SlideShare a Scribd company logo
Presented By ManmeetThapar - 49  VishruthaMaarar - 20 ArtiGada - 03 DeepavaliVankalu - 04 SiddheshParab - 16 RammaniGupta - 10
Contents
What is Operational Risk A form of risk that summarizes the risks a company or firm undertaken when it attempts to operate within a given field or industry.  Operational risk is the risk that is not inherent in financial, systematic or market-wide risk. It is the risk remaining after determining financing and systematic risk, and includes risks resulting from breakdowns in internal procedures, people and systems.
Contd……………… Operational risk can be summarized as human risk; it is the risk of business operations failing due to human error.  Operational risk will change from industry to industry, and is an important consideration to make when looking at potential investment decisions. Industries with lower human interaction are likely to have lower operational risk.
What is Operational Risk The Basel Committee defines operational risk as: ‘’The risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.’’  Credit risk or market risk is not a part of operational risk. 
Why Manage Operational Risk Operational risk can kill financial institution. Credit and market risk are now well known and understood and therefore more likely to merely wound. Operational risk is pervasive complex & dynamic unlike market and credit risk which tend to be isolated in the specific areas of the business. Operational risk pervades all business entities, hiding in wings , waiting to surface.
Advantages
Causes of Operational Risk Causes
Causes of Operational Risk Internal Processes People Contd……..
Causes of Operational Risk
Types Of Operational Risk Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution, Delivery and Process Management Case Study – SBI- IT Related
Types Of Operational Risk Internal Fraud Unauthorised activity , theft of fraud that involves atleast one internal party. Eg: intentional ,misreporting of positions  Unauthorised undertaking of transactions  Insider trading Theft  Robbery Forgery
contd….. External Fraud External fraud refers to theft or fraud carried out by a third party outside the organisation. Eg Computer hacking damage and  theft of information
Contd…… Employment Practices and Workplace Safety This category refers to events relating to employee relations , safe working environment and discrimination. E.g.:  Employee compensation claims  Wrongful termination. Violation of health and safety rules  Discrimination claims  Harassment
Contd…… Clients, Products and Business Practices Operational losses in this category arise from a failure to meet an obligation to a client or from the nature or design of a product. eg misuse of confidential client information Money laundering Product defects Exceeding client exposure limits
Damage to Physical Assets This category accounts for losses as a result of disaster and other events. Eg: Natural disaster Terrorism  Vandelism Contd……….
Contd……. Business Disruption and System Failures Hardware and software failures telecommunication problem Utility outages and disruption
Contd… Execution, Delivery and Process Management This category covers risk events related to transaction processing or process management , trade counter parties and vendors. Eg: Miscommunication Data entry errors Accounting errors  Unapproved accesses given to client account Vendor disputes Outsourcing
Case Studies 1SBI – IT Related SBI, UK’s Treasury operations use the Reuters 3000 dealing system.  Dealers negotiate and confirm various deals . Deals were posted manually into the banking application. Risk of error prone entries, missed out deals, lack of suitable and timely checks & verification and inability to ascertain accurately counter party dealing limits. Requirement : ‘Straight through Processing’ from Reuters dealing server to the Misys-Equation platform to minimise operational risk.
Solution Technologies such as  Microsoft Windows 2000 server,  Access database, IBM MQ series, Misys Meridian middleware and IBM AS/400.
The process can be categorized as follows: • Electronic capture of deals via Reuter Ticket Output Feed (TOF).• Deal data processing with data validation and writing to database.• Deal data mapping, formatting and posting to Misys Equation using Meridian Middleware/IBM MQ Series.• Secure and user-friendly interface to monitor flow of deal data, correct any exceptions and review status of posting into Misys Equation.• Intelligent use of Reuters Current Interest Feed (CIF) to retrieve counter- party dealing limits and actual exposures from the Equation banking system and displaying the same back to the dealers.
Operational Risk

More Related Content

Similar to Operational Risk

ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
H Contrex
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
balejandre
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational risk
Ujjwal 'Shanu'
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
IBM Security
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
banerjeerohit
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
Raj Kumar
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
PECB
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyam
Satyanandan Atyam
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
Christine Maligec, CRM-E, CRIS
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
Saras Singh
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
Rainer Mueller
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
Ujjwal 'Shanu'
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
Tory Quinton
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
Michelle Bojorquez
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
sarah kabirat
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
Bill Lisse
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
 

Similar to Operational Risk (20)

ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational risk
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyam
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 

More from ITM Institute, Mumbai (Sion Br.)

Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
ITM Institute, Mumbai (Sion Br.)
 
Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
ITM Institute, Mumbai (Sion Br.)
 
Omega Watch industry
Omega Watch industryOmega Watch industry
Omega Watch industry
ITM Institute, Mumbai (Sion Br.)
 
Moser Baer
Moser BaerMoser Baer
Asian Paint
Asian Paint Asian Paint
Financial Planning project
Financial Planning projectFinancial Planning project
Financial Planning project
ITM Institute, Mumbai (Sion Br.)
 
