SlideShare a Scribd company logo
The Role of Data Science in 
Enterprise Risk Management 
By John Liu, PhD, CFA
Question 
of the Day 
¡ How do you tell the difference between a 
Bayesian Statistician and Data Scientist? 
¡ Answer: What’s the p-value?
Big Data: Big Risks 
¡ Healthcare 
¡ Financial Services 
¡ Insurance 
¡ Transportation 
¡ National Security 
¡ Dating
Key 
Takeaways 
¡ What is Enterprise Risk Management 
(ERM)? 
¡ What is the Role of Data Science in 
ERM? 
¡ What Data Analytics are used for ERM?
What is 
Enterprise Risk 
Management?
What is 
Risk Management? 
¡ A structured approach to manage uncertainty 
¡ Management strategies: 
Risk Avoidance Risk Transfer Risk Mitigation
Risk Management - Defense 
Insurance Approach 
Reward 
Do Nothing 
Probability of Success
Risk Management - Offense 
Opportunistic Approach 
Reward 
Carpe Diem 
Do Nothing 
Probability of Success
What is ERM? 
¡ Risk-based approach to managing an enterprise 
¡ Risk-aware: every major tangible and intangible 
factor contributing toward failure in every process at 
every level of the enterprise 
¡ Enterprise value maximized with optimal balance 
between profitability/growth and related risks 
¡ Management better prepared to seize opportunities 
for growth and value creation
ERM 
Components 
Identify 
Quantify 
Respond 
Monitor & Report 
Effectiveness 
Monitor 
Comprehensive 
Approach To 
Managing 
Uncertainty 
Identify/Assess Internal 
and External Risks 
Risk Scoring 
& Modeling 
Respond and Control
ERM 
Goals 
¡ Provide holistic view across an organization 
leveraging firm experience and knowledge 
¡ Provide greater transparency to factors that can 
impair value preservation and business profitability 
¡ Understand & test assumptions & interpretations in 
business decision-making
ERM 
Risk Types 
¡ • Resource Capital Management 
• Business Disruption, IT Operational 
• Credit Exposure 
• Exchange Rate, Cash flow, Funding Financial 
• Privacy, Security, Safety 
• Regulatory and Statutory Compliance 
• Financial Reporting 
• Regulatory Reporting Reporting 
• Natural Catastrophe 
• Market Panics Hazard 
• Business Planning 
• Marketing, Reputation Strategic
RM vs ERM 
HQ: EUR exposure Subsidiary: USD exposure 
Sells EUR, Buys USD Sells USD, Buys EUR 
RM: Subsidiaries/Business Units manage risks separately 
ERM: Manage NET exposure across entire enterprise
Data Science 
and ERM
ERM 
Framework 
Enterprise Structure, Risks Objectives & Components 
Compliance 
Financial 
Compliance 
Reporting 
Hazard 
Strategic 
Entity Wide 
Division 
Business Unit 
Comprehensive 
Approach 
Leverage Data & 
Analytic Resources 
Predictive Modeling
Common 
Challenges 
¡ Data warehousing & sharing across entity 
¡ Prioritization methodology 
¡ Consolidated reporting 
¡ Timeliness 
¡ Data security 
¡ The risk management process itself!
Role of 
Data Science 
¡ Data science methods provide: 
¡ Enterprise Data Management 
¡ Comprehensive warehousing 
¡ Data quality and abundance 
¡ Risk Analytics 
¡ Predictive Modeling 
¡ Loss Distributions 
¡ Reporting 
¡ Real-time visualization, dashboards 
¡ Regulatory requirements 
Reporting
Typical 
Corporate EDW 
¡ Big data warehouse ≠ useful data (quite the opposite)
Data Management 
¡ Comprehensive data warehouse 
¡ Coherent data collection (maybe) 
¡ Facilitate data sharing across entity 
¡ No useful analytics without abundant, high quality data 
Data Big Data 
Excel BigTable 
PostgreSQL Cassandra, HIVE, HBase 
MongoDB Vertica, KDB
Risk 
Analytics 
¡ Benefits beyond Business Intelligence 
Descriptive 
Analytics 
Predictive 
Analytics 
Prescriptive 
Analytics 
What happened? What’s likely to occur? Why would it occur? 
Hindsight Foresight Insight 
Summary Statistics Data mining Heuristic Optimization 
web analytics, BI, 
credit scoring, trend 
operations planning, 
inventory reporting 
analysis, sentiment 
stochastic methods 
¡ Newest: cognitive analytics = What is the best answer?
Rich Set of Visualization & 
Reporting Tools 
Aggregate Risk 
Dashboards 
Continuous & 
Comprehensive 
Risk Monitors 
Source: IBM Cognos
Data Analytics 
Applications for ERM 
¡ • Scenario Analysis Operational & Stress Testing 
Financial • Credit Scoring 
Compliance • IT Security Anomaly Detection 
Reporting • Risk Dashboard 
Hazard • Catastrophe & Market Risk Hedging 
Strategic • Marketing Analytics
Data Analytics 
for ERM
Definition of 
Risk 
¡ Risk = Frequency of Loss x Severity of Loss 
¡ Loss Distribution 
Unexpected Loss
Traditional ERM 
