Operational Risk Ed25
Operational Risk Ed25
Certificate
Operational Risk
Edition 25, June 2023
This workbook has been written to prepare you for the Chartered Institute for Securities & Investment’s
Operational Risk examination.
Published by:
Chartered Institute for Securities & Investment
© Chartered Institute for Securities & Investment 2023
20 Fenchurch Street
London
EC3M 3BY
Tel: +44 20 7645 0600
Fax: +44 20 7645 0601
Email: [email protected]
www.cisi.org/qualifications
Author:
Stewart Lancaster, Chartered FCSI
Reviewers:
Jigna Malde, Chartered FCSI
Kainoa Blaisdell, Chartered MCSI
This is an educational workbook only and the Chartered Institute for Securities & Investment accepts no
responsibility for persons undertaking trading or investments in whatever form.
While every effort has been made to ensure its accuracy, no responsibility for loss occasioned to any person
acting or refraining from action as a result of any material in this publication can be accepted by the publisher
or authors.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise
without the prior permission of the copyright owner.
Warning: any unauthorised act in relation to all or any part of the material in this publication may result
in both a civil claim for damages and criminal prosecution.
Candidates should be aware that the laws mentioned in this workbook may not always apply to
Scotland.
A learning map, which contains the full syllabus, appears at the end of this workbook. The syllabus
can also be viewed on cisi.org and is also available by contacting the Customer Support Centre on +44
20 7645 0777. Please note that the examination is based upon the syllabus.
The questions contained in this workbook are designed as an aid to revision of different areas of the
syllabus and to help you consolidate your learning chapter by chapter.
II
Important – Keep Informed on Changes to this Workbook and Examination Dates
Changes in industry practice, economic conditions, legislation/regulations, technology and various other
factors mean that practitioners must ensure that their knowledge is up to date.
At the time of publication, the content of this workbook is approved as suitable for examinations taken
during the period specified. However, changes affecting the industry may either prompt or postpone the
publication of an updated version.
It should be noted that the current version of a workbook will always supersede the content of those
issued previously.
Keep informed on the publication of new workbooks and any changes to examination dates by regularly
checking the CISI’s website: cisi.org/candidateupdate
CISI examinations are used extensively by firms to meet the requirements of government regulators.
Besides the regulators in the UK, where the CISI head office is based, CISI examinations are recognised
by a wide range of governments and their regulators, from Singapore to Dubai and the US. Around
50,000 examinations are taken each year, and it is compulsory for candidates to use CISI workbooks to
prepare for CISI examinations so that they have the best chance of success. Our workbooks are normally
revised every year by experts who themselves work in the industry and also by our Accredited Training
Partners, who offer training and elearning to help prepare candidates for the examinations. Information
for candidates is also posted on a special area of our website: cisi.org/candidateupdate.
This workbook not only provides a thorough preparation for the examination it refers to, it is also a
valuable desktop reference for practitioners, and studying from it counts towards your Continuing
Professional Development (CPD). Mock examination papers, for most of our titles, will be made available
on our website, as an additional revision tool.
CISI examination candidates are automatically registered, without additional charge, as student
members for one year (should they not be members of the CISI already), and this enables you to use a
vast range of online resources, including CISI TV, free of any additional charge. The CISI has more than
40,000 members, and nearly half of them have already completed relevant qualifications and transferred
to a core membership grade. You will find more information about the next steps for this at the end of
this workbook.
III
IV
Risk Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1
Other Major Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2
The Nature of Operational Risk . . . . . . . . . . . . . . . . . . . . . . . . . 45
3
The Causes and Impacts of Operational Risk Events . . . . . . . . . . . . 93
4
Operational Risks Arising in the Trade Cycle . . . . . . . . . . . . . . . 109
5
The Support and Control Functions . . . . . . . . . . . . . . . . . . . . . 127
6
Operational Risk in the Regulatory Environment . . . . . . . . . . . . . 143
7
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
8
Multiple Choice Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
It is estimated that this manual will require approximately 80 hours of study time.
What next?
See the back of this book for details of CISI membership.
V
VI
Before you open Chapter 1
We love a book! ...but don’t forget you have been sent a link to an
ebook, which gives you a range of tools to help you study for this
qualification
Depending on the individual subject being studied and
your device, your ebook may include features such as:
Highlight, bookmark Images, tables and Links to relevant End of chapter questions
and make animated graphs websites and interactive multiple
annotations digitally* choice questions
* These features are device dependent. Please consult your manufacturers guidelines for compatibility
Risk Basics
1. Introduction 3
2. What is Risk? 3
1. Introduction
1
This workbook describes what risk is and what it
means to the financial services sector. It describes
the four common categories of risk – credit,
market, liquidity and operational – providing a
brief contextual overview of the first three and
focusing particularly on the latter. Operational
risk and some of the more important aspects of its
management are described in detail in chapters 3,
4 and 5.
2. What is Risk?
3
For these reasons, all airline operators expend a great deal of time, effort and money on ensuring
adequate safety standards by means of rigorous airframe and engine maintenance, adequate aircrew
training, the establishment of safety procedures, and general compliance with all relevant industry
standards. The same approach has been adopted by many other industries and activities. Think of the
importance in the modern world of health and safety regulations, inspection and enforcement.
There are direct parallels with the approach to operational risk in the financial services sector; here, the
consequences generally occur in the form of financial loss or reputational damage and to prevent this,
firms put risk control procedures in place.
Financial services regulators, just like airline regulators, set minimum standards and then police them to
ensure that firms are doing enough to protect their clients’ interests.
Historically, financial institutions have concentrated on market, credit and liquidity risk as a means
of understanding their exposure to loss. However, following a number of high-profile losses due to
operational failures, the industry has increasingly focused on the measurement and management of
operational risk.
An appropriate starting point for understanding the subject is to review the commonly used risk terms
and definitions employed by the financial services sector.
1.1.1 Know the following major risk categories: credit risk; market risk; operational risk; liquidity risk
The essential points to note when applying this definition to risk management are:
• Chance – this is the ‘likelihood’ or ‘probability’ of an event happening in the future. The event has not
yet happened; it exists as one of a number of possible outcomes that may occur in the future. This is
important because it suggests that people can take action today that may reduce the chance of an
event occurring in the future.
• Adverse consequences – the potential outcome is regarded as negative. It is a potential occurrence
that people are trying to avoid. This is also called the downside of risk.
4
Risk Basics
It is generally accepted that there are four main categories of risk in the financial services sector:
1
• Credit risk relates to lending or agreeing to trade with another counterparty. This is the fundamental
risk in finance, as banks’ traditional business is to lend money in return for interest revenue. Lending
institutions accept the credit risk of a borrower not paying back the loan, in exchange for revenue.
The higher the risk profile of the borrower, the higher the interest rate banks can charge. Credit risk
also exists between trade counterparties, with the risk being that a counterparty does not pay, or
deliver the asset they have agreed to deliver on time.
• Market risk is manifested by exposure to the uncertain market value of a portfolio. For example, a
trader may hold a portfolio of securities, assets or commodities. They know what the market value of
these instruments is today, but are uncertain as to what the market value will be a week from today.
Therefore, the trader faces market risk. Market risk represents the potential risk of loss of earnings or
capital arising from a reduction in the value of financial instruments. In simple terms, an investor is
exposed to market risk as soon as a financial product is purchased. This is intrinsic in all markets and
across all products.
• Liquidity risk is the risk that a bank or other financial institution may not be able to close out a
position because the market is illiquid in some way (market liquidity). For example, there may not
be enough buyers of stock when an institution is wishing to sell. Liquidity risk may also mean that
the bank or financial institution may not be able to fulfil transactions as it does not hold sufficient
cash (funding liquidity). This overlaps with credit/counterparty risk. If a counterparty is funding
themselves on a short-term basis and industry-wide confidence in that particular firm begins to
fall, liquidity available to that particular firm may dry up which will then prevent them from settling
trades with other firms. Historically, liquidity risk has also been closely linked to systemic risk, as it
may affect many or all firms at the same time.
• Operational risk is formally defined by the Basel Committee on Banking Supervision (BCBS) as
‘the risk of loss resulting from inadequate or failed internal processes, people and systems or from
external events’. In practical terms, operational risk addresses the risk of things going wrong with
the day-to-day operating activities of the firm, which then results in financial or other loss. There is
a strong correlation between operational risk and the other risk categories, and when something
goes wrong there is often an operational risk impact in addition to any credit, market or liquidity
risk impacts experienced by the firm. While credit, market and liquidity risk may all be a function of
the broader economic environment (eg, systemic risks), operational risks are specific to the firm in
question.
The financial services sector has become increasingly aware of the importance of managing risk. For
financial services institutions, as stated above, this may involve credit risk, market risk, liquidity risk or
operational risk. For financial services regulators, it has come to mean adopting risk-based supervision.
For banks in particular, the measurement and control of capital risk has become a key issue.
5
Traditionally, credit risk from lending was the primary risk for banks. As financial institutions entered
new markets and traded new products, other risks such as market risk began to occupy the attention
of management. In the last few decades, financial institutions have developed sophisticated tools and
methodologies to manage market risk, driven by the huge rewards involved in its upside. The methods
have been modified to allow the modelling of credit risk.
The importance of operational risk has been acknowledged, and it now takes its place as one of the
fundamental categories of risk that require effective management.
Operational risk management is concerned principally with identifying, assessing, measuring and
managing inherent weaknesses in the operational workings of a financial institution.
The following activities and associated processes are common across financial institutions, and are
prone to operational risk events:
They can affect one or many areas of the firm and can cross departmental boundaries. The main sources
from which deficiencies can originate are:
• information systems
• internal controls
• human error
• systems failure
• lack of governance, leading to inadequate policies and procedures
• external events.
In general terms, ‘risk management’ tries to ensure that the likelihood of risks being realised and the
potential impact are reduced to acceptable levels. The four important aspects of this description are:
• Implementation – risk management is concerned with taking action to reduce risk levels. It requires
a proactive, or preventative approach. There is little benefit in the foreknowledge that a loss-making
event may occur if no action is taken to prevent it, or to mitigate its consequences.
• A structured process – this means using the result of a planned, ongoing decision process and
related action programme. This involves identifying, assessing, controlling, monitoring, reporting
and mitigating risks where possible. Once implemented, there will be a need for feedback and
review of the process to aid and inform future decision-making.
6
Risk Basics
• Reducing the likelihood – the likelihood of a risk being realised within a business can be
1
reduced but cannot be eliminated completely (unless the activity to which the risk is related is not
undertaken at all). This is linked to the idea of probability. If the future were certain, there would be
no probabilities, only certain outcomes. The best that can be done is to try to make the future a little
more certain and reduce the chance of negative outcomes.
• Acceptable levels – given that risk cannot be eliminated entirely, effective risk management is
concerned with reducing the chances of misfortune to an acceptable level. What is acceptable will
depend upon factors such as risk appetite, regulatory boundaries, and the level of risk that each
institution feels comfortable with. Identifying acceptable levels of risk involves understanding and
balancing the downside of risk with the potential benefits of the upside. Finding agreement at a
firm-wide or industry-wide level and obtaining regulatory consent on the level of acceptability of
risk is a major area of contention when designing risk management strategies.
1.1.3 Understand the operational risk issues linked with recent major risk-related events in the
financial services sector, such as: BNP Paribas (2013); Invesco (2014); PPI; LIBOR; HSBC (2016);
Central Bank of Bangladesh (2016); Wells Fargo (2016); TSB 2018; GAM 2018; Raphael’s Bank
(2018)
As stated historically, financial institutions have concentrated on market and credit risk as a means of
managing their exposure to loss. However, following a number of high-profile losses due to operational
failures, the industry has increasingly been focusing on managing and measuring the risks inherent in their
internal processes. This section summarises well-known operational failures which have highlighted the
need for better understanding and control of operational risk.
• Invesco – this US-based investment management company was fined £18.6 million in April 2014 by
the UK regulator, the Financial Conduct Authority (FCA), for exposing investors to higher levels
of risk than they had been led to expect. This higher level of exposure occurred during the period
between May 2008 and November 2012. Customers lost in the region of £5 million and Invesco was
required to pay compensation to clients that were affected by this major oversight. It was found that
Invesco did not comply with investment limits and did not clearly inform investors or explain the
associated risks of its use of derivatives in its simplified prospectus required for each fund. Invesco
incorrectly described the impact of using derivatives in the key investor information documents
that they produced in 2012. By using derivatives, Invesco was introducing leverage into its funds,
although the firm was not allowed to use derivatives in this way. Invesco had to quickly improve its
systems and controls as identified by the FCA. The regulator also found that the firm had not always
recorded trades on time, which meant funds could have been wrongly priced. The firm also failed to
monitor whether trades were fairly allocated between funds, creating an actual risk that some funds
may have been disadvantaged.
• LIBOR – The London Interbank Offered Rate (LIBOR) is an average interest rate that is calculated daily
through submissions by major banks in London. As early as 2008, there were rumours circulating in
the financial services sector that some banks were attempting to manipulate this rate for their own
benefit. The LIBOR scandal itself arose when it was found that some banks were falsely over- or
7
understating their interest rates in order to profit on certain trades, or to give the false impression
that they were more creditworthy than they actually were. LIBOR was also the benchmark rate for
many types of derivatives, such as swaps and structured products. Banks could, therefore, influence
the setting of prices for products they had sold to clients.
The banks are required to submit their bids for the interest rates that they are paying, or would
expect to pay for inter-bank lending. One way of assessing the health of the financial system is to
look at the LIBOR rate. For example, if the banks involved in submitting their interest rates feel more
confident about the financial system, they would submit a lower interest rate and vice versa. In 2012,
it was revealed by Barclays Bank that there was significant fraud and collusion by member banks,
and that it had been fined at that stage £290 million by the UK’s then regulator, the FSA, for rigging
LIBOR between 2005 and 2009. Several other banks were also indicted and had action taken against
them, including a prison sentence for a trader at both Citigroup and UBS, Tom Hayes. In addition,
new benchmark interest rates other than LIBOR have been introduced to curb future manipulation.
• HSBC – was targeted in January 2016 in a distributed denial of service (DDoS) attack. HSBC confirmed
that the attack was successfully defended and that its systems had not been breached; however, the
cyber attack resulted in HSBC’s online banking facilities being unavailable – with customers not
being able to access their online accounts or make payments.
A cyber attack such as a DDoS is designed to overwhelm websites and other online services with huge
volumes of website traffic. Hackers stealthily infect thousands of computers around the world with
malware that allows these machines to be used as part of a coordinated attack on the target website.
The attack was timed to coincide with one of the bank’s busier periods including the first pay date
after the Christmas period for many, as well as coinciding with the self-assessment tax payment
deadline at the end of January. While there was no direct loss as a result of the attack, indirect losses
included reputational damage, as customers were frozen out of their systems, as well as the cost of
enhancing system resilience to prevent a recurrence of this issue.
• Bank of Bangladesh – the central bank of Bangladesh was subject to a sophisticated cyber attack in
an attempt to steal over $950 million. In February 2016, hackers gained access to the bank’s internal
systems and payment credentials, allowing them to initiate a series of transactions via Society for
the Worldwide Interbank Financial Telecommunication (SWIFT) to a number of fictitious entities
in Sri Lanka and the Philippines.
The bank’s systems had been compromised a month earlier, which allowed the criminals to not
only initiate a number of fraudulent payments but to also turn off internal printers that were used
to print all money transfer instructions which were then manually reviewed. Suspicion was raised
by the Federal Bank of New York due in part to a spelling mistake in the recipient’s name; however,
weaknesses in the bank’s internal controls meant that once the suspicion was raised the bank was
unable to determine if the trades were in fact fraudulent. Once the internal printer functionality was
eventually restored the bank became aware of dozens of transactions that had been initiated over
the weekend. Whilst the suspicious activity was identified by the Federal Bank of New York, delays
in responding by the Bank of Bangladesh meant that the cyber-criminals managed to withdraw over
$80 million.
• Wells Fargo – was fined $185 million in September 2016 as a result of employees of Wells Fargo
fraudulently opening millions of fee-bearing bank accounts and credit cards on behalf of clients
without their consent in order to meet sales targets and to boost income for the bank. The fraud was
discovered when clients started noticing unexpected fees being deducted from their accounts and,
8
Risk Basics
in some cases, money was moved from the client’s legitimate accounts to fund these fraudulent
1
accounts. As part of the widespread deception which took place over a five-year period, employees
used a processes known as ‘pinning’ whereby the client’s security pin number was reset to ‘0000’,
allowing members of staff to access and control the account; employees would also replace the
clients’ contact details with their own contact details to circumvent fraud notifications to the clients.
Over the period 2011–16, Wells Fargo fired over 5,000 employees for opening accounts without
client consent and in February 2019, it agreed to settle an associated class action for $320 million.
• Merrill Lynch – was fined £34 million in October 2017 as a result of repeated EMIR transaction
reporting failures, after having received two prior final notices from the FCA. Merrill Lynch had been
subject to the transaction reporting requirements for exchange-traded derivatives (ETDs) under
EMIR since February 2014 and had experienced difficulties in implementing appropriate systems
and controls.
ETD trades consist of two ‘legs’: the market leg and the client leg. These were not recorded within
their systems, meaning these trades had to be synthetically generated by their systems to allow
them to be reported onwards to the regulator. Unfortunately, a static data table that contained
incorrect information was used to identify if the trade was reportable, resulting in over 68 million
trades not being reported to the regulator.
Merrill Lynch was criticised for delaying the implementation of the reporting requirements until
three months before the regulatory deadline, relying on a large number of external contractors to
support its reporting initiative, the majority of whom were let go once the regulatory deadline had
arrived despite not having fully implemented the required processes. Specifically, the FCA stated
that the systems testing conducted by Merrill Lynch ‘was not adequate to address the risk that the
reports [...] were complete and accurate’.
While the issues were identified internally, the lack of appropriate controls over the three-year period
in review, coupled with the repeated nature of the offence, resulted in the regulator increasing the fine
by 60%.
9
• TSB – as part of their separation from the Lloyds Banking Group in September 2018, TSB migrated its
five million customers on to its proprietary digital platform. Delays in the migration led to 1.9 million
customers losing access to their online banking and mobile banking applications.
During the outage, TSB was the target of an unprecedented fraud with over 10,000 incidents being
reported; this was further exacerbated by what the bank has acknowledged as ‘poor communication’
with its customers following the incident. The bank later admitted this had diminished its clients’
trust. The FCA subsequently started an investigation into the bank, which has been criticised for
downplaying the issues and not responding quickly enough to early concerns. TSB has committed
to ensuring that all clients will not be out of pocket due to the migration issues or subsequent fraud.
• GAM – in July 2018, the Swiss asset manager suspended the manager of its Absolute Return Bond
Fund following a whistleblower tip regarding ‘a number of potential misconduct issues’. Following
an independent investigation conducted by an external law firm, the whistleblower escalated and
expanded on their concerns to the FCA.
The whistleblower claimed that there was a failure to observe internal risk management and
record-keeping policies and conflicts of interest policies over a prolonged period. The investigation
concluded that, while there was no material client detriment, there had been breaches of its dealing
and inducement policies.
Subsequently, GAM experienced large outflows of funds as clients sought to move away from the
fund range in question. This led to its liquidation and a management restructure of the firm in a
bid to enhance the organisational controls, thus reducing the autonomy its investment staff had
previously enjoyed.
• Raphael’s Bank – was one of the UK’s oldest independent retail banks; it operated prepaid card
and charge card services across Europe and the UK for which it relied on an outsourced provider.
The bank had been fined previously by the PRA in 2015 for its failure in relation to oversight of
outsourced functions. In May 2018, the FCA and the PRA jointly fined Raphael’s Bank £1.89 million
for ‘flaws in its overall management and oversight of outsourcing risk from board level down’ between
2014 and 2016.
The regulator noted that Raphael’s bank did not have the processes in place to identify and assess
the risks related to business continuity and disaster recovery arrangements. These risks crystalised
when an incident occurred at its third-party supplier, preventing any transactions from being
authorised which affected over 3,000 customers who were unable to use their prepaid cards during
an eight-hour period on Christmas eve in 2015. The bank was eventually wound down in 2019 after
it failed to attract a buyer.
• WhatsApp – In September 2022 the US regulator the Securities Exchange Commission (SEC) fined
multiple banks $2 billion for what they described as ‘pervasive off-channel communications’ which
allowed employees of the organisations involved to avoid regulatory scrutiny by communicating
via WhatsApp. These record-keeping failings were identified across multiple levels from junior
employees through to senior executives.
A number of global financial institutions including Barclays, Bank of America, Citigroup, Credit
Suisse, Deutche Bank, Goldman Sachs, Morgan Stanley and UBS ordered to pay fines in the
region of $200 million dollars each. It is believed that the use of instant messaging apps became
more commonplace during the COVID-19 pandemic whereby employees and employers had to
adapt quickly to a remote working environment as countries introduced ‘lockdowns’. However,
the decentralised nature of these applications, coupled with the ability to permanently delete
messages, means they are not easily accessible or able to be monitored by organisations breaching
record-keeping requirements designed to detect and prevent financial manipulation of markets and
fraudulent activities.
10
Risk Basics
2.5 The Role of the Board, the Board Risk Committee and the Chief
1
Risk Officer (CRO) in the Governance of Risk within the Firm
Learning Objective
1.1.4 Understand the role of the Board, the Board Risk Committee and the chief risk officer (CRO) in
the governance of risk within the firm
The board of directors is a group of individuals who have been appointed into their roles and will jointly
oversee the various activities of the company. Collectively, they are often referred to as ‘the board’. Their
roles and responsibilities are detailed in the constitutional documents of the company.
Some members of the board will be executive and others, typically a majority, will be independent or
non-executive.
