SlideShare a Scribd company logo
Effective Risk Management for Digital Finance
MATIMBA TREVOR MABASA
Table of
Contents
1. MARCH 2023 – CHAT GPT
2. START WITH THE WHY & HOW
3. WHAT IS EFFECTIVE RISK MANAGEMENT?
4. THE FOUR LINES OF DEFENSE
5.THE RISK MANAGEMENT PROCESS:
5.1. RISK IDENTIFICATION
5.2. RISK ASSURANCE AND MITIGATION
5.3. RISK REPORTING
6.TYPICAL RISK MITIGATION STRATEGIES
7. COMMON DIGITAL RISKS & MITIGATION
STRATEGIES
8. QUESTIONS
1. March 2023
2. Start with the
why?
1. To work with
management to set
the tone for a
proactive risk
culture
2. To work with
management to
identify risks and
set risk appetites
3. To raise
awareness and
recommend
controls
4. To enable
conscious risk
taking (i.e eyes
wide open)
5. To predict and
manage predictable
disasters (disasters
we should have
seen)
6. Identifying the
normalization of
deviance (it can
also happen to us)
7. To enable the
business to achieve
its objectives
8. To recommend
controls to mitigate
risks (business and
Technology)
9. To minimise
losses and
maximise profits
3. What is an effective risk
management strategy and
environment ?
1. It’s a continuous monitoring process
(Incidents,Changes,Audit,etc.)
2. Understands the industry landscape
includingcustomer needs
3. Understands the business landscape
includingassets
4. It is proactive and predictive
5. It is embeddedin all businessprocesses
6. It is proactive
7. It is data driven
8. It is customer and businessdriven
9. Everybody takes responsibility for risk
management (risk conscious andaverse)
10. It is collaborative
4. The four lines of defense for effective risk management
The board of directors sets
the tone (1st Line)
Executive management
including business & IT
develops and implement the
strategy (1st Line)
Line management and 1st
line risk implements and
monitors controls
2nd Line Risk provides
guidelines and assurance
3rd Line of defense reviews
and provide assurance on
risk and controls
4th line of defense (External
Audit) provides assurance
on risks and controls
5.1. Risk
identification &
Assessment
3.1.1. Incident Trending
and Analysis for
continuous monitoring
3.1.2. Change Trending
and Analysis
3.1.3. Internal &
External Audit Themes
3.1.4. Perform Business
units risk assessments
(RCSA) including:
- Establishing likelihood
and consequences
- Recommending
controls
5.2. Risk
Assurance and
mitigation
3.2.1 DEVELOP AN
ASSURANCE PLAN
3.2.2. IDENTIFY AND TEST
THE CONTROL
ENVIRONMENT
3.2.3. IMPLEMENT
CONTINUOUS MONITORING
INCLUDING:
1. INCIDENT TRENDING AND
PREDICTIVE ANALYSIS
2. RISK CONTROL
ASSESSMENTS (ADHERENCE
TO GOVERNANCE
DOCUMENTS
3. AUDIT PLANS –
UPCOMING AUDITS
4. AUDIT FINDINGS REVIEW
AND TRACKING
5. CHANGE MANAGEMENT
5.3. Risk
reporting
Integrate risk discussions in daily, weekly and monthly stand-ups
Risk forums within business units by Risk managers
Risk and compliance committees for Business units
Risk & compliance committees for the Group
6. Typical Risk mitigation strategies
Mitigate
Transfer
Avoid
Accept
7. Common Top Digital Risks & Mitigation strategies
Risk Impact Example of Controls
1. Business Disruption Risk:
• Technology Failures
• Change Controls Failures
Financial loss
Reputational Damage
• Regular maintenance
• Effective change management
processes
• Resilient systems, people and
processes i.e cloud/DR, etc.
• Capacity Planning & Monitoring
2. Fraud Risk • Real time monitoring
• Regular awareness campaigns
3. Third Party Risk • Third party reviews
• High risk for controls
4. Information & Cyber Risk • Cyber security measures (Encryption,
Multi –factor authentication,
Mimecast, honeypots, firewalls, etc.)
• Vulnerability Management
• Patch
• Web Security
5. Regulatory Compliance:
• POPIA
• AML
• Exchange Controls
• POPIA controls
• AML
• Exchange Controls
Common Top Digital Risks & Mitigation strategies – continued
Risk Impact Examples Controls
5. Execution/Strategic Initiatives Financial loss
Reputational Damage
Adequate and effective project
management practices
6. Competition (Blackberry,
Nokia, etc.)
• Relevant and up to date
business strategy aligned to
current and future customers
needs and demands
• Regular reviews and updates
Other mitigation strategies:
• Insurance Coverage: Evaluate the possibility
of obtaining insurance coverage tailored to
digital finance risks. This can help mitigate
financial losses resulting from certain
unforeseen events
• Stronger Cybersecurity measures
Matimba Trevor Mbasa- Effective Risk Management

