SlideShare a Scribd company logo
1 of 4
Download to read offline
AI and Data Analytics in Operational Risk Management and Investment Management – Part 1
Guan Seng Khoo, PhD; gskhoo@gmail.com
Former Head of ERM/GRC, AIMCo
I. Focus on Operational Risk Management: Prologue - Walking the Walk
The Context / Environment of the Eco-system
In most of the organizations I have worked with, I often chatted with the building security personnel and
one a while, accompanied them while they made their rounds, to observe and understand what they
faced and experienced daily and get their feedback on how they would react and communicate to the
stakeholders (incl. landlords, tenants, occupants, govt. support services, etc.) in times of disruptions,
emergencies, etc. or criminal acts as well. In essence, they are the "experts" in their defined areas of
responsibilities and getting their feedback helps us in our own understanding of how the
potential operational risks can arise in a particular eco-system (vertical or at the BU level or horizontal
and cross-sectional at the enterprise level) with a lifecycle view of the business activities and processes in
the eco-system.
Internal Blind Spots
To elucidate further the importance of understanding the business process in the operational risk space,
let’s briefly compare the loss events at Barings and Enron. In the case of Barings, it was about the lack of
oversight and awareness by the senior management and board of directors (in London) about Leeson’s
activities in Singapore, while in Enron’s case, the senior management was directly involved in the
fraudulent activities. The fraudulent activities in both cases were due to and involved different "internal"
processes.
So, as I listened to most of the other speakers (mostly from IT vendors) at this AI event, I realized that
most of the focus of the FCC solution vendors today (in the field of AI and data analytics applied to op risk
management), are still biased towards the external perspective in targeting the external perpetrators in
say, fraud, money laundering, hacking, KYC-type client on-boarding (naturally, of course), etc. Very few of
these solutions cover the internal (or in-house) perspective or address more of the potential incidences
or issues that could be perpetrated by insiders or colleagues, in isolation (e.g., rogue trader) or in cahoots
with other parties (e.g., the LIBOR scandal). Hence, it is very important to first understand and be
knowledgeable about the business process occurring in a particular or generic context (environment), to
augment one’s risk mitigation or management challenge in devising strategies or procedures to mitigate
such potential loss events.
Eco-system Impact from Individual Parts (when not in sync with the rest)
When all the parts in this eco-system are moving smoothly and in unison, it's almost like a "6 sigma"
state. However, it just takes one entity or participant who refuses to play along to cause a malfunction
or breakdown in the integrity process to impact the whole ecosystem. Using an extreme example, this is
often the case with issues in home title ownership in some countries or provinces where fraudulent
characters impersonate the real or beneficial owners, selling their homes and absconding with the
proceeds, jeopardizing the status of the beneficial owners who are often still liable for the mortgage loans
outstanding. These criminals often act in cahoots with insiders or perpetrators at say, the land registries,
etc. So, while the lender (the FI) might have a sophisticated KYC system in identifying the borrower (the
victim of the crime above) as a credit-worthy customer, events or perpetrators in other "organs" of the
eco-system might still cause an impact or unintended consequence to the state of operational risk
readiness at the lender's end.
Business Process Governance
Essentially then, in the context of optimal operational risk management, it is highly appropriate to perform
a risk mapping between the potential loss events and business process first. The risk-based mapping
process will enhance the clarity and future audit of the operations in addition to unearthing more latent
information about the organization itself. This way, a more comprehensive and enterprise-view of the
potential operational risk exposures hopefully can be unearthed first.
Of course, not all scenarios can be accounted for but the task involved will elevate the organization to a
higher level of awareness and appreciation of all its business processes and correspondingly, operational
risk management. As a result of the exercise, if future loss incidences occur, the risk response from the
mapping process may potentially help prevent the escalation of these losses or to mitigate them
appropriately.
What is often not mentioned from these process-centric risk mapping exercises is the transparency that
they yield as part of the outcomes. When performed across the whole organization, the clarity achieved
in terms of highlighting each business unit or line, together with the core processes and task-holders
(contact persons) involved can never be under-estimated as accountability and “auditability” are also
taken into consideration – ATA (Accountability, Transparency and Auditability) – see Fig. below.
When coupled with issues related to the quality, time and cost, such a risk- and data-oriented ATA model
will provide a better analysis of the processes and the potential operational risk exposures. Also, with the
current global emphasis on corporate governance and transparency, the ATA approach fits this “ethics”
mindset nicely and provides the benchmark for best practices in ORM implementation, especially those
pertaining to Pillar 2 of the Basel Accord.
To expedite the mapping, we can make use of reference models for the definition of high-level processes,
with the risks assigned on a process level, instead of a business line, thus yielding more clarity and
concrete information. The processes themselves can also be the basis for the op risk self-assessment
(RSA), ensuring a complete picture for every process.
In a nutshell, ORM and business process governance go hand-in-hand together, augmented by smarter
analytics of the data or information from myriad sources incl. expert judgements.
Lessons on Data Sourcing – Performing Due Diligence Assessment on External Managers
While most assessments on external managers tend to focus on their financials, I also employ the same
principles as above when visiting these firms to get a better appreciation of how they (external managers)
manage risk. I prefer to meet employees from all levels of their organizational hierarchy in their natural
setting, rather than in just pre-arranged meeting rooms (and usually with C-suite or senior management
executives only). Once, I visited a famous firm and in an informal chat with one of the portfolio managers
along the corridor after lunch, he “boasted” about the Bentley he just bought after joining the firm
because the rest of the senior staff also owned and drove Bentleys (evident from the parked Bentleys in
the carpark) ………. You can guess how I perceive this firm.
Extending your conversations to include the traders on the trading floors, auditors or compliance staff
going about doing their work, including the janitor, you’d often be surprised with the nuggets of
information you picked up. Such informal activities and exchanges often yield far more information about
the firms’ conduct and integrity beyond the financial numbers and these unstructured data play a critical
role in my overall assessment of these firms during my due diligence visits – I will be elaborating more on
the financial and performance assessment in part 2.