In terms of the governance of a firm, responsibility is essentially divided between the board of directors
and the shareholders. In smaller companies, these may be the same people in practice. Ensuring that
the board operates effectively is essential in any well run organisation; in the US, the Sarbanes-Oxley
Act 2002 introduced new standards of accountability for the boards of all companies that have a
listing in the US, and directors potentially face large fines and imprisonment if they are found guilty of
accounting-related crimes.
11
2.5.2 The Board Risk Committee
The board risk committee has the responsibility of providing oversight and giving advice to the board
of directors in relation to identified risk exposures of the organisation, including both current and
potential risks, future risk strategy, and the levels of risk appetite and risk tolerance of the organisation.
While board risk committees have long been common to large firms, smaller firms are less likely to have
them in their organisation.
The activities of the CRO (see below) are overseen by the board risk committee.
The CRO may report to the board of directors or the board risk committee and will typically oversee
the organisation’s enterprise risk management (ERM) approach. Forming an enterprise-wide view of
risk across the organisation will require the agreement of a number of different areas in a financial firm,
given the level of understanding that the CRO needs to have, and the willingness of a department to
provide key data and avail themselves and their people to a greater level of oversight, which may or may
not be welcome.
The increasing number of CROs being appointed within financial services represents a key area of
development for risk management and, more generally, compliance. While very important in times
of financial stress and trouble, the perceived importance of this role may be diminished during more
profitable parts of the economic cycle.
Enterprise risk management (ERM) is a concept that provides a firm with the ability to understand,
address and manage its interrelated risks in the most effective way. It is also commonly referred to
as integrated risk management, or firm-wide risk management, because it is a structured, consistent
and continuous process across the whole organisation (which could extend around the globe) for
identifying, assessing, deciding on responses to, and reporting on opportunities and threats that affect
the achievement of its objectives.
One of ERM’s main aims is to protect shareholder value by integrating the management of all the
disparate risks of a portfolio of businesses. This allows a firm to appreciate its overall risk profile and to
identify and explain financial risk in a transparent, structured and comprehensive way.
12
Risk Basics
In order to protect shareholder value, ERM has four practical objectives that make financial risk
1
management more effective. These are to:
These objectives are common to any risk-management process. The difference with ERM is that it
integrates the management of all risks. This means generating a common framework and using a
common approach and systems for the management of:
• market risk
• credit risk
• liquidity risk
• operational risk
• reputational risk
• strategic risk
• business risk.
Much of the effort involved in ERM, at present, is in understanding the interrelationship between the
different risk types that a business faces and improving the way the various risk specialists work with
each other in forming the overall risk picture. As a result, ERM is the next major strategic step forward for
financial institutions to help them manage their risk.
There are a number of areas and challenges to be considered when implementing an effective ERM
policy. These include the following:
• Has the firm adopted a common process for risk management and is there a common understanding
of risk and risk management within the firm?
• How are risk management tools being applied to decision-making within the firm and are they
being used effectively and consistently?
• Do all the firm’s business and operational plans consider risks and incorporate measures to mitigate
those risks and/or to maximise opportunities?
• Is there a sufficient understanding of how each risk area impacts others within the risk teams to
allow them to provide adequate challenge to business decisions?
• Is the risk management function adequately resourced and granted proper authority, and does it
report to a high level within the organisation?
In order to help firms understand the risks that they may be exposed to, it is common to use a risk
register as a risk-management tool. This acts as a central record or database for all the individual known
risks that the firm has identified and then details, for each risk, the source and nature of the risk, the
treatment options available and the existing countermeasures that the firm may use to mitigate the
risks. The risk register will usually contain an assessment of the impact to the firm should the risk arise in
practice along with the likelihood of the risk occurring. The risk register may appear in different media,
eg, a written register or a spreadsheet.
13
End of Chapter Questions
Think of an answer for each question and refer to the appropriate section for confirmation.
2. Name two of the high-profile losses that have occurred in recent years in the financial services
sector.
Answer Reference: Section 2.4
3. What caused the London Interbank Offered Rate (LIBOR) scandal in the UK?
Answer Reference: Section 2.4
4. Why was Raphael’s Bank fined by the Financial Conduct Authority (FCA) in 2018?
Answer Reference: Section 2.4
6. What are the responsibilities of the chief risk officer (CRO) of a firm?
Answer Reference: 2.5.3
14
2
Chapter Two
3. Market Risk 30
5. Liquidity Risk 39
1. Credit Risk
2
Learning Objectives
17
1.1.1 Definition
Credit risk, also sometimes known as default risk, is defined as the risk of loss caused by the failure of a
counterparty to meet its obligations or to repay monies due.
Credit risk affects any firm to which money is owed by way of loan debt or obligation to pay, such as
fees. The firm that has the financial obligation is called an obligor. Credit risk exists in any contract
where one party has an obligation to another, and is present in the trading of all financial instruments.
A ‘counterparty’ is one of the parties to a transaction – either the buyer or the seller, the lender or the
borrower.
On-balance sheet transactions include instruments such as loans and the buying and selling of securities.
Loans carry ‘direct risk’, which is the simple risk of loan default when money is lent to a customer.
Securities carry issuer risk, which is the risk of default by the issuer on redemption or on interest
servicing when an institution or investor holds debt securities (eg, bonds) issued by the issuing
institution.
Bonds are a long-term form of debt and, thus, there is a risk that the issuer will default on its obligations
to pay coupons and repay the principal with regard to the bond. When considering issuer risk, an
investor must assess the likelihood of a default taking place, the severity of such a default and when
a default might occur. Bonds are issued by governments and corporations to raise finance, and
government bonds (eg, gilts – the UK government securities) are deemed less risky than corporate
bonds. However, government issuers can also present credit risk – for example, the Russian Government
defaulted on payment of interest and bond redemptions in September 1998.
Off-balance sheet transactions involve financial instruments such as securitisation products, forwards,
and over-the-counter (OTC) derivatives. These may also include the transfer of liabilities to nominally
independent entities, such as special purpose vehicles (SPVs). One of the main advantages of using
off-balance sheet products is that they are treated differently from a capital adequacy perspective and
allow a firm to reduce its balance sheet liabilities.
Both on- and off-balance-sheet transactions can carry pre-settlement risk and settlement risk.
• Pre-settlement risk is the risk that an institution defaults prior to the settlement of the transaction
when the traded instrument has a positive economic value to the other party.
• Settlement risk occurs when there is a non-simultaneous exchange of value (eg, cash for securities)
and one of the parties defaults during the exchange.
18
Other Major Risks
2
• Bond investors, who lose their investment if the bond issuer fails, face issuer credit risk.
• Firm A and Firm B trade an interest rate swap. If interest rates move in Firm A’s favour, Firm B
will owe a net obligation. As Firm B could fail to perform on such an obligation, Firm A faces pre-
settlement credit risk.
• An investment company has a forward contract to exchange euros for US dollars with a foreign
firm. On the contract’s maturity date, the investment company makes its euro payment but,
because of time differences, there is a delay in the foreign firm making its corresponding dollar
payment. Given that it is possible that the firm will fail to make its payment, the corporation faces
settlement credit risk.
2.2.1 Know the basic techniques for measuring credit risk: credit exposure management; credit risk
premium; credit ratings; modern measurement techniques
Measuring credit risk involves the use of tools or models to estimate the credit exposure of the lender.
These range from basic crude techniques, such as simply taking the credit exposure as being equal to
the notional values of all transactions and managing this exposure, to more modern approaches that
measure more precisely the risks inherent in a portfolio.
19
1.2.2 Credit Risk Premium
The credit risk premium is the difference between the interest rate a firm pays when it borrows and
the interest rate on a default-free security, such as an investment grade government bond. In other
words, the additonal compensation (the risk premium) is the extra compensation the market or financial
institution requires for lending to a firm that presents a risk of defaulting.
As a firm’s credit risk increases, lenders demand a higher credit risk premium through an increase in the
amount of interest paid. This increase is necessary to offset the increased probability that the loan will
not be repaid in accordance with its terms.
There is a strong relationship between credit risk premium and credit rating (see section 1.2.3). The
higher a firm’s rating, the more creditworthy the firm, so the lower the premium. This means that the
cost of borrowing will be lower for a higher-rated firm as a reflection of its lower probability of default.
As a result, a downgrade in a company’s credit rating can significantly increase its borrowing costs.
An independent rating agency will assign a credit rating based on analysis of the company’s financial
status and published statements. This is usually done with a short- and long-term outlook.
Worldwide, there are many different credit rating agencies, although ratings are predominantly
provided by three main agencies: Moody’s Standard & Poor’s (S&P) and Fitch Ratings (or simply ‘Fitch’
for short). The services provided by these agencies enable investors to rely upon impartial and regularly
updated research, which takes into account all the various factors that are necessary in respect of credit
risk assessment.
Different agencies use different terminologies to assign their ratings. For example, Moody’s uses ratings for
long-term credit that range from Aaa, representing the highest-quality investments, to a variety of C ratings
for firms more likely to default. This is clear from the table below. The main agencies supplying ratings are:
• Moody’s
• Standard & Poor’s
• Fitch Ratings.
20
Other Major Risks
2
Aaa AAA AAA Prime
A1 A+ A+
A-1 F1 Upper medium grade
A2 A A
A3 A- A-
P-2 A-2 F2
Baa1 BBB+ BBB+
Lower medium grade
Baa2 BBB BBB
P-3 A-3 F3
Baa3 BBB- BBB-
Any instrument up to and including Baa or BBB is deemed to be investment grade, the remainder below
this level being referred to as non-investment grade. Investment grade bonds are those that have been
judged likely enough to meet their payment obligations. Commonly used abbreviations in the industry
are ‘IG’ for bonds with an investment grade rating, and ‘junk’ or ‘high yield’ for non-investment grade.
21
The credit rating agencies have sometimes been subject to criticisms which could somewhat undermine
market confidence in them, including:
• On occasions they have not downgraded companies promptly enough. For example, Enron’s rating
was still at investment grade four days before the company went bankrupt in 2002, despite the fact
that the credit rating agencies had been aware of the company’s problems for months.
• Some of the rating agencies have been criticised for having too familiar a relationship with
companies’ management, possibly opening themselves to undue influence or the vulnerability of
being misled. During the financial crisis, several of the ratings agencies assigned high credit ratings
on securitised products which, after further due diligence, should not have been the case. This
potential conflict of interest is implicit in the relationships when the companies being rated are the
ones paying fees to the rating agencies in order to obtain the credit rating.
• Some credit rating agencies have made errors of judgement in rating some structured products,
particularly in assigning AAA ratings to structured debt which in a large number of cases was
subsequently downgraded or defaulted. As part of the Sarbanes-Oxley Act of 2002, the US Securities
and Exchange Commission (SEC) was required to produce a report detailing how credit ratings are
used in US regulation and the policy issues this use raises.
See chapter 7 for more details regarding the Sarbanes-Oxley Act of 2002.
22
Other Major Risks
These tools are commercially available to help companies gain an overall view of credit risk across their
entire organisation and product spectrum, and have become powerful aids in measuring the credit
exposure of portfolios. However, although they represent significant advances in aiding credit risk
management at the portfolio level, their accuracy generally depends on good quality historical data. If
2
the quality of this data is poor, then confidence in the model’s output is degraded. The quality of data is
affected by issues such as:
• The simple lack of availability of data, for instance, for emerging markets.
• Significant economic or political changes in a country, making historical data irrelevant or
misleading, for example, a change in political ideology or the discovery of large reserves of natural
resources.
• Major market events making historical data irrelevant or misleading, for example, the introduction of the
euro in 1999, and the COVID-19 pandemic.
Although the science of measuring credit risk using modern measurement techniques and tools is
continually developing, there are some common assumptions used by both firms and regulators that can
introduce inaccuracies into the risk models and produce inaccurate credit risk calculations.
• Using simplified calculations of potential future exposure. Generally, the potential future exposure of a
portfolio is greater than the current exposure. Institutions may apply charges to account for potential
exposure based on broad categories that oversimplify the different levels of risk. These charges are stated as
percentages of notional amounts, but notionals are not always true measures of the underlying credit risks.
• Assuming that some exposures have equal credit risk when the reality is that they do not. For instance,
owing to the simple rules applied in the Basel Committee on Banking Supervision’s (BCBS’) original
guidelines on capital adequacy, the risks associated with South Korean and German banks were
treated as equivalent. The capital adequacy proposal from the BCBS relates a firm’s capital more
closely to its true risk.
• A lack of recognition of the time period of credit risk. Default risk increases as the time of exposure
increases. This is sometimes not accounted for.
• A lack of recognition of portfolio diversification. Overall, credit risk is significantly reduced by
diversification, but measurement calculations may not take this into account.
Note that the BCBS is a committee of the Bank for International Settlements (BIS), which was established
at the end of 1974 and now has some 60 member central banks. Countries are represented by their
central bank and also by the authority with formal responsibility for the prudential supervision of
banking business where this is not the central bank. The committee formulates broad supervisory
standards and guidelines and recommends statements of best practice in the expectation that
individual authorities will take steps to implement them through detailed arrangements – statutory or
otherwise – which are best suited to their own national systems.
23
2. Credit Risk Management and Reporting
The key objective of the credit risk management function is to maximise an institution’s risk-adjusted
rate of return by maintaining credit risk exposure within acceptable limits. This is an essential part of the
overall long-term success of the organisation. Institutions should identify, measure, monitor and control
credit risk to ensure that they hold adequate levels of capital to cover these risks should they occur.
The board of directors has ultimate responsibility for approving and, at least annually, reviewing the
credit risk strategy and major credit risk policies of the institution. It is then the responsibility of senior
management to implement this credit risk strategy.
This means implementing a sound risk management policy to manage credit risk in a firm-wide context,
which includes:
• performing adequate credit analysis by counterparty, country and sector (this includes the
performance of regulatory Know Your Customer (KYC) checks as well as assessing creditworthiness)
• ensuring decisions on granting credit are made independently of the trading areas
• integrating the credit risk policy with the firm’s general business strategy.
Although the information provided by external rating agencies (see section 1.2.3) can be useful, it is of
limited value in relation to the needs of a sophisticated credit risk management function. This is because
it is often too historic, not detailed enough to meet the firm’s requirements fully and not as sensitive to
changes as a firm’s own analysis. As well as performing this detailed credit analysis, the responsibilities
of the credit risk management function will include:
24
Other Major Risks
2
2.2 Credit Risk Mitigation
Learning Objective
2.3.2 Understand the following examples of credit risk mitigation: asset securitisation; central
counterparties; clearing houses; collateral and margin; credit derivatives; credit limits;
diversification; loan sales; netting; underwriting standards
Mitigating credit risk involves the use of a range of techniques that aim to maintain a firm’s credit
exposure within acceptable parameters. These techniques operate at both individual level and portfolio
level.
The common credit risk mitigation techniques employed by financial institutions are:
• underwriting standards
• credit limits
• collateral and margin
• netting.
25
Underwriting Standards
Underwriting standards are the standards that financial institutions apply to borrowers in order to
evaluate their creditworthiness and, therefore, mitigate the risk of default.
Credit Limits
Credit limits are maximum limits for all aspects of credit exposure, including lending, set by financial
institutions to prevent too much exposure by a particular firm (counterparty).
All financial institutions will set limits of some description for all borrowers as a means of reducing credit
risk.
• A unilateral arrangement means that one party gives collateral to the other.
• A bilateral arrangement allows for two-sided obligations, such as a swap or foreign exchange
forward. In this situation, both parties may post collateral for the value of their total obligation to the
other.
• A netted arrangement means that the net obligation may be collateralised so that, at any point in
time, the party who is the net obligor posts collateral for just the value of the net obligation.
In a typical arrangement, collateral is provided upfront by the buyer to the seller (known as initial
margin), the collateral is periodically ‘marked-to-market’ (ie, its present value is calculated using current
market prices/rates), and the amount adjusted to reflect changes in value. The obligor has to supply
additional collat eral when the market value has risen, or removes collateral when it has fallen.
Margin can be described as the difference between the cost of the trade and the current marked-
to-market price of the trade. An example of this is the use of variation margin in exchange-traded
derivatives markets, when collateral (or margin) calls (demands) are made by the exchange, clearing
house or clearing broker on a daily basis to reflect changes in the market value of the trades.
26
Other Major Risks
Cash/Payment Netting
Cash netting (also known as payment netting) is the practice whereby two parties that exchange
2
multiple cash flows during a given day agree bilaterally to net those cash flows to one payment per
currency, thereby reducing settlement risk. It also reduces transaction costs and communication
expenses. Figure 2.1 shows an example of cash netting.
Party A
£2m £3m
£4m £1m
£3m
Party C Party B
£6m
The diagram above shows the end-of-day commitments between parties A, B and C. No netting
agreement is in place. If, for instance, party C defaulted on wits commitments, the replacement costs
would be £4 million for party A and £6 million for party B.
Party
A
£2m £2m
Party Party
C C
£3m
The diagram above shows the same commitments but this time a netting agreement exists between
each party. The cash flows shown above reflect the net obligation between each party. Now if party C
defaults, the replacement costs would only be £2 million for party A and £3 million for party B.
27
2.2.2 Portfolio Level
A portfolio is a collection of investments owned by the same individual or organisation. An efficient or
optimal portfolio either:
Portfolio management is concerned with optimising the market and credit risk inherent in the portfolio
components in order to maximise returns.
Some of the most common techniques for mitigating credit risk within a portfolio are:
• diversification
• asset securitisation
• loan sales
• the use of credit derivatives.
Diversification
Diversification is a means of offsetting risk in a portfolio by spreading investment across borrowers in
different, negatively correlated industry sectors (ie, industry sectors that have an inverse or opposite
relationship to each other, so that when the investment return reduces, the other will increase).
The aim of diversification is that the earnings of some loans in a portfolio will offset the losses of others,
making it less likely that the institution will lose money overall. By this principle of combining individual
loans into a portfolio, it is possible to reduce overall credit risk. By doing this, institutions avoid
unacceptable concentrations of credit risk. Diversification can also be done geographically; for example
an EU-based bank will most likely seek to lend in several countries.
Example
An investor is seeking to invest in a British sun cream retail outlet. However, they are concerned
about the seasonal nature of the business and the unpredictability of the weather.
In order to reduce the dependence on one company, they decide to diversify their portfolio and
achieve this by investing in a shop specialising in umbrellas. The sun cream shop does well on sunny
days, while the umbrella shop does well on rainy days.
Although the earnings of each individual business can be volatile, the combined earnings will be less
so because of the inverse relationship, or negative correlation, between their earnings.
Asset Securitisation
Asset securitisation is the practice of pooling bonds or loans with credit risk and selling them as a package
to outside investors. This is attractive for the seller because it removes their credit exposure. It is also attractive
for investors because the diversification they can achieve across many loans reduces their overall credit risk.
28
Other Major Risks
Loan Sales
Loan sales is the practice of a firm making a loan to a company and then selling the loan to other
institutions or investors. This strategy is attractive to firms because they earn a fee from the original loan
but the new investor assumes the credit risk. This can be very important if large amounts are involved for
2
such purposes as financing takeovers.
Credit Derivatives
A credit derivative is a type of specialised OTC product that allows credit risk to be managed by the
transfer of credit exposure between parties.
Institutions can use credit derivatives to increase or decrease their credit exposure to a particular
counterparty, for a particular period of time. They are attractive because they allow financial institutions to:
• mitigate their credit risk more effectively and improve their portfolio diversification by reducing
undesirable credit risk concentrations
• customise their credit exposure to another party without having a direct relationship with them
• transfer credit risk without adversely affecting the customer relationship.
Since their introduction in the 1990s, these instruments have been an important innovation in the
mitigation of credit risk. However, they can also expose the user to other types of financial risks and
regulatory costs.
Like other OTC products, they are privately negotiated financial contracts. These contracts expose
the user to operational risk, counterparty risk, liquidity risk and legal risk. Controlling these risks is an
essential factor in the operation and development of this market.
The way in which just one of these, a CDS, works is explained below.
29
Example
Bank A holds an asset in the form of a loan made to a corporate client. Bank A is concerned that the
corporate client might default on its obligations to service and/or repay the debt, so Bank A enters
into a CDS with another bank, Bank B.
In return for a regular payment based on a percentage of the face value of the loans, Bank B agrees to
pay out in the event of the corporate client defaulting.
Bank A is using the CDS to hedge. By buying a CDS, Bank A can manage its credit exposure and
maintain its relationship with the client. Any payout from Bank B will be triggered by pre-specified
credit events and will typically be based on the fall in the value of the loan as a result of the event, for
example, the actual default or a credit rating downgrade by an external credit rating agency.
3. Market Risk
3.1 Introduction
Learning Objectives
2.4.1 Know the basic features of market risk: price level risk; volatility risk; liquidity risk; basis risk
2.4.2 Be able to apply the basic features of market risk to simple, practical situations
One of the major aims of many financial institutions is to make a profit by investing in the global financial
markets. This business, by its nature, is based on price uncertainty – the uncertainty of knowing
whether market prices will move in a favourable or adverse direction. Price uncertainty is the mechanism
that allows profit or losses to be made, and the risk of loss associated is known as market risk. This risk
reflects the uncertainty of an asset’s future price.
The factors affecting market risk are complex. For instance, when investing in a company’s shares there
are direct (specific) and indirect (systemic) market risk factors to consider:
• Direct market risk factors are those that directly reflect the performance of a company, such as the
health of its balance sheet, its vision, the energy and strength of its management team and its policy.
• Indirect market risk factors are those that indirectly affect the performance of a company, such as
interest rate levels, economic events, and political and environmental effects.