Dubai World Crisis
Dubai World CrisisDubai World Crisis

More from ITM Institute, Mumbai (Sion Br.) (7)

Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
 
Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
 
Omega Watch industry
Omega Watch industryOmega Watch industry
Omega Watch industry
 
Moser Baer
Moser BaerMoser Baer
Moser Baer
 
Asian Paint
Asian Paint Asian Paint
Asian Paint
 
Financial Planning project
Financial Planning projectFinancial Planning project
Financial Planning project
 
Dubai World Crisis
Dubai World CrisisDubai World Crisis
Dubai World Crisis
 

Recently uploaded

1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
Neal Brewster
 
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
k4ncd0z
 
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
bresciafarid233
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
nalamynandan
 
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
sameer shah
 
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
rlo9fxi
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
Neal Brewster
 
Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)
AntoniaOwensDetwiler
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
Colin R. Turner
 
在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样
在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样
在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样
5spllj1l
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
Colin R. Turner
 
Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
tscdzuip
 
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
qntjwn68
 
Applying the Global Internal Audit Standards_AIS.pdf
Applying the Global Internal Audit Standards_AIS.pdfApplying the Global Internal Audit Standards_AIS.pdf
Applying the Global Internal Audit Standards_AIS.pdf
alexiusbrian1
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
EasyReports
 
Who Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdfWho Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdf
Price Vision
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
Commonwealth
 
What's a worker’s market? Job quality and labour market tightness
What's a worker’s market? Job quality and labour market tightnessWhat's a worker’s market? Job quality and labour market tightness
What's a worker’s market? Job quality and labour market tightness
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptxOAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
hiddenlevers
 

Recently uploaded (20)

1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
 
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
 
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
 
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
 
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
 
Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
 
在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样
在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样
在线办理(TAMU毕业证书)美国德州农工大学毕业证PDF成绩单一模一样
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
 
Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...
 
University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
 
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
 
Applying the Global Internal Audit Standards_AIS.pdf
Applying the Global Internal Audit Standards_AIS.pdfApplying the Global Internal Audit Standards_AIS.pdf
Applying the Global Internal Audit Standards_AIS.pdf
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
 
Who Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdfWho Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdf
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
 
What's a worker’s market? Job quality and labour market tightness
What's a worker’s market? Job quality and labour market tightnessWhat's a worker’s market? Job quality and labour market tightness
What's a worker’s market? Job quality and labour market tightness
 
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptxOAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
 

Operational Risk

  • 1. Presented By ManmeetThapar - 49 VishruthaMaarar - 20 ArtiGada - 03 DeepavaliVankalu - 04 SiddheshParab - 16 RammaniGupta - 10
  • 3. What is Operational Risk A form of risk that summarizes the risks a company or firm undertaken when it attempts to operate within a given field or industry. Operational risk is the risk that is not inherent in financial, systematic or market-wide risk. It is the risk remaining after determining financing and systematic risk, and includes risks resulting from breakdowns in internal procedures, people and systems.
  • 4. Contd……………… Operational risk can be summarized as human risk; it is the risk of business operations failing due to human error. Operational risk will change from industry to industry, and is an important consideration to make when looking at potential investment decisions. Industries with lower human interaction are likely to have lower operational risk.
  • 5. What is Operational Risk The Basel Committee defines operational risk as: ‘’The risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.’’ Credit risk or market risk is not a part of operational risk. 
  • 6. Why Manage Operational Risk Operational risk can kill financial institution. Credit and market risk are now well known and understood and therefore more likely to merely wound. Operational risk is pervasive complex & dynamic unlike market and credit risk which tend to be isolated in the specific areas of the business. Operational risk pervades all business entities, hiding in wings , waiting to surface.
  • 8. Causes of Operational Risk Causes
  • 9. Causes of Operational Risk Internal Processes People Contd……..
  • 11. Types Of Operational Risk Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution, Delivery and Process Management Case Study – SBI- IT Related
  • 12. Types Of Operational Risk Internal Fraud Unauthorised activity , theft of fraud that involves atleast one internal party. Eg: intentional ,misreporting of positions Unauthorised undertaking of transactions Insider trading Theft Robbery Forgery
  • 13. contd….. External Fraud External fraud refers to theft or fraud carried out by a third party outside the organisation. Eg Computer hacking damage and theft of information
  • 14. Contd…… Employment Practices and Workplace Safety This category refers to events relating to employee relations , safe working environment and discrimination. E.g.: Employee compensation claims Wrongful termination. Violation of health and safety rules Discrimination claims Harassment
  • 15. Contd…… Clients, Products and Business Practices Operational losses in this category arise from a failure to meet an obligation to a client or from the nature or design of a product. eg misuse of confidential client information Money laundering Product defects Exceeding client exposure limits
  • 16. Damage to Physical Assets This category accounts for losses as a result of disaster and other events. Eg: Natural disaster Terrorism Vandelism Contd……….
  • 17. Contd……. Business Disruption and System Failures Hardware and software failures telecommunication problem Utility outages and disruption
  • 18. Contd… Execution, Delivery and Process Management This category covers risk events related to transaction processing or process management , trade counter parties and vendors. Eg: Miscommunication Data entry errors Accounting errors Unapproved accesses given to client account Vendor disputes Outsourcing
  • 19. Case Studies 1SBI – IT Related SBI, UK’s Treasury operations use the Reuters 3000 dealing system. Dealers negotiate and confirm various deals . Deals were posted manually into the banking application. Risk of error prone entries, missed out deals, lack of suitable and timely checks & verification and inability to ascertain accurately counter party dealing limits. Requirement : ‘Straight through Processing’ from Reuters dealing server to the Misys-Equation platform to minimise operational risk.
  • 20. Solution Technologies such as Microsoft Windows 2000 server, Access database, IBM MQ series, Misys Meridian middleware and IBM AS/400.
  • 21. The process can be categorized as follows: • Electronic capture of deals via Reuter Ticket Output Feed (TOF).• Deal data processing with data validation and writing to database.• Deal data mapping, formatting and posting to Misys Equation using Meridian Middleware/IBM MQ Series.• Secure and user-friendly interface to monitor flow of deal data, correct any exceptions and review status of posting into Misys Equation.• Intelligent use of Reuters Current Interest Feed (CIF) to retrieve counter- party dealing limits and actual exposures from the Equation banking system and displaying the same back to the dealers.