SlideShare a Scribd company logo
• What is ERM
• Uncertainty Principle
• ERM Framework
• Risk Response Strategy
• Benefits of ERM
• 8 Components of ERM
• Process affected by Board of Directors, Management, etc.
• To identify risk
• To Manage risk
• Reasonable assurance about achievement of Objectives
• All organizations [Profitable + NGO] faces uncertainty
• It is a challenge to management
• Uncertainty brings Risk and Opportunity
• ERM provides a FRAMEWORK to deal with Risk and Opportunity
Risk Management
Risk Assessment
Risk Mitigation/Control
Risk Identification
Risk Analysis
Risk Prioritization
Risk Reduction
Risk Planning
Risk Monitoring
Mitigate
Avoid / Transfer
Accept
MATA – Mitigate, Avoid, Transfer and Accept
• Avoidance
• Reduction
• Alternative Actions
• Share or Insure
• Accept
1) Align risk appetite and strategy
2) Link growth, risk and return
3) Enhance risk response decisions
4) Minimize operational surprises and losses
5) Identity and manage cross-enterprise risks
6) Provide integrated responses to multiple risks
7) Size opportunities
Risk
Planning
+
-
Variety
of
Risk
Opportunity
1) Align risk appetite and strategy
2) Link growth, risk and return
3) Enhance risk response decisions
4) Minimize operational surprises and losses
5) Identity and manage cross-enterprise risks
6) Provide integrated responses to multiple risks
7) Size opportunities
Risk
Response
Components
Risk
Planning
Components
Risk
Monitoring
Components
1) Internal Environment
2) Objective Setting
3) Event Identification
4) Risk Assessment
5) Risk Response
6) Control Activities
7) Information and Communication
8) Monitoring
Risk Team
Risk Team
Risk Team
Risk Team
BOD
BOD
MIS
TCWG*
* TCWG - Those charged with Governance
External Risk
Strategic Enablers
Operational
Internal Risk
Governance
Strategic Planning
Ethics & Values
Stakeholder Relations
Access to Services People
Processes Financial
Business Interruption Technology
Emergency Response Infrastructure
Demand
Irregulatory
Economical
Socio-Political
Environment
Strategic Operational
Hazard Financial
• Demand Shortfall
• Customer retention
• Integration problems
• Pricing pressure
• Regulation
• Research and Development
• Industry or sector downturn
• JV or partner losses
• Operational Controls
• Poor Capacity management
• Supply Chain Issues
• Employee Issues including fraud
• Bribery and Corruption
• Regulation
• Commodity prices
• Macroeconomic
• Political Issues
• Legal Issues
• Terrorism
• National disasters
• Debt and interest rates
• Poor Financial management
• Asset losses
• Goodwill and amortisation
• Accounting problems
Cost
• Budget Exceeded
• Unanticipated Expense
Resources
• Team is under resourced
• Material shortage
• Machinery unavailable
• Industrial Action
• Skill gap
Environmental
• Bad weather results in re-work
• Weather delays progress
• Adverse environmental affects occur
• Environmental approval not completed in time
Scope
• Scope creeps
• Scope partly defined
• Project changes poorly managed
Communication
• Poor communication
(Stakeholder dissatisfaction)
• Positive and timely communication
(positive publicity)
Time
• Schedule over runs
• Tasks omitted for schedule
• Opportunity to compress
schedule
Product Design System / Software Manufacturing All Other Project Management Quality
Product
Performance
Design
Data Accuracy
Security
Assembly
Tools
Consumer service
Environment
Teamwork
Product cost
Quality system
Signal Levels
Low Medium High
Low Medium Medium
Low Low Low
Probability
Impact
Low Medium High
Low
Medium
High
Low High
Minimal Moderate
Inherent
Control
rely Not rely
Low
High
Yosef Nowgaonkar
yosef.nowgaonkar@gmail.com
+91 9920029148
Wealth management, payment, capital market, crowdfunding, lending and
insurance enterprises
Cryptocurrency, cloud computing, big data analytics and media developers
Enterprises and individuals
Conventional banks, insurance enterprises, stock brokerage firms and
venture capitalist enterprises
Financial regulators and legislatures
Fintech start-ups
Technology developers
Financial customers
Traditional financial
institutions
Government
• Fraud Risk
• Merchant Risk
• Regulatory risk
• Anti-money laundering and countering terrorist financing
• Consumer Risks
• Cybersecurity and Data Privacy
• Credit risk and operational risk
• Outsourcing Risk
Fintech Company
Fintech Enterprise
Risk Area
Fintech Innovative
Solution Risk Area
New Business Models
Applications
Processes
Products
Services
Investment Management
Customer Management
Regulation
Technology Integration
Security and Privacy
Risk Management Practices
This process recognises and documents the risk factors that may affect the fintech initiative.
This process determines the probability of occurrence of the fintech risk and the impact on
the fintech initiative.
This process involves a mathematical calculation of the expected monetary value (EMV) of a
risk.
This component includes six fintech challenges: investment management, customer
management, regulation, technology integration, security and privacy, and risk
management practices.
This component examines the risk associated with implementing “technologically enabled
financial innovations that could result in new business models, applications, processes,
products or services”.
Identify fintech risk
Perform qualitative risk
analysis
Perform quantitative risk
analysis
Address fintech enterprise
risk area
Implement fintech innovative
solutions risk area
Fintech Risk
Management Phases
and Processed
Fintech Innovative
Solutions Risk Area
Fintech Enterprise Risk
Area
Fintech Risk
Organizing
and Planning
Fintech Risk
Assessment
Fintech Risk
Reaction
Fintech Risk
Monitor
and Control
Investment
Management
Customer
Management
Regulation
Technology
Integration
Security and
Privacy
Risk
Management
Practices
New
Business
Models
Applications Processes Products Services
Organize and
Plan Fintech
Risk Effort
Identify
Fintech
Risk
Perform
Qualitative
Risk Analysis
Perform
Quantitative
Risk Analysis
Response
to
Risk
Monitor
And
Control Risk