More Related Content

Similar to Matimba Trevor Mbasa- Effective Risk Management

Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
Risk Management Institution of Australasia
 
project risk management
project risk managementproject risk management
project risk management
Ashima Thakur
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
PECB
 
Risk Management Presentation to Doyle Property Club
Risk Management Presentation to Doyle Property ClubRisk Management Presentation to Doyle Property Club
Risk Management Presentation to Doyle Property Club
marcpreston
 
rimap Body of Knowledge
rimap Body of Knowledgerimap Body of Knowledge
rimap Body of Knowledge
FERMA
 
ToTCOOP+i O3 o4 unit-9_final_version_en
ToTCOOP+i O3 o4 unit-9_final_version_enToTCOOP+i O3 o4 unit-9_final_version_en
ToTCOOP+i O3 o4 unit-9_final_version_en
ToTCOOPiTech
 
MSF Risk Management Discipline v.1.1
MSF Risk Management Discipline v.1.1MSF Risk Management Discipline v.1.1
MSF Risk Management Discipline v.1.1
Paulo H. Leocadio
 
CORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptxCORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptx
NED University of Engineering and Technology
 
CORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptxCORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptx
NED University of Engineering and Technology
 
Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit
Aurelien Domont, MBA
 
ISO 31000.pdf
ISO 31000.pdfISO 31000.pdf
ISO 31000.pdf
ssuser840a78
 
PMP_Project Risk Management
PMP_Project Risk ManagementPMP_Project Risk Management
PMP_Project Risk Management
Hisham Haridy MBA, PMP®, RMP®, SP®
 
Risk and Control Self Assessment - IRM India Affiliate
Risk and Control Self  Assessment - IRM India AffiliateRisk and Control Self  Assessment - IRM India Affiliate
Risk and Control Self Assessment - IRM India Affiliate
IRM India Affiliate
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
Christina33713
 
#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi
SN Panigrahi, PMP
 
Ihor Pavlenko: PMO Risk Management (UA )
Ihor Pavlenko: PMO Risk Management (UA )Ihor Pavlenko: PMO Risk Management (UA )
Ihor Pavlenko: PMO Risk Management (UA )
Lviv Startup Club
 
Risk1.ppt
Risk1.pptRisk1.ppt
Risk1.ppt
DwaipayanSamanta
 
Risk management Chapter 2 for project monument course for MSC students
Risk management Chapter 2 for project monument course for MSC studentsRisk management Chapter 2 for project monument course for MSC students
Risk management Chapter 2 for project monument course for MSC students
Abebaw31
 
IBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CVIBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CV
IBIRONKEABEBI FAGBEMI
 
Session 10 gdas pmp study group presentation
Session 10   gdas pmp study group presentationSession 10   gdas pmp study group presentation
Session 10 gdas pmp study group presentation
Tu Nguyen, PMP®,PMI-RMP®
 

Similar to Matimba Trevor Mbasa- Effective Risk Management (20)

Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
project risk management
project risk managementproject risk management
project risk management
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
 
Risk Management Presentation to Doyle Property Club
Risk Management Presentation to Doyle Property ClubRisk Management Presentation to Doyle Property Club
Risk Management Presentation to Doyle Property Club
 
rimap Body of Knowledge
rimap Body of Knowledgerimap Body of Knowledge
rimap Body of Knowledge
 
ToTCOOP+i O3 o4 unit-9_final_version_en
ToTCOOP+i O3 o4 unit-9_final_version_enToTCOOP+i O3 o4 unit-9_final_version_en
ToTCOOP+i O3 o4 unit-9_final_version_en
 
MSF Risk Management Discipline v.1.1
MSF Risk Management Discipline v.1.1MSF Risk Management Discipline v.1.1
MSF Risk Management Discipline v.1.1
 
CORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptxCORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptx
 
CORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptxCORPORATE GOVERNANCE ppt.pptx
CORPORATE GOVERNANCE ppt.pptx
 
Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit
 
ISO 31000.pdf
ISO 31000.pdfISO 31000.pdf
ISO 31000.pdf
 
PMP_Project Risk Management
PMP_Project Risk ManagementPMP_Project Risk Management
PMP_Project Risk Management
 
Risk and Control Self Assessment - IRM India Affiliate
Risk and Control Self  Assessment - IRM India AffiliateRisk and Control Self  Assessment - IRM India Affiliate
Risk and Control Self Assessment - IRM India Affiliate
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi
 
Ihor Pavlenko: PMO Risk Management (UA )
Ihor Pavlenko: PMO Risk Management (UA )Ihor Pavlenko: PMO Risk Management (UA )
Ihor Pavlenko: PMO Risk Management (UA )
 
Risk1.ppt
Risk1.pptRisk1.ppt
Risk1.ppt
 
Risk management Chapter 2 for project monument course for MSC students
Risk management Chapter 2 for project monument course for MSC studentsRisk management Chapter 2 for project monument course for MSC students
Risk management Chapter 2 for project monument course for MSC students
 
IBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CVIBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CV
 