The financial services sector takes advantage of the existence of market risk to make profit. The aim
of managing this is not to eradicate, but to understand and quantify the risk. If this is done accurately,
an informed decision can be made on how acceptable the risk is compared to the firm’s strategic
risk appetite, and whether this investment is worthwhile. The crucial aspect, as with all forms of risk
management, is the confidence in the accuracy of the estimate of the size of risk. As there are vast
profits to be made in getting this right, financial institutions have invested heavily in research, tools and
expertise to try to predict the future performance of their investments.
30
Other Major Risks
The need to understand this market risk is also important in the pricing of some financial products, such
as futures and options. For these reasons, the methods and tools employed for measuring market risk
have become very advanced, involving cutting-edge mathematical theory and computer-processing
technology. This section provides a basic understanding of these methods and tools and explains how
2
they fit into an overall risk management strategy.
3.1.1 Definition
Market risk can be defined as the risk of loss of earnings or capital arising from changes in the value of
financial instruments. In simple terms, an investor is exposed to market risk as soon as they purchase a
financial product; the risk is materialised if the value of the product goes down.
Market risk is intrinsic in all markets and all products, such as:
Due to the inherent differences between these markets and products, different types of market risk will
relate to each product.
• Price level risk – this is due to the potential for adverse changes in the price of a financial instrument
and includes:
• Foreign exchange (FX) rate, exchange rate or currency risk – this exists due to adverse
movements in exchange rates. It affects any portfolio with cash flows denominated in a currency
other than the base currency of the business.
• Interest rate risk – this exists due to adverse movements in interest rates and will affect fixed-
income securities, and any forward-looking derivative.
• Credit risk – increases in market-wide credit risk typically occurs during market shocks and
corresponding periods of ‘flight to quality’. The debt of all private issuers can fall by varying
degrees when investors flock to the safety of government bonds (which are perceived as ‘risk
free’) or extremely safe short-term instruments (often given the general term of ‘cash’).
• Equity price risk – this exists due to adverse movements in share prices affecting a portfolio.
• Commodity price risk – this is the risk of an adverse price movement in the value of a
commodity.
• Volatility risk – this is the risk of price movements that are more uncertain than usual affecting the
pricing of products. All priced instruments suffer from this form of volatility. This particularly affects
options pricing, because if the market is volatile then the pricing of an option is more difficult and
options will become more expensive.
31
• Liquidity risk – this is the risk of loss through not being able to trade in a market or obtain a price
on a desired product when required. This can occur in a market owing to either a lack of supply
or demand or a shortage of market makers. Note that liquidity risk can also refer to the funding
liquidity of a specific firm, meaning the risk that it may not be able to meet its obligations when
they are due. Loss in this case can be incurred due to the cost of borrowing or facing contractual
penalties and may ultimately result in insolvency. For this second type of liquidity risk, see section 5.
• Basis risk – this occurs when one kind of risk exposure is offset with another exposure in an
instrument that behaves in a similar, but not identical, manner (ie, hedged). It reflects the uncertainty
of the difference in the impact of the market factors on the prices of the two instruments. An
example of basis risk is the risk when the price of a futures contract varies from the price of the
underlying cash instrument as the expiry date approaches.
2.5.1 Understand the measures of central tendency and dispersion: mean; median; mode; standard
deviation; distribution analysis
Measurement of market risk involves advanced statistical and probability theory and analysis
techniques. However, most conventional methods rely on basic principles, such as distribution analysis.
Distribution analysis is a statistical means of using historical data to predict future events and relies
on an understanding of probability distributions. These are mathematical functions that describe the
probability of possible outcomes. They are depicted as graphs with the ‘probability of occurrence’ on
the vertical axis and the ‘possible outcome’ on the horizontal axis. Many types of distribution are used
for analysis but for the purposes of this workbook, only an understanding of the most common form is
needed, which is called a ‘normal distribution’ or bell curve, as shown in Figure 2.3.
• It is continuous. This means that each point on the curve has a real value.
• It is symmetrical about its mean (a measure of central value).
The mean is a measure of the average value of a set of data, calculated by dividing the sum of all the
values (eg, heights of people) by the total population (eg, total number of people). Other measures
of central value are the median and the mode. The ‘median’ is the value such that exactly half of a
population is of a greater quantity. If the population has an odd number of entries, the median is the
middle entry after sorting in increasing order. If the list has an even number of entries, the median is
equal to the sum of the two middle numbers after sorting, divided by two. The ‘mode’ is the value that
has the greatest frequency of occurrence. For example, from the following list of numbers: 1, 1, 2, 3, 3, 3,
4, 5, 5, 6 the mean is 3.3, the median is 3 and the mode is 3.
32
Other Major Risks
Number
2
of events
1 SD
2 SDs
Mean Height
1.20 1.50 1.70 1.90 2.10
The curve shows how people’s height varies in a particular population. The mean, or average, height
is shown to be 1.7 metres, so most people in the population will fall in a band around this value. A few
people are very tall and a few very short. Using this curve, we can make a prediction of how tall the next
person to be measured will be, or what percentage of people are above or below a certain height. Many
other natural events, such as people’s intelligence (IQ), or a country’s temperature, can be described by
this type of distribution.
The standard deviation (SD) is a means of measuring variability, uncertainty or volatility. It measures
the dispersion from the average or mean value. If, for instance, an equity is highly volatile, it will have
a high SD. In finance, investment returns from primary instruments (but not derivatives), based on
market factors, are often assumed to be normally distributed. By making this assumption, it is possible
to create a model that will predict the future performance of the instrument to a given probability.
This probability is also known as the confidence level. For example, if the mean historical price of an
instrument were £1, we would be 50% confident that tomorrow’s price would be more than £1. By using
a knowledge of SD we could also calculate what the price would be that would ensure we had a 95%
confidence level that tomorrow’s price would be higher. This means if we bought an equity, say, at that
price, we would be 95% certain that we would not lose money. This sort of calculation is useful as a basis
for establishing the risk appetite of the firm and limiting loss.
33
33
3.3 Measuring Market Risk: Value at Risk (VaR)
Learning Objective
VaR can be formally defined as the maximum loss that can occur with a specified confidence over a
specified period. For example, if a portfolio’s one-week VaR is stated as £1 million in 99 weeks out of
100, then the portfolio is predicted to lose less than £1 million over 99 weeks out of 100. This estimate
would be based upon the portfolio’s current composition and recent market conditions, so it would not
account for potential future changes.
VaR is a category of risk metrics that describes, in terms of probability, the market risk of a trading
portfolio. VaR is widely used by banks, securities firms, commodity and energy traders and other trading
organisations.
Such firms might track their portfolios’ market risk by using historical volatility as a risk metric. They
might do so by calculating the historical volatility of their portfolios’ market value over a rolling look-
back period of a given number of trading days. The problem with doing this is that it would provide
a ‘retrospective’ indication of risk. The historical volatility would illustrate how risky the portfolio had
been over the previous period; it would say nothing about how much market risk the portfolio was
presenting today.
34
Other Major Risks
For institutions to manage risk, they must know about risks while they are being taken. If a trader fails
to hedge a portfolio correctly, their supervisor and firm need to find out before a loss is incurred. VaR
gives institutions the ability to do this. Unlike retrospective risk metrics, such as historical volatility, VaR
is prospective. It quantifies market risk while it is being taken. VaR attempts to measure market risk in
2
an integrated manner, theoretically taking into account all sources of market risk in a portfolio. It can,
however, be difficult to calculate in practice.
• Historical simulation – this is the simplest method, and uses actual historic returns in the risk
factors to estimate risk exposure in the future. Its advantage is that it is the least controversial,
because it is based on actual data.
• Correlation simulation – this is also known as the variance/covariance simulation. It calculates
the volatility of each risk factor from historical data and estimates their effect on the portfolio to give
an overall estimate of risk that accounts for all risk factors.
Benefits Limitations
• VaR provides a statistical probability of • VaR does not account for liquidity risk.
potential loss. • It is dependent on accurate historical
• It can assess the correlation between data. For this reason, it is most useful for
different assets. financial instruments that have easily
• It translates all risks in a portfolio into a available records of market values such as
common standard (that of potential loss), derivative instruments, bonds, and currency
thus allowing the quantification of firm- instruments. For areas such as loans and
wide, cross-product exposures. deposits, it is less useful, due to the long-
term maturities involved.
• If market conditions or the risk environment
change dramatically (eg, during a crisis
period), VaR may provide poor predictions.
35
The calculation of the expected shortfall looks at the average losses over and above an arbitrarily
selected risk threshold. For example, if the level of VaR is 90%, the expected shortfall will represent the
average of the outcomes in the worst performing 10% of instances. The expected shortfall is not the
same as the worst case scenario, which will always be at 100% of the initial investment, unless leveraged
derivative instruments are held in the portfolio – in which case the worst case scenario may be in excess
of 100%.
The powerful mathematical models described have been developed as a means of predicting,
or anticipating, future events. This is not a perfect process and the models can break down if the
assumptions they are based upon are violated or if the data used by the model is incorrect. The risk of
this happening is called model risk.
An important aspect in the application of these models is to understand the assumptions and test their
accuracy as far as possible. This is achieved by performing back testing and stress testing.
Back Testing
Back testing is the practice of comparing the actual daily trading exposure to the predicted VaR figure.
It is a test of reliability of the VaR methodology and ensures that the approach is of sufficient quality. It
is usually performed on a daily basis by the financial reporting function and, if unsatisfactory differences
between reality and estimation are found, the VaR model must be revised.
Stress Testing
Stress testing means testing the model against ‘extreme’ market event scenarios. It can be thought of
as emphasising particular risks that may, or may not, have been captured by the VaR calculation. Stress
tests are not designed to generate worst-case results.
Stress testing is normally performed by the financial reporting function, and the results can also be fed
back into the VaR model to improve it. There is no standard way of stress testing but the BIS does carry
out surveys of common practice in the marketplace. There is a wide range of stress test practices at
banks and securities firms.
The use of stress tests continues to broaden from the exploration of exceptional but plausible events –
the traditional focus of stress testing – to cover a much wider range of applications. These include the
exploration of the risk profile of a firm, the allocation of economic capital, the verification of existing
limits, and the evaluation of business risks. The expanded usage of stress testing derives from its wider
acceptance within firms. Aside from its inherent flexibility, it benefits from explicitly linking potential
impacts to specific events.
36
Other Major Risks
Nonetheless, stress tests continue to focus primarily on traded market portfolios. These portfolios are
well suited to stress testing as they can be marked-to-market on a regular basis. Stress tests on loan
books are conducted less frequently and, quite often, by separate business units of the firm. Stress
testing often involves creating a wide range in the particular risks considered and evaluating how the
2
portfolios would have performed in those extreme scenarios.
Models need to be refined to take into account market events (eg, negative or rising interest rates).
Many of the models that were set up during the pre-crisis levels were designed in an environment
of high and positive interest rates. When global interest rates fell, many institutions began charging
negative interest on cash balances in currencies such as the euro, Norwegian krone, Swedish krona
and the Swiss franc, and as a result, the yield curves for these currencies, which are used as an input
into various models provided incorrect trade valuations because the models were not programmed to
accept negative interest rates. Stress testing works as a complement, rather than a supplement, to major
risk management tools such as VaR. It is, therefore, becoming an integral part of the risk management
framework of banks and securities firms.
2.7.1 Understand the following techniques for mitigating market risk: hedging; market risk limits;
diversification
• hedging
• diversification
• risk limits.
4.1.1 Hedging
Hedging is a means of reducing risk and it is usually used to reduce the impact of adverse price
movements by taking an offsetting position in a related product. It is a means of insuring against market
risk in the same way that a car is insured against damage and loss.
37
There are different types of hedging which are used to address specific risks, including interest rate risks
and currency risks. The main financial instruments used in hedging are derivatives, in particular, futures,
options and swaps.
For instance, an investor may buy an equity and is at risk of losing money if the market declines. This
could be hedged by buying a ‘put option’. This option gives the buyer the right to sell the stock at a
set price (the strike price) within a particular time in the future, providing the investor with a degree of
protection against adverse market movements.
The decision to hedge is a trade-off between the risk of adverse movement and the cost of the hedge –
in the example above, this would be the purchase price of the option. It is, however, difficult to achieve
perfect offsetting of the risk because the use of hedging introduces, or exacerbates, other risks such as
basis risk, credit risk and operational risk.
4.1.2 Diversification
Diversifying a portfolio is a technique for mitigating market risk that uses the same principles as for
credit risk mitigation described in section 2.2.
The existence of market risk limits does not, however, assume the existence of credit limits. These will be
established separately, and vice versa.
When an organisation takes a risk, it will often specify the maximum loss that it is prepared to make on
a portfolio or transaction. This is called the ‘market risk limit’ or ‘stop-loss limit’, and may be expressed
in terms of VaR.
The effectiveness of risk limits to manage market risk is dependent upon the accuracy of the risk
measurement used to set the limits.
• Risk limits usually have to be inflated in order to accommodate the errors and uncertainty in the
measurement. This adversely affects the potential profit of the firm.
• Traders or other investment professionals may exploit the inaccuracy of risk measurement and take
risks that they know the measurement does not account for.
Providing that high-quality risk data is used, risk limits can be very effective. While investment
professionals sometimes see them as restrictive, they can also be viewed as empowering because they
set the risk appetite of the firm and represent explicit authority to take specified levels of risk.
38
Other Major Risks
2
2.7.2 Understand the role of the market risk management function
As already explained, market risk relates to the loss of earnings or capital arising from changes in the
value of financial instruments.
In the same way that institutions employ a credit risk management function to manage credit risk, it is
also essential that they develop and implement an independent market risk management framework
to manage market risk and then to ensure that there is adequate reporting. This also includes
implementing a firm-wide policy with clear roles and responsibilities.
5. Liquidity Risk
2.8.1 Know the basic terms used in the subject of liquidity risk: asset and liability management;
maturity ladders; actual and contractual cash receipts; asset liquidity risk; funding liquidity risk;
fund liquidity risk; liquidity coverage ratio; net stable funding ratio
2.8.2 Be able to apply the concept of liquidity risk to simple, practical situations
Liquidity risk is an area of risk management that concerns itself predominantly with two main variables
– cash and time. Funding liquidity risk is the risk that an institution will not be able to meet its liabilities
as they become due, ie, there is a shortfall of available cash to meet the liquidity within a given time.
39
On the subject of liquidity risk, some of the basic terms used are as follows:
• Asset and liability management aims to reduce liquidity risk by trying to match the timings of cash
flows against the liabilities of the firm, ensuring that the amount of cash to be received is greater
than the liabilities due.
• Maturity ladders are one way of helping to improve liquidity for an organisation. This method
involves investing in a range of securities that have varying maturity dates. This ensures regular cash
flows in terms of both income and capital maturing.
• Actual and contractual cash receipts can affect the timing of cash flows and need to be taken into
consideration when matching projected cash flows against future liabilities. Some cash receipts
from investments will be contractual (ie, a predetermined, fixed amount of income will be received
on a set date) while others may be actual (ie, will be linked to the performance level of a suitable
index). Firms will need to balance the types of cash being received in order to meet future liabilities
as they fall due.
• Asset liquidity risk is the risk of loss caused by an inability to sell an asset that cannot be sold at or
near the current market value when required due to lack of liquidity in the market. Asset liquidity
risk is essentially a subset of market risk.
• Funding liquidity risk is demonstrated when liabilities cannot be met when they fall due, or can
only be met at an uneconomic price. They can be firm-specific or systemic.
• Fund liquidity risk is the risk that there may not be sufficient cash available within a fund to pay
out redeemed units in time to meet demand. This risk can be exacerbated in funds that do not deal
on a daily basis, as the fund may need to pay compensation to clients if the market has experienced
adverse movement between fund pricing points. When the manager of a fund is not able to satisfy
redemption requests, they may be forced to temporarily freeze outflows, known as ‘gating’. This may
help preserve the remaining value of assets in the fund but has serious reputational consequences
for the manager.
Example
In September 2007, Northern Rock suffered from the crystallisation of liquidity risk due to the sub-
prime crisis. The bank was over-exposed to the sub-prime mortgage sector and suffered from short-
term liquidity issues despite being solvent at the time.
The UK Government gave huge amounts of financial assistance to provide sufficient levels of liquidity
to Northern Rock. The bank in this case was unable to meet its various liabilities with the assets that
it had available.
In response, the regulator now places greater supervisory focus on liquidity risk especially with
regard to high-impact retail firms.
Basel III introduced two standardised liquidity measures, the liquidity coverage ratio (LCR) and the
net stable funding ratio, as a way to help banks and other interested parties assess liquidity risks on a
common basis across banking institutions.
The LCR relates to highly liquid assets held by financial institutions to meet short-term obligations. The
ratio is a generic stress test that aims to anticipate market-wide shocks. The LCR is designed to ensure
financial institutions have the necessary assets on hand to ride out short-term liquidity disruptions. The
net stable funding ratio is defined as the amount of available stable funding relative to the amount of
required stable funding.
40
Other Major Risks
2
Learning Objective
2.9.1 Know the key measures of asset liquidity risk: bid-offer spread; market depth; immediacy;
resilience
Bid-Offer Spread
The bid-offer (or bid-ask) spread is used by market participants as an asset liquidity measure. The ‘bid
price’ is the price at which the institution will buy an asset and the ‘offer price’ is the price at which the
institution will sell an asset.
To compare different products, the ratio of the spread to the product’s mid-price can be used. The
smaller the ratio, the more liquid the asset. This spread comprises operational, administrative and
processing costs, as well as the compensation required for the possibility of trading with a more
informed trader.
Market Depth
This relates to the liquidity of the market and is the amount of an asset that can be bought and sold at
various bid-ask spreads. An institution needs to consider the effect of executing a large order on the
market and to adjust the bid-ask spread accordingly. The institution will need to calculate the liquidity
cost as the difference between the execution price and the initial execution price.
41
Immediacy
Immediacy is used as a measure of market liquidity by evaluating the time needed to trade a certain
quantity of an asset successfully at a prescribed cost. This measure would be expected to be higher in
illiquid assets.
Resilience
Resilience is a measure of the time taken for asset prices to return to previous levels after a large
transaction. Resilience essentially evaluates an asset’s ability to recover after a surge in supply or
demand. The levels of resilience would be expected to be higher for a liquid asset than for an illiquid
asset, allowing it to be used as a proxy of market liquidity.
The resilience of an asset requires the use of historic market data and can only be determined over a
period of time.
In addition, firms may sell assets that are near-term cash equivalents, such as government securities.
This is typically done on a contingency basis to meet unexpected cash needs, and such liquidity reserves
must be actively managed, since the assets must be unencumbered (that is, not pledged as collateral for
any other transaction) and easy to liquidate under potentially adverse market conditions.
2.10.1 Understand the role of the liquidity risk management function from the perspective of the firm
Managing liquidity is a fundamental component in the safe and sound management of all financial
institutions. The liquidity risk management function will carry out and monitor all aspects of the
liquidity profile of the institution to ensure that an appropriate level of liquidity is maintained, assets
and liabilities are being prudently managed and that expected cash inflows have an appropriate
relationship to cash outflows.
Banks and larger financial institutions are evaluated on their levels of liquidity which are reported as
part of their statutory duty to meet cash obligations without having to sell large amounts of assets and
potentially incur losses. These liquidity measures are used as risk indicators for those investing in, or
contracting with, these institutions.
42
Other Major Risks
2
Answer Reference: Section 1.1.1
4. What is the difference between credit exposure and credit risk premium?
Answer Reference: Sections 1.2.1 and 1.2.2
9. What are four of the most common techniques for managing credit risk within a portfolio?
Answer Reference: Section 2.2.2
10. What three reasons make credit derivatives attractive as a means of managing credit risk?
Answer Reference: Section 2.2.2
43
12. What are the four main types of market risk?
Answer Reference: Section 3.1.2
15. Name four ways in which asset liquidity risk can be measured.
Answer Reference: Section 5.2.1
44
1
Chapter Three
2. Corporate Culture 49
8. Risk Response 84
1. Introduction
Over the last decade or so, the full impact of the
effects of operational risk failures has begun to be
appreciated in the financial services sector which, in
turn, has heightened awareness of the importance
of appropriate operational risk management. This
3
is mainly due to the increase in major loss events
that have seriously affected corporate profitability
and reputation (see chapter 1, section 2.4). As a
result, the effective management of these risks has
become a major priority for senior management,
regulators and customers. This change in thinking
in the industry has led to the need for a rigorous and
structured approach to understanding, identifying,
assessing, measuring, mitigating and monitoring
operational risk.
47
Figure 3.1 – The Chain of Events of Operational Risk
3.1.1 Know the basic Bank for International Settlements (BIS) definition of operational risk
The Bank for International Settlements (BIS) defines operational risk as:
‘The risk of loss resulting from inadequate or failed internal processes, people and systems or from external
events’.
In practical terms, it is the risk of loss that a business faces in the course of conducting its daily activities,
procedures and systems.
The BIS is referred to further in chapter 2, section 1.2.4 and chapter 7, section 3.
3.1.2 Understand that operational risk is present across the organisation in all departments and
activities
As can be seen from the definition of operational risk above, the departments and activities of the
firm that could potentially be affected by operational risks are spread across the firm as a whole. It
is, therefore, important that there is a firm-wide approach to tackling the operational risks that have
been identified or those that may occur in the future. Section 3.8 of this chapter explores the need for
consistency of the firm-wide approach in more detail. Chapter 5 of this workbook looks at the front
office, support functions and control functions of a firm in more detail in the context of helping the firm
manage its operational risks. Staff across the firm (including the board of directors, senior management
and all other staff) should be aware of the various operational risks (and other types of risk) that will
affect their roles.
