk
Fraud Risk
Health &
Safety Risk
Building
Security
Risk
Brand &
Reputation
Risk
Risk Appetite – Pros and Cons of Risk-Taking
 Risk Appetite…. is the level of risk that an organization is prepared to accept in pursuit of its business
objectives
 Risks are not always negative and can present opportunities
Pros of Risk
Decision to ‘Invest in business expansion’
Cons of Risk
Failure to invest in robust IT Systems and therefore Cybersecurity risk management
Who’s Responsible for Risk Management
 Risk Management is the responsibility of every employee
 The Risk Management Tone & Culture of your organisation is ‘Set from the Top’ and the ultimate
responsibility is with the Board of Directors
Board of Directors
Management
Every company employee
The Risk Management Cycle
 Risk Management is part of the Day to Day Business
Types of Risk Mitigation
What is Risk Mitigation?
A key element of the risk management cycle – ‘it’s the process of taking specific and deliberate actions to
minimise or eliminate unacceptable risks’ (Outside Risk Appetite)
Examples of Risk Mitigation
 Staff Training - Well trained staff make less mistakes
 Evaluate your Customers - Review the credit rating of your
customers before extending generous payment terms
 Implement Four-Eyes Payment Controls - To ensure a single
individual cannot initiate and authorise payments
 Buy Insurance - So that you can transfer the risk to someone
with a greater risk appetite for it
In Focus….A Major Risk during COVID-19
 COVID-19 Pandemic has resulted in an unprecedented number of businesses enabling their staff to work from home
 Working away from a secure office environment has resulted in a significant increase in Cybersecurity Risks and Threats
 Cybercriminals have recognised and embraced this opportunity
 Since the start of ‘Lock-Down’ across the globe, the number of incidences of Phishing and Business Email Compromise has
increased significantly
 Over 90% of successful cybersecurity breaches start with an email and involve an act or omission (error) by a staff member
Post-COVID Trends in Phishing Emails Post-COVID Trends in Business Email Compromise
In Focus….Customer Data Protection (GDPR)
Six Major Principles of GDPR
1.0 Processed lawfully, fairly and in a transparent manner
2.0 Collected for specified, explicit and legitimate purposes
3.0 Adequate, relevant and limited to what is necessary
4.0 Accurate and, where necessary, kept up to date
5.0 Retained only for as long as necessary
6.0
Processed in an appropriate manner to maintain
security
General Rule:
GDPR (General Data Protection Regulations) applies to any company that stores or processes personal
information about EU citizens within EU states, even if they do not have a business presence within the EU
 Supervisory Authorities have the power to impose fines
against companies guilty of breaching GDPR:
 €10,000,000 or 2% of worldwide annual turn-over in
preceding F/Year (whichever is greater)
 €20,000,000 or 4% of worldwide annual turn-over in
preceding F/Year (whichever is greater)
 Size of the fine will depend on the severity of the incident
and type of personal data lost
 Judicial Remedy
Penalties for Non-Compliance with GDPR
Next Steps In Protecting Your Business
Key Steps To Improve your Information Security , Data Protection and Business-wide Risk Management
 Put an Info Security & Data Protection Policy in place as soon as possible
 Complete a data inventory for your business i.e. What / Who’s / How / When assessment of the data do you
hold
 Assign specific responsibility for Information Security and Data Protection at Board and Management level
 Initiate a Cybersecurity Risk Assessment of your business with the support of an experienced risk consultant
 Organise regular Cybersecurity staff awareness training for all staff at all levels of your business
 Implement a broader business-wide risk inventory with the support of an experienced risk management and
compliance consultant
 Engage in risk mitigation immediately where ‘common sense’ suggests you should do so; Your ’gut instinct’ is
often right!

More Related Content

What's hot

Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
 
Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000PECB
 
ISO 37001 – Preparing for Certification
ISO 37001 – Preparing for CertificationISO 37001 – Preparing for Certification
ISO 37001 – Preparing for CertificationPECB
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
ISO_37001_anti_bribery_mss
ISO_37001_anti_bribery_mssISO_37001_anti_bribery_mss
ISO_37001_anti_bribery_mssSophie McMurray
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationPECB
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014FERMA
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costPECB
 
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackBusiness Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackContinuity and Resilience
 
Transparency International Malaysia: Business Integrity Programme
Transparency International Malaysia: Business Integrity ProgrammeTransparency International Malaysia: Business Integrity Programme
Transparency International Malaysia: Business Integrity ProgrammeEthical Sector
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceResolver Inc.
 