¡ Analytic Methods 
¡ Closed-form solutions (…just like most things in life) 
¡ Historical 
¡ Estimate risk using internal and external loss data 
¡ Monte Carlo 
¡ Estimate distribution parameters from real data 
¡ Monte-Carlo sample distribution 
¡ Calculate ensemble measures to estimate overall risk 
¡ Simple to implement, aggregate across entity, but make 
complex assumptions, not robust to outliers
Modern ERM 
¡ Data analytics driven 
¡ Inference based methods 
¡ KRI scoring 
¡ Parallelization 
¡ Natural applications 
¡ credit risk scoring 
¡ Anti-money laundering 
¡ Fraud
Prediction Methods 
Methods 
Transduction 
Tail Bayesian Frequentist 
Extreme-Value 
Expected Deficit 
Naïve Bayes 
HMMs 
Bayes Nets 
Regression, 
Decision Trees 
SVM 
Ensemble Methods 
Bagging, Boosting, Voting
Outliers, Inliers, 
and Just Plain Liars 
¡ Prediction problems fall in two classes: 
Inliers Outliers 
Inherently different problems with different quirks
Main Problems with 
Inlier Prediction 
¡ Parametric model choice 
¡ Estimation error for lower moments (mean, s.d.) 
¡ Incorrectly conjugating priors 
¡ Normal/Gaussian distributions don’t really occur in 
real life 
¡ I.I.D.? Really?
Main Problem with 
Outlier Prediction 
¡ Data Quality and Abundance 
¡ To estimate low probability events, big data may not be big 
enough 
Data: 150 years of daily data 
Predictor: 100 year flood severity 
Relevant Data: 1 or 2 data points
Value-at-Risk (VaR) 
¡ Loss severity measure for a given probability and time 
horizon 
• Estimate potential losses (or 
historical losses) 
• Rank losses based on severity 
• 95% Value-at-Risk is equal to 
the 95th percentile loss 
• Interpretation = Losses won’t 
exceed 65.2m 95% of time 
• Underestimates losses during 
the other 5% of time 
Rank 
Loss 
1 
-­‐0.1 
2 
-­‐0.1 
3 
-­‐0.3 
4 
-­‐0.6 
5 
-­‐0.7 
6 
-­‐0.9 
7 
-­‐1.1 
… 
… 
91 
-­‐59.5 
92 
-­‐63.2 
93 
-­‐64.9 
94 
-­‐65.0 
95 
-­‐65.2 
96 
-­‐66.5 
97 
-­‐67.8 
98 
-­‐93.9 
99 
-­‐110.0 
100 
-­‐273.1 
VaR
Value-at-Risk 
¡ Loss severity measure for a given probability and time 
horizon 
1-day 95% VaR of $1m 
Expect to lose no more than 
$1m in 95 out of every 100 days 
Says nothing about the other 5 
days out of 100. Not very 
reassuring, is it?
Tail Value-at-Risk (TVaR) 
¡ Loss severity measure for a given probability and time 
horizon 
• Estimate potential losses (or 
historical losses) 
• Rank losses based on severity 
• 95% Tail Value-at-Risk is equal 
to average of all losses 
beyond 95th percentile loss 
• Expect to lose on average 
$122m if losses exceed the 
95th percentile 
Rank 
Loss 
1 
-­‐0.1 
2 
-­‐0.1 
3 
-­‐0.3 
4 
-­‐0.6 
5 
-­‐0.7 
6 
-­‐0.9 
7 
-­‐1.1 
… 
… 
91 
-­‐59.5 
92 
-­‐63.2 
93 
-­‐64.9 
94 
-­‐65.0 
95 
-­‐65.2 
96 
-­‐66.5 
97 
-­‐67.8 
98 
-­‐93.9 
99 
-­‐110.0 
100 
-­‐273.1 
TVaR
Tail Value-at-Risk (TVaR) 
¡ Loss severity measure for a given probability and time 
horizon 
1-day 95% TVaR of $122m 
Better Measure of Risk 
Also known as Expected 
Shortfall, CVaR
Application: Operational 
Risk Management 
¡ Definition: The risk of direct and indirect loss resulting 
from inadequate or failed: 
¡ Internal processes 
¡ People 
¡ IT systems 
¡ External events 
Source: NYFed 
Operational 
Risk 
External Criminal 
Activity 
Information 
security failure 
Internal 
Criminal 
Unauthorized Activity 
Activity 
Processing 
Failure 
System Failure 
Control Failure 
Business 
Disruption 
Workplace Safety 
Malpractice
Managing OpRisk 
¡ One Approach 
Source: NYFed 
Assess Scorecard 
Internal 
Loss Data 
Identify 
Weakness 
Risk 
Scenarios 
Risk Model 
OpVar 
Risk 
Capital
Methods 
¡ Scorecard 
3 
5 
9 
¡ KRI scoring models 
2 
3 
5 
¡ Useful where no severity data exists 
1 
2 
3 
Loss Distribution 
Impact 
¡ ¡ Estimation of severity distribution parameters 
¡ MLE Not robust – data not i.i.d., biased upwards, subject to 
Probability 
data paucity & sparsity 
¡ Leads to biased loss exposures and correlation assumptions 
¡ Huge opportunity for inference-based analytics
Looking 
Forward
ERM Trends 
Source: NCSU 
¡ Increasing adoption of ERM
Forensic Data Analytics 
Fraud Detection Top Concern 
But Low Adoption. 
Source: Ernst & Young
Promise of Data Analytics 
¡ EDW remains a huge issue for most corporations 
¡ Legacy zombie systems 
¡ IT reporting lines 
¡ Increased understanding by senior managers and 
C-suite 
¡ Analytics as a Service: growing competition within 
consulting industry 
¡ Talent Gap – same for anything Data Science
Thank 
you