48
The Nature of Operational Risk
2. Corporate Culture
3
Culture can be loosely defined as ‘the way we do things around here’. While it reflects the collective
beliefs and traditions of the workforce, it is strongly influenced by a firm’s leadership. This is because
people naturally take their lead from their superiors. For instance, if senior managers are seen to have an
appetite for taking risks, then they will most likely attract individuals who like to take risks, so that the
culture will also be one of risk-taking.
Developing and maintaining the right culture and attitude towards risk is a hugely influential factor in
the risk management process and in the effectiveness of risk management policies and actions. Without
an appropriate culture, a firm can never be fully confident that it is managing its risk properly.
If risk consciousness is not part of the culture, then the culture needs to be changed. This can be difficult
because it reflects the people that make it up. People tend not to be entirely rational in their thought
processes and actions, as the less tangible effects of emotion, habits, principles, ethos and ego all play
a part in their decision-making. As a result, there can be a resistance to change. Operational risk due
to cultural issues has a large intangible element to it. The cause-and-effect relationship is often not
obvious, which makes managing it more of a perceptual issue than a logical one.
Some of the main issues that impact the risk culture are:
49
2.3 Leadership
Learning Objective
3.2.1 Understand the importance of effective leadership and the role of senior management in
sustaining a robust risk and control culture
One of the key roles of senior management is to position a firm’s culture so that it best supports the
business objectives. This can also be seen as adapting the strategy and objectives of the organisation
to best fit the prevailing culture. Either view requires senior managers to be effective leaders and to
understand how leadership can affect a firm’s operational risk and prevailing culture.
Leadership is viewed as one of the most significant drivers of culture. How organisational leaders
behave and interact with employees is critical in the fostering of a favourable risk culture. Effective
leaders will deliberately alter their style depending on the situation, this requires both a sensitivity to
the requirements of the business (and its culture) and an understanding of their own leadership abilities.
If the risk environment is relatively stable and predictable, and there is a well-established, risk-aware
culture, then one style of leadership is appropriate. However, if there is a high pace of change, and an
immature risk environment, another style may be appropriate. Leaders, therefore, need to be aware
of their organisation’s position and what strategies they must adopt to create the most effective
environment.
50
The Nature of Operational Risk
3.2.2 Know the main factors determining a firm’s risk and control culture: strategy/objectives;
clear roles and responsibilities; risk appetite; selection, training and development; values and
behaviours; communication; incentivisation and remuneration
3
3.2.3 Know the organisational areas where positive behaviours are necessary to ensure a continuing
robust risk and control culture
3.2.4 Understand the contribution of the risk officers in maintaining a robust risk and control culture
3.2.5 Understand the UK regulators’ expectations of risk control and culture
Good risk processes and planning are worth nothing without the commitment and energy of a
motivated, effective workforce. Equally, weaknesses in risk processes and systems can be offset by
vigilant, expert staff. Thus, the need for a robust culture in the effective management of operational
risk cannot be overstated. Creating, instilling and communicating this culture is, as has been explained,
largely the role of senior management, the board of directors and the leadership of a firm.
Creating a robust risk and control culture starts with the firm having a clearly defined business strategy
and objectives. Its strategy is its method or plan chosen, given the often limited resources available, to
achieve its desired objectives and is typically viewed as its long-term planning.
A firm’s risk officers play a significant part in continuing a robust risk and control culture. This is achieved
through a combination of engagement with the business, providing risk training and promoting
awareness of risk and continuous monitoring and reporting of key risk events. A firm’s risk officers will
act as an independent challenge to the business and will provide assurance to senior managers that
risks are being managed within the firm’s risk appetite. A robust risk culture will depend on the ability of
the organisation to develop positive attributes in the following areas discussed below.
2.4.2 Motivation
Motivation is a psychological phenomenon that relates to the amount of effort, care and commitment
that people put into a task. People’s levels of motivation are recognised as being a key factor in
improving their performance.
Examples of factors that motivate people are the interest, challenge and rewards of their job. Incentive
schemes and remuneration initiatives help to keep staff motivated. Motivation also depends on limiting
the negative effect of ‘hygiene factors’ such as poor pay, working conditions or management style.
51
If jobs and careers can be designed to unlock an individual’s motivation, a more positive risk culture will
result, and organisational performance will be enhanced.
2.4.3 Morale
Excellent morale is related to how positively staff view their organisation, working conditions, outlook
and leaders. It is linked closely to motivation and commitment. Positive morale among staff can be
important in encouraging other areas, such as taking personal responsibility.
2.4.4 Integrity
Firms need staff with high integrity that have pride in their performance, are professional in their
approach and demonstrate high levels of honesty. A lack of integrity (perceived or otherwise) can cause
significant damage to a firm’s reputation. The quality of integrity is instilled into the culture through the
words and actions of its leaders and senior managers, however this does not diminish the importance
of careful recruitment and selection practices to ensure that firms only hire employees whose values are
aligned with those of the firm.
There should be adequate levels of transparency within the firm for the staff to understand the
objectives and relevant working practices of the firm as a whole and how risk management can support
the achievement of its goals.
The culture of the firm will also be affected by the degree of training and development opportunities
the staff are offered. Having a skilled and dedicated workforce will only add further to the success of the
firm and provide a wide range of benefits to it and its staff.
The firm’s senior management are held accountable by the regulator to ensure that they have organised
and controlled the affairs of the firm responsibly and effectively, and developed and maintained
adequate risk management systems. The attitudes and behaviour of the board of directors and senior
management will have a huge impact on the firm’s risk and control culture. Management should be
seen to lead by example and set the right tone because the firm’s approach to these key areas will
influence the rest of the firm and its staff to follow suit.
52
The Nature of Operational Risk
3
2.4.7 Collective Awareness
A collective ‘conscience’ about risk is the idea of a risk-aware organisation where staff are comfortable
with the language and ideas behind risk management, and risk management practices are embedded
throughout the business, supported by ongoing training and appropriate reward and recognition
policies.
2.4.9 Expertise
The technical ability and experience of staff is a major factor in perceiving and anticipating risks.
Ongoing training and development is a key component in ensuring that the business maintains the
right level of expertise which, in turn, provides confidence that business is being conducted to high
standards.
3.4.1 Understand the following areas required by an operational risk policy: board level sponsorship;
identification of key officers; cross-divisional involvement and agreement; clearly defined
roles and responsibilities; definition and communication of the risk management framework;
segregation of duties; consistency of approach firm-wide; coordination; documentation of
acceptable risk levels; definition and communication of the control standards framework
The operational risk policy is the document that outlines a firm’s strategy, methodology and
objectives for operational risk management including defining the levels of risk it is prepared to accept
(risk appetite). It is also where the boundary between operational risk and other risk areas, such as
market and credit risk, is clarified.
53
In order to meet the prime objectives of operational risk management, the risk policy should address the
following areas:
• sponsorship
• identification of key officers
• cross-divisional involvement and agreement
• roles and responsibilities
• definition and communication of the risk management framework and explicitly the firm’s risk
methodology
• consistency of the firm-wide approach
• coordination and escalation
• segregation of duties, and
• risk appetite.
3.1 Sponsorship
The firm’s policy and approach should be agreed and sponsored at board level. As it is firm-wide
and often requires significant cultural change, it must have the full and continued support of senior
management if it is to succeed.
Key risk officers may also be designated from within the business itself. If ownership of operational risk
issues is assigned to the department or business process where they originate, the relevant line manager
will often be made responsible for risk management. For this reason, managers may have direct reporting
lines through their own business lines and dotted lines into the risk management function.
Collaboration with other risk management disciplines is becoming ever more important as understanding
of the inter-relationship of financial risk increases.
54
The Nature of Operational Risk
3
3.4 Roles and Responsibilities
The policy should provide clear responsibility and accountability for risk management at all levels. Staff
throughout the organisation need to know precisely what is expected of them and why. If they are
accountable for managing risk, then they also require the necessary control and authority to be able to
take action and implement risk reduction plans.
The risk policy should include clear lines of authority, identify key risk officers to carry out prescribed
actions, and define specific roles and responsibilities. The risk policy should also make clear the
consequences of non-compliance for staff not observing the policy.
Regular reviews of the policy are needed to ensure that the success criteria remain valid and relevant.
The policy must be communicated to all relevant staff and they should be made aware of the
implications of not following the firm’s risk management policy.
55
3.6 Segregation of Duties
In order to control and manage specific risks associated with certain procedures (such as the risk of
errors, internal fraud or collusion) effectively, the firm will need to ensure effective segregation of
duties between the trading and support functions, such as front office, operations, accounting and risk
monitoring.
The approach lays out the framework or rules of engagement under which the firm will operate. This
must be in unison with, and support, the overall business strategy. This means:
• employing a methodology that identifies and categorises all the operational risks that exist in the
organisation
• employing a methodology for measuring and assessing the significance of all the identified risks
• working with line managers to agree the mitigating action required to reduce the risk exposure to
acceptable levels
• monitoring the effects of the mitigating action to ensure its success, and
• reporting and escalating risk issues to all appropriate levels of the organisation. This ensures that
there is transparency and aids the decision-making process.
In practice, the framework described is rarely fixed and standardised immediately. It is more evolutionary
to begin with, and its maturity will reflect the maturity of the organisation with respect to operational
risk management.
The process of developing the approach is, therefore, cyclical and continuous, and can result in
refinements to the risk policy.
The strategy should be consistent throughout the firm. A common operational policy and terminology,
existing globally and across all functions, allows:
56
The Nature of Operational Risk
3.8 Coordination
Again, because the risk policy takes a firm-wide approach and cuts across departmental boundaries,
there should be a central, independent risk management role responsible for the coordination and
implementation of risk policies and procedures. Depending on the size and type of organisation, this
role may be set up as an independent department.
3
Most large organisations have now developed an independent operational risk management function
that reports to an overall group risk officer. This is described in further detail in section 4.
Increasingly, firms are using the ‘three lines of defence model’ to implement risk management across
the organisation as an important method of demonstrating and structuring roles, responsibilities and
accountabilities for decision-making and risk and control. This helps the firm achieve effective and
suitable levels of governance, risk management and assurance. The operational risk policy adopted by
the firm will include details of how the firm has utilised the model operationally in order to provide a
robust risk framework within the firm as a whole.
First Line of Defence: Business Operations – Risk and Control within the Business
The first line sits within the business itself and details the controls a firm has in place to deal with the
day-to-day business activities of the firm. Controls are integrated into the firm’s systems and processes.
Assuming that the design of these systems and processes is sufficient to reduce risk to an acceptable
level, compliance with the process should ensure an adequate risk control environment. There should
be an appropriate level of supervision in place to ensure compliance and to highlight any breakdowns
in control, any inadequacies of process and other eventualities. The first line of defence provides
management of the firm with verification and provides feedback to the audit committee by identifying
risks and business improvements, implementing controls, and reporting on progress.
57
The second line of defence is enforced by the advisory and monitoring functions of risk management
and compliance. There are many functions in companies that are linked to risk management and
compliance roles including:
Third Line of Defence: Internal Audit and Other Independent Assurance Providers
The third line of defence is the independent verification provided by the firm’s audit committee and the
internal audit function that reports to that committee.
The internal audit function undertakes a programme of risk-based audits covering all aspects of both
the firm’s first and second lines of defence. The internal audit function may well take some assurance
from the work of the second-line functions and amend its checking of the first line.
The level of assurance taken will depend on the effectiveness of the second line and the internal audit
function will need to coordinate its involvement with compliance and risk management at the firm. The
feedback from the audits will need to be reported to all three lines, ie, accountable line management,
the executive and oversight committees and the board audit committee of the firm.
There is a reasonable assumption that the internal audit function will identify any weaknesses in both
the first and second lines of defence which may otherwise have led to significant loss at the firm. All
three lines of defence have specific roles in the internal risk control governance model, and they are:
3.6.1 Understand the following: the meaning of the term risk appetite; the meaning of the term
risk capacity; the importance of documenting a firm’s risk appetite; the content and target
audience for a risk appetite statement
Risk appetite (also referred to as a risk tolerance) is defined as the level of risk the organisation is
comfortable to accept in the course of its business activities. A risk appetite defines the level of
acceptable risk based on the balance between the potential benefits of the risk and the threats that risk
may bring to the organisation.
58
The Nature of Operational Risk
The firm needs to establish and document acceptable risk levels for all relevant aspects of its business.
This has to be sponsored at the highest level within the organisation to provide a consistent and
validated benchmark for all risks across the business. This allows individual risks to be identified,
monitored, reported and escalated effectively and consistently to ensure the firm does not face
unnecessary levels of risk.
Setting a benchmark level of risk appetite by way of a risk appetite statement provides a foundation
3
for objectively defining when risks can be accepted, thus allowing the firm to focus its resources on
managing and monitoring key risks as well as defining a consistent level of acceptable risk that the
business is prepared to undertake to achieve its strategic objectives. This facilitates the early escalation
of risks that are outside of tolerance and supports a business case for prioritisation of resources or
further investment to address these risks.
Risk appetite can be expressed in any number of ways including an absolute value or limit (eg, £1 million
per risk event) or a relative limit (eg, 3% of revenue, or 1% of clients in default). While the risk appetite
statement will vary from one organisation to another, it would usually be sponsored at board level
and would be made available within the business to communicate the limits and provide transparency
around the risk management process. A risk appetite statement should include the:
• date of issue
• document approvals and revisions
• definition of risk and risk ratings to ensure consistency across the business
• risk appetite value or limit
• escalation procedures for any risk identified exceeding the risk appetite
• frequency of review or date of next review, and
• distribution.
Risk appetite is closely linked to the concept of risk capacity. Risk capacity is defined as the amount
of risk an organisation can afford to take in the course of its business activities. This is, essentially,
the organisation’s ability to absorb a loss of a certain size over a period of time. For example, a firm
may express a risk appetite of losses not exceeding £1 million within a financial year, however, its risk
capacity may be at £5 million as its capital resources would allow it to absorb this loss without affecting
the ongoing viability of the business.
59
4. The Operational Risk Management Process
Learning Objectives
3.3.1 Know the following terms in relation to operational risk management: inherent (gross) risk;
residual (net) risk
3.3.2 Understand the role of the operational risk management function
3.3.3 Understand the key aims of operational risk management: identification and assessment of
risks; management of operational risk exposure within appetite
3.3.4 Know the stages of the operational risk management process: policy; identification/
classification; setting operational risk appetite and/or tolerance; risk and control measurement
and assessment; risk response; monitoring; reporting and escalation
As described in chapter 1, risk management aims to ensure that the likelihood of risks being realised, and
the potential impact, are reduced to acceptable levels. For many firms, risk management is more than
simply a matter of compliance with the current regulatory regime, and there are several benefits to good
operational risk management that any organisation can enjoy including:
This means exploiting the business opportunities that risk-taking provides (or the ‘upside’) whenever
possible, while at the same time managing the potential loss (or the ‘downside’).
The main focus within the financial services sector is managing the downside, or the potential loss, due
to operational risk. Practically, the operational risk management function has three key aims:
1. to assist with the effective identification, measurement, assessment and management of operational
risk
2. to assist with the reduction or mitigation of the potential impact to acceptable levels
3. to adopt a common, structured approach to risk management embedded across the firm.
Once the high-level risk policy has been agreed, a risk management process must be implemented to
enable the risk management function to achieve its aims. The level of risk that the firm will wish to be
exposed to, and the risk appetite of the firm, will have been agreed by the board of directors and senior
management. This amount of risk will include the proportion of operational risk that the firm feels will be
acceptable, given its risk appetite.
60
The Nature of Operational Risk
• monitoring of risks
• reporting and escalation of risks
• planning and change, and
• policy and appetite.
Sections 5 to 8 will explain the elements of this process and how they interrelate.
3
Figure 3.2 – The Risk Management Process
Risk Identification
and Classification Risk and Control
Measurement
and Assessment
Operational
Risk Policy and Risk Risk Response
Appetite Management
Risk Reporting
and Escalation
Once a high-level risk policy has been agreed, it is the role of the operational risk management
function to embed, oversee and support the risk management processes across the firm to ensure that
risks are being appropriately identified and assessed to assign risk owners throughout the business
and to monitor ongoing risks to ensure that they remain within the risk appetite of the firm. Timely
risk information should be provided to key stakeholders to facilitate the effective prioritisation and
allocation of resources across the firm, including the updating of operational risk policies and risk
appetite documents for the approval of the board.
The operational risk management process should be integrated throughout the business to allow
it to be effective in supporting the business in achieving its strategic aims. This approach promotes
engagement across business lines as well as utilising the expertise and specialist knowledge of subject
matter experts throughout the organisation.
61
4.1 Risk Register
A risk register, sometimes referred to as a ‘risk log’ or ‘risk management matrix’, is a risk management
tool commonly used in organisational risk assessments. It acts as a central record of all risks identified
by the organisation and is designed to capture every stage of the risk management cycle as well as
providing a clear line of sight between risks, their rating and the resulting actions taken by the risk
manager. A risk register typically contains:
• risk reference (used internally to help identify this risk in the future)
• date identified
• description of the risk
• risk owner
• risk cause
• key controls
• risk effect/harm
• risk scores (inherent and residual)
• risk response/proposed action (immediate)
• remedial actions (follow-up) and deadlines, and
• methods of monitoring the risk.
One of the key benefits of a risk register is that it allows risk managers to aggregate risk data across
various group entities to facilitate risk reporting of consolidated risk profiles at group level, or to drill
down to various teams to identify process level risks at the lowest level of detail contained within the
risk register. This consistency of approach also provides an objective way of recording risk assessments
and comparing the appropriateness of risk response across different parts of the business to ensure that
risks are being treated consistently across business lines.
62
The Nature of Operational Risk
Risks can be recorded in a simple spreadsheet or in sophisticated enterprise risk software, depending on
the level of complexity of the business, its risk management approach and its appetite for investment in
risk management tools.
3
• Inherent risk is the risk associated with an activity or an event before the risk response, ie, the level
of risk before any controls have been put into place.
• Residual risk is the amount of risk remaining once the controls have been implemented. It is
impossible to remove risk from a process or business line completely without ceasing the activity,
and reducing residual risk to a level within the risk appetite is one of the ways the risk management
function supports the business in achieving its strategic objectives.
The difference between inherent and residual risk levels can be viewed as a measure of the effectiveness
of the controls.
For a firm, the purpose of identifying operational risks is to understand, record and categorise these
risks. By doing this, the firm can create a basis for establishing its risk profile and an understanding of the
types of risk it faces and its level of exposure. There is a need to do this in order to:
• provide information to management on which decisions to make and to take action on to ensure a
controlled environment
• establish the chain of events relationship of operational risk described in section 1 and understand
where they occur throughout the firm
• provide a basis for risk measurement and assessment which may, for example, be used for capital
allocation purposes
• set boundaries to differentiate between operational risk and other risk types (such as market and
credit risk) and assign ownership for their mitigation, and
• develop a common language for discussing, assessing and managing risk that allows clear and
transparent communication and decision-making.
When identifying risks, a firm needs to consider not only its own processes and systems, but also its
relationships with its clients, the nature of its products and the wider business environment.
63
Risk identification is the fundamental first step in understanding how operational risk affects the firm,
raising awareness of risk issues and assessing the culture of the organisation.
It can be a difficult exercise due to the diverse nature of risk causes and the difficulty in distinguishing
cause from effect.
The Basel Accords are a series of three international banking regulation agreements that were developed
over several years, beginning in the 1980s. Set by the Basel Committee on Banking Supervision (BCBS),
the Accords establish capital requirements and risk measurements for global banks, with the aim of
enhancing financial stability worldwide.
The second of these Accords (Basel II) was first published in 2004 and has since undergone several
revisions. For the first time, Basel II incorporated a detailed categorisation of operational risk, credit risk
and market risk and, in particular, provided a breakdown of the seven specific risk event types that give
rise to operational risk exposure.
1. Internal fraud – examples include employee theft, bribery or insider trading on an employee’s own
account.
2. External fraud – examples include robbery, forgery and theft via computer hacking and cyber
attacks.
3. Employment practices and workplace safety – examples include violation of employee health
and safety rules, and discrimination claims.
4. Clients, products and business practices – examples include misuse of confidential information
and money laundering.
5. Damage to physical assets – examples include loss or damage to physical assets from natural
disasters or man-made events such as terrorism, war, arson or vandalism.
6. Business disruption and systems failures – examples include hardware, software and
telecommunications outages, utility failure and problems with real estate facilities.
7. Execution, delivery and process management – examples include unapproved access to client
accounts and outsourcing vendor disruptions or failures.
Please note that these risk event types are banking-focused and, as such, other types of financial
institutions may find it difficult solely to use this list to provide them with meaningful risk analysis and
may, therefore, choose to supplement the following event types.