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber SecurityFERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber SecurityFERMA
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk managementAnu Damodaran
 

What's hot (20)

Emerging Risks
Emerging RisksEmerging Risks
Emerging Risks
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000
 
Key Slides
Key SlidesKey Slides
Key Slides
 
ISO 37001 – Preparing for Certification
ISO 37001 – Preparing for CertificationISO 37001 – Preparing for Certification
ISO 37001 – Preparing for Certification
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
ISO_37001_anti_bribery_mss
ISO_37001_anti_bribery_mssISO_37001_anti_bribery_mss
ISO_37001_anti_bribery_mss
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System Implementation
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014Julia Graham's presentation to FUEDI general assembly 2014
Julia Graham's presentation to FUEDI general assembly 2014
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackBusiness Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber Attack
 
Transparency International Malaysia: Business Integrity Programme
Transparency International Malaysia: Business Integrity ProgrammeTransparency International Malaysia: Business Integrity Programme
Transparency International Malaysia: Business Integrity Programme
 
Bribery Act checklist
Bribery Act checklistBribery Act checklist
Bribery Act checklist
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber SecurityFERMA Webinar: At the Junction of Corporate Governance and Cyber Security
FERMA Webinar: At the Junction of Corporate Governance and Cyber Security
 
What is RIMS Doing?
What is RIMS Doing?What is RIMS Doing?
What is RIMS Doing?
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 

Similar to Managing Risk and Compliance - 14th October 2020

Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_Haluk Ferden Gursel
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
Failure deriving from underestimating risk management
 Failure deriving from underestimating risk management Failure deriving from underestimating risk management
Failure deriving from underestimating risk managementPECB
 
Chartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk ManagementChartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk ManagementCA. (Dr.) Rajkumar Adukia
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Alex Yates
 
Introduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewIntroduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewTatianaMajor22
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
SEC Guidance on Cybersecurity
SEC Guidance on CybersecuritySEC Guidance on Cybersecurity
SEC Guidance on CybersecurityEssert Inc
 
Risk management osh
Risk management oshRisk management osh
Risk management oshjaycatubig
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementAnu Damodaran
 

Similar to Managing Risk and Compliance - 14th October 2020 (20)

Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
Icab lectures chapter 5 & 6, Business and Finance, ICAB
Icab lectures chapter 5 & 6, Business and Finance, ICABIcab lectures chapter 5 & 6, Business and Finance, ICAB
Icab lectures chapter 5 & 6, Business and Finance, ICAB
 
Failure deriving from underestimating risk management
 Failure deriving from underestimating risk management Failure deriving from underestimating risk management
Failure deriving from underestimating risk management
 
Chartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk ManagementChartered Accountant’s Role in an Enterprise Risk Management
Chartered Accountant’s Role in an Enterprise Risk Management
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
 
Risk management
Risk managementRisk management
Risk management
 
Introduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330OverviewIntroduction to Risk ManagementMana.6330Overview
Introduction to Risk ManagementMana.6330Overview
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
SEC Guidance on Cybersecurity
SEC Guidance on CybersecuritySEC Guidance on Cybersecurity
SEC Guidance on Cybersecurity
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 

More from Morlai Kargbo, FCCA

The Power of Connections Presentation - 19th January 2022
The Power of Connections Presentation - 19th January 2022The Power of Connections Presentation - 19th January 2022
The Power of Connections Presentation - 19th January 2022Morlai Kargbo, FCCA
 
Women in Accountancy Presentation - 8th December 2021
Women in Accountancy Presentation - 8th December 2021Women in Accountancy Presentation - 8th December 2021
Women in Accountancy Presentation - 8th December 2021Morlai Kargbo, FCCA
 
The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021
The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021
The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021Morlai Kargbo, FCCA
 
Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021
Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021
Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021Morlai Kargbo, FCCA
 
