After making clear that effective Enterprise Risk Management (ERM) policies are needed, we need to define clearly what ERM is and which components and actions are essential to minimize risks in today’s environment.
First, we have to clarify, what is risk and what is risk management? Most organizations and norms define risk in the way of the National Institute of Standards and Technology (NIST) as “a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability and the resulting impact of that adverse event on the organization” [1]. Risks in this context are potentially bad influence on a company’s operations. The management of these risks usually includes the steps of identifying possible risks, assessing their impact on the organization, plan for actions to avoid, reduce, share or retain the risks, and continuously reevaluating the results when the environment changes [1], [2]. Depending on the area in which the risks have to be managed, the definition and the steps may vary slightly.
Prince2 OGC Manual - Risk Management Cycle, p.242
In contrast to the clear definition of Risk and Risk Management, Enterprise Risk Management currently lacks clear and precise components. The definition depends greatly by organizations. For instance, the Casualty Actuarial Society defined it as “linking risk management with the creation of organizational value expressing risk in terms of impact on organizational objectives” and encompasses hazard, financial, operational and strategic risks [3]. Other sources define the areas finer with areas like legal risks, tax risks, regulatory risks, etc. [4]. Other definitions range from “a disciplined approach aligning strategy, processes, people, technology, and knowledge to manage uncertainties as the enterprise creates value” to “the assessment of collective risks that affect value and the implementation of a company-wide strategy to maximize that value” [5].
What all these definitions have in common though, are that Enterprise Risk Management takes a holistic view on the area of risk management [6]. Different risks are not managed by their functional departments, e.g. financial risks are managed by the finance department, but through a committee that is specialized in assessing risks and seeing the “big picture” instead of the narrow view of each department. Risk Management Frameworks like the COSO (explained in the next blog post), combined with Service Management Framework like COBIT or ITIL, give a set of best practices that can be used to control most of the operational and strategic risks that occur in the IT environment. They have several important aspects in common that need to be managed:
- IT Security, including managing of risks of threats coming from the inside, e.g. knowledgeable employees that are using the IT for their own purposes, as well as outside threats like Hackers or even hostile governments.
- Data Management, including not only planning for disasters and backing up data in a safe location with recovery tests, but also the management of communication tools like instant messaging [7] or e-mail. This implies also a management of new data storage technologies e.g. within a Cloud.
- Business Continuity, this is closely linked to other areas and includes not only high impact, but low probability threats (“Black Swans”) like 9/11, but also more likely threats e.g. a power outage and the continuing of business through in-house power generators.
- Change and Release Management. Many risks can occur through the change of the current systems and the disruption of normal operations through this. Especially in IT, where a seemingly small bug can result in a complete shutdown, a management of these risks is of the utmost importance.
- Compliance with laws, since the Sarbanes-Oxley-Act, specific processes and guidelines on how risks should be managed and subsequently monitored are required by every company. Non-compliance can not only result in high fines, but in higher regulations from the government [8].
Although there are already established frameworks for managing enterprise risks, the amount of resources necessary to invest in certain parts depends heavily on the business the company participates in. While banks may emphasize IT security and the avoidance of interruptions of IT systems, retailers like Walmart may focus on data management since their business intelligence is their main competitive advantage. With this in mind, a good ERM system always considers the business context it is used in.
References:
[1] National Institute of Standards and Technology, Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, and Alexis Feringa
[2] ISO/IEC 31010 Final Draft
[3] Casualty Actuarial Society, “Overview of Enterprise Risk Management”, Enterprise Risk Management Committee, May 2003
[4] Lisa K. Meulbroek, “Integrated Risk Management for the Firm: A Senior Manager’s Guide”, Harvard Business School
[5] John J. Hampton, "Fundamentals of Enterprise Risk Management: How Top Companies Assess Risk, Manage Exposures, and Seize Opportunities", AMACOM, 2009
[6] James Lam, "Enterprise Risk Management: From Incentives to Controls", John Wiley & Sons, 2003
[7] Nancy Flynn, "Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication", AMACOM, 2004
[8] Anne M. Marchetti, "Beyond Sarbanes-Oxley Compliance: Effective Enterprise Risk Management", John Wiley & Sons, 2005