64
The Nature of Operational Risk
Event Type –
Event Type – Level 2 Activity Examples – Level 3
Level 1
• Transactions not reported (intentional)
Unauthorised
• Transaction type unauthorised (monetary loss)
activity
• Mismarking of positions (intentional)
3
• Fraud/credit fraud/worthless deposits
• Theft/extortion/embezzlement/robbery
• Misappropriation of assets
• Malicious destruction of assets
Internal fraud
• Forgery
Theft and fraud • Cheque kiting
• Smuggling
• Account take-over/impersonation
• Tax non-compliance/evasion (wilful)
• Bribes/kickbacks
• Insider trading (not on a firm’s account)
• Theft/robbery
Theft and fraud • Forgery
External
• Cheque kiting
fraud
• Hacking damage
Systems security
• Theft of information (with monetary loss)
• Compensation, benefit, termination issues
Employee relations
• Organised labour activity
Employment
• General liability (eg, slip and fall)
practices and
Safe environment • Employee health and safety rules events
workplace
• Workers’ compensation
safety
Diversity and
All discrimination types
discrimination
• Fiduciary breaches/guideline violations
• Suitability/disclosure issues (eg, know your customer
(KYC))
• Retail consumer disclosure violations
Suitability, disclosure
• Breach of privacy
and fiduciary
Clients, • Aggressive sales
products • Account churning
& business • Misuse of confidential information
practices • Lender liability
• Antitrust improper trade/market practices
• Market manipulation
Improper business or
• Insider trading (on a firm’s account)
market practices
• Unlicensed activity
• Money laundering
65
Event Type –
Event Type – Level 2 Activity Examples – Level 3
Level 1
• Product defects (eg, unauthorised)
Product flaws
Clients, • Model errors
products Selection,
• Failure to investigate a client per guidelines
& business sponsorship and
• Exceeding client exposure limits
practices exposure
Advisory activities • Disputes over performance of advisory activities
Damage • Natural disaster losses
Disasters and other
to physical • Human losses from external sources (terrorism,
events
assets vandalism)
Business • Hardware
disruption • Software
Systems
and process • Telecommunications
management • Utility outage/disruptions
• Miscommunication
• Data entry, maintenance or loading error
• Missed deadline or responsibility
Transaction capture, • Model/system misoperation
execution and • Accounting error/entity attribution error
maintenance • Other task misperformance
• Delivery failure
• Collateral management failure
Execution, • Reference data maintenance
delivery Monitoring and • Failed mandatory reporting obligation
& process reporting • Inaccurate external report (loss incurred)
management Customer intake and • Client permissions/disclaimers missing
documentation • Legal documents missing/incomplete
Customer/ • Unapproved access given to accounts
client account • Incorrect client records (loss incurred)
management • Negligent loss or damage of client assets
• Non-client counterparty misperformance
Trade counterparties
• Miscellaneous non-client counterparty disputes
• Outsourcing
Vendors & suppliers
• Vendor disputes
66
The Nature of Operational Risk
3.5.4 Understand the following methods for identifying operational risk: risk and control self-
assessment; reviews and audits; focus workshops; risk event analysis; management information
3.9.3 Understand how indicators can be used as a method of monitoring operational risk
3
Classifying operational risk using common categories is the first step in developing a common risk
language. It also helps to distinguish causes from effects and can be used as a basis for the development
of a risk capture, identification and measurement system.
Different organisations will put a different emphasis on risks and will, therefore, categorise risks in
different ways. It is not important what categories are chosen, providing that they are:
For example, a common method is to categorise by the root causes of process, people, systems and
events as is summarised in the table below.
Risk Categorisation
67
Process People Systems Events
Capacity
Communication Regulatory change
management
Expertise
Cybercrime Terrorism
concentration
Culture
Uncertainty
Labour
There are a variety of methods used for the practical capture and identification of risk. Some of the more
common ones are:
In order to capture the complete risk profile, all of these methods require the involvement and
partnership of risk owners and risk experts. Risk owners include senior management, process and
product heads and the line staff who deal with the risks on a daily basis.
These self-assessments can be based on a silo within a team or department, or can encompass an entire
end-to-end process spanning multiple teams.
The risk expert will work together with management and staff in order to produce a risk profile that can
be used in the risk measurement or assessment phase.
68
The Nature of Operational Risk
Reviews and audits can also be performed on the external risk environment to identify and compare the
risks faced by competitors and other market participants.
3
• potential impact of losses or control breakdown to the firm
• existence of a suitable mechanism for monitoring the risk.
69
Examples of process-related and non-process-related indicators are as follows:
These indicators allow the firm to set its risk appetite and give managers the autonomy to make business
decisions within specified boundaries. Levels of acceptable risk can be established by attaching limits,
or thresholds of acceptability, to each indicator. In this regard, many firms monitor KRIs on a red/amber/
green basis (often referred to as the ‘RAG’ status), and ensure that staff understand the implications,
escalation process and actions to be taken when risk indicators go into the amber or red zones.
By identifying and assessing the severity of risks and properly understanding the cause of the chain of
events, objective measurement criteria can be chosen to monitor ongoing risk status.
• Key performance indicators (KPIs) – used to measure activity within the organisation and are
often used as a measure of success in meeting performance targets.
• Key control indicators (KCIs) – used to monitor the effectiveness of controls in meeting their
objectives.
All these indicators tend to be reviewed on a periodic basis (generally monthly) to alert firms to changes
in risk concerns. Such indicators may include the number of failed trades, staff turnover rates, and the
frequency and/or severity of errors and omissions. Firms could benefit from having a robust process for
changing KRI thresholds.
70
The Nature of Operational Risk
Case Study
Using Risk Indicators to Measure Operational Risk – Setting Risk Bands for Cash (Nostro) Breaks
Reconciliations are a key internal control for all organisations. As a measure of risk, a firm may
determine the number of unreconciled items (ie, unresolved cash nostro breaks) on a firm’s cash
reconciliations along with the age of the break. This allows the firm to gauge how effectively this
3
control is working and identify the current risk associated with the outstanding reconciliating items.
The table which follows shows how risk bands might be set in practice to assess this risk of unresolved
cash (nostro) breaks. For instance:
• risk is considered to be medium, if the total number of unresolved breaks is between 5% and 7%
of total volumes
• risk is considered to be medium, if the number of breaks that have remained unresolved for
between 8 and 14 days is between 1% and 1.5% of total volumes
• risk is considered to be medium, if the value of unresolved breaks is between £800 million and
£2 billion.
Risk Bands
Assessment Criteria (approximate percentage of total volumes)
LOW (green) MEDIUM (amber) HIGH (red)
Number of breaks 3% 5% 7%
71
5.4 The Practical Problems of Risk Identification
Learning Objective
3.5.5 Understand the practical problems of risk identification: changes to business operating models;
changes to business environment; firm-wide engagement; differing individual perception of risk
The biggest practical problems with the risk identification phase are:
• the amount of time required to be invested by managers and staff to ensure the compilation of a
good-quality, comprehensive risk profile
• the mix of business carried on by the firm, changes to its business operating model and the
particular environment in which it operates
• any changes associated with the firm-wide engagement arising from new markets, products,
systems and regulation that may hinder the identification of risk
• although it is perhaps more of a measurement factor (and is addressed again later in this chapter),
the lack of good quality, consistent historical data on operational risk available to a firm both
internally and externally does present a practical limitation
• the lack of robust policies
• the methods of collecting and compiling a risk profile
• the different opinions and perceptions of staff at the firm towards risk, for example a senior manager
at a firm may not regard a particular activity as being of a higher risk than perhaps a less senior
manager and vice versa
• difficulties in consistently categorising risk data, and issues relating to consistency generally.
3.7.1 Know the basic terms used in the assessment and measurement of operational risk
Risk assessment and risk measurement are concerned with understanding the likelihood of risks
occurring and their impact on the business in terms of direct or indirect loss. Risk assessment is closely
linked to risk measurement. It delivers an assessment of risk at a point in time with appropriate controls
in place.
Measurement is associated with the use of quantitative techniques to understand the size of risk such as
measuring losses, measuring the frequency and impact of risk events and making statistical predictions.
Assessment has more to do with evaluating measurement data and estimating the impact on the
business. It is especially useful for considering those risks which cannot be actuarially or statistically
measured, given the lack of appropriate data.
72
The Nature of Operational Risk
For instance, a firm’s risk measurement system might record that the front-office trading system is 98.5%
reliable. Assessment would make the judgement as to whether this is acceptable for normal business
performance. Put another way, measurement is objective, and assessment is subjective. These terms are
closely linked and are often used interchangeably – both address the question: how big is the problem?
It should be stressed that the processes for assessing and measuring operational risk are are not unique
to operational risk, as they can also be applied to other types of risk as well.
3
6.1 Why Assess and Measure Risk?
Learning Objectives
3.7.2 Understand the main reasons for assessing and measuring operational risk
3.9.1 Understand the main activities that comprise the risk monitoring of the risk management
process: measurement; assessment
Once an understanding of the size of a problem has been gained, appropriate action can be taken to
address it.
The reasons for assessing and measuring operational risk are to:
73
6.2 Methods of Measurement
Learning Objectives
Quantifying risk in terms of the precise financial impact it has on the business would be the ideal basis
for decision-making. However, the problem with using financial measures and models is supporting
them with accurate, comprehensive data. The acquisition of this data is the most difficult aspect of
measurement due to operational risk’s complex nature and the fact that much of the data is difficult to
derive automatically from the firm’s systems.
Objective measurement is difficult because of the same practical problems explained in the previous
section on risk identification. Objectivity is further complicated by the multi-dependencies between
functional areas and processing activities.
For these reasons, it is hard to measure and assess operational risk precisely with confidence, so both
qualitative and quantitative methods are commonly used, such as:
Learning Objective
From the control perspective, one of the simplest methods of assessing risk is the creation and application
of a rating or ranking hierarchy. This is a method of rating or ranking risks in order of their importance.
The assessment may be subjective – depending on the experience of the professionals involved, or
objective – being supported by historical data, or both. In either event, the ranking decision depends on
two criteria – the likelihood of the risk being realised, and the magnitude of the impact.
74
The Nature of Operational Risk
The ‘likelihood’ of the risk being realised can be represented as a range of probabilities which correspond
to a rating, for example:
Rating
3
Low = 1% to 5% 2
Medium = 5% to 10% 3
The magnitude of the impact is the potential loss if the risk is realised. This can be represented as a
monetary range, and also assigned a rating, for example:
Rating
Impact (£)
5
Medium Risk High Risk
4
2
Low Risk Medium Risk
1
1 2 3 4 5 Likelihood (%)
75
Note that the monetary ranges will change depending on the business area being measured and the
scale of the firm’s activities.
An overall risk assessment can be made by multiplying together the likelihood or probability and impact
ratings to provide a risk score (risk rating) which is effective in prioritising risks:
If there is good quality historical data available, actual percentages of monetary figures can be used.
Each risk can be plotted on a ranking chart to produce a risk profile as shown in Figure 3.3.
Firms will often perform this process for both inherent and residual risks. Inherent risk assessment
considers likelihood without controls in place, while residual risk assessment includes consideration
of the control environment. This procedure allows the effectiveness of controls to be evaluated and
provides an analysis of risk based on:
A firm which falls into the top right-hand box of ‘High Risk’ will, in theory, fail and would, in practice, not
exist for long.
• provides a simple, powerful method for viewing the range of risks the business faces
• provides an evaluation of the effectiveness of the control environment
• focuses management attention on the most important risks
• can be used with minimal hard data so, if historical data is not available, useful subjective
measurement can still be performed
• can capture a wide range of risk possibilities – from large, strategic risks to everyday, more detailed
issues. For this reason it can be effective at all levels of an organisation
• can be used to anticipate loss by ranking the potential risks of new situations. This means it is
forward-looking as well as backward-looking. It is, therefore, a useful method if fundamental
industry changes need to be understood, such as the impact on the control environment of new
ways of working (remote working)
• encourages a risk-aware culture and a more transparent risk environment. In order to maintain
the risk profiles, a culture of continuous assessment is needed. This encourages line staff and risk
managers to work closely and allows good practice to be adopted more easily, and
• enables a firm to assess its risk exposure against its defined risk appetite.
Problems with applying such a process may occur on the edges or centre, which lie between risk boxes
(for example between high and medium) when the cost benefit of remedial action is difficult to acertain.
Its other main disadvantages are that it is subjective, and may present an oversimplified view. All
subjective assessments should be validated by:
76
The Nature of Operational Risk
Learning Objective
3.7.4 Understand the risk and control self-assessment (self-certification) method of assessing
operational risk
3
Risk and control self-assessment (self-certification), also sometimes known as the ‘bottom-up’ method,
can be used for measurement as an extension of the risk identification and control process. It generally
utilises the ranking approach mentioned previously in section 6.2.1.
Once managers have compiled a list of risks, they make their own assessment of the firm’s exposure to
each risk on a regular basis.
• it can be subjective and possibly open to abuse and manipulation by managers. For this reason, it
should be independently validated
• it can be difficult to apply consistently across the various business units and multiple locations that
exist within a global financial institution.
Self-assessments are more effective when used in conjunction with other methods.
77
6.2.3 Scenario Analysis
Learning Objective
Scenario analysis is a subjective method of highlighting potential risk issues in order to enable
preventive action to be taken. It uses the experience of business professionals to capture possible
scenarios that have occurred in the past, or that may result in loss in the future.
One of the key benefits of scenario analysis is that it considers more than one variable (risk) in
combination to identify the impact and identify how the existing controls would perform. By
investigating these scenarios, preventative measures can be taken to reduce their risk of occurrence. It
is broadly concerned with looking at worst-case scenarios.
Its other advantages are the same as for ranking (see section 6.2.1).
The main disadvantage of scenario analysis is that it depends on the expertise of the professionals
involved. If there are gaps in knowledge or experience, the scenarios may lack rigour.
A practical example of scenario analysis would be to consider how a firm’s process to authorise payments
from a client’s account would work if there was limited or no access to the main place of business. If dual
signatures are required and staff have been asked to work remotely and are, therefore, unable to review
physical copies of supporting evidence or sign control sheets, how is the control observed?
It is not uncommon to discover that when viewed in conjunction, one risk event may increase the risk in
other areas, eg, a business continuity event may increase the potential risk of fraudulent payments due
to a weakened control.
Payment instructions are then printed alongside the supporting evidence and are reviewed by two
senior managers, and a control sheet is signed before the payment is released on the banking system.
Scenario analysis could look at the risk associated with this process and then might consider the
impact of a business interruption where staff may be working remotely and may not have access to
all of the systems they would usually have access to within their office. For example, staff may not
have access to printers to print the payment instructions for review and senior managers may not be
available to sign control sheets, potentially weakening this control and increasing the risk of errors
or fraudulent transactions. This highlights a new risk that would not have been visible if each process
was looked at in isolation.
78
The Nature of Operational Risk
6.2.4 Benchmarking
Learning Objective
3
Benchmarking involves comparing loss data and measures of operational risk with competitors and
other firms in the industry. This allows the firm to establish how effectively it manages risk compared
with its peer group.
The advantages of benchmarking are that it:
• allows the firm to make a judgement on what represents good performance, and set a standard for
the industry based on the best firm
• makes operational risk more transparent within the industry.
• is difficult to find suitable data sources that compare like with like
• may be difficult to verify open and honest reporting of risk measures
• may create a false sense of security for market leaders. Just because a firm ranks highly in its
industry, this does not imply that it manages risk effectively – it merely outperforms its competitors
in the risk areas.
Learning Objective
A top-down risk assessment process involves the senior management reviewing the key risks that
their business may be exposed to and then implementing a process.
A typical top-down risk assessment process may comprise the following stages:
79
6.2.6 Risk Event Data Analysis
Learning Objective
3.7.7 Understand the uses and limitations of internal risk event data in assessing operational risk
Internal risk event data evaluation is important in mapping the actual risk events and losses experienced
by the firm back to a sensible categorisation system. Once the data has been collected (from either
internal or external sources) it can then be used in the assessment process, often using benchmarking
or statistical methods.
For instance, a ‘loss distribution’ curve may be created that records the value of all material (direct)
losses in a particular risk category over a time period of, say, three years. By analysing this curve using
similar value at risk (VaR) techniques to those introduced in chapter 2, some prediction of future losses
can be made within specified confidence limits.
Figure 3.4
No. of incidents
Expected losses
Unexpected losses
Expected losses are those that occur with reasonable frequency. They represent known weaknesses, or
sit within the risk appetite of the firm. They must be managed by good process controls and an effective,
continuous risk management process.
Unexpected losses are those low-frequency, high-impact events that can create serious problems. They
are much more difficult to manage on a day-to-day level because they do not occur often enough to test
the control environment. They are best managed using contingency planning.
80
The Nature of Operational Risk
The advantage of using this assessment method is that it allows the firm to understand the size of losses,
in monetary terms, which can be attributed to particular risks.
Its main disadvantage or limitation is that it does not predict unexpected losses very well, owing to the
lack of data. Some firms also do not make allowance for near misses, ie, potential events that might
have caused serious harm but were detected in time, by luck or judgement. Consequently, reporting
the results of historical loss analysis in a way that makes decision-making easier can be difficult. It is
3
also worth noting that often firms do not always include indirect or ‘soft’ costs, as these are not easily
identifiable from the accounting system or general ledger.
Learning Objectives
As well as being derived from data generated internally, loss data can also be derived from data that is
generated and hosted by external data collectors and organisations. This so-called external loss data
(ie, the data relating to losses that have been suffered by other firms, either in the same or a different
industry, because of operational risk) can then be used in an operational risk framework.
Although there are many sources of external data of value and relevance to institutions, the main ones
in the UK include the British Bankers’ Association (BBA), the Operational Riskdata eXchange Association
(ORX), the Operational Risk Consortium (ORIC) and Fitch.
By looking beyond its own four walls, a firm may be able to identify and address potentially catastrophic
risks. In turn, firms that use external loss data effectively have the potential to place themselves ahead of
the game in terms of strategic planning and competitiveness within the sector.
81
Benefits of Using External Loss Data Limitations of Using External Loss Data
• External data providers make available high- • Working with statistics is still seen as a burden
quality information and data for re-use by rather than a benefit by some firms.
institutions to support strategic planning. • Without experience, it can be difficult to frame
• The quality of data held is assured. the right question to ask external providers.
• Large quantities of data are available free to • It can be expensive to acquire data from
institutions on providers’ websites. external data providers.
• Bespoke services are provided when more • It can be difficult to translate statistics into
detailed data is required. meaningful information accurately.
• Some providers provide regular publications • Providers need to supply more guidance and
in hard copy form. case studies on re-use.
• High-level data on peer institutions enables • A lack of data consistency (regarding the same
firms to make meaningful comparisons. data) between external providers can lead to
• Time series and historical data enable inefficiency and inaccurate outcomes.
comparisons over time. • It can be difficult to map external data to
• Some provides offer training in the use of internally held data in order to draw accurate
data. conclusions.
• Ongoing discussion between providers aims • It is difficult to obtain data at a sufficient level
to deliver a rounded service. of detail for making useful comparisons with
• Data providers work proactively to enhance competitors.
the usability of their data.
• Such data allows an institution to benchmark
specific aspects of its own performance
against that of industry peers.
7.1 Monitoring
Learning Objective
3.9.2 Understand the importance of risk monitoring in the risk management process
The monitoring and reporting cycle allows the risk management process to be continuous. The
monitoring stage comprises the following activities:
• the establishment and firm-wide adoption of appropriate risk parameters such as risk indicators
(explained in section 7.2) to measure the level of risk
• an ongoing, continuous process of objective measurement against a pre-agreed risk appetite
• an independent policing of risk parameters by the firm’s risk managers.
82
The Nature of Operational Risk
During the monitoring process, if risks are found to be unchanged or increasing, then the following may
be required:
3
Monitoring is, therefore, an important feedback step that ensures that the risk management process is
functioning.
Its effectiveness is dependent on the ability of the firm to retrieve, collate and, when necessary, accrue
the required information in real-time.
7.2 Reporting
Learning Objective
3.9.4 Understand the main functions of operational risk reporting to internal and external
stakeholders
Risk reporting is the mechanism of communicating the losses, exposure and risks to the right level of
management in the firm. Its functions are to:
It is necessary to report risk internally (across and up the organisation to internal stakeholders) and
externally (to clients, regulators, auditors and analysts). A firm’s risk policy should also include controls
to ensure that the right reports are received by the right people in a timely manner.
The Audit and Accounting Faculty of the accounting body, the Institute of Chartered Accountants in
England and Wales (ICAEW), issued guidance to the directors and reporting accountants of service
organisations. This guidance, which was first published in 2006 and has since been revised and
expanded, recommends that a firm’s internal control report contains a report by its directors and
reporting accountants.
After an incident has occurred, the event itself needs to be escalated and reported to the incident
management team as well as the relevant risk and risk management committees. This will, in turn, lead
to a full analysis of the incident after it has been resolved, including why it occurred even if the firm had
already taken precautionary measures to prevent such occurrences. It may well be that, the firm needs
to review, change or add procedures and controls following an event, in order to ensure that future
recurrences are prevented.
83
Prompt escalation to the incident management team will be required in all instances, but particularly
when customers of the firm have been impacted. The priority should be to resolve the issues that affect
the customers quickly and then undertake the necessary investigations and intensive data collection for
the root cause of the problem to be corrected.
8. Risk Response
Learning Objective
3.8.1 Understand the type of risk response: risk acceptance; reducing the likelihood and the impact;
risk avoidance; risk transfer
3.8.2 Understand the use of the following examples of operational controls in reducing the impact
or likelihood of operational risk: supervision and segregation of duties; business continuity and
contingency planning; information and physical security; risk awareness training
3.8.3 Understand how the following examples can be used to transfer operational risk; insurance;
outsourcing
Once risks have been identified and measured, a firm is in a position to take effective action or respond to
address them. Treatment aims to make risks less intense or severe, and there are five potential mitigation
methods:
Operational ‘risk controls’ are activities that are inserted into a process to protect it against specific
operational risks. Controls do not generally add value to processing in direct terms (ie, by moving the
process forward from one state to another), but they can add value in indirect terms by protecting
against error and consequential loss.
For example, a procedural control might be set up to protect against the risk of a member of staff
diverting funds to a personal bank account when making a payment (ie, committing fraud). This
procedure might ensure that one person prepares the documentation to send a payment and another
person approves it and physically sends it (ie, segregation of duties). This action does not directly
make the process any quicker or cheaper (in fact in might make it slower and more costly); however, it
is necessary to protect the firm against fraudulent activity, in order to save money in the longer term.
84
The Nature of Operational Risk
There should be an independent control function and/or internal system audit trail in place to deter this
from happening in practice.