More Related Content

What's hot

How to Do a Formal Risk Assessment
How to Do a Formal Risk AssessmentHow to Do a Formal Risk Assessment
How to Do a Formal Risk AssessmentPraveen Vackayil
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskOsama Salah
 
Introduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation SlidesIntroduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation SlidesSlideTeam
 
Economically driven Cyber Risk Management
Economically driven Cyber Risk ManagementEconomically driven Cyber Risk Management
Economically driven Cyber Risk ManagementOsama Salah
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesSlideTeam
 
Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides SlideTeam
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskTony Martin-Vegue
 
Decision trees, scenario analysis, monte carlo simulation and scenario planni...
Decision trees, scenario analysis, monte carlo simulation and scenario planni...Decision trees, scenario analysis, monte carlo simulation and scenario planni...
Decision trees, scenario analysis, monte carlo simulation and scenario planni...Hernan Huwyler, MBA CPA
 
Introduction to Core Assessments
Introduction to Core AssessmentsIntroduction to Core Assessments
Introduction to Core AssessmentsResolver Inc.
 
Risk Mitigation Strategy Powerpoint Presentation Slides
Risk Mitigation Strategy Powerpoint Presentation SlidesRisk Mitigation Strategy Powerpoint Presentation Slides
Risk Mitigation Strategy Powerpoint Presentation SlidesSlideTeam
 
Risk Mitigation Plan PowerPoint Presentation Slide
Risk Mitigation Plan PowerPoint Presentation SlideRisk Mitigation Plan PowerPoint Presentation Slide
Risk Mitigation Plan PowerPoint Presentation SlideSlideTeam
 
Prevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation SlidesPrevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation SlidesSlideTeam
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis"Apolonio \"Apps\"" Garcia
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Risk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation SlidesRisk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation SlidesSlideTeam
 
Corporate FX Questions and Answers for 2016
Corporate FX Questions and Answers for 2016Corporate FX Questions and Answers for 2016
Corporate FX Questions and Answers for 2016FiREapps
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Alexei Sidorenko, CRMP
 

What's hot (20)

How to Do a Formal Risk Assessment
How to Do a Formal Risk AssessmentHow to Do a Formal Risk Assessment
How to Do a Formal Risk Assessment
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Introduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation SlidesIntroduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation Slides
 
