SlideShare a Scribd company logo
AI and Data Analytics in Operational Risk Management and Investment Management – Part 1
Guan Seng Khoo, PhD; gskhoo@gmail.com
Former Head of ERM/GRC, AIMCo
I. Focus on Operational Risk Management: Prologue - Walking the Walk
The Context / Environment of the Eco-system
In most of the organizations I have worked with, I often chatted with the building security personnel and
one a while, accompanied them while they made their rounds, to observe and understand what they
faced and experienced daily and get their feedback on how they would react and communicate to the
stakeholders (incl. landlords, tenants, occupants, govt. support services, etc.) in times of disruptions,
emergencies, etc. or criminal acts as well. In essence, they are the "experts" in their defined areas of
responsibilities and getting their feedback helps us in our own understanding of how the
potential operational risks can arise in a particular eco-system (vertical or at the BU level or horizontal
and cross-sectional at the enterprise level) with a lifecycle view of the business activities and processes in
the eco-system.
Internal Blind Spots
To elucidate further the importance of understanding the business process in the operational risk space,
let’s briefly compare the loss events at Barings and Enron. In the case of Barings, it was about the lack of
oversight and awareness by the senior management and board of directors (in London) about Leeson’s
activities in Singapore, while in Enron’s case, the senior management was directly involved in the
fraudulent activities. The fraudulent activities in both cases were due to and involved different "internal"
processes.
So, as I listened to most of the other speakers (mostly from IT vendors) at this AI event, I realized that
most of the focus of the FCC solution vendors today (in the field of AI and data analytics applied to op risk
management), are still biased towards the external perspective in targeting the external perpetrators in
say, fraud, money laundering, hacking, KYC-type client on-boarding (naturally, of course), etc. Very few of
these solutions cover the internal (or in-house) perspective or address more of the potential incidences
or issues that could be perpetrated by insiders or colleagues, in isolation (e.g., rogue trader) or in cahoots
with other parties (e.g., the LIBOR scandal). Hence, it is very important to first understand and be
knowledgeable about the business process occurring in a particular or generic context (environment), to
augment one’s risk mitigation or management challenge in devising strategies or procedures to mitigate
such potential loss events.
Eco-system Impact from Individual Parts (when not in sync with the rest)
When all the parts in this eco-system are moving smoothly and in unison, it's almost like a "6 sigma"
state. However, it just takes one entity or participant who refuses to play along to cause a malfunction
or breakdown in the integrity process to impact the whole ecosystem. Using an extreme example, this is
often the case with issues in home title ownership in some countries or provinces where fraudulent
characters impersonate the real or beneficial owners, selling their homes and absconding with the
proceeds, jeopardizing the status of the beneficial owners who are often still liable for the mortgage loans
outstanding. These criminals often act in cahoots with insiders or perpetrators at say, the land registries,
etc. So, while the lender (the FI) might have a sophisticated KYC system in identifying the borrower (the
victim of the crime above) as a credit-worthy customer, events or perpetrators in other "organs" of the
eco-system might still cause an impact or unintended consequence to the state of operational risk
readiness at the lender's end.
Business Process Governance
Essentially then, in the context of optimal operational risk management, it is highly appropriate to perform
a risk mapping between the potential loss events and business process first. The risk-based mapping
process will enhance the clarity and future audit of the operations in addition to unearthing more latent
information about the organization itself. This way, a more comprehensive and enterprise-view of the
potential operational risk exposures hopefully can be unearthed first.
Of course, not all scenarios can be accounted for but the task involved will elevate the organization to a
higher level of awareness and appreciation of all its business processes and correspondingly, operational
risk management. As a result of the exercise, if future loss incidences occur, the risk response from the
mapping process may potentially help prevent the escalation of these losses or to mitigate them
appropriately.
What is often not mentioned from these process-centric risk mapping exercises is the transparency that
they yield as part of the outcomes. When performed across the whole organization, the clarity achieved
in terms of highlighting each business unit or line, together with the core processes and task-holders
(contact persons) involved can never be under-estimated as accountability and “auditability” are also
taken into consideration – ATA (Accountability, Transparency and Auditability) – see Fig. below.
When coupled with issues related to the quality, time and cost, such a risk- and data-oriented ATA model
will provide a better analysis of the processes and the potential operational risk exposures. Also, with the
current global emphasis on corporate governance and transparency, the ATA approach fits this “ethics”
mindset nicely and provides the benchmark for best practices in ORM implementation, especially those
pertaining to Pillar 2 of the Basel Accord.
To expedite the mapping, we can make use of reference models for the definition of high-level processes,
with the risks assigned on a process level, instead of a business line, thus yielding more clarity and
concrete information. The processes themselves can also be the basis for the op risk self-assessment
(RSA), ensuring a complete picture for every process.
In a nutshell, ORM and business process governance go hand-in-hand together, augmented by smarter
analytics of the data or information from myriad sources incl. expert judgements.
Lessons on Data Sourcing – Performing Due Diligence Assessment on External Managers
While most assessments on external managers tend to focus on their financials, I also employ the same
principles as above when visiting these firms to get a better appreciation of how they (external managers)
manage risk. I prefer to meet employees from all levels of their organizational hierarchy in their natural
setting, rather than in just pre-arranged meeting rooms (and usually with C-suite or senior management
executives only). Once, I visited a famous firm and in an informal chat with one of the portfolio managers
along the corridor after lunch, he “boasted” about the Bentley he just bought after joining the firm
because the rest of the senior staff also owned and drove Bentleys (evident from the parked Bentleys in
the carpark) ………. You can guess how I perceive this firm.
Extending your conversations to include the traders on the trading floors, auditors or compliance staff
going about doing their work, including the janitor, you’d often be surprised with the nuggets of
information you picked up. Such informal activities and exchanges often yield far more information about
the firms’ conduct and integrity beyond the financial numbers and these unstructured data play a critical
role in my overall assessment of these firms during my due diligence visits – I will be elaborating more on
the financial and performance assessment in part 2.