Potential risks should be anticipated and evaluated when the process is first designed and the necessary
controls embedded within it. There are four types of control – directive, preventative, detective and
corrective controls:
3
Directive controls are usually found in the form of policies and other documentation designed to direct
individuals to adhere to, or avoid certain practices. An example of a directive control in use would be the
setting up and ongoing maintenance of good procedures to prevent unauthorised actions and errors.
Preventative controls are those that prevent errors occurring in the first place. They attempt to tackle
the root causes of risk and are most effective when incorporated within processes at the outset by
anticipating a risky outcome. Technology solutions are often used as a key means of implementing
preventative controls.
A key preventative control is also ‘supervision and segregation of duties’. This means the separation
of trading, operation and control, financial reporting and risk management functions. The aim of
segregating these functions is to prevent too much responsibility and authority being concentrated in
the hands of specific individuals. In turn, this prevents the possibility of the internal control structure
being compromised and the risk of fraud arising. The lack of appropriate segregation of duties is one of
the major process causes of operational risk.
From the transaction processing perspective, another important area is the ‘maintenance of data
integrity’ in systems, for example, the incorrect capture of a transaction’s details in a firm’s systems
due to errors created through manual input. If the process were to be designed so that the transaction
is captured once at the point of execution and checked, after which this data may thereafter flow
automatically into the downstream systems. Note that while the risk of manual errors would disappear,
it would be replaced by system risks, which are generally considered to be lower. This illustrates the
benefit of a straight-through processing (STP) or automated environment.
• the use of training to reduce the likelihood of human error arising from a lack of expertise
• the use of well-designed systems to automate processes such as STP that prevent users re-keying
data, and
• the use of systematic controls to eliminate risk due to human error, such as validating data fields
that prevent users from inputting a date of birth for a future date.
Corrective controls are designed to remediate errors or losses where the previous control types have
failed. An example of a corrective control in use would be an authorisation process to make a payment
to a client’s account to cover losses incurred due to an internal process or control failure, putting the
client back in the position they would have been in had the error not occurred.
85
Detective controls detect errors once they have occurred. They can be further split into two sub-
categories – internal and external detection:
• Internal detective controls detect errors after they have occurred but before a potential loss is
realised in the outside world (ie, they detect the risk event in order to prevent the effect). Checking
and inspection-type activities fall under this category. For instance, checking the legal drafting of
a contract before it is signed is a control that may detect errors in the terms and conditions of the
contract. These errors would then be rectified and the contract sent out at no loss to the firm. If the
control did not exist, the potential for legal risk to be realised would increase.
• External detective controls are those that detect errors and losses once they have been realised
(ie, they detect the effects). Post-settlement checks such as statement-to-ledger reconciliations fall
under this category. If a problem is found, for example, if a counterparty has not been paid on time,
there could be a loss realised due to a compensation claim for lost interest. If the detective control is
effective, the problem will be resolved quickly and the loss effect limited. External detective controls
are important because they can limit the direct and indirect losses to the firm. External detective
controls are really concerned with reducing the impact of loss, rather than reducing the likelihood of
loss (because the loss has already occurred). This is discussed in the next section.
As stated in the previous section, using detective controls is one method. Other strategies are:
86
The Nature of Operational Risk
• Operational resilience – this describes how well an organisation is able to absorb or adapt to an
ever-changing environment, and ensures that the design of infrastructure, processes and systems is
able to resist a business interruption. A key distinction between operational resilience and business
continuity is that operational resilience includes changes in customer demand or the wider market
in addition to business continuity scenarios and is concerned with reducing these impacts on the
business.
• Disaster recovery – this is concerned with responding to events after they have occurred and
3
ensuring the business can return to ‘business as usual’ with the least impact, usually within a set
timeline agreed.
• Good communication and reporting – having high quality, integrated management information
systems allows information to be shared globally and efficiently. This means that, if a risk is realised,
the firm is able to react quickly to reduce its impact.
Outsourcing
If a firm understands the amount of operational risk it carries, it may choose to outsource aspects of
its business to a third party with specific expertise in managing certain risks and who will carry the risk
exposure for a fee. This option of risk management is gaining popularity with financial institutions;
however, it is important to remember that a firm only transforms the risk from, say, direct process risk
to managing the quality of the outsourced process, in other words, a risk still exists. On the other hand,
some firms also actively take on risk from others, as seen in insourcing businesses.
Insurance
Insurance is a means of transferring a specified amount of risk to an insurance provider for a fee (the
premium). For example, it may:
• cover the event of loss due to fire, theft, risk of non-payment of monies owed, losses when they
occur and/or loss of profits
• provide potential balance sheet protection
• smooth income flows for the business.
When taking out insurance, a firm needs to know what the insurance will pay out for, and when it will
pay out. In practice, insurance companies will usually cap their potential liability under a policy by
imposing limits and may stipulate conditions on the firm (eg, a firm may take out an insurance cover of
up to £1 million to protect against theft; however, the insurance company may require the firm to have
minimum levels of security in operation). Insurance can reduce the impact of a risk event, but it will not
remove it completely; reputational damage, and subsequent potential loss of income, could still occur.
87
Information and Physical Security
The operational risks associated with information and physical security can be reduced by firms making
adequate and suitable arrangements for safeguarding them. The level to which this can be done
depends on the amount, type and value of the things that need to be safeguarded.
Financial Reserves
Financial reserves is essentially a form of self insurance that can be used to increase a firm’s ability to
withstand the impact of a risk event being realised. Financial reserves also serve to reduce liquidity risk
and need to be held in a form that ensures that they are sufficiently liquid (such as cash or liquid assets)
so that they can be accessed at short notice and without delay, in any crisis situation.
8.4.2 Limitations
While risk transfer can be attractive to businesses seeking to reduce their direct financial losses
and capital adequacy costs, it does not address the reputational impact. Also, the indirect costs of
operational losses incurred by an insurer or third party will most likely still have to be borne by the firm.
88
The Nature of Operational Risk
3
framework
Summarising some of the themes that have been discussed so far in this chapter, some of the practical
constraints of implementation are:
• Data collection and management constraints – in practice, it is very difficult to build a truly
comprehensive data set. Apart from the general lack of data, system constraints and a lack of
standardisation mean that the required data feeds from disparate sources cannot be easily
developed. There is also relatively little availability of industry-wide data, as this depends on firms
‘self-reporting’ and, by definition, it is not straightforward to gain an understanding of high-impact,
low-frequency events. Firms may also not be allowed to report for legal disclosure reasons.
• Cultural constraints – business heads need to be convinced of the value that operational risk
management will bring. If not implemented in a well-structured manner, it is often seen as a cost to
the business, and even a nuisance, rather than a real asset. Consequently, many firms have rolled out
risk management frameworks little by little, attempting to gain the confidence and support of one
business area before moving on to another.
• Resource and cost constraints – firms continually underestimate the amount of time and resources
required to implement identification and measurement systems. In an era of tight cost controls,
resource constraints put a limit on how quickly or comprehensively implementation is carried out.
• Indicator constraints – it can be difficult to design risk indicators that monitor the full range
of risks. There is a natural tendency to use indicators that are already available (such as existing
management information) but these are often designed to monitor performance rather than risk.
The extra cost and time required to design and maintain a truly comprehensive set of risk indicators
is often prohibitive.
89
10. Operational Resilience
Learning Objective
3.10.1 Understand the difference between operational risk and operational resilience and the
significance placed upon operational resilience by the regulator
Operational resilience has been the focus of regulators both in the UK and around the world as the
financial services and banking sectors become more interconnected. In the UK, the FCA, PRA and Bank
of England have been working on a joint policy statement on operational resilience, which is defined by
the Basel Committee on Banking Supervision (BCBS) as:
In practical terms, operational resilience is one of the outcomes of good operational risk management;
however there are some key differences between the two. Firstly the term, critical operations, needs to
be defined based on the range of services an organisation provides its clients, in the UK these critical
services are known as Important Business Services (IBS).
Once an organisation has mapped its important business services, it will need to assess its Impact
Tolerances which describes the maximum tolerable level of disruption to an IBS. These impact tolerances
will vary between organisations and are impacted by the firm’s appetite to risk as well as understanding
the potential impact to its clients.
Finally firms are expected to perform scenario testing against a range of extreme but plausible scenarios
to ensure that the firm can continue to deliver these important business services within these impact
tolerances.
While there is clearly overlap between the objectives of operational resilience and operational risk,
operational resilience can be thought of as managing the risk relating to the delivery of important
business services whereas operational risk concerns itself with managing risks to the firm.
90
The Nature of Operational Risk
1. What are the three stages of the operational risk chain of events?
Answer Reference: Section 1
3
Answer Reference: Section 3
14. What are some of the benefits of using external loss data?
Answer Reference: Section 6.2.7
15. What are the advantages of using key risk indicators (KRIs)?
Answer Reference: Section 7.2
91
16. What are the five main risk response strategies?
Answer Reference: Section 8
20. List some of the practical constraints that might be encountered when implementing an
operational risk management strategy.
Answer Reference: Section 9
92
1
Chapter Four
1. The Causes
and Impacts of
Operational Risk
Learning Objectives
4
4.1.2 Understand why knowledge of causes is
important in operational risk management
95
Figure 4.1 – The Causes of Operational Risk
People
Processes Systems
How well an organisation influences and adapts to its environment and harmonises its people, processes
and technology dictates how successful it will be in managing its risk.
For example, if staff are using old, manually intensive and incompatible systems, the reliance on their
integrity and expertise to deal with system-related problems is greater and the complexity of the
process design to ensure control is increased. This will have an impact on the firm’s ability to adapt to its
changing environment and its effectiveness in controlling its risk environment.
Conversely, adopting an efficient straight-through processing (STP) system will greatly reduce people
risk, but will increase system risk, due to the increased reliance on Information Technology (IT).
Due to the breadth of operational risk, the potential ‘events’ that link root causes to effects cover a wide
range of activities that can eventually result in loss. Some of the important events are:
• incorrect data
• delayed processing and documentary omissions
• regulatory non-compliance
• project mismanagement
• fraud and theft
• unforeseen litigation
• information technology failures.
The events are described in section 1.3 and their consequent impact in section 2.
96
The Causes and Impacts of Operational Risk Events
4.1.3 Understand operational risk events in simple, practical examples: incorrect data; delayed
processing and documentary omissions; regulatory non-compliance; project mismanagement;
fraud and theft; unforeseen litigation; information technology failures
4.3.1 Understand the links between, causes, events and impacts of operational risk
4
Due to the breadth of operational risk, the potential ‘events’ that link root causes to effects cover a wide
range of activities that can eventually result in loss. We will now describe some of these events and their
consequential impacts.
This lack of data integrity can originate from any or all of the four causes described at the start of this
chapter. For example, data may need to be manually keyed into a system because two systems are
incompatible with each other (system cause), leading to mis-keying because of human error (people
cause). The error may then not be detected due to the lack of an effective control procedure (process
cause), which may then result in incorrect documentation being sent to a client. The chance of this
problem occurring might be increased due to the pressure of increasing volumes (event cause).
97
Delays in the processing of a transaction or omissions in documents can result in interest claims or
financial penalties (direct losses), and damaged reputation resulting from incorrect documentation
(indirect losses).
Examples of the potential effects of regulatory non-compliance are direct loss through fines or penalties,
and indirect loss through regulatory censure resulting in damaged reputation or inability to trade.
Projects can be large and strategic (eg, the design and implementation of a new system capable of
processing ten times the volume of business with lower risk and for the same cost), or small and tactical
(eg, the design and implementation of a client query system that helps to improve the quality of client
service). Either way, the sum total of all project work occurring in an organisation has an effect on its
‘business-as-usual’ operations. Examples of projects are:
• The design and implementation of a new system capable of processing ten times the volume of
business with lower risk and for the same cost. This would be a large, strategic project and would
involve ‘people’, ‘process’ or ‘system’ aspects.
• The design and implementation of a client query system that helps to improve the quality of client
service. This may vary in size from a small project in one particular area of operation to a more
strategic project involving a number of departments.
• The design and implementation of a management training programme to support a cultural change
to a more consensual style of management.
• The design and implementation of a new organisational structure for a firm to provide greater
autonomy and better decision-making for middle managers.
Project risk is the risk that the failure, or partial failure, of a project to meet its objectives leads to financial
loss, lost opportunity and resource costs. Since projects can overlap several areas, take signficant time
and require a great deal of rescources to implement, undertaking a project and assuming project risk
can be signficant.
98
The Causes and Impacts of Operational Risk Events
4
• the opportunity of using the resources employed on the unsuccessful (or semi-successful)
project in a more effective manner
• the project destabilising day-to-day operations. For instance, the involvement of line staff in the
project may put extra pressure on the business. This has knock-on effects of causing events such
as incorrect data, delayed processing and documentary omissions, or deterioration in client
service, which then lead to financial loss
• the project being part of a change programme that is uncoordinated or inadequately controlled.
The sum total of all projects may be beyond the capacity of the business.
For fraud and theft to occur, there must be opportunity, and this opportunity is usually the result of an
operational issue. For example, if a single individual has end-to-end authority in the processing of client
payments, the opportunity for fraud is greatly increased, this could be the ability to amend bank account
details stored within the system as well as the authority to release payments in its banking systems. This
is one of the main reasons why firms have established controls in place to ensure segregation of duties
between front and back office functions.
The potential effects of fraud and theft are direct loss as a result of the crime, and indirect loss due to
adverse publicity damaging the firm’s reputation.
• contractual differences or ambiguities relating to the level of service to be expected from a third-
party systems provider or outsourced partner
• any litigation brought by a competitor due to issues such as intellectual property, or
• employee litigation resulting from grievances involving equal opportunities, health and safety,
compensation or employee contracts.
99
The potential effects of unforeseen litigation are direct loss related to potentially large compensation
and legal bills resulting from losing a lawsuit, and indirect loss due to the effects of adverse publicity on
the firm’s reputation.
• power failure
• hardware failure
• back-up power systems not working
• hardware failure
• viruses and bugs affecting the operation of systems
• loss of data or data corruption
• systems or software becoming obsolete or insufficient
• over usage or overloading of systems, and
• cyberattacks such as distributed denial-of-service (DDoS) attacks.
Failure can also occur where a firm has inter-related systems that are dependent on one another for
the effective operation of the business. For example, system upgrades to one system may affect the
communications and compatibility with other systems, both internally and externally. The number of
system dependencies grows exponentially as the business adopts new inter-connected systems.
The huge amount of data being generated by modern financial services firms means organisations must
plan well ahead to have systems which can handle the volumes of transactions taking place. Failure to
do so may harm customers, but also put the firm into regulatory non-compliance.
The potential effects of technology failures are direct loss through fines or penalties, indirect loss due to
the amount of time spent by staff that are unable to proceed with their responsibilities, and indirect loss
resulting from adverse publicity negatively impacting the firm’s reputation.
100
The Causes and Impacts of Operational Risk Events
4
of earnings; regulatory censure/closure and reputational damage; staff demotivation; poor
conduct risk outcomes; remedial and litigation costs
As with market and credit risk, the ultimate effect or impact of operational risk being realised is financial
loss. Such financial losses can be either direct or indirect.
101
2.1.2 Indirect Loss
Indirect loss is sometimes referred to as consequential loss. Indirect loss may be incurred due to the
associated remedial costs of rectifying the operational weakness that led to the loss, such as through
re-allocating staff from profitable activities to help correct the problem.
Indirect loss can have both financial or non-financial impacts, for example reputational damage, known
as ‘reputational risk’, can influence client opinion of the integrity of a financial institution which is a
major factor in its competitiveness and success. They can be damaged by:
• adverse publicity due to a lack of client suitability, ie, being associated with criminals, notoriety or
scandal
• perceived malpractice, such as inflating commissions, mis-selling, concealing losses and the
identification of accounting irregularities
• not responding to client complaints in a timely manner leading to further complaints requiring
additional resources to resolve
• client dissatisfaction resulting in loss of not only existing clients, but also future business
opportunities.
Direct losses:
• the cost of appointing a skilled person under Section 166 skilled person review
• the cost of the regulatory fine
• the cost of implementing new systems.
Indirect losses:
• the resource cost in reviewing and rectifying the process weakness over a prolonged period
• the loss of future business as a result of the enforcement action
• the loss of productivity due to staff demotivation.
While the immediate impacts may be considered non-financial, these may ultimately lead to a
financial consequence. For example, a lack of morale could lead to a loss of productivity which, in
turn, could result in failing to attract new clients, or having to hire additional staff
102
The Causes and Impacts of Operational Risk Events
4.1.3 Understand the root causes of operational risk events in simple, practical examples: incorrect
data; delayed processing and documentary omissions; regulatory non-compliance; project
mismanagement; fraud and theft; unforeseen litigation; information technology failures
This table gives some examples of the main impacts of the risk events described earlier.
4
Risk Event Risk Effect
103
Risk Event Risk Effect
Fraud and theft The potential effects of fraud and theft are:
• direct loss as a result of the crime
• indirect loss due to adverse publicity damaging the firm’s reputation.
Unforeseen The potential effects of unforeseen litigation are:
litigation • direct loss related to potentially large compensation and legal bills resulting
from losing a lawsuit
• indirect loss due to the effects of adverse publicity on the firm’s reputation.
Technology The potential effects of technology failures are:
failures • direct loss through fines or penalties
• indirect loss due to the amount of time spent by staff that are unable to
proceed with their responsibilities
• indirect loss resulting from adverse publicity negatively impacting the firm’s
reputation.
4.3.1 Understand the links between causes, events and impacts of operational risk
In chapter 1, we defined risk as ‘The chance or possibility of damages, loss, injury or other adverse
consequences’. For any risk to be crystallised within an organisation, there must be the realisation of a
risk event, ie, the ‘risk event’ is essentially the loss event that occurs. In contrast, the ‘risk effect’ is the
loss incurred by the firm.
104
The Causes and Impacts of Operational Risk Events
Below are some examples of these operational risks. In each example, there are details of the root cause,
the event and the impact of the operational risks.
Examples
1. Data stored in the system incorrectly
Root cause – Technology (complex systems) and/or people (lack of training).
4
Effects – Financial loss due to a failed trade (eg, interest claims) plus possible knock-on effects
if the trade is part of a structured product or hedge, as well as reputational damage leading to a
loss.
2. Unexpected litigation
Root cause – People (lack of training or carelessness), compounded by process (the complexity
of the job).
Effects – Financial loss arising from the contention of a contract by a client or third party (eg, cost
of litigation, inability to claim profits) as well as reputational loss.
Event – An error in a credit model resulting in a client exceeding its credit limit. This may lead to
regulatory censure and unexpected financial loss if the client defaults.
Effects – Potentially larger-than-expected loss, if the client defaults, and financial penalties from
regulators (with consequential reputational damage).
4. Delayed processing
Root cause – Weak process and controls in identifying and monitoring open option positions and
exercise events.
Identifying the root cause of the risk is required in order to be able to identify appropriate controls later
in the risk management cycle.
105
Identifying the risk effects involves recognising the various negative impacts on the business associated
with the risk identified. This could be financial, reputational, operational (ie, reduced capacity) or result
in the loss of future customers.
There are countless other instances of operational risk that can occur anywhere in the transaction life
cycle.
4.4.1 Understand the concept of near-miss identification and reporting as a result of an operational
risk event
A risk event can either deliver an actual loss or gain or it could be a near miss. The definition of a near
miss is effectively embodied in its very name: it is where a risk event has occurred but it did not cause an
actual loss (eg, the risk effects were not realised). It could represent an event that would have occurred
if preventative control measures had failed or been inadequate. Alternatively it might be an event that
ultimately did not cause any loss because a firm’s detective control mechanisms operated successfully.
It could also be that a loss was avoided simply by luck or chance.
An example of a near-miss incident could be a trader incorrectly inputting trade details into their
systems with the wrong price detail, which ordinarily may lead to a financial loss for the firm of brokers
or its client. However, an operational control system may identify this error and cause the matter to be
investigated, corrected and reconciled without any resulting loss.
The recording, resolution, reporting and escalation of any near misses should broadly follow the same
process as any other operational risk event, even if no actual loss occurs in practice. When details of the
near miss are reported to management, the full details of the incident need to be provided so that there
is no misunderstanding as to how the event actually occurred. Companies need to establish a suitable
reporting mechanism to avoid any misunderstandings; this may be incorporated in practice as part of
regularly supplied management information (MI).
It is important to record and incorporate near misses in the operational risk reporting mechanisms
because they help to give a complete overall picture of the incidence of risk and its resolution. Near-miss
events provide a clear indicator of failed or inadequate controls as well as affording the institution the
opportunity to put suitable controls in place before a recurrence of the risk event.
106
The Causes and Impacts of Operational Risk Events
4
Answer Reference: Section 1.3.4
4. What are the potential effects of delayed processing and documentary omissions?
Answer Reference: Section 2.2
107
108
1
Chapter Five
5
1. The Primary Business Environment 111
109
110
Operational Risks Arising in the Trade Cycle
5
• the back office (or ‘operations’) provides
administrative and support services.
111
2. The Front Office
Learning Objectives
The front office of a financial institution is where trading and investment decisions take place. It is
populated by the firm’s ‘revenue-earners’. These are the traders, fund managers, salespeople and
market risk managers.
Only authorised employees in the front office can commit the firm to a contract and a clear distinction
must be drawn between staff having the status of traders or dealers (who provide the actual execution
of the trades or deals) and trade support staff (‘support functions’ who assist in order handling and the
provision of quotations/prices to the client – see section 3).
The revenue-earners are interested primarily in making a profit for the firm, and generally have most
involvement in the transaction life-cycle up to the point of transaction execution (ie, the commitment of
funds). After this point, the administration of the transaction is conducted by the ‘support staff’.