Seven Types of Rest Presentation - 15th September 2021
Seven Types of Rest Presentation - 15th September 2021Seven Types of Rest Presentation - 15th September 2021
Seven Types of Rest Presentation - 15th September 2021Morlai Kargbo, FCCA
 
Street Children Empowerment Foundation Presentation - 8th September 2021
Street Children Empowerment Foundation Presentation - 8th September 2021Street Children Empowerment Foundation Presentation - 8th September 2021
Street Children Empowerment Foundation Presentation - 8th September 2021Morlai Kargbo, FCCA
 
MicroLoan Foundation Presentation - 11th August 2021
MicroLoan Foundation Presentation - 11th August 2021MicroLoan Foundation Presentation - 11th August 2021
MicroLoan Foundation Presentation - 11th August 2021Morlai Kargbo, FCCA
 
Women in Accountancy Presentation - 28th July 2021
Women in Accountancy Presentation - 28th July 2021Women in Accountancy Presentation - 28th July 2021
Women in Accountancy Presentation - 28th July 2021Morlai Kargbo, FCCA
 
Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021
Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021
Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021Morlai Kargbo, FCCA
 
Creativity in Leadership Presentation - 14th July 2021
Creativity in Leadership Presentation - 14th July 2021Creativity in Leadership Presentation - 14th July 2021
Creativity in Leadership Presentation - 14th July 2021Morlai Kargbo, FCCA
 
Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021
Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021
Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021Morlai Kargbo, FCCA
 
Top Tips on Getting Quality Sleep Presentation - 30th June 2021
Top Tips on Getting Quality Sleep Presentation - 30th June 2021Top Tips on Getting Quality Sleep Presentation - 30th June 2021
Top Tips on Getting Quality Sleep Presentation - 30th June 2021Morlai Kargbo, FCCA
 
Climate Change - New Corporate Reporting Presentation - 16th June 2021
Climate Change - New Corporate Reporting Presentation - 16th June 2021Climate Change - New Corporate Reporting Presentation - 16th June 2021
Climate Change - New Corporate Reporting Presentation - 16th June 2021Morlai Kargbo, FCCA
 
China's Belt and Road Initiative Presentation - 31st March 2021
China's Belt and Road Initiative Presentation - 31st March 2021China's Belt and Road Initiative Presentation - 31st March 2021
China's Belt and Road Initiative Presentation - 31st March 2021Morlai Kargbo, FCCA
 
R&D Tax Relief Presentation - 24th March 2021
R&D Tax Relief Presentation - 24th March 2021R&D Tax Relief Presentation - 24th March 2021
R&D Tax Relief Presentation - 24th March 2021Morlai Kargbo, FCCA
 
Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021
Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021
Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021Morlai Kargbo, FCCA
 
Ellitan's Masterkey Ltd Presentation - 16th December 2020
Ellitan's Masterkey Ltd Presentation - 16th December 2020Ellitan's Masterkey Ltd Presentation - 16th December 2020
Ellitan's Masterkey Ltd Presentation - 16th December 2020Morlai Kargbo, FCCA
 
Brexit Transition Presentation - 9th December 2020
Brexit Transition Presentation - 9th December 2020Brexit Transition Presentation - 9th December 2020
Brexit Transition Presentation - 9th December 2020Morlai Kargbo, FCCA
 
Spotlight Reporting - 25th November 2020
Spotlight Reporting - 25th November 2020Spotlight Reporting - 25th November 2020
Spotlight Reporting - 25th November 2020Morlai Kargbo, FCCA
 
SME Board Meetings and Governance - 11th November 2020
SME Board Meetings and Governance - 11th November 2020SME Board Meetings and Governance - 11th November 2020
SME Board Meetings and Governance - 11th November 2020Morlai Kargbo, FCCA
 

More from Morlai Kargbo, FCCA (20)

The Power of Connections Presentation - 19th January 2022
The Power of Connections Presentation - 19th January 2022The Power of Connections Presentation - 19th January 2022
The Power of Connections Presentation - 19th January 2022
 
Women in Accountancy Presentation - 8th December 2021
Women in Accountancy Presentation - 8th December 2021Women in Accountancy Presentation - 8th December 2021
Women in Accountancy Presentation - 8th December 2021
 