Economically driven Cyber Risk Management
Economically driven Cyber Risk ManagementEconomically driven Cyber Risk Management
Economically driven Cyber Risk Management
 
Risk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation SlidesRisk Calculator PowerPoint Presentation Slides
Risk Calculator PowerPoint Presentation Slides
 
Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
 
Decision trees, scenario analysis, monte carlo simulation and scenario planni...
Decision trees, scenario analysis, monte carlo simulation and scenario planni...Decision trees, scenario analysis, monte carlo simulation and scenario planni...
Decision trees, scenario analysis, monte carlo simulation and scenario planni...
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Managing the business_risk_of_fraud
Managing the business_risk_of_fraudManaging the business_risk_of_fraud
Managing the business_risk_of_fraud
 
Introduction to Core Assessments
Introduction to Core AssessmentsIntroduction to Core Assessments
Introduction to Core Assessments
 
Risk Mitigation Strategy Powerpoint Presentation Slides
Risk Mitigation Strategy Powerpoint Presentation SlidesRisk Mitigation Strategy Powerpoint Presentation Slides
Risk Mitigation Strategy Powerpoint Presentation Slides
 
Risk Mitigation Plan PowerPoint Presentation Slide
Risk Mitigation Plan PowerPoint Presentation SlideRisk Mitigation Plan PowerPoint Presentation Slide
Risk Mitigation Plan PowerPoint Presentation Slide
 
Prevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation SlidesPrevention And Control Strategies PowerPoint Presentation Slides
Prevention And Control Strategies PowerPoint Presentation Slides
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Risk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation SlidesRisk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation Slides
 
Corporate FX Questions and Answers for 2016
Corporate FX Questions and Answers for 2016Corporate FX Questions and Answers for 2016
Corporate FX Questions and Answers for 2016
 
Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017Норман Маркс на форуме World Class Risk Management 2017
Норман Маркс на форуме World Class Risk Management 2017
 

Similar to Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
Using Analytics to Audit T&E
Using Analytics to Audit T&EUsing Analytics to Audit T&E
Using Analytics to Audit T&Emcoello
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...MITRE - ATT&CKcon
 
PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016 PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016 PSD Group Ltd
 
Business model innovation by experimentation
Business model innovation by experimentationBusiness model innovation by experimentation
Business model innovation by experimentationEnergized Work
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and securityM. Isaiah McGowan
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Data Mining 11-18-10
Data Mining 11-18-10Data Mining 11-18-10
Data Mining 11-18-10Ed Tobias
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Resolver Inc.
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.pptKareemRasmy1
 
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning Big Data Week
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxAbraraw Zerfu
 
Aliado risk management presentation v3a
Aliado risk management presentation v3aAliado risk management presentation v3a
Aliado risk management presentation v3aJody Keyser
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdfRJ231
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 

Similar to Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014 (20)

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Using Analytics to Audit T&E
Using Analytics to Audit T&EUsing Analytics to Audit T&E
Using Analytics to Audit T&E
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
 
PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016 PSD Operational Risk Event - June 2016
PSD Operational Risk Event - June 2016
 
Business model innovation by experimentation
Business model innovation by experimentationBusiness model innovation by experimentation
Business model innovation by experimentation
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Data Mining 11-18-10
Data Mining 11-18-10Data Mining 11-18-10
Data Mining 11-18-10
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2ADCB Presentation - MENA Bank Tech June 2014 v2
ADCB Presentation - MENA Bank Tech June 2014 v2
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.ppt
 
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
BDW16 London - Amjad Zaim, Cognitro Analytics: How Deep is Your Learning
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptx
 
Aliado risk management presentation v3a
Aliado risk management presentation v3aAliado risk management presentation v3a
Aliado risk management presentation v3a
 
ppt erm.pdf
ppt erm.pdfppt erm.pdf
ppt erm.pdf
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 

More from John Liu

Kubeflow and Data Science in Kubernetes
Kubeflow and Data Science in KubernetesKubeflow and Data Science in Kubernetes
Kubeflow and Data Science in KubernetesJohn Liu
 
Artificial Intelligence As a Service
Artificial Intelligence As a ServiceArtificial Intelligence As a Service
Artificial Intelligence As a ServiceJohn Liu
 
Machine Learning with Small Data
Machine Learning with Small DataMachine Learning with Small Data
Machine Learning with Small DataJohn Liu
 