Revenue-earners will monitor transactions throughout their life in order to manage market risk (implicit
in the daily profit & loss (P&L) calculation) and may also be involved in specific issues or problems, such
as dealing with sensitive clients or making decisions on complex transactions.
The roles within the front office will vary from one organisation to another, and so will the associated
responsibilities. For example, a fund manager may be responsible for making investment decisions in
accordance with the fund’s investment restrictions, whereas a dealer may be responsible for the best
execution of a trade.
• Ensuring that an effective segregation of duties is in place between trading and support functions,
such as the front office, operations, accounting and risk monitoring.
• Having clear escalation procedures in place covering all key risks, such as exceeding agreed limits.
112
Operational Risks Arising in the Trade Cycle
• Ensuring adequate research has been carried out before dealing in a new product, portfolio or
counterparty. This may include, for instance, the production and authorisation of a detailed business
plan.
• Controlling new market and credit limit requests and ensuring they are adhered to.
• Effective capital requirement reporting and details relating to the usage of capital.
• Conducting continuous limit reviews in order to maintain the firm’s risk appetite. For instance,
counterparty credit limits may be reviewed at set intervals or whenever there is an adverse material
change in either their financial status or market.
• Ensuring effective control over front-office systems, including reference data, computer models,
spreadsheets and algorithms. This is particularly important when complex mathematical models
are used involving ‘chaining’ of calculations, so that the output from one calculation is used as the
input for another, or when there are no easily devised plausibility checks possible on the results of
the model.
5
• Ensuring after-hours trading is properly defined and controlled.
• Tightly controlling dealing tickets and ensuring they are processed quickly and efficiently, eg,
numbering them consecutively, using timestamps and transmitting them immediately to the
settlement department after they have been produced in the dealing room.
• Continuously updating positions. Dealers should always know the value of their long, short and net
positions, as well as the value of any hedge relating to a position.
• Maintaining high ethical standards by having effective procedures in place to ensure that:
• there is no trading at off-market rates, or at rates which deviate from prevailing market levels
• dealing only occurs within the dealing room, unless specifically authorised otherwise
• there is client confidentiality in accordance with data protection principles
• trading errors are immediately reported and dealt with
• compliance rules are followed, particularly with respect to the rules of conduct and entertainment,
and ensuring that token gifts are not excessive and are only accepted in accordance with rules.
When setting up operational risk management processes in the front office, appropriate risk indicators
are chosen to monitor the effectiveness of these controls such as the number of limits breaches, system
availability and dealing ticket processing times.
5.1.1 Understand what tasks must be completed during set-up: marketing and sales; Know
Your Customer; international sanctions; suitability; account set-up; reference data; credit
assessment; standard settlement instructions; legal contract negotiation; client and
counterparty agreements
5.1.2 Understand the key controls and indicators associated with the set-up phase
In this section, we will look at the various tasks that need to be completed during the client set-up,
or ‘on-boarding’ stage. Improving the client on-boarding process is a key priority for firms and is an
important factor in their ability to attract and retain clients. Client on-boarding will encompass a number
of checks, including Know Your Customer (KYC), account set-up, operational and systems setup, and
113
credit risk reviews. Client on-boarding also includes the periodic review, account maintenance and off-
boarding of clients.
• Marketing and sales – the UK regulator has very specific rules regarding how investments should
be marketed, particularly to retail customers. Some of these rules require advertisements to be clear,
fair and not misleading; certain minimum amounts of information to appear in the advertisement;
and contact details of the advertising firm to be included. Further, the regulator has rules relating to
cold-calling and record-keeping.
• Know your customer (KYC) – KYC is conducted prior to transacting with a client and forms a key part
of an organisation’s onboarding controls. It also needs to be refreshed periodically; the regulator’s
penalties for non-compliance with KYC requirements can be severe. KYC requirements are essential to
an institution for three reasons:
• It forms a key part of anti-money laundering (AML) controls, helping to prevent the introduction
of illegal funds into the financial system as well as preventing terrorist financing.
• Secondly, KYC is central to the firm’s ability to give proper advice as without up-to-date
knowledge of the customer, their circumstances and objectives, it becomes difficult to make
sure that strategy and product recommendations are suitable and meet their needs.
• Finally, client requirements change throughout their lifetimes and vulnerable customers,
in particular, may require additional support as a result of bereavement, job loss, health- or
mental health-related issues which could impair decision-making or the client’s ability to make
payments such as insurance premiums or loan repayments. Firms are required to ensure that
they are able to identify vulnerable customers and to engage with them in a way which is
appropriate to their circumstances. Strong KYC procedures are at the heart of this.
• Consequently, the rules require that the firm takes ‘reasonable steps’ to gather information about
the customer. This is commonly done using a KYC fact-finding questionnaire, which may be
supplemented by personal identification, address history or confirmation of the source of funds
(for example, if making an investment or obtaining a mortgage). In the UK, the Financial Conduct
Authority (FCA) has issued requirements in its Handbook for firms to abide by.
• International sanctions – are political and economic decisions made by countries against specific
countries, organisations or individuals to protect the national interest or international law. These
sanctions vary from economic sanctions placed on a country to financial sanctions placed on
organisations or individuals which may pre-empt the provision of financial services. It is, therefore,
important that firms are able to implement controls to ensure that they are not transacting on
behalf of a sanctioned entity or individual.
• Suitability – it is very important that the needs of the client are ascertained and taken into account
before advising and dealing with them so that the firm can help meet these needs and objectives
with the products and services that it is planning to offer clients. These requirements will need to be
reviewed and checked on a regular basis to ensure that they remain valid under the FCA’s suitability
requirements. The firm will need to collect certain ‘reference data’ (see below for further details).
Information relating to ‘soft facts’ will also need to be obtained from the customer, eg, ‘If the market
were to fall significantly tomorrow, would you see that as an opportunity or a threat’? The reply to
such questions will help the firm determine the client’s acceptable level of risk exposure.
• Account set-up – certain details relating to the customer will need to be recorded by the firm and
the correct customer classification must be applied on the firm’s internal records.
• Reference data – also called ‘current standing data’ or ‘static information’, this includes details to be
recorded by the firm, eg, customer’s name, address, contact details, or investment objectives. These
details need to be rechecked by the firm on a regular basis, so as to ensure they are still correct.
114
Operational Risks Arising in the Trade Cycle
• Credit assessment – the firm may also need to carry out credit reference searches on potential
customers and counterparties to assess their financial standing.
• Standard (or standing) settlement instructions (SSIs) – this includes details of how customers will
pay for their investment purchases and how they wish to receive their settlement monies when selling
investments.
• Legal contract negotiation – this includes agreeing terms and conditions by the legal department
within the business that may be used in client agreements and terms of business.
• Client and counterparty agreements – these may need to be sent out to customers (depending
on the type of investment) and their written confirmation may be required before the firm can start
carrying out the activities that the customer has requested.
If a firm is advising a retail customer, or acting as an investment manager for a retail customer, or
arranging a pension opt-out or transfer for a retail customer, it must take reasonable steps to ensure
5
that it is in possession of sufficient personal and financial information relevant for the services that the
firm has agreed to provide. This could include information about income, other assets, outgoings, age,
investment objectives and attitude towards, and understanding of, risk. Potential customers may also
be credit-checked to confirm that they may be accepted as customers. They may also be sent a ‘terms of
business’ letter or may need to complete and return a client agreement letter.
5.3.1 Understand the components of the pre-settlement phase: transaction capture; trade
confirmation; asset and cash positioning; centralised clearing; calculation of collateral
5.3.2 Understand the key controls and indicators associated with the pre-settlement phase
The front-office support functions mainly ensure that trade information from the front office passes
smoothly and accurately into the position-keeping and settlement systems. In most organisations,
these post-trade activities take place within the operations department.
It generally involves the capture of transactions in the front-office systems and trade confirmation
processes.
• trends in the volume of transactions compared with the percentage handled manually
• the number of errors detected by reconciliations
115
• the time taken to detect and resolve the errors, and
• the number of transactions not captured within a specific time from trade execution.
Confirmations can be made electronically, by telephone, or in writing and their format is usually agreed
through a legal agreement signed by the two parties involved as part of the set-up activity. For some
products, such as listed derivatives and others that use a central counterparty (CCP), confirmation can
involve a high degree of automation by being performed electronically. For other products, such as
some uncleared over-the-counter (OTC) derivatives, confirmations are performed as part of a bilateral
agreement using hard copy documents that are largely standardised. This standardisation helps reduce
the risk of error and legal ambiguity and allows firms to design processes assuming consistent inputs.
Operational risk exists due to the possibility of disputes of transaction details, confirmation errors or
delays when confirming trades, all of which could result in the counterparty defaulting without the firm
having legal recourse.
• ensuring that a legal agreement covering confirmation protocol is in place prior to trading (a
preventative control)
• a confirmation checking function performed by a different person to the creator (an internal
detective control)
• front office sign-off of the economic terms of the confirmation (an internal detective control)
• follow-up actions to counterparties that have not returned written confirmations (an internal
detective control).
116
Operational Risks Arising in the Trade Cycle
5
3.1.3 Asset and Cash Positioning
The asset and cash positioning process ensures that there is sufficient stock or cash available at the
time of settlement to fulfil the settlement of a contract. Operational risk exists because positioning is
part of an overall inventory management process in which firms strive to make the most efficient use of
their resources. This means that stock and cash are continually being recycled and used in a way that will
generate the maximum return for the firm. Because of this dynamic process, there may be insufficient
assets available when they are required. This leads to two potential consequences:
• settlement being delayed, exposing the firm to interest claims, potential fines and reputational
damage
• higher borrowing costs – in order to ensure settlement, a firm may have to borrow cash or securities
at a higher cost than would otherwise be necessary.
• the use of internal funding deadlines by which time confirmation and transaction instructions must
be completed. These deadlines would allow enough time for the funding and settlement activities
to be completed (a preventative control)
• system limits to warn users that there are insufficient assets available to cover an upcoming settlement
(a detective control).
117
3.1.4 Centralised Clearing
The use of a centralised clearing system such as using a central clearing counterparty (CCP) is a means
practised on a number of exchanges and other structures globally to reduce credit risk. Futures and
options exchanges around the world have adopted a central clearing house system, and the same
approach has been applied to securities exchanges and to other markets (including energy contracts
and OTC derivatives).
The clearing house acts as a CCP, or guarantor of contracts, for the market and products concerned.
By this means, the clearing house assumes the credit risk, thereby limiting the exposure of its clearing
members by protecting them from the potential impact of the default of others. A leading UK CCP is
LCH and in the US, the CME Group also acts as a CCP and clearing house.
Rather than being involved in a direct counterparty-to-counterparty contract (and so assuming each
other’s credit risk), the clearing house acts as the CCP to each. If one clearing member defaults, the
clearing house will guarantee the performance of the contract to the other.
In order for clearing houses to be credible in their ability to reduce credit risk, they need to have
significant financial resources to cope with potential major market default events and scenarios. They
obtain these resources in a variety of ways, such as capital supplied by:
• their members
• their share capital and reserves
• the exchange, or
• other parties that do not have a direct relationship with the economics of their market.
For example, LCH has a series of sources providing financial backing. The major tranche of this support,
which is next in line after clearing member margin cover held, is the member default fund, to which
every clearing member contributes in cash (interest-bearing) according to the volume of its clearing
activities and size of open position.
Since the clearing house takes on the credit risk of all trades, it must manage the risk effectively. This
is done through stringent membership requirements, continuously reviewing the financial status
of existing members and employing position monitoring and margining. Position monitoring is
the analysis of an individual member’s exposure risk in relation to their ability to cover their margin
liabilities and delivery obligations. This is performed on an intra-day basis. Margining refers to the
practice of evaluating the risk to the clearing house of a member’s position and making collateral calls
to insure against the risk of the member’s default.
Two principal types of margin are taken into account by the clearing house when calling for margin at
the start of the day’s trading:
• Initial margin – which reflects the typical worst-case scenario of a one-day price move on all
registered open positions.
• Variation margin – based upon a mark-to-market calculation at the previous day’s closing prices,
which reflects the profit or loss on all registered open positions.
118
Operational Risks Arising in the Trade Cycle
Collateral has already been discussed in chapter 2 of this workbook. Collateral provides protection in
the form of security against the possibility of payment default by one or more of the parties associated
with a particular trade or trades. Collateral can be accepted in a wide range of forms, including cash,
government securities, letters of credit, equities and other measures. Collateral management relates to
the notification of, and verifying collateral transactions, in order to reduce the level of credit risk. It will
take into account the calculation, delivery and receipt of the collateral in order to meet margin calls.
5.4.1 Understand the components of the settlement phase: payment instructions; payment receipts;
5
securities transfers and custody
5.4.2 Understand the key controls and indicators associated with the settlement phase
5.5.1 Understand the components of the post-settlement phase: reconciliation; inventory
management; margin/collateral management
5.5.2 Understand the key controls and indicators associated with the post-settlement phase
5.6.1 Know the main types of corporate action: dividend and coupon payments; redemption of
fixed-income securities; rights issues; stock buy-backs; takeovers and mergers; conversion of
convertible bonds; proxy voting
5.6.2 Understand the main risks associated with corporate action processing: missed
announcements; complex structure of information and instruction flows between participants;
late election; incomplete or incorrect information or instructions
Traditionally, operations departments (also referred to as back office) exist to process and settle
transactions throughout the lifecycle of a trade. Their objectives are to:
• monitor the life of a transaction through to settlement, ensuring that key events are flagged and
acted upon when necessary
• fulfil the settlement, payment and other actions in respect of each transaction and position held
• provide the transaction, position and cash movement information used for the accounting function.
• transaction instruction
• settlement, and
• reconciliation.
119
As stated in section 2.2, in order to perform the transaction instruction activity effectively, firms will
hold SSI data for most of their counterparties. This allows the automation of the instruction process, as
SSI details are received when the counterparty is first set up in operational systems. In some cases, and
for some products, SSI details are not available when the settlement date approaches and a separate
transaction-specific instruction must be used. This introduces additional risk.
Automated trade confirmation and matching system (which link trading organisations with custodians
and other counterparties) are commonly provided by third-party systems vendors. One example is the
OMGEO service provided by the Depository Trust & Clearing Corporation (DTCC).
In order to reduce the chances of error and improve process efficiency, the ‘transaction instruction’
stage can sometimes be combined with the confirmation stage, whereby a single combined transaction
confirmation and instruction is sent.
Risks and controls are similar to the confirmation process described above.
3.2.2 Settlement
Settlement in securities operations is the physical delivery of an asset in exchange for an equivalent
amount in cash or payment receipt. The main operational risk is that the preceding steps in the process
break down, resulting in settlement failure or delay. This is exacerbated in markets that do not employ
true delivery versus payment (DvP) systems.
A risk indicator that measures the quality of the overall process is the number of times a firm settles late,
but this could also be affected by market influences.
3.2.3 Post-Settlement
Post-settlement refers to the stage immediately after the trade has settled as per the previous section.
This stage will typically include reconciliation and inventory management, along with margin and
collateral management. It also includes financial, management and regulatory reporting as covered in
chapter 6 of this workbook.
The firm has a duty of care to ensure that its customers’ trades are carried out in accordance with their
instructions and it is the firm’s responsibility to make sure that the customer is treated fairly at all times.
This requirement extends into the post-settlement phase as well.
3.2.4 Reconciliation
Firms will reconcile their records and positions of the trades after the trades have settled in order to
make sure that the correct amounts of assets and cash and assets were exchanged and that there is no
shortfall. Firms will reconcile as often as they need to with respect to customer assets held in custody in
order to demonstrate to the regulator that they have treated their customers fairly.
Inventory management involves how a firm keeps records of its customers’ cash and stock movements.
For example, if it uses an electronic system to record these details, then the firm must ensure that the
system is sufficient for this purpose.
120
Operational Risks Arising in the Trade Cycle
Reconciliation is an accounting/control function which ensures that the firm’s record of cash and stock
movements (the ‘internal world’) is accurate and, furthermore, agrees with its statement of balance
and holdings (the ‘external world’). It is a key detective control that ensures that the differences are
identified and resolved in a timely manner. It forms part of the post-settlement phase in the lifecycle of
a trade.
Reconciliation controls are typically applied to provide checks against a wide range of records, such
as cash, stock or (depot) accounts, collateral, margin, dealing positions, client money and custody
accounts.
The volume of unreconciled events (or ‘breaks’) is commonly used as a ‘risk indicator’ to assess the
quality of the transaction capture and processing activity. The more errors a firm detects when
reconciling its many positions after the settlement date has passed, the higher the level of risk the firm
5
may be exposed to. Reconciliation errors will involve more staff time in trying to resolve the issues,
leading to lower levels of productivity.
The amount of reconciliation breaks, as we have seen, is an important – KRI, along with the amount of
time spent by staff and other resources in rectifying the discrepancy. Other KRIs include the amount of
overtime being worked by the reconciliations team, the monetary cost of this overtime and any other
associated costs, for example, fines imposed by regulators for not following the correct reconciliation
procedures or not reconciling records on time. Unreconciled positions may also involve the payment of
interest or compensation claims to parties that have been disadvantaged.
• Dividends and coupon payments – these represent the income element of holding equities
(also called shares and common stock) and fixed-income securities (eg, bonds), respectively. Both
dividends and coupons are usually paid at a predefined frequency and can be a fixed or variable
amount depending on the security type.
• Redemption of fixed-income securities – most fixed-income securities have a maturity date
attached to them upon their creation, at which point the principal (the capital element) will be
returned to the investor.
• Rights issues – these are issues of shares that are offered at a discounted price by a company to its
shareholders in proportion to their existing shareholding. If a shareholder chooses not to take up a
rights issue, they can usually sell the rights to another investor.
121
• Stock buybacks – also known as share repurchase schemes or, simply, share repurchases, these
involve the company buying back its own shares from its shareholders. This is usually done in one
of two ways:
• through purchasing its own shares on the open market, or
• through a tender offer where its investors are (usually) offered a premium to sell a proportion of
their shares back to the company.
Whichever method is used, this has the effect of increasing the relative value of the remaining
shares for shareholders. Share buybacks are particularly common in the US, as they are much more
tax efficient than paying dividends; however, in recent years, share buybacks have come under
scrutiny. In March 2020, for example, the five largest airlines in the US – Delta, American Airlines,
United, Southwest and Alaska – had reportedly spent $44.9 billion on share buybacks and dividends
in the five years prior. Separate data showed those same airlines had spent 96% of their free cash
flow on buying back their own shares over the previous decade.
• Takeovers and mergers – when a company puts in a bid to take over another company. Takeovers
are in many ways similar to a stock buyback scheme, with the main difference being that another
company is attempting to buy the shares to obtain a majority shareholding and, therefore, gain
control of the company. The main difference between a takeover and a merger is that in a merger
both companies are in agreement to combine the two existing companies into one new company
whereas in a takeover this is not always the case.
• Conversion of convertible bonds – convertible bonds can be converted into a specified number of
shares, usually at a predetermined price. This gives the investor the flexibility to move away from the
fixed-income bond into an equity position in the same issuing firm.
• Proxy voting – most equities carry voting rights, essentially providing an investor with the ability
to vote on important decisions at shareholder meetings. Many investors choose to delegate voting
on their behalf to another individual or organisation rather than personally attend the shareholder
meeting; this is known as a proxy vote.
122
Operational Risks Arising in the Trade Cycle
Owing to the complexity of corporate actions, there are several risks to which securities firms are
exposed that give rise to the need to have appropriate controls in place, including good quality and
timely information feeds on corporate actions. This gives firms time to respond appropriately and in line
with client instructions.
The main risks associated with corporate actions processing fall into two categories – financial, where
clients or counterparties claim compensation as a result of errors and omissions, or reputational, where
client or market relationships are damaged, potentially resulting in the loss of future business. There are
a number of risk events associated with the processing of corporate actions, including the following:
• Missed announcements – if an announcement is missed then it is likely that the underlying client
will not have had the opportunity to respond.
• Complex structure of information and instruction flows between participants – the complexity
5
of asset servicing is further increased in a global marketplace, particularly where there are many
market counterparties, such as brokers, investment managers, custodians, subcustodians, and
transfer agents. Timing differences and different methods of communication all increase the
possibility or error.
• Late elections – corporate actions have a deadline associated with them; failure to respond within
the deadline can result in financial loss for the underlying clients. Many corporate actions will have
a ‘default’ option. Failing to respond in time usually triggers a default election; this may be contrary
to the client’s wishes.
• Incomplete or incorrect information or instructions – this can result in the information or
instruction being rejected, or the wrong election being made; this could result in even greater
financial loss, for example, if the firm acted contrary to client instructions in error.
Where a corporate action has been processed in error, such as an incorrect instruction, it can be harder
to place a financial value on the error and this may damage the client relationship.
With the increasing focus on environmental, social and governance (ESG) criteria, some organisations
are holding positions in securities purely to influence the decision-making of the underlying firms to
bring about positive change. Proxy voting essentially helps to steer management in the right direction
from an ESG perspective (eg, reducing carbon emissions, improving working conditions, and separation
of powers on the board respectively). An alternative to voting is shareholder engagement, whereby
shareholders (as partial owners of a business) may enter into dialogue with management to encourage
behavioural change and address serious ESG issues.
The value of any margin or collateral held during the transaction instruction and settlement phases will
need to be closely monitored to ensure that it remains sufficient to cover the potential exposure should
one party default on their obligations. The value of any margin or collateral held will be marked to
market, ie, compared against the current price of the asset in the relevant market. The value of margin or
123
collateral held will, in practice, be monitored on a daily basis, either on an end-of-day basis or an intra-
day basis and any shortfall in the value will need to be notified to the obligor so that additional margin
or collateral may be requested and supplied.