The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021
The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021
The Impact of Grief and Loss in the Workplace Presentation - 6th October 2021
 
Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021
Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021
Ellitan's Masterkey Ltd Mastermind Quiz - 29th September 2021
 
Seven Types of Rest Presentation - 15th September 2021
Seven Types of Rest Presentation - 15th September 2021Seven Types of Rest Presentation - 15th September 2021
Seven Types of Rest Presentation - 15th September 2021
 
Street Children Empowerment Foundation Presentation - 8th September 2021
Street Children Empowerment Foundation Presentation - 8th September 2021Street Children Empowerment Foundation Presentation - 8th September 2021
Street Children Empowerment Foundation Presentation - 8th September 2021
 
MicroLoan Foundation Presentation - 11th August 2021
MicroLoan Foundation Presentation - 11th August 2021MicroLoan Foundation Presentation - 11th August 2021
MicroLoan Foundation Presentation - 11th August 2021
 
Women in Accountancy Presentation - 28th July 2021
Women in Accountancy Presentation - 28th July 2021Women in Accountancy Presentation - 28th July 2021
Women in Accountancy Presentation - 28th July 2021
 
Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021
Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021
Digitisation of the Ghanaian Economy (Part 2) Presentation - 21st July 2021
 
Creativity in Leadership Presentation - 14th July 2021
Creativity in Leadership Presentation - 14th July 2021Creativity in Leadership Presentation - 14th July 2021
Creativity in Leadership Presentation - 14th July 2021
 
Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021
Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021
Digitisation of the Ghanaian Economy (Part 1) Presentation - 7th July 2021
 
Top Tips on Getting Quality Sleep Presentation - 30th June 2021
Top Tips on Getting Quality Sleep Presentation - 30th June 2021Top Tips on Getting Quality Sleep Presentation - 30th June 2021
Top Tips on Getting Quality Sleep Presentation - 30th June 2021
 
Climate Change - New Corporate Reporting Presentation - 16th June 2021
Climate Change - New Corporate Reporting Presentation - 16th June 2021Climate Change - New Corporate Reporting Presentation - 16th June 2021
Climate Change - New Corporate Reporting Presentation - 16th June 2021
 
China's Belt and Road Initiative Presentation - 31st March 2021
China's Belt and Road Initiative Presentation - 31st March 2021China's Belt and Road Initiative Presentation - 31st March 2021
China's Belt and Road Initiative Presentation - 31st March 2021
 
R&D Tax Relief Presentation - 24th March 2021
R&D Tax Relief Presentation - 24th March 2021R&D Tax Relief Presentation - 24th March 2021
R&D Tax Relief Presentation - 24th March 2021
 
Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021
Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021
Accounting for Grants, Reliefs and Loans Presentation - 10th February 2021
 
Ellitan's Masterkey Ltd Presentation - 16th December 2020
Ellitan's Masterkey Ltd Presentation - 16th December 2020Ellitan's Masterkey Ltd Presentation - 16th December 2020
Ellitan's Masterkey Ltd Presentation - 16th December 2020
 
Brexit Transition Presentation - 9th December 2020
Brexit Transition Presentation - 9th December 2020Brexit Transition Presentation - 9th December 2020
Brexit Transition Presentation - 9th December 2020
 
Spotlight Reporting - 25th November 2020
Spotlight Reporting - 25th November 2020Spotlight Reporting - 25th November 2020
Spotlight Reporting - 25th November 2020
 
SME Board Meetings and Governance - 11th November 2020
SME Board Meetings and Governance - 11th November 2020SME Board Meetings and Governance - 11th November 2020
SME Board Meetings and Governance - 11th November 2020
 

Recently uploaded

VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 

Recently uploaded (20)

VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 

Managing Risk and Compliance - 14th October 2020

  • 2. Definitions - Risk Management and Compliance Risk…  Risk is defined as the probability / possibility of something bad happening – (A common definition)  The effect of uncertainty on our ability to achieve our Objectives – (ISO31000 definition) Compliance…..  the process of making sure your company and employees follow all laws, regulations, standards, and ethical practices that apply to your organisation which falls within governance
  • 3. Development of Risk Management Before the French mathematician Blaise Pascal’s probability theory, there was no means of measuring the chance of potential outcomes ‘Preparing for the future was very much in the lap of the gods’ Risk Management has enabled significant improvements in Decision-making Risk Management…. Encompasses the identification, analysis, and response to risk factors that form part of the life of a business. Effective risk management means attempting to control, as much as possible, future outcomes by acting proactively rather than reactively. Corporate Finance Institute
  • 4. Types of Risk Types of Risk Regulatory Compliance Risk IT Risk People Risk Credit Risk Cybersecurity Risk Fraud Risk Health & Safety Risk Building Security Risk Brand & Reputation Risk
  • 5. Risk Appetite – Pros and Cons of Risk-Taking  Risk Appetite…. is the level of risk that an organization is prepared to accept in pursuit of its business objectives  Risks are not always negative and can present opportunities Pros of Risk Decision to ‘Invest in business expansion’ Cons of Risk Failure to invest in robust IT Systems and therefore Cybersecurity risk management
  • 6. Who’s Responsible for Risk Management  Risk Management is the responsibility of every employee  The Risk Management Tone & Culture of your organisation is ‘Set from the Top’ and the ultimate responsibility is with the Board of Directors Board of Directors Management Every company employee
  • 7. The Risk Management Cycle  Risk Management is part of the Day to Day Business
  • 8. Types of Risk Mitigation What is Risk Mitigation? A key element of the risk management cycle – ‘it’s the process of taking specific and deliberate actions to minimise or eliminate unacceptable risks’ (Outside Risk Appetite) Examples of Risk Mitigation  Staff Training - Well trained staff make less mistakes  Evaluate your Customers - Review the credit rating of your customers before extending generous payment terms  Implement Four-Eyes Payment Controls - To ensure a single individual cannot initiate and authorise payments  Buy Insurance - So that you can transfer the risk to someone with a greater risk appetite for it
  • 9. In Focus….A Major Risk during COVID-19  COVID-19 Pandemic has resulted in an unprecedented number of businesses enabling their staff to work from home  Working away from a secure office environment has resulted in a significant increase in Cybersecurity Risks and Threats  Cybercriminals have recognised and embraced this opportunity  Since the start of ‘Lock-Down’ across the globe, the number of incidences of Phishing and Business Email Compromise has increased significantly  Over 90% of successful cybersecurity breaches start with an email and involve an act or omission (error) by a staff member Post-COVID Trends in Phishing Emails Post-COVID Trends in Business Email Compromise
  • 10. In Focus….Customer Data Protection (GDPR) Six Major Principles of GDPR 1.0 Processed lawfully, fairly and in a transparent manner 2.0 Collected for specified, explicit and legitimate purposes 3.0 Adequate, relevant and limited to what is necessary 4.0 Accurate and, where necessary, kept up to date 5.0 Retained only for as long as necessary 6.0 Processed in an appropriate manner to maintain security General Rule: GDPR (General Data Protection Regulations) applies to any company that stores or processes personal information about EU citizens within EU states, even if they do not have a business presence within the EU  Supervisory Authorities have the power to impose fines against companies guilty of breaching GDPR:  €10,000,000 or 2% of worldwide annual turn-over in preceding F/Year (whichever is greater)  €20,000,000 or 4% of worldwide annual turn-over in preceding F/Year (whichever is greater)  Size of the fine will depend on the severity of the incident and type of personal data lost  Judicial Remedy Penalties for Non-Compliance with GDPR
  • 11. Next Steps In Protecting Your Business Key Steps To Improve your Information Security , Data Protection and Business-wide Risk Management  Put an Info Security & Data Protection Policy in place as soon as possible  Complete a data inventory for your business i.e. What / Who’s / How / When assessment of the data do you hold  Assign specific responsibility for Information Security and Data Protection at Board and Management level  Initiate a Cybersecurity Risk Assessment of your business with the support of an experienced risk consultant  Organise regular Cybersecurity staff awareness training for all staff at all levels of your business  Implement a broader business-wide risk inventory with the support of an experienced risk management and compliance consultant  Engage in risk mitigation immediately where ‘common sense’ suggests you should do so; Your ’gut instinct’ is often right!