Data Analytics in Computational Law
Data Analytics in Computational LawData Analytics in Computational Law
Data Analytics in Computational LawJohn Liu
 
AI & Machine Learning: Business Transformation
AI & Machine Learning: Business TransformationAI & Machine Learning: Business Transformation
AI & Machine Learning: Business TransformationJohn Liu
 
Social Network Analysis for Healthcare
Social Network Analysis for HealthcareSocial Network Analysis for Healthcare
Social Network Analysis for HealthcareJohn Liu
 
Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...
Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...
Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...John Liu
 
Sentiment-Driven Financial Intelligence
Sentiment-Driven Financial IntelligenceSentiment-Driven Financial Intelligence
Sentiment-Driven Financial IntelligenceJohn Liu
 
A Way Forward
A Way ForwardA Way Forward
A Way ForwardJohn Liu
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...
Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...
Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...John Liu
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceJohn Liu
 
Naive Bayes for the Superbowl
Naive Bayes for the SuperbowlNaive Bayes for the Superbowl
Naive Bayes for the SuperbowlJohn Liu
 
Neural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting RecognitionNeural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting RecognitionJohn Liu
 

More from John Liu (15)

Kubeflow and Data Science in Kubernetes
Kubeflow and Data Science in KubernetesKubeflow and Data Science in Kubernetes
Kubeflow and Data Science in Kubernetes
 
Artificial Intelligence As a Service
Artificial Intelligence As a ServiceArtificial Intelligence As a Service
Artificial Intelligence As a Service
 
Machine Learning with Small Data
Machine Learning with Small DataMachine Learning with Small Data
Machine Learning with Small Data
 
Data Analytics in Computational Law
Data Analytics in Computational LawData Analytics in Computational Law
Data Analytics in Computational Law
 
AI & Machine Learning: Business Transformation
AI & Machine Learning: Business TransformationAI & Machine Learning: Business Transformation
AI & Machine Learning: Business Transformation
 
DeepREM
DeepREMDeepREM
DeepREM
 
Social Network Analysis for Healthcare
Social Network Analysis for HealthcareSocial Network Analysis for Healthcare
Social Network Analysis for Healthcare
 
Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...
Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...
Healthy Competition: How Adversarial Reasoning is Leading the Next Wave of In...
 
Sentiment-Driven Financial Intelligence
Sentiment-Driven Financial IntelligenceSentiment-Driven Financial Intelligence
Sentiment-Driven Financial Intelligence
 
A Way Forward
A Way ForwardA Way Forward
A Way Forward
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...
Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...
Beyond Machine Learning: The New Generation of Learning Algorithms Coming to ...
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial Intelligence
 
Naive Bayes for the Superbowl
Naive Bayes for the SuperbowlNaive Bayes for the Superbowl
Naive Bayes for the Superbowl
 
Neural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting RecognitionNeural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting Recognition
 

Recently uploaded

Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJames Polillo
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单nscud
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单ewymefz
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhArpitMalhotra16
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单vcaxypu
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxbenishzehra469
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单ewymefz
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsalex933524
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxzahraomer517
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBAlireza Kamrani
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单enxupq
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单enxupq
 
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Domenico Conte
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单yhkoc
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单ewymefz
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesStarCompliance.io
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单ewymefz
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatheahmadsaood
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单ewymefz
 

Recently uploaded (20)

Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 

Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014

  • 1. The Role of Data Science in Enterprise Risk Management By John Liu, PhD, CFA
  • 2. Question of the Day ¡ How do you tell the difference between a Bayesian Statistician and Data Scientist? ¡ Answer: What’s the p-value?
  • 3. Big Data: Big Risks ¡ Healthcare ¡ Financial Services ¡ Insurance ¡ Transportation ¡ National Security ¡ Dating
  • 4. Key Takeaways ¡ What is Enterprise Risk Management (ERM)? ¡ What is the Role of Data Science in ERM? ¡ What Data Analytics are used for ERM?
  • 5. What is Enterprise Risk Management?
  • 6. What is Risk Management? ¡ A structured approach to manage uncertainty ¡ Management strategies: Risk Avoidance Risk Transfer Risk Mitigation
  • 7. Risk Management - Defense Insurance Approach Reward Do Nothing Probability of Success
  • 8. Risk Management - Offense Opportunistic Approach Reward Carpe Diem Do Nothing Probability of Success
  • 9. What is ERM? ¡ Risk-based approach to managing an enterprise ¡ Risk-aware: every major tangible and intangible factor contributing toward failure in every process at every level of the enterprise ¡ Enterprise value maximized with optimal balance between profitability/growth and related risks ¡ Management better prepared to seize opportunities for growth and value creation
  • 10. ERM Components Identify Quantify Respond Monitor & Report Effectiveness Monitor Comprehensive Approach To Managing Uncertainty Identify/Assess Internal and External Risks Risk Scoring & Modeling Respond and Control
  • 11. ERM Goals ¡ Provide holistic view across an organization leveraging firm experience and knowledge ¡ Provide greater transparency to factors that can impair value preservation and business profitability ¡ Understand & test assumptions & interpretations in business decision-making
  • 12. ERM Risk Types ¡ • Resource Capital Management • Business Disruption, IT Operational • Credit Exposure • Exchange Rate, Cash flow, Funding Financial • Privacy, Security, Safety • Regulatory and Statutory Compliance • Financial Reporting • Regulatory Reporting Reporting • Natural Catastrophe • Market Panics Hazard • Business Planning • Marketing, Reputation Strategic
  • 13. RM vs ERM HQ: EUR exposure Subsidiary: USD exposure Sells EUR, Buys USD Sells USD, Buys EUR RM: Subsidiaries/Business Units manage risks separately ERM: Manage NET exposure across entire enterprise
  • 15. ERM Framework Enterprise Structure, Risks Objectives & Components Compliance Financial Compliance Reporting Hazard Strategic Entity Wide Division Business Unit Comprehensive Approach Leverage Data & Analytic Resources Predictive Modeling
  • 16. Common Challenges ¡ Data warehousing & sharing across entity ¡ Prioritization methodology ¡ Consolidated reporting ¡ Timeliness ¡ Data security ¡ The risk management process itself!
  • 17. Role of Data Science ¡ Data science methods provide: ¡ Enterprise Data Management ¡ Comprehensive warehousing ¡ Data quality and abundance ¡ Risk Analytics ¡ Predictive Modeling ¡ Loss Distributions ¡ Reporting ¡ Real-time visualization, dashboards ¡ Regulatory requirements Reporting
  • 18. Typical Corporate EDW ¡ Big data warehouse ≠ useful data (quite the opposite)
  • 19. Data Management ¡ Comprehensive data warehouse ¡ Coherent data collection (maybe) ¡ Facilitate data sharing across entity ¡ No useful analytics without abundant, high quality data Data Big Data Excel BigTable PostgreSQL Cassandra, HIVE, HBase MongoDB Vertica, KDB
  • 20. Risk Analytics ¡ Benefits beyond Business Intelligence Descriptive Analytics Predictive Analytics Prescriptive Analytics What happened? What’s likely to occur? Why would it occur? Hindsight Foresight Insight Summary Statistics Data mining Heuristic Optimization web analytics, BI, credit scoring, trend operations planning, inventory reporting analysis, sentiment stochastic methods ¡ Newest: cognitive analytics = What is the best answer?
  • 21. Rich Set of Visualization & Reporting Tools Aggregate Risk Dashboards Continuous & Comprehensive Risk Monitors Source: IBM Cognos
  • 22. Data Analytics Applications for ERM ¡ • Scenario Analysis Operational & Stress Testing Financial • Credit Scoring Compliance • IT Security Anomaly Detection Reporting • Risk Dashboard Hazard • Catastrophe & Market Risk Hedging Strategic • Marketing Analytics