More Related Content

What's hot

Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniques
ILRI
 
Introduction To Risk Management Powerpoint Presentation Slides
Introduction To Risk Management Powerpoint Presentation SlidesIntroduction To Risk Management Powerpoint Presentation Slides
Introduction To Risk Management Powerpoint Presentation Slides
SlideTeam
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
FAA Safety Team Central Florida
 
Risk management
Risk managementRisk management
Risk management
Jubayer Alam Shoikat
 
Risk management
Risk management Risk management
Risk management
mamta bhaurya
 
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksStrategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
International Federation of Accountants
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
rafeeqameen
 
Risk management
Risk managementRisk management
Risk management
Babasab Patil
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management Right
Proformative, Inc.
 
Risk management
Risk managementRisk management
Risk management
Manish Tiwari
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
PYA, P.C.
 
Risk management
Risk managementRisk management
Risk management
Harold Malamion
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
JIGNESH PADIA
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)Bushra Angbeen
 
Enterprise Risk Management Framework
Enterprise Risk Management FrameworkEnterprise Risk Management Framework
Enterprise Risk Management Framework
Nigel Tebbutt
 
Entetrprise risk management process
Entetrprise risk  management processEntetrprise risk  management process
Entetrprise risk management process
Rabin K. Acharya PhD (MPhil,MBA,MPA,MA)
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk ppt
NehaKamboj10
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
SlideTeam
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Saras Singh
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
Wil Rickards
 

What's hot (20)

Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniques
 
Introduction To Risk Management Powerpoint Presentation Slides
Introduction To Risk Management Powerpoint Presentation SlidesIntroduction To Risk Management Powerpoint Presentation Slides
Introduction To Risk Management Powerpoint Presentation Slides
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk management Risk management
Risk management
 
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksStrategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk management
Risk managementRisk management
Risk management
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management Right
 
Risk management
Risk managementRisk management
Risk management
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management Overview
Risk Management OverviewRisk Management Overview
Risk Management Overview
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)
 
Enterprise Risk Management Framework
Enterprise Risk Management FrameworkEnterprise Risk Management Framework
Enterprise Risk Management Framework
 
Entetrprise risk management process
Entetrprise risk  management processEntetrprise risk  management process
Entetrprise risk management process
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk ppt
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 

Similar to Enterprise Risk Management.pdf

CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
Sam Bowne
 
Risk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditRisk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal Audit
Smitesh Bhosale
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
Sam Bowne
 
CNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk Management
Sam Bowne
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
Sam Bowne
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
NICSA
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119
KAYODE ADEBIYI
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
EnterpriseGRC Solutions, Inc.
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
wisnu wardhana, i nyoman
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
Goutama Bachtiar
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
Stephen Ong
 
mr neeraj - day 1 - compliance
mr neeraj - day 1 - compliancemr neeraj - day 1 - compliance
mr neeraj - day 1 - complianceNeeraj Verma
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
Sami Benafia
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
Logikcull.com
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptx
Abraraw Zerfu
 
Risk management
Risk managementRisk management
Risk management
Aglaia Connect
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
Sam Bowne
 

Similar to Enterprise Risk Management.pdf (20)

1 business risks
1 business risks1 business risks
1 business risks
 
1 business risks
1 business risks1 business risks
1 business risks
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
 
Risk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditRisk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal Audit
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
 
CNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk Management
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 
mr neeraj - day 1 - compliance
mr neeraj - day 1 - compliancemr neeraj - day 1 - compliance
mr neeraj - day 1 - compliance
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptx
 
Risk management
Risk managementRisk management
Risk management
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 

Recently uploaded

Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 

Recently uploaded (20)

Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 

Enterprise Risk Management.pdf

  • 1.
  • 2.
  • 3. • What is ERM • Uncertainty Principle • ERM Framework • Risk Response Strategy • Benefits of ERM • 8 Components of ERM
  • 4. • Process affected by Board of Directors, Management, etc. • To identify risk • To Manage risk • Reasonable assurance about achievement of Objectives
  • 5. • All organizations [Profitable + NGO] faces uncertainty • It is a challenge to management • Uncertainty brings Risk and Opportunity • ERM provides a FRAMEWORK to deal with Risk and Opportunity
  • 6. Risk Management Risk Assessment Risk Mitigation/Control Risk Identification Risk Analysis Risk Prioritization Risk Reduction Risk Planning Risk Monitoring Mitigate Avoid / Transfer Accept MATA – Mitigate, Avoid, Transfer and Accept
  • 7. • Avoidance • Reduction • Alternative Actions • Share or Insure • Accept
  • 8. 1) Align risk appetite and strategy 2) Link growth, risk and return 3) Enhance risk response decisions 4) Minimize operational surprises and losses 5) Identity and manage cross-enterprise risks 6) Provide integrated responses to multiple risks 7) Size opportunities
  • 9. Risk Planning + - Variety of Risk Opportunity 1) Align risk appetite and strategy 2) Link growth, risk and return 3) Enhance risk response decisions 4) Minimize operational surprises and losses 5) Identity and manage cross-enterprise risks 6) Provide integrated responses to multiple risks 7) Size opportunities
  • 10. Risk Response Components Risk Planning Components Risk Monitoring Components 1) Internal Environment 2) Objective Setting 3) Event Identification 4) Risk Assessment 5) Risk Response 6) Control Activities 7) Information and Communication 8) Monitoring Risk Team Risk Team Risk Team Risk Team BOD BOD MIS TCWG* * TCWG - Those charged with Governance
  • 11.
  • 12. External Risk Strategic Enablers Operational Internal Risk Governance Strategic Planning Ethics & Values Stakeholder Relations Access to Services People Processes Financial Business Interruption Technology Emergency Response Infrastructure Demand Irregulatory Economical Socio-Political Environment
  • 13. Strategic Operational Hazard Financial • Demand Shortfall • Customer retention • Integration problems • Pricing pressure • Regulation • Research and Development • Industry or sector downturn • JV or partner losses • Operational Controls • Poor Capacity management • Supply Chain Issues • Employee Issues including fraud • Bribery and Corruption • Regulation • Commodity prices • Macroeconomic • Political Issues • Legal Issues • Terrorism • National disasters • Debt and interest rates • Poor Financial management • Asset losses • Goodwill and amortisation • Accounting problems
  • 14. Cost • Budget Exceeded • Unanticipated Expense Resources • Team is under resourced • Material shortage • Machinery unavailable • Industrial Action • Skill gap Environmental • Bad weather results in re-work • Weather delays progress • Adverse environmental affects occur • Environmental approval not completed in time Scope • Scope creeps • Scope partly defined • Project changes poorly managed Communication • Poor communication (Stakeholder dissatisfaction) • Positive and timely communication (positive publicity) Time • Schedule over runs • Tasks omitted for schedule • Opportunity to compress schedule
  • 15. Product Design System / Software Manufacturing All Other Project Management Quality Product Performance Design Data Accuracy Security Assembly Tools Consumer service Environment Teamwork Product cost Quality system Signal Levels
  • 16. Low Medium High Low Medium Medium Low Low Low Probability Impact Low Medium High Low Medium High Low High Minimal Moderate Inherent Control rely Not rely Low High
  • 18.
  • 19. Wealth management, payment, capital market, crowdfunding, lending and insurance enterprises Cryptocurrency, cloud computing, big data analytics and media developers Enterprises and individuals Conventional banks, insurance enterprises, stock brokerage firms and venture capitalist enterprises Financial regulators and legislatures Fintech start-ups Technology developers Financial customers Traditional financial institutions Government
  • 20. • Fraud Risk • Merchant Risk • Regulatory risk • Anti-money laundering and countering terrorist financing • Consumer Risks • Cybersecurity and Data Privacy • Credit risk and operational risk • Outsourcing Risk
  • 21. Fintech Company Fintech Enterprise Risk Area Fintech Innovative Solution Risk Area New Business Models Applications Processes Products Services Investment Management Customer Management Regulation Technology Integration Security and Privacy Risk Management Practices
  • 22. This process recognises and documents the risk factors that may affect the fintech initiative. This process determines the probability of occurrence of the fintech risk and the impact on the fintech initiative. This process involves a mathematical calculation of the expected monetary value (EMV) of a risk. This component includes six fintech challenges: investment management, customer management, regulation, technology integration, security and privacy, and risk management practices. This component examines the risk associated with implementing “technologically enabled financial innovations that could result in new business models, applications, processes, products or services”. Identify fintech risk Perform qualitative risk analysis Perform quantitative risk analysis Address fintech enterprise risk area Implement fintech innovative solutions risk area
  • 23. Fintech Risk Management Phases and Processed Fintech Innovative Solutions Risk Area Fintech Enterprise Risk Area Fintech Risk Organizing and Planning Fintech Risk Assessment Fintech Risk Reaction Fintech Risk Monitor and Control Investment Management Customer Management Regulation Technology Integration Security and Privacy Risk Management Practices New Business Models Applications Processes Products Services Organize and Plan Fintech Risk Effort Identify Fintech Risk Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Response to Risk Monitor And Control Risk