More Related Content

Similar to Ai and data analytics in operational risk management and investment management part 1

Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueDavid Graham
 
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...Guan Khoo
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDana Canavan
 
Risk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfRisk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfharihelectronicspune
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016bfreeman1987
 
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESBUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESMark Evans
 
SUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTSUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTPaul Authachinda
 
GRC CMAJ Bala and Shyam
GRC CMAJ Bala and ShyamGRC CMAJ Bala and Shyam
GRC CMAJ Bala and Shyamshyam sundar
 
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...Gradytl
 
The IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docxThe IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docxjmindy
 
Why Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessWhy Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessEverteam
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Skill Pyramid
Skill Pyramid Skill Pyramid
Skill Pyramid Ted Brauch
 
Effective and practical controls for solid aml division
Effective and practical controls for solid aml divisionEffective and practical controls for solid aml division
Effective and practical controls for solid aml divisioncomplianceonline123
 

Similar to Ai and data analytics in operational risk management and investment management part 1 (20)

Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and value
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmed
 
Risk management
Risk managementRisk management
Risk management
 
Risk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfRisk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdf
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
 
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESBUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
 
Fraud Risk Assessment_Notes
Fraud Risk Assessment_NotesFraud Risk Assessment_Notes
Fraud Risk Assessment_Notes
 
SUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTSUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENT
 
GRC CMAJ Bala and Shyam
GRC CMAJ Bala and ShyamGRC CMAJ Bala and Shyam
GRC CMAJ Bala and Shyam
 
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
 
The IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docxThe IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docx
 
Why Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessWhy Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's Success
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Skill Pyramid
Skill Pyramid Skill Pyramid
Skill Pyramid
 
Lean Auditing
Lean AuditingLean Auditing
Lean Auditing
 
Effective and practical controls for solid aml division
Effective and practical controls for solid aml divisionEffective and practical controls for solid aml division
Effective and practical controls for solid aml division
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 

More from Guan Khoo

Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversionSg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversionGuan Khoo
 
Empirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cioEmpirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cioGuan Khoo
 
Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...Guan Khoo
 
Ifrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deteriorationIfrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deteriorationGuan Khoo
 
China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion Guan Khoo
 
Evidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIOEvidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIOGuan Khoo
 
Abc financial analyticsdemo
Abc financial analyticsdemoAbc financial analyticsdemo
Abc financial analyticsdemoGuan Khoo
 
Abcwealthmgr2002
Abcwealthmgr2002Abcwealthmgr2002
Abcwealthmgr2002Guan Khoo
 
Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008Guan Khoo
 
Real asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khooReal asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khooGuan Khoo
 
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersionAifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersionGuan Khoo
 
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...Guan Khoo
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooGuan Khoo
 
Rma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of IcaapRma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of IcaapGuan Khoo
 

More from Guan Khoo (14)

Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversionSg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
 
Empirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cioEmpirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cio
 
Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...
 
Ifrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deteriorationIfrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deterioration
 
China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion
 
Evidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIOEvidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIO
 
Abc financial analyticsdemo
Abc financial analyticsdemoAbc financial analyticsdemo
Abc financial analyticsdemo
 
Abcwealthmgr2002
Abcwealthmgr2002Abcwealthmgr2002
Abcwealthmgr2002
 
Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008
 
Real asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khooReal asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khoo
 
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersionAifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
 
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs Khoo
 
Rma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of IcaapRma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of Icaap
 

Recently uploaded

Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 

Recently uploaded (20)

Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 

Ai and data analytics in operational risk management and investment management part 1