Session 10 gdas pmp study group presentation
Session 10   gdas pmp study group presentationSession 10   gdas pmp study group presentation
Session 10 gdas pmp study group presentation
 

More from itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
itnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
itnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
itnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
itnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
itnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
itnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
itnewsafrica
 

More from itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 

Matimba Trevor Mbasa- Effective Risk Management

  • 1. Effective Risk Management for Digital Finance MATIMBA TREVOR MABASA
  • 2. Table of Contents 1. MARCH 2023 – CHAT GPT 2. START WITH THE WHY & HOW 3. WHAT IS EFFECTIVE RISK MANAGEMENT? 4. THE FOUR LINES OF DEFENSE 5.THE RISK MANAGEMENT PROCESS: 5.1. RISK IDENTIFICATION 5.2. RISK ASSURANCE AND MITIGATION 5.3. RISK REPORTING 6.TYPICAL RISK MITIGATION STRATEGIES 7. COMMON DIGITAL RISKS & MITIGATION STRATEGIES 8. QUESTIONS
  • 4. 2. Start with the why? 1. To work with management to set the tone for a proactive risk culture 2. To work with management to identify risks and set risk appetites 3. To raise awareness and recommend controls 4. To enable conscious risk taking (i.e eyes wide open) 5. To predict and manage predictable disasters (disasters we should have seen) 6. Identifying the normalization of deviance (it can also happen to us) 7. To enable the business to achieve its objectives 8. To recommend controls to mitigate risks (business and Technology) 9. To minimise losses and maximise profits
  • 5. 3. What is an effective risk management strategy and environment ? 1. It’s a continuous monitoring process (Incidents,Changes,Audit,etc.) 2. Understands the industry landscape includingcustomer needs 3. Understands the business landscape includingassets 4. It is proactive and predictive 5. It is embeddedin all businessprocesses 6. It is proactive 7. It is data driven 8. It is customer and businessdriven 9. Everybody takes responsibility for risk management (risk conscious andaverse) 10. It is collaborative
  • 6. 4. The four lines of defense for effective risk management The board of directors sets the tone (1st Line) Executive management including business & IT develops and implement the strategy (1st Line) Line management and 1st line risk implements and monitors controls 2nd Line Risk provides guidelines and assurance 3rd Line of defense reviews and provide assurance on risk and controls 4th line of defense (External Audit) provides assurance on risks and controls
  • 7. 5.1. Risk identification & Assessment 3.1.1. Incident Trending and Analysis for continuous monitoring 3.1.2. Change Trending and Analysis 3.1.3. Internal & External Audit Themes 3.1.4. Perform Business units risk assessments (RCSA) including: - Establishing likelihood and consequences - Recommending controls
  • 8. 5.2. Risk Assurance and mitigation 3.2.1 DEVELOP AN ASSURANCE PLAN 3.2.2. IDENTIFY AND TEST THE CONTROL ENVIRONMENT 3.2.3. IMPLEMENT CONTINUOUS MONITORING INCLUDING: 1. INCIDENT TRENDING AND PREDICTIVE ANALYSIS 2. RISK CONTROL ASSESSMENTS (ADHERENCE TO GOVERNANCE DOCUMENTS 3. AUDIT PLANS – UPCOMING AUDITS 4. AUDIT FINDINGS REVIEW AND TRACKING 5. CHANGE MANAGEMENT
  • 9. 5.3. Risk reporting Integrate risk discussions in daily, weekly and monthly stand-ups Risk forums within business units by Risk managers Risk and compliance committees for Business units Risk & compliance committees for the Group
  • 10. 6. Typical Risk mitigation strategies Mitigate Transfer Avoid Accept
  • 11. 7. Common Top Digital Risks & Mitigation strategies Risk Impact Example of Controls 1. Business Disruption Risk: • Technology Failures • Change Controls Failures Financial loss Reputational Damage • Regular maintenance • Effective change management processes • Resilient systems, people and processes i.e cloud/DR, etc. • Capacity Planning & Monitoring 2. Fraud Risk • Real time monitoring • Regular awareness campaigns 3. Third Party Risk • Third party reviews • High risk for controls 4. Information & Cyber Risk • Cyber security measures (Encryption, Multi –factor authentication, Mimecast, honeypots, firewalls, etc.) • Vulnerability Management • Patch • Web Security 5. Regulatory Compliance: • POPIA • AML • Exchange Controls • POPIA controls • AML • Exchange Controls
  • 12. Common Top Digital Risks & Mitigation strategies – continued Risk Impact Examples Controls 5. Execution/Strategic Initiatives Financial loss Reputational Damage Adequate and effective project management practices 6. Competition (Blackberry, Nokia, etc.) • Relevant and up to date business strategy aligned to current and future customers needs and demands • Regular reviews and updates
  • 13. Other mitigation strategies: • Insurance Coverage: Evaluate the possibility of obtaining insurance coverage tailored to digital finance risks. This can help mitigate financial losses resulting from certain unforeseen events • Stronger Cybersecurity measures