More Related Content

Similar to Ai and data analytics in operational risk management and investment management part 1

Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and value
David Graham
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
Tom Patterson CPA CISA
 
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
Guan Khoo
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
Chad Korosec
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmed
Dana Canavan
 
Risk management
Risk managementRisk management
Risk management
kartikganga
 
Risk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfRisk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdf
harihelectronicspune
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
bfreeman1987
 
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESBUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
Mark Evans
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
mahaffeycheryld
 
Fraud Risk Assessment_Notes
Fraud Risk Assessment_NotesFraud Risk Assessment_Notes
Fraud Risk Assessment_Notes
Charanjeet Singh Bhatia
 
SUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTSUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENT
Paul Authachinda
 
GRC CMAJ Bala and Shyam
GRC CMAJ Bala and ShyamGRC CMAJ Bala and Shyam
GRC CMAJ Bala and Shyam
shyam sundar
 
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Gradytl
 
The IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docxThe IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docx
jmindy
 
Why Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessWhy Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's Success
Everteam
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
Beji Jacob
 
Skill Pyramid
Skill Pyramid Skill Pyramid
Skill Pyramid
Ted Brauch
 
Lean Auditing
Lean AuditingLean Auditing
Effective and practical controls for solid aml division
Effective and practical controls for solid aml divisionEffective and practical controls for solid aml division
Effective and practical controls for solid aml division
complianceonline123
 

Similar to Ai and data analytics in operational risk management and investment management part 1 (20)

Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and value
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
My ERM Chapter (9) in "Operational Risk 2.0", (Riskbooks, 2007) introducing B...
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmed
 
Risk management
Risk managementRisk management
Risk management
 
Risk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfRisk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdf
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
 
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESBUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Fraud Risk Assessment_Notes
Fraud Risk Assessment_NotesFraud Risk Assessment_Notes
Fraud Risk Assessment_Notes
 
SUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENTSUPPLY CHAIN RISK MANAGEMENT
SUPPLY CHAIN RISK MANAGEMENT
 
GRC CMAJ Bala and Shyam
GRC CMAJ Bala and ShyamGRC CMAJ Bala and Shyam
GRC CMAJ Bala and Shyam
 
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
Whitepaper: Misconduct Rarely Happens in Isolation: How You Can Detect Critic...
 
The IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docxThe IUP Journal of Operations Management, Vol. XVI, .docx
The IUP Journal of Operations Management, Vol. XVI, .docx
 
Why Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's SuccessWhy Unstructured Processes are Critical to an Organization's Success
Why Unstructured Processes are Critical to an Organization's Success
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Skill Pyramid
Skill Pyramid Skill Pyramid
Skill Pyramid
 
Lean Auditing
Lean AuditingLean Auditing
Lean Auditing
 
Effective and practical controls for solid aml division
Effective and practical controls for solid aml divisionEffective and practical controls for solid aml division
Effective and practical controls for solid aml division
 

More from Guan Khoo

Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversionSg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Guan Khoo
 
Empirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cioEmpirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cio
Guan Khoo
 
Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...
Guan Khoo
 
Ifrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deteriorationIfrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deterioration
Guan Khoo
 
China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion
Guan Khoo
 
Evidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIOEvidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIO
Guan Khoo
 
Abc financial analyticsdemo
Abc financial analyticsdemoAbc financial analyticsdemo
Abc financial analyticsdemo
Guan Khoo
 
Abcwealthmgr2002
Abcwealthmgr2002Abcwealthmgr2002
Abcwealthmgr2002
Guan Khoo
 
Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008
Guan Khoo
 
Real asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khooReal asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khoo
Guan Khoo
 
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersionAifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
Guan Khoo
 
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Guan Khoo
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs Khoo
Guan Khoo
 
Rma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of IcaapRma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of Icaap
Guan Khoo
 

More from Guan Khoo (14)

Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversionSg iqpc sg_feb2409_iparmasia_gskhoofinalversion
Sg iqpc sg_feb2409_iparmasia_gskhoofinalversion
 
Empirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cioEmpirical evidence based investing - lessons for the cio
Empirical evidence based investing - lessons for the cio
 
Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...Ai and data analytics in operational risk management and investment managemen...
Ai and data analytics in operational risk management and investment managemen...
 
Ifrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deteriorationIfrs9 ntu mfe2000-ews-credit-deterioration
Ifrs9 ntu mfe2000-ews-credit-deterioration
 
China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion China's A-shares post-MSCI inclusion
China's A-shares post-MSCI inclusion
 
Evidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIOEvidence-based Investing: Lessons for the CIO
Evidence-based Investing: Lessons for the CIO
 
Abc financial analyticsdemo
Abc financial analyticsdemoAbc financial analyticsdemo
Abc financial analyticsdemo
 
Abcwealthmgr2002
Abcwealthmgr2002Abcwealthmgr2002
Abcwealthmgr2002
 
Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008Robo advisory-online-fow dw-asia-gs_khooalgo2008
Robo advisory-online-fow dw-asia-gs_khooalgo2008
 
Real asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khooReal asset some unspoken challenges in real asset investing gs-khoo
Real asset some unspoken challenges in real asset investing gs-khoo
 
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersionAifmd iosco hedge fund reporting template 2010draft-LiteVersion
Aifmd iosco hedge fund reporting template 2010draft-LiteVersion
 
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
Algorithmic Google on Streaming Prices _Technical&FundamentalAnalyses + Portf...
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs Khoo
 
Rma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of IcaapRma May22 Stress Testing In The Context Of Icaap
Rma May22 Stress Testing In The Context Of Icaap
 

Recently uploaded

Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Enterprise Wired
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
eddie19851
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 

Recently uploaded (20)

Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 

Ai and data analytics in operational risk management and investment management part 1

