Risk Management Insights

I want to join the BLOG

Operational Risk Management 3 – Risk and Controls Self Assessment applied in a Business Context

Enterprise Risk Management Risk and Control Self Assessment Operational Risk Risk Assessment

This is the third blog in our Operational Risk Management series.

In the first article, I explained the incredible KRI system we all have via our five senses. In the second blog, I discussed the application of the Risk and Control Self Assessment (RCSA) in our personal lives using the example of the annual medical check-up. The seven key steps of the RCSA process were set out as part of this example.

In this blog, we will see how the RCSA works in a business context by applying it to a business process. I will use the process of managing employee expense claims, their payment, processing and recording, a process we can all appreciate from one perspective or another.

This example is deliberately at a granular level to illustrate the principles. The same concepts should be used at any level of the organisation using the appropriate level of granularity. This means that the volume of information should be similar for any risk assessment carried out.

calculator-close-up-data-2058136

Step 1: Business Objectives

The objectives of this process are to:

  1. Keep employees happy
  2. Meet contractual requirements (actual if contained in the employment contract and implied if contained in an HR policy)
  3. Meet external compliance obligations such as Corporations Law and Tax Laws
  4. Manage expenses

Step 2: Identify critical processes

The critical processes (things we need to successfully complete in order to meet the objectives) are:

  1. Pay the correct amountscreen_2x
  2. Pay on time
  3. Pay the correct bank account
  4. Have a simple and fair expense policy and expense claim process
  5. Know what the contractual obligations are
  6. Meet the contractual obligations. Depending on what they are, items 1,2 & 3 are most likely to meet them
  7. Know what the external compliance obligations are. We will use typical corporations law and tax law obligations in this example which require proper recording and accounting with adequate supporting documentation
  8. Post to the correct general ledger account
  9. Post the correct amount
  10. Post in the correct period
  11. Obtain and maintain relevant supporting documentation such as tax invoices
  12. Prepare and maintain a budget and assess budget vs. actual
  13. Pay only legitimate expenses

I have listed the critical processes in order of the objectives. However, there is a many to many relationship between objectives and critical processes which means one critical process can meet more than one objective or vice versa.

Step 3: Risks

We can now ask ourselves – what risks exist that could prevent the critical processes from being successfully completed? It is best to address each critical process at a time to ensure all key risks are identified. Again, there is a many to many relationship between critical processes and risks. I have only listed risks relating to the first three critical processes as examples:

  1. Manual processing error
  2. System processing error
  3. Third party bank processing error
  4. System outage
  5. Insufficient available funds

Step 4: Controls

For each risk, we then identify the key controls. Below are examples relating to some of the risks noted above.

  1. Segregation of duties - Review and authorise
  2. Reconciliation
  3. Staff resource management
  4. Back-up systems
  5. Cash flow planning

Step 5: Assess and analyse the risks

We can now analyse the risks by assessing their likelihood and impact using the pre-determined scales (I am using a simple 1 = Low and 5 = high rating below).  We typically find this is best performed by assessing the residual risk first (as this is the level we understand and experience) and then assess inherent risk by reassessing after assuming the recorded controls do not work / exist. I have only assessed one as an example.

ERM_Screenshot.png

Step 6: Evaluate

Evaluation of the risk is made against the organisations’ risk appetite, commonly using a risk matrix as follows:IMAGE_TATTAM.png

The residual risk for this example is highlighted.

Step 7: Issues and Actions

The evaluation into risk levels then prompts how the risk will be dealt with. Depending on the risk appetite levels, the response may be:

  • Accept the risk. This would occur automatically if the risk was within the acceptable level or formally if it was outside of normal acceptance
  • Reduce the risk by:
    • Increasing controls
    • Transferring some of the impact (e.g. Insurance)
    • Avoiding by ceasing the process
    • Process re-engineering to change the level of inherent risk
  • Increasing the risk by:
    • Removing or reducing controls because the cost does not outweigh the benefit
    • Process re-engineering which increases the level of inherent risk based on increasing reward

The RCSA process when done in this manner has the following advantages:

  1. It aligns risk management perfectly with business objectives and ultimately strategy
  2. It helps embed risk management as part of the normal business process
  3. It overcomes the view that risk management is opposed and works against the achievement of objectives
  4. It is more engaging with the business as it focusses on the achievement of objectives which is the man focus of business.

Watch our webinar on risk assessment

Learn more about Inherent, Residual and Targeted Risks and how you can leverage each one to add value to your risk management framework. We'll also be sharing some professional hacks for overcoming common issues with using Inherent Risk. Click on the image below to register: Recording of Webinar on Inherent, Residual and Targeted Risk

Share This

You might also be interested in:

1

2

3