  • 24. Definition of Risk ¡ Risk = Frequency of Loss x Severity of Loss ¡ Loss Distribution Unexpected Loss
  • 25. Traditional ERM ¡ Analytic Methods ¡ Closed-form solutions (…just like most things in life) ¡ Historical ¡ Estimate risk using internal and external loss data ¡ Monte Carlo ¡ Estimate distribution parameters from real data ¡ Monte-Carlo sample distribution ¡ Calculate ensemble measures to estimate overall risk ¡ Simple to implement, aggregate across entity, but make complex assumptions, not robust to outliers
  • 26. Modern ERM ¡ Data analytics driven ¡ Inference based methods ¡ KRI scoring ¡ Parallelization ¡ Natural applications ¡ credit risk scoring ¡ Anti-money laundering ¡ Fraud
  • 27. Prediction Methods Methods Transduction Tail Bayesian Frequentist Extreme-Value Expected Deficit Naïve Bayes HMMs Bayes Nets Regression, Decision Trees SVM Ensemble Methods Bagging, Boosting, Voting
  • 28. Outliers, Inliers, and Just Plain Liars ¡ Prediction problems fall in two classes: Inliers Outliers Inherently different problems with different quirks
  • 29. Main Problems with Inlier Prediction ¡ Parametric model choice ¡ Estimation error for lower moments (mean, s.d.) ¡ Incorrectly conjugating priors ¡ Normal/Gaussian distributions don’t really occur in real life ¡ I.I.D.? Really?
  • 30. Main Problem with Outlier Prediction ¡ Data Quality and Abundance ¡ To estimate low probability events, big data may not be big enough Data: 150 years of daily data Predictor: 100 year flood severity Relevant Data: 1 or 2 data points
  • 31. Value-at-Risk (VaR) ¡ Loss severity measure for a given probability and time horizon • Estimate potential losses (or historical losses) • Rank losses based on severity • 95% Value-at-Risk is equal to the 95th percentile loss • Interpretation = Losses won’t exceed 65.2m 95% of time • Underestimates losses during the other 5% of time Rank Loss 1 -­‐0.1 2 -­‐0.1 3 -­‐0.3 4 -­‐0.6 5 -­‐0.7 6 -­‐0.9 7 -­‐1.1 … … 91 -­‐59.5 92 -­‐63.2 93 -­‐64.9 94 -­‐65.0 95 -­‐65.2 96 -­‐66.5 97 -­‐67.8 98 -­‐93.9 99 -­‐110.0 100 -­‐273.1 VaR
  • 32. Value-at-Risk ¡ Loss severity measure for a given probability and time horizon 1-day 95% VaR of $1m Expect to lose no more than $1m in 95 out of every 100 days Says nothing about the other 5 days out of 100. Not very reassuring, is it?
  • 33. Tail Value-at-Risk (TVaR) ¡ Loss severity measure for a given probability and time horizon • Estimate potential losses (or historical losses) • Rank losses based on severity • 95% Tail Value-at-Risk is equal to average of all losses beyond 95th percentile loss • Expect to lose on average $122m if losses exceed the 95th percentile Rank Loss 1 -­‐0.1 2 -­‐0.1 3 -­‐0.3 4 -­‐0.6 5 -­‐0.7 6 -­‐0.9 7 -­‐1.1 … … 91 -­‐59.5 92 -­‐63.2 93 -­‐64.9 94 -­‐65.0 95 -­‐65.2 96 -­‐66.5 97 -­‐67.8 98 -­‐93.9 99 -­‐110.0 100 -­‐273.1 TVaR
  • 34. Tail Value-at-Risk (TVaR) ¡ Loss severity measure for a given probability and time horizon 1-day 95% TVaR of $122m Better Measure of Risk Also known as Expected Shortfall, CVaR
  • 35. Application: Operational Risk Management ¡ Definition: The risk of direct and indirect loss resulting from inadequate or failed: ¡ Internal processes ¡ People ¡ IT systems ¡ External events Source: NYFed Operational Risk External Criminal Activity Information security failure Internal Criminal Unauthorized Activity Activity Processing Failure System Failure Control Failure Business Disruption Workplace Safety Malpractice
  • 36. Managing OpRisk ¡ One Approach Source: NYFed Assess Scorecard Internal Loss Data Identify Weakness Risk Scenarios Risk Model OpVar Risk Capital
  • 37. Methods ¡ Scorecard 3 5 9 ¡ KRI scoring models 2 3 5 ¡ Useful where no severity data exists 1 2 3 Loss Distribution Impact ¡ ¡ Estimation of severity distribution parameters ¡ MLE Not robust – data not i.i.d., biased upwards, subject to Probability data paucity & sparsity ¡ Leads to biased loss exposures and correlation assumptions ¡ Huge opportunity for inference-based analytics
  • 39. ERM Trends Source: NCSU ¡ Increasing adoption of ERM
  • 40. Forensic Data Analytics Fraud Detection Top Concern But Low Adoption. Source: Ernst & Young
  • 41. Promise of Data Analytics ¡ EDW remains a huge issue for most corporations ¡ Legacy zombie systems ¡ IT reporting lines ¡ Increased understanding by senior managers and C-suite ¡ Analytics as a Service: growing competition within consulting industry ¡ Talent Gap – same for anything Data Science