  • 1. AI and Data Analytics in Operational Risk Management and Investment Management – Part 1 Guan Seng Khoo, PhD; gskhoo@gmail.com Former Head of ERM/GRC, AIMCo I. Focus on Operational Risk Management: Prologue - Walking the Walk The Context / Environment of the Eco-system In most of the organizations I have worked with, I often chatted with the building security personnel and one a while, accompanied them while they made their rounds, to observe and understand what they faced and experienced daily and get their feedback on how they would react and communicate to the stakeholders (incl. landlords, tenants, occupants, govt. support services, etc.) in times of disruptions, emergencies, etc. or criminal acts as well. In essence, they are the "experts" in their defined areas of responsibilities and getting their feedback helps us in our own understanding of how the potential operational risks can arise in a particular eco-system (vertical or at the BU level or horizontal and cross-sectional at the enterprise level) with a lifecycle view of the business activities and processes in the eco-system. Internal Blind Spots To elucidate further the importance of understanding the business process in the operational risk space, let’s briefly compare the loss events at Barings and Enron. In the case of Barings, it was about the lack of oversight and awareness by the senior management and board of directors (in London) about Leeson’s activities in Singapore, while in Enron’s case, the senior management was directly involved in the fraudulent activities. The fraudulent activities in both cases were due to and involved different "internal" processes. So, as I listened to most of the other speakers (mostly from IT vendors) at this AI event, I realized that most of the focus of the FCC solution vendors today (in the field of AI and data analytics applied to op risk management), are still biased towards the external perspective in targeting the external perpetrators in say, fraud, money laundering, hacking, KYC-type client on-boarding (naturally, of course), etc. Very few of these solutions cover the internal (or in-house) perspective or address more of the potential incidences or issues that could be perpetrated by insiders or colleagues, in isolation (e.g., rogue trader) or in cahoots with other parties (e.g., the LIBOR scandal). Hence, it is very important to first understand and be knowledgeable about the business process occurring in a particular or generic context (environment), to augment one’s risk mitigation or management challenge in devising strategies or procedures to mitigate such potential loss events. Eco-system Impact from Individual Parts (when not in sync with the rest) When all the parts in this eco-system are moving smoothly and in unison, it's almost like a "6 sigma" state. However, it just takes one entity or participant who refuses to play along to cause a malfunction
  • 2. or breakdown in the integrity process to impact the whole ecosystem. Using an extreme example, this is often the case with issues in home title ownership in some countries or provinces where fraudulent characters impersonate the real or beneficial owners, selling their homes and absconding with the proceeds, jeopardizing the status of the beneficial owners who are often still liable for the mortgage loans outstanding. These criminals often act in cahoots with insiders or perpetrators at say, the land registries, etc. So, while the lender (the FI) might have a sophisticated KYC system in identifying the borrower (the victim of the crime above) as a credit-worthy customer, events or perpetrators in other "organs" of the eco-system might still cause an impact or unintended consequence to the state of operational risk readiness at the lender's end. Business Process Governance Essentially then, in the context of optimal operational risk management, it is highly appropriate to perform a risk mapping between the potential loss events and business process first. The risk-based mapping process will enhance the clarity and future audit of the operations in addition to unearthing more latent information about the organization itself. This way, a more comprehensive and enterprise-view of the potential operational risk exposures hopefully can be unearthed first. Of course, not all scenarios can be accounted for but the task involved will elevate the organization to a higher level of awareness and appreciation of all its business processes and correspondingly, operational risk management. As a result of the exercise, if future loss incidences occur, the risk response from the mapping process may potentially help prevent the escalation of these losses or to mitigate them appropriately. What is often not mentioned from these process-centric risk mapping exercises is the transparency that they yield as part of the outcomes. When performed across the whole organization, the clarity achieved in terms of highlighting each business unit or line, together with the core processes and task-holders (contact persons) involved can never be under-estimated as accountability and “auditability” are also taken into consideration – ATA (Accountability, Transparency and Auditability) – see Fig. below.
  • 3. When coupled with issues related to the quality, time and cost, such a risk- and data-oriented ATA model will provide a better analysis of the processes and the potential operational risk exposures. Also, with the current global emphasis on corporate governance and transparency, the ATA approach fits this “ethics” mindset nicely and provides the benchmark for best practices in ORM implementation, especially those pertaining to Pillar 2 of the Basel Accord. To expedite the mapping, we can make use of reference models for the definition of high-level processes, with the risks assigned on a process level, instead of a business line, thus yielding more clarity and concrete information. The processes themselves can also be the basis for the op risk self-assessment (RSA), ensuring a complete picture for every process. In a nutshell, ORM and business process governance go hand-in-hand together, augmented by smarter analytics of the data or information from myriad sources incl. expert judgements. Lessons on Data Sourcing – Performing Due Diligence Assessment on External Managers While most assessments on external managers tend to focus on their financials, I also employ the same principles as above when visiting these firms to get a better appreciation of how they (external managers) manage risk. I prefer to meet employees from all levels of their organizational hierarchy in their natural setting, rather than in just pre-arranged meeting rooms (and usually with C-suite or senior management executives only). Once, I visited a famous firm and in an informal chat with one of the portfolio managers along the corridor after lunch, he “boasted” about the Bentley he just bought after joining the firm
  • 4. because the rest of the senior staff also owned and drove Bentleys (evident from the parked Bentleys in the carpark) ………. You can guess how I perceive this firm. Extending your conversations to include the traders on the trading floors, auditors or compliance staff going about doing their work, including the janitor, you’d often be surprised with the nuggets of information you picked up. Such informal activities and exchanges often yield far more information about the firms’ conduct and integrity beyond the financial numbers and these unstructured data play a critical role in my overall assessment of these firms during my due diligence visits – I will be elaborating more on the financial and performance assessment in part 2.