SlideShare a Scribd company logo
Ulukman Mamytov
IPROMAC 7530-28-8213
Risk Management
Professor: Wakayama Kazuo
Microsoft operates in a competitive, high-risk business, with rapidly
advancing technology and ever shortening product life cycles. In that
context, Microsoft’s risk management group seeks to construct and
implement an enterprise-wide risk management system
Microsoft’s RMG was established in 1997, within the
treasury department
Brent Callinicos, treasurer, RMG leader
Worked in: Procter & Gamble, Walt Disney, Microsoft
(1992-2007), Google, Uber, Baidu, Hyperloop
Focus: to develop a comprehensive and integrated
approach to risk identification, measurement, and management.
Goal: to bring to the business risk area (nonfinancial risk) a level of
measurement and management similar to that in the financial risk area.
Financial risk management at Microsoft has been evolving since 1994, when the
company began its foreign exchange hedging program. In about 1995, the
company began to calculate VAR for its foreign exchange risk.
Value at Risk
Philip Jorion, author, professor and risk manager
Jorion is the author of more than 100 publications
on the topic of risk management and international
finance, and is credited with pioneering the
Value at Risk approach to risk management.
Jorion: “VAR measures the worst expected loss
 over a given time interval
 under normal market conditions
 at a given confidence level.”
In 1996, Microsoft’s treasury presented to the finance committee of the
board of directors a white paper analyzing the factors that had contributed
to the publicized derivative losses that companies had reported.
Result: Microsoft created a comprehensive and integrated approach to
financial risk measurement and management within the treasury function.
Tree of
Risks
Foreign
Exchange
Strategic
Equity
Employee
Stock
Option
Interest
Rate
Gibraltar:
• gives an aggregated view of the
market risks
• performs VAR analysis
To measure VAR, Microsoft
developed its own system – IRMA
(Internal Risk Management Appl.)
+ 2 additional third-party systems to
measure risks to make sure not to
miss any..
Foreign exchange program - price protection for areas with unstable
currencies - to make sure that distributors don’t lose margins and don’t
stop ordering products from Microsoft.
= SCM concept of AAA: Agility, Adaptability, Alignment
Every department has its own intranet site, and communication through
the intranet is part of the firm’s culture. Microsoft wants all managers to
understand the risks embodied in the decisions they make. As new
projects are launched, business managers are encouraged to consult risk
management’s intranet site with risk checklists, anecdotes, best practices.
Employees have access to virtually any financial data.
Bill Gates:
“A company’s middle managers and line employees, not just its high-
level executives, need to see business data… Companies should
spent less time protecting financial data from employees and more
time teaching them to analyze and act on it.”
Certainly, some information is password protected.
Microsoft does not rely solely on VAR to measure its financial risks. It
also uses stress testing through scenario analysis to consider the
impact of political, geographic, and economic circumstances.
Risk Management Group activities:
 Risk financing – having a clear view of risk profiles to validate the risk
financing plans.
 Quantification resources – inclusion of senior risk analyst and senior
quantitative analyst with a Ph.D. in mathematics.
 Face-to-face meetings with directors or product unit managers to
have enterprise-wide view of risks.
 Defining worst-case scenarios
In case of earthquakes - What risks are most important to Microsoft?
Property?
Is property insurance enough?
The real risk is not that buildings get damaged but that it causes
business interruption in the product development cycle and that
company cannot do business.
 Capital market risks because of the firm’s inability to trade
 Worker compensation or employee benefit risk
 Supplier risk for those in the area of earthquake
 Loss of market share because the business is interrupted
 R&D risks because those activities are interrupted / product delays
 Product support risks
What happened to Kobe Steel after Kobe earthquake?
How did their stock do? Did they get sued?
An important result of
scenario analysis is to put a
dollar amount on the risks.
What will it cost the company?
Risks ranking through
mapping and prioritizing risks
Pareto principle 80/20
 1998 – Callinicos – Ernst&Young Global Risk Manager
 1998 – Overall Treasury Excellence – an Alexander Hamilton Awards,
use of technology to design a web-based tool to share risk information
through the company’s intranet
 1999 – “Pioneer of the Enterprise approach to risk management” – by
CFO magazine and Arthur Andersen
 1999 – Gold award for financial risk management – at the Alexander
Hamilton Awards, noted that Microsoft turned the “financial crisis in
Asia and Brazil into significant gain for the company”
 1999 – Corporate Award for Risk Management Solutions – from
Treasury Management International

More Related Content

What's hot

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
JoAnna Cheshire
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
Jose Palanco
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
Vladimir Jirasek
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Edureka!
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
Risk Analysis Consultants, s.r.o.
 