  • 1. AI and Data Analytics in Operational Risk Management and Investment Management – Part 1 Guan Seng Khoo, PhD; gskhoo@gmail.com Former Head of ERM/GRC, AIMCo I. Focus on Operational Risk Management: Prologue - Walking the Walk The Context / Environment of the Eco-system In most of the organizations I have worked with, I often chatted with the building security personnel and one a while, accompanied them while they made their rounds, to observe and understand what they faced and experienced daily and get their feedback on how they would react and communicate to the stakeholders (incl. landlords, tenants, occupants, govt. support services, etc.) in times of disruptions, emergencies, etc. or criminal acts as well. In essence, they are the "experts" in their defined areas of responsibilities and getting their feedback helps us in our own understanding of how the potential operational risks can arise in a particular eco-system (vertical or at the BU level or horizontal and cross-sectional at the enterprise level) with a lifecycle view of the business activities and processes in the eco-system. Internal Blind Spots To elucidate further the importance of understanding the business process in the operational risk space, let’s briefly compare the loss events at Barings and Enron. In the case of Barings, it was about the lack of oversight and awareness by the senior management and board of directors (in London) about Leeson’s activities in Singapore, while in Enron’s case, the senior management was directly involved in the fraudulent activities. The fraudulent activities in both cases were due to and involved different "internal" processes. So, as I listened to most of the other speakers (mostly from IT vendors) at this AI event, I realized that most of the focus of the FCC solution vendors today (in the field of AI and data analytics applied to op risk management), are still biased towards the external perspective in targeting the external perpetrators in say, fraud, money laundering, hacking, KYC-type client on-boarding (naturally, of course), etc. Very few of these solutions cover the internal (or in-house) perspective or address more of the potential incidences or issues that could be perpetrated by insiders or colleagues, in isolation (e.g., rogue trader) or in cahoots with other parties (e.g., the LIBOR scandal). Hence, it is very important to first understand and be knowledgeable about the business process occurring in a particular or generic context (environment), to augment one’s risk mitigation or management challenge in devising strategies or procedures to mitigate such potential loss events. Eco-system Impact from Individual Parts (when not in sync with the rest) When all the parts in this eco-system are moving smoothly and in unison, it's almost like a "6 sigma" state. However, it just takes one entity or participant who refuses to play along to cause a malfunction
  • 2. or breakdown in the integrity process to impact the whole ecosystem. Using an extreme example, this is often the case with issues in home title ownership in some countries or provinces where fraudulent characters impersonate the real or beneficial owners, selling their homes and absconding with the proceeds, jeopardizing the status of the beneficial owners who are often still liable for the mortgage loans outstanding. These criminals often act in cahoots with insiders or perpetrators at say, the land registries, etc. So, while the lender (the FI) might have a sophisticated KYC system in identifying the borrower (the victim of the crime above) as a credit-worthy customer, events or perpetrators in other "organs" of the eco-system might still cause an impact or unintended consequence to the state of operational risk readiness at the lender's end. Business Process Governance Essentially then, in the context of optimal operational risk management, it is highly appropriate to perform a risk mapping between the potential loss events and business process first. The risk-based mapping process will enhance the clarity and future audit of the operations in addition to unearthing more latent information about the organization itself. This way, a more comprehensive and enterprise-view of the potential operational risk exposures hopefully can be unearthed first. Of course, not all scenarios can be accounted for but the task involved will elevate the organization to a higher level of awareness and appreciation of all its business processes and correspondingly, operational risk management. As a result of the exercise, if future loss incidences occur, the risk response from the mapping process may potentially help prevent the escalation of these losses or to mitigate them appropriately. What is often not mentioned from these process-centric risk mapping exercises is the transparency that they yield as part of the outcomes. When performed across the whole organization, the clarity achieved in terms of highlighting each business unit or line, together with the core processes and task-holders (contact persons) involved can never be under-estimated as accountability and “auditability” are also taken into consideration – ATA (Accountability, Transparency and Auditability) – see Fig. below.
  • 3. When coupled with issues related to the quality, time and cost, such a risk- and data-oriented ATA model will provide a better analysis of the processes and the potential operational risk exposures. Also, with the current global emphasis on corporate governance and transparency, the ATA approach fits this “ethics” mindset nicely and provides the benchmark for best practices in ORM implementation, especially those pertaining to Pillar 2 of the Basel Accord. To expedite the mapping, we can make use of reference models for the definition of high-level processes, with the risks assigned on a process level, instead of a business line, thus yielding more clarity and concrete information. The processes themselves can also be the basis for the op risk self-assessment (RSA), ensuring a complete picture for every process. In a nutshell, ORM and business process governance go hand-in-hand together, augmented by smarter analytics of the data or information from myriad sources incl. expert judgements. Lessons on Data Sourcing – Performing Due Diligence Assessment on External Managers While most assessments on external managers tend to focus on their financials, I also employ the same principles as above when visiting these firms to get a better appreciation of how they (external managers) manage risk. I prefer to meet employees from all levels of their organizational hierarchy in their natural setting, rather than in just pre-arranged meeting rooms (and usually with C-suite or senior management executives only). Once, I visited a famous firm and in an informal chat with one of the portfolio managers along the corridor after lunch, he “boasted” about the Bentley he just bought after joining the firm
  • 4. because the rest of the senior staff also owned and drove Bentleys (evident from the parked Bentleys in the carpark) ………. You can guess how I perceive this firm. Extending your conversations to include the traders on the trading floors, auditors or compliance staff going about doing their work, including the janitor, you’d often be surprised with the nuggets of information you picked up. Such informal activities and exchanges often yield far more information about the firms’ conduct and integrity beyond the financial numbers and these unstructured data play a critical role in my overall assessment of these firms during my due diligence visits – I will be elaborating more on the financial and performance assessment in part 2.