A ‘margin call’ is the request for additional funds when a margin account falls below the minimum
requirement to be deposited. The need for a margin call will typically arise as a result of an adverse
change in the value of the asset or contract.
Whenever the firm has less cover for margin or collateral than it requires, it is exposed to potential risk.
New trades may be processed without a problem and may settle on their intended settlement date.
However, sometimes the trade may not settle in accordance with the market practice applicable,
leading to possible brokers’ claims, payment of interest or compensation along with decreases in the
level of customer satisfaction. These results of poor post-settlement processes can be used by firms as
KRIs to assist them in monitoring the level of operational risk that they are exposed to.
3.2.8 Record-Keeping
The FCA has set high-level rules for records that are maintained by authorised firms in the UK. Firms
must arrange for orderly records to be kept of their business and their internal organisation, including
all services and transactions undertaken by them. The medium for holding records is not prescribed, but
the records should be capable of being reproduced in English and on paper. This includes a requirement
to provide a translation if the records are retained in a language other than English. Records do not need
to be readily accessible, but must be capable of being retrieved within a suitable timescale to meet the
needs of the firm, its customers and the regulators.
The general principle for retention periods for records is that they should be retained for as long as
relevant to the purposes for which the record was made. However, in addition to these high-level
requirements, there are more specific record-keeping rules pertaining to certain types of business (the
rules are outside the scope of this particular syllabus). While the exact length that records must be
retained depends on the products involved, generally all records of transactions must be kept for at
least five years in the UK.
Firms will most probably have software systems that will be used to capture, manage, store, preserve
and deliver records relating to organisational processes and customer records. The management of
records is of growing importance for the financial services sector in order that firms meet the regulators’
requirements and also those of the firms themselves.
124
Operational Risks Arising in the Trade Cycle
2. Give six examples of controls that may be used in a front office to reduce risks.
Answer Reference: Section 2.1
3. Give three examples of key risk indicators (KRIs) that may be used by the front-office support
functions when capturing transactions.
Answer Reference: Section 3.1.1
5
4. What is positioning?
Answer Reference: Section 3.1.3
8. Why does a financial services firm need to manage the amount of margin or collateral that it holds?
Answer Reference: Section 3.2.7
125
126
1
Chapter Six
6
for the firm will include those dealing with business
continuity, health and safety, information security
and physical security.
129
1.2 Middle and Back Offices
Learning Objectives
6.2.1 Understand the role and responsibilities of the middle- and back-office functions in managing
operational risk
6.2.2 Understand the role of the following reporting functions in the context of operational risk:
transaction; trade
• the front office includes sales and trading personnel, investment managers and corporate finance
• the middle office supports the front office and acts as a point of control, which may include control
over an outsourced provider, and
• the back office, generally referred to as ‘operations’, provides administrative and support services.
At every stage during the operations processes, there is potential exposure to an array of different risks.
Systems must be designed and personnel trained to allow the institution to be continuously alert to
these risks and to detect, prevent and measure them. The exact nature of risks can vary according to the
business and service type, but many aspects are common.
The middle office is responsible for helping manage operational risks that the firm may be exposed to.
It will have systems in place to ascertain and assess the types of client the firm has, their risk profiles and
their risk requirements, as not all clients have the same wants and needs. The middle office ensures that
due diligence is correctly carried out before being passed to the back office by:
• ensuring that trades are correctly booked onto the various systems and that all procedures are
being correctly followed by traders, salespeople and other related business functions
• monitoring existing trades, which may involve making amendments for rate re-fixes, processing
trade unwinds and assignments of existing positions and also overseeing collateral management
• revaluing portfolios, including the maintenance and verification of market data inputs and daily and
monthly profit and loss calculations
• reporting profit and loss positions, risk and process metrics
• providing a point of contact as well as a point of control over an outsourced provider (further
information on outsourcing can be found in section 3.8.3 in chapter 3).
Often, monitoring corporate actions and ensuring proper response from traders or investment
managers is also a function carried out by the middle office.
The back office (or ‘operations’) refers to the administration and support personnel in a financial services
company. It carries out functions such as settlement, clearing, record maintenance, asset servicing and
interface with regulatory compliance and accounting.
130
The Support and Control Functions
By managing these activities expertly, it helps to manage operational risks by ensuring that the correct
settlement instruction information is added to the trade, that the trade is correctly confirmed and
affirmed, and that the trade settles correctly on its intended settlement date. The back office ensures
that:
• actual exchanges and deliveries of money and assets between the firm and its various counterparties
are arranged, monitored, verified and fulfilled
• settlement instructions are rigorously maintained and checked
• flows between cash nostro accounts and deposit accounts at securities depositories are correctly
managed.
The various participants in the financial markets, including banks, brokers, fund managers, regulators
and clients, all require transparency for there to be orderly and efficient markets. Regulators state
that details of each trade, whether a buy or sell order, must be reported to the market, which, in turn,
makes the trade details public, while complying with client confidentiality rules. The market is usually
represented by an exchange. Trade-reporting regulations require firms to report details of the trades,
6
including such aspects as the date of the deal, the time of the deal, the price of the deal, the volume
traded, the stock traded and the identifier of the firm transacting the deal. Trade reporting takes place in
near-real time via an approved publication arrangement (APA).
Transactions need to be reported to the relevant regulators and trade repositories for different reasons.
Transaction reporting is needed by regulatory authorities in order to identify possible instances of
market abuse and the data is not made available to other market participants. Transaction reporting
takes place generally within one business day after the date that the trade was made and is referred to
as ‘T+1’, where the ‘T’ stands for trade date. Specialist-reporting service provider companies, referred to
as approved reporting mechanisms (ARMs), are approved by the regulator for this purpose.
Firms must ensure that they comply with the regulatory authorities and will set up their own reporting
functions whose responsibility it will be to ensure that both trade reporting and transaction reporting is
carried out in accordance with these rules.
1.3 Compliance
Learning Objectives
6.3.1 Understand the role and responsibilities of the compliance function in relation to operational risk
6.3.2 Understand the consequences of compliance risk
Compliance with regulatory requirements and ethical conduct standards is a major concern to boards of
directors and senior executives because they are held accountable and personally liable for violations.
In a complex and decentralised business environment, corporations must institute consistent, firm-
wide compliance policies and procedures to prevent litigation and reputational damage and meet
shareholder accountability demands. The compliance function may not be directly responsible for the
ethical issues of the firm, but, in practice, overseeing the conduct of the firm is the responsibility of the
compliance function. Ultimately, it is the board of directors that will take responsibility for the ethics,
behaviours and values at the firm.
131
In the UK, the Financial Conduct Authority (FCA) sets standards and guidelines that address how firms
should act in line with proper conduct and ethics towards their customers.
Under the UK Markets in Financial Instruments Directive (UK MiFID), which was adopted in 2007, it is a
requirement for sufficiently large firms, to have an independent and permanent compliance function.
This independent function must have sufficient authority and be structured, resourced and operated
effectively. In smaller firms, compliance with regulation is also mandatory and the use of external
compliance support services may be utilised to meet regulatory requirements.
Compliance risk is intimately tied up with operational risk because it is often the breakdown in
processes, procedures and a weak control culture that allows compliance risk to be realised. For
example, compliance risk may arise if:
The compliance function in a firm exists to combat this risk. This compliance function defines the
programmes and processes and their related accountability. Its objectives are to ensure:
• Good corporate governance by defining the way the board of directors and senior executives
execute and govern the company’s overall compliance strategy and ethical mission.
• Organisational integrity through the development of ethics and integrity programmes. These
define the training and communication programmes and related accountability processes (such as
a self-assessment process) that exist to motivate, measure and monitor the organisation’s ethical
performance.
• Regulatory compliance by defining the programmes and processes that measure and monitor
the extent to which the organisation adheres to existing laws, regulations, industry guidelines and
general business norms or conventions.
In many firms, the compliance function is also one of the top-level internal policy-makers for risk
control across all functions and covers key areas of market, credit and operational risk. When
operating successfully, the compliance role balances the limiting effects of necessary controls with the
empowerment of the workforce to operate within clear boundaries (which may be enforced by other
functions).
The policies and procedures that the compliance function generates are designed to meet these
objectives and to provide direction and clarity to the firm’s employees. Its responsibilities are wide,
covering all aspects of the business and interacting with all of the firm’s functions.
132
The Support and Control Functions
• Good practice – the compliance function keeps abreast of good practice in the industry and the
recommendations of the regulators. It ensures that the following are incorporated into the firm’s
policies:
• advice for business units on regulatory issues
• compliance monitoring
• communication with the regulatory authorities and reviewing regulatory policy initiatives
• routine compliance duties such as staff registration and staff dealing approval.
• Regulatory reporting requirements – this covers the reporting of required information to the
relevant regulators. Compliance will ensure the firm sets policies for requirements such as:
• financial accounts
• client money and client asset returns
• lists of authorised traders, counterparties and products
• transaction and position reporting.
• Employee conduct – the compliance function will ensure that employees are provided with clear
6
guidelines and training reflecting law, industry regulations and the firm’s expectations. The issues
that would be addressed include:
• insider dealing and other forms of market abuse
• acceptance of gifts
• client entertainment
• whistleblower protection
• conflicts of interest
• relationship with competitors
• relationship with the media
• confidentiality, and
• money laundering.
• fraud
• insider dealing and other forms of market abuse
• money laundering
• exposure violations
• non-compliance with regulatory requirements, eg, mis-selling
• non-cooperation with regulatory investigations
• unauthorised trading
• anti-bribery control failures, and
• concealing losses.
The firm may also have to pay damages, contracts may also be voided, and reputational damage may
occur, all of which could materially impact the firm.
133
1.4 Financial Reporting and Regulation
Learning Objective
6.4.1 Understand the role of the financial reporting and regulatory function in the context of the
operational risk environment
The financial reporting and regulatory function exists to ensure that the firm’s assets, liabilities, profit
and loss (P&L) are accurately compiled and reported on their financial statements.
We have already discussed the importance of the reporting and escalation stage of the risk management
process in chapter 3. Reporting involves defining periodic reports in consultation with their intended
audience and ensuring that ‘real-time’ escalation systems and procedures are implemented. These
procedures need to have predefined thresholds that define how high up the management structure the
issue needs to be escalated and who is responsible for escalating it.
Risk reporting involves communicating the losses, exposure and risks to the right level of management
in the firm, including escalating the details to the board of directors. Its functions are to:
It is necessary to report risk internally (across and up the organisation to internal stakeholders) and
externally (to clients, regulators, auditors and analysts). A firm’s risk policy should also include controls
to ensure that the right reports are received by the right people at the right time to support their
decision-making.
Risk reporting allows for the re-use of risk information that has been collected by the firm for other
processes and negates the need to conduct other risk assessments on the same matter for other
purposes.
It is important to make sure that the type of information to be collected is clearly defined, including the
time at which it is required and the timescale to which it relates. It is also important to ascertain what
methods should be used to report and communicate the findings.
Accounting risk is the risk of inaccurate financial reporting. Its effects are poor management decision-
making (based on incorrect information), and regulatory non-compliance. These effects can lead to the
consequences of direct and indirect loss such as fines and penalties.
Accounting errors can also conceal already realised losses. These can often go undetected for a long
period as they become lost among other problems and causes.
134
The Support and Control Functions
The financial reporting and regulatory functions perform both internal reporting and external reporting:
Operational risk is inherent in the policies, processes or procedures that ensure accurate financial
reporting. If these break down, accounting risk can be realised. For example:
• Traders misreporting a transaction’s details in the trading book to make it appear more profitable.
The key control is to validate front-office positions on a daily basis as part of the daily reporting
function. This is done by reconciling front-office positions (the trader’s view of the world) with the
back-office positions (which, when the transactions have settled, should represent the external view
of the world). Some firms call this activity the ‘product control function’.
• Misreporting accounts because of complex aggregation rules. Financial institutions usually report
6
internally by trading book because information is collected at the trader’s book level in order to
assess trader performance. However, they are required to report externally at a legal entity level.
For this reason, the financial reporting systems need to aggregate information to the entity and
group level. While this might seem a simple process in theory, in practice, it can prove very difficult
due to poor system integration and the lack of an overall view of the business (both of which are
operational risks).
• A trader is focused on the future – ie, trying to predict what a market will do – while the accounting
function focuses on the past, ie, ensuring that what has been traded is accurately reported. This can
occasionally create a tension between the front office and the accounting function. The intention must
be to develop a good relationship, to foster open communication and to avoid operational difficulties.
• Changing accounting standards in the industry can lead to confusion in the interpretation of
regulations and reporting requirements.
• Mergers and takeovers can exacerbate accounting risk by adding to the fragmentation of the
business view. It takes time for a company to understand the full financial details of the merged
company and to incorporate these efficiently into the financial reporting of the new firm.
6.5.1 Understand the role of the HR function in the context of the operational risk environment
Operational risk exists throughout the human resources (HR) process. Among other things the HR
function is responsible for:
135
• establishing and maintaining a formal policies and procedures manual, incorporating benefits for
employees, and
• maintaining employee records.
In addition, there may be instances where the HR function supports business strategy and initiatives,
such as mergers and acquisitions which may involve aspects such as employee assessments, salary
reviews and benchmarking. There may also be some legal aspects such as the Transfer of Undertakings
(Protection of Employment) Regulations 2006 (TUPE) or observing employee consultation requirements
laid out in legislation. In recruiting new employees, HR must also consider how potential hires fit with,
and affect, the culture of the firm, as this is important to how well the operational risk is managed.
6.6.1 Understand the role of the internal audit function in relation to operational risk
6.6.2 Know the requirements of the MiFID directive in respect of the internal audit function
Internal audit plays an important role in the risk control framework. It provides an independent, internal
assessment of the effectiveness of the firm’s controls and procedures. It also independently assesses the
effectiveness of the risk management process.
Under MiFID, it is a requirement for each firm to have an ‘independent internal audit function’ if it is
appropriate and proportionate, which must again have sufficient authority and be structured, resourced
and operated effectively. The independent periodic review of all transaction life-cycle activities is an
important safeguard for senior management in ensuring the integrity of the internal control structure.
It also ensures that management information systems are operating effectively through independent
testing and validation.
By performing reviews, internal audit assesses control effectiveness, questioning whether an institution’s
processes and procedures are:
• adequately controlled
• up to date, and
• practised in accordance with manuals and documentation.
Internal audit must have an unrestricted mandate to review all aspects of the transaction life cycle and
be totally independent of senior managers and their departments who are subject to the review. There
is a crossover with the operational risk management process in that both involve the identification
of risk issues. However, auditing focuses on checking the control environment on a ‘snapshot’ basis
(eg, once every six months), highlighting issues (audit points) and reporting, tracking and validating
remedial action taken by the business. On the other hand, operational risk management monitors
risk on a continuous, day-to-day basis, as part of the process allowing more dynamic and strategic
management. Audit information should, therefore, be used as an input to operational risk management.
Audit points can also be used as risk indicators.
136
The Support and Control Functions
6
Both internal and external audits can be powerful enablers of change. As part of the cultural change to
a more risk-aware outlook, the company’s desire to resolve audit issues can significantly raise the profile
of the need for effective risk management.
6.7.1 Understand the role of the IT function in the context of the operational risk environment
Operational risk exists throughout the IT process, from strategic decisions about IT, through managing
projects, to design, implementation and maintenance.
The IT function is typically divided into four separate departments within a financial services firm:
• support – these provide an ‘on-call’ service that provides urgent assistance in the event of IT failures
or problems
• infrastructure – these are responsible for the smooth provision of computer systems which run the
day-to-day business, including information security and access control
• architects – these are involved in designing, developing, testing and implementing new systems
• project managers – these control specific projects within the IT function, involving budgeting,
timing estimation and progress monitoring. They will also liaise between IT and the users of the
systems, ie, the other business functions of the firm.
137
The technology causes of operational risk have already been explained in chapter 4, and the risk
management responsibility for these causes sits within the IT function. In summary, its broad
responsibilities include:
• highlighting and managing deficiencies in the design or operation of all systems that support the
firm’s activities
• protecting the organisation from system security issues such as viruses and hacking
• ensuring that information held on systems is secure
• ensuring system development keeps pace with rapidly evolving user requirements, and
• ensuring that systems integrate effectively, thereby minimising manual intervention and data
integrity issues.
In addition to representing an area where risk must be managed, the IT function has also provided
innovations for reducing risks within the firm. For example, banks are increasingly using new
technologies such as artificial intelligence (AI) and machine learning (ML) for credit scoring and
improving the performance of the loan book.
1.8 Legal
Learning Objectives
6.8.1 Understand the role of the legal function in the context of the operational risk environment
6.8.2 Know the common legal areas where operational risk issues arise
Legal risk is the risk of loss due to legal issues brought about by an inability to enforce legal contracts,
licences, ownership rights, patents or documents. Legal risk could also arise from inadvertently
agreeing to contractual conditions, such as providing an indemnity to the contracting party, therefore,
transferring the risk from the party to the firm. The legal function’s role is to manage risk by ensuring
that:
To do so, this function must implement effective policies and procedures, the effectiveness of which
depends on how well the operational risk issues are managed.
The legal function is critical at the set-up stage when legal agreements are negotiated prior to trading.
Such agreements (which can be at the entity, product or transaction level) are designed to cover any
legal eventuality that may reasonably occur, as agreed by the business line, during the course of the
contract.
138
The Support and Control Functions
• Contract formation – ensuring the appropriate legal documentation is in place and is satisfactory
prior to trading. Getting the contract details right at the outset is one of the main responsibilities
of the legal function. The best way to avoid legal risk is to produce contracts that are clear and rely
on predefined, approved wording for consistency. This should be done in conjunction with advice
from the relevant business area. This could also include decisions about the exact legal structures
of various investment vehicles, which if not taken carefully can lead to everything from competitive
disadvantage and low uptake by clients, to incurring unforeseen losses due to contradictory
requirements or opaque risk controls.
• Legal names – confirming the counterparty’s legal name helps to establish the legal, contractual
rights of each party.
• Jurisdiction – law in one jurisdiction may not apply, or apply differently, in another.
• Netting arrangements – netting is used as a means of reducing credit risk. The terms or rules for
6
netting must be contractually agreed and care taken to ensure enforceability.
• Collateral arrangements – ensuring that all collateral arrangements are legally enforceable and
cover the assets intended.
• Power to transact – ensuring the counterparty has the legal power to transact, ie, that it is not
acting beyond its legal authority – a term legally known as ultra vires.
• Employee authority – ensuring that the counterparty’s employees have the appropriate authority
to transact on behalf of the firm.
• Fiduciary responsibilities – ensuring the fiduciary responsibilities of a firm are understood. A
fiduciary is an individual, corporation or association holding assets for another party, often with the
legal authority and duty to make decisions regarding financial matters on their behalf.
• Client relationship – ensuring the maintenance of an arm’s length relationship with the client (via
the legal agreement) and disclosure of the relevant risks. There must be clarity between an arm’s
length relationship and an advisory relationship.
6.9.1 Understand the role of the product development and marketing function in the context of the
operational risk environment
The product development function deals with the creation of new, and also the adaptation or
modification of, existing products and services that will offer customers new or additional benefits.
Products or services may need to be developed to help satisfy a newly defined customer need in the
marketplace or to compete with rival firms. The marketing function plays a critical role in linking sales,
development, customers and potential customers of a business. Typical responsibilities of the product
development function and the marketing function include:
139
• promoting ideas, goods or services to an identified target market
• ensuring all promotional material is appropriate and compliant
• managing distribution and logistics strategies, and
• understanding competitors and the market fully.
The product development and marketing functions will also have a responsibility to ensure that the
business does not grow too rapidly, which could result in the firm not having enough resources to cope
with the increase in demand for its services, for example, an insufficiency of staff, IT systems or related
infrastructure. This also needs to be balanced with having an optimum level of business to ensure survival.
Linked in with the product development and marketing functions will be a communications function
(covering both external and internal communications) and an investor relations function.
6.10.1 Understand the role of the project management and change management function in the
context of the operational risk environment
The project management team aims to bring about the successful completion of specific project
goals and objectives. Where multiple projects are being managed in conjunction, this is referred to as
‘programme management’.
The change management team ensures that any required changes are implemented in a controlled
manner by following a predefined framework or model. The various operational risks faced by both of
these functions will need to be identified and managed throughout the process.
Operational risk may increase during a transitional period; for example, as a result of a change in
regulation, introduction of a new system or a change in policy or procedure, particularly during the
period where the change is still relatively new and unfamiliar. This risk can be increased further where
the business areas affected have high workloads and low experience.
For example, a new system has been deployed and is being run in parallel for a period of time. During
this phase, transactions are being keyed manually into both systems, resulting in higher workloads for
the team affected. A reconciliation of the two databases identifies that key fields are being incorrectly
populated in the new system. Further investigation identifies that this is due to a lack of training on the
new system and an insufficient understanding of how these key fields are being used.
140
The Support and Control Functions
2. What is the difference between the middle office and the back office function?
Answer Reference: Section 1.2
5. What three questions does the internal audit function seek to answer when performing reviews?
6
Answer Reference: Section 1.6
6. What is the difference between the role of the internal audit function and the role of the risk
management function?
Answer Reference: Section 1.6
7. What is the difference between the project management function and the change management
function?
Answer Reference: Section 1.10
141
142
1
Chapter Seven
7
This syllabus area will provide approximately 4 of the 50 examination questions
144
Operational Risk in the Regulatory Environment
1. Introduction
This chapter describes the main events that have
occurred in the development of standard practices
and regulations with respect to operational risk
management, culminating in the publication of
the Basel Accords. Basel II included an explicit
treatment of operational risk for the first time and
represented a watershed in the drive for common
standards and protection.
7
These guidelines have evolved as a result of
global research, surveys and investigation into the