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfCybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
ssuser7b150d
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
Vidyalankar Institute of Technology
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
Liberteks
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
BSides Delhi
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identification
Priyanka Aash
 
Operational risk management (2)
Operational risk management (2)Operational risk management (2)
Operational risk management (2)
Ujjwal 'Shanu'
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 

What's hot (20)

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfCybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identification
 
Operational risk management (2)
Operational risk management (2)Operational risk management (2)
Operational risk management (2)
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Security architecture
Security architectureSecurity architecture
Security architecture
 

Similar to Microsoft Risk Management

Implementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfImplementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdf
Robert Serena, FSA, CFA, CPCU
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
Anu Damodaran
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation Age
Career Communications Group
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
H Contrex
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
Anu Damodaran
 
Sea risk-management-in-vuca-environment-noexp
Sea risk-management-in-vuca-environment-noexpSea risk-management-in-vuca-environment-noexp
Sea risk-management-in-vuca-environment-noexp
densands
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
iasaglobal
 
Career options after risk management course
Career options after risk management courseCareer options after risk management course
Career options after risk management course
GautamPandey056
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
Christine Maligec, CRM-E, CRIS
 
Career options after risk management course converted
Career options after risk management course convertedCareer options after risk management course converted
Career options after risk management course converted
GautamPandey056
 
Financial organization-orm
Financial organization-ormFinancial organization-orm
Financial organization-orm
MetricStream Inc
 
Narayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docx
Narayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docxNarayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docx
Narayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docx
vannagoforth
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
Abdulbasit Almauly
 
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxCHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
keturahhazelhurst
 
Cyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateCyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India Affiliate
IRM India Affiliate
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
How AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millionsHow AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millions
Heiko Schwarz
 
Application of Enterprise Risk Management
Application of Enterprise Risk ManagementApplication of Enterprise Risk Management
Application of Enterprise Risk Management
Sonjai Kumar, SIRM
 
Risk & compliance magazine compressed
Risk & compliance magazine compressed Risk & compliance magazine compressed
Risk & compliance magazine compressed
Mirror Review
 

Similar to Microsoft Risk Management (20)

Implementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdfImplementing an Enterprise Risk Management program (2022 updates).pdf
Implementing an Enterprise Risk Management program (2022 updates).pdf
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation Age
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Sea risk-management-in-vuca-environment-noexp
Sea risk-management-in-vuca-environment-noexpSea risk-management-in-vuca-environment-noexp
Sea risk-management-in-vuca-environment-noexp
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
 
Career options after risk management course
Career options after risk management courseCareer options after risk management course
Career options after risk management course
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Career options after risk management course converted
Career options after risk management course convertedCareer options after risk management course converted
Career options after risk management course converted
 
Financial organization-orm
Financial organization-ormFinancial organization-orm
Financial organization-orm
 
Narayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docx
Narayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docxNarayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docx
Narayana Rao Mahankali Week 11 - DiscussionCOLLAPSETop of Fo.docx
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxCHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
 
Cyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateCyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India Affiliate
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
How AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millionsHow AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millions
 
Application of Enterprise Risk Management
Application of Enterprise Risk ManagementApplication of Enterprise Risk Management
Application of Enterprise Risk Management
 
Risk & compliance magazine compressed
Risk & compliance magazine compressed Risk & compliance magazine compressed
Risk & compliance magazine compressed
 

More from Ulukman Mamytov

Genentech
GenentechGenentech
Genentech
Ulukman Mamytov
 
Walmart's SCM
Walmart's SCMWalmart's SCM
Walmart's SCM
Ulukman Mamytov
 
Perrier
PerrierPerrier
Презентации веб-страницы Declaracia.kg
Презентации веб-страницы Declaracia.kgПрезентации веб-страницы Declaracia.kg
Презентации веб-страницы Declaracia.kg
Ulukman Mamytov
 
Развитие животноводства в КР
Развитие животноводства в КРРазвитие животноводства в КР
Развитие животноводства в КР
Ulukman Mamytov
 
Разработка научных основ организации и управления пастбищами
Разработка научных  основ  организации и управления пастбищамиРазработка научных  основ  организации и управления пастбищами
Разработка научных основ организации и управления пастбищами
Ulukman Mamytov
 
Анализ зарубежных сайтов налоговых органов
Анализ зарубежных сайтов налоговых органовАнализ зарубежных сайтов налоговых органов
Анализ зарубежных сайтов налоговых органов
Ulukman Mamytov
 
Всеобщее декларирование в Кыргызстане
Всеобщее декларирование в КыргызстанеВсеобщее декларирование в Кыргызстане
Всеобщее декларирование в КыргызстанеUlukman Mamytov
 
электронный токио
электронный токиоэлектронный токио
электронный токиоUlukman Mamytov
 

More from Ulukman Mamytov (9)

Genentech
GenentechGenentech
Genentech
 
Walmart's SCM
Walmart's SCMWalmart's SCM
Walmart's SCM
 
Perrier
PerrierPerrier
Perrier
 
Презентации веб-страницы Declaracia.kg
Презентации веб-страницы Declaracia.kgПрезентации веб-страницы Declaracia.kg
Презентации веб-страницы Declaracia.kg
 
Развитие животноводства в КР
Развитие животноводства в КРРазвитие животноводства в КР
Развитие животноводства в КР
 
Разработка научных основ организации и управления пастбищами
Разработка научных  основ  организации и управления пастбищамиРазработка научных  основ  организации и управления пастбищами
Разработка научных основ организации и управления пастбищами
 
Анализ зарубежных сайтов налоговых органов
Анализ зарубежных сайтов налоговых органовАнализ зарубежных сайтов налоговых органов
Анализ зарубежных сайтов налоговых органов
 
Всеобщее декларирование в Кыргызстане
Всеобщее декларирование в КыргызстанеВсеобщее декларирование в Кыргызстане
Всеобщее декларирование в Кыргызстане
 
электронный токио
электронный токиоэлектронный токио
электронный токио
 

Recently uploaded

Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 

Recently uploaded (20)

Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 

Microsoft Risk Management

  • 1. Ulukman Mamytov IPROMAC 7530-28-8213 Risk Management Professor: Wakayama Kazuo Microsoft operates in a competitive, high-risk business, with rapidly advancing technology and ever shortening product life cycles. In that context, Microsoft’s risk management group seeks to construct and implement an enterprise-wide risk management system
  • 2. Microsoft’s RMG was established in 1997, within the treasury department Brent Callinicos, treasurer, RMG leader Worked in: Procter & Gamble, Walt Disney, Microsoft (1992-2007), Google, Uber, Baidu, Hyperloop Focus: to develop a comprehensive and integrated approach to risk identification, measurement, and management. Goal: to bring to the business risk area (nonfinancial risk) a level of measurement and management similar to that in the financial risk area. Financial risk management at Microsoft has been evolving since 1994, when the company began its foreign exchange hedging program. In about 1995, the company began to calculate VAR for its foreign exchange risk.
  • 3. Value at Risk Philip Jorion, author, professor and risk manager Jorion is the author of more than 100 publications on the topic of risk management and international finance, and is credited with pioneering the Value at Risk approach to risk management. Jorion: “VAR measures the worst expected loss  over a given time interval  under normal market conditions  at a given confidence level.”
  • 4. In 1996, Microsoft’s treasury presented to the finance committee of the board of directors a white paper analyzing the factors that had contributed to the publicized derivative losses that companies had reported. Result: Microsoft created a comprehensive and integrated approach to financial risk measurement and management within the treasury function. Tree of Risks Foreign Exchange Strategic Equity Employee Stock Option Interest Rate Gibraltar: • gives an aggregated view of the market risks • performs VAR analysis To measure VAR, Microsoft developed its own system – IRMA (Internal Risk Management Appl.) + 2 additional third-party systems to measure risks to make sure not to miss any..
  • 5. Foreign exchange program - price protection for areas with unstable currencies - to make sure that distributors don’t lose margins and don’t stop ordering products from Microsoft. = SCM concept of AAA: Agility, Adaptability, Alignment
  • 6. Every department has its own intranet site, and communication through the intranet is part of the firm’s culture. Microsoft wants all managers to understand the risks embodied in the decisions they make. As new projects are launched, business managers are encouraged to consult risk management’s intranet site with risk checklists, anecdotes, best practices. Employees have access to virtually any financial data. Bill Gates: “A company’s middle managers and line employees, not just its high- level executives, need to see business data… Companies should spent less time protecting financial data from employees and more time teaching them to analyze and act on it.” Certainly, some information is password protected.
  • 7. Microsoft does not rely solely on VAR to measure its financial risks. It also uses stress testing through scenario analysis to consider the impact of political, geographic, and economic circumstances. Risk Management Group activities:  Risk financing – having a clear view of risk profiles to validate the risk financing plans.  Quantification resources – inclusion of senior risk analyst and senior quantitative analyst with a Ph.D. in mathematics.  Face-to-face meetings with directors or product unit managers to have enterprise-wide view of risks.  Defining worst-case scenarios
  • 8. In case of earthquakes - What risks are most important to Microsoft? Property? Is property insurance enough? The real risk is not that buildings get damaged but that it causes business interruption in the product development cycle and that company cannot do business.  Capital market risks because of the firm’s inability to trade  Worker compensation or employee benefit risk  Supplier risk for those in the area of earthquake  Loss of market share because the business is interrupted  R&D risks because those activities are interrupted / product delays  Product support risks What happened to Kobe Steel after Kobe earthquake? How did their stock do? Did they get sued?
  • 9. An important result of scenario analysis is to put a dollar amount on the risks. What will it cost the company? Risks ranking through mapping and prioritizing risks Pareto principle 80/20
  • 10.  1998 – Callinicos – Ernst&Young Global Risk Manager  1998 – Overall Treasury Excellence – an Alexander Hamilton Awards, use of technology to design a web-based tool to share risk information through the company’s intranet  1999 – “Pioneer of the Enterprise approach to risk management” – by CFO magazine and Arthur Andersen  1999 – Gold award for financial risk management – at the Alexander Hamilton Awards, noted that Microsoft turned the “financial crisis in Asia and Brazil into significant gain for the company”  1999 – Corporate Award for Risk Management Solutions – from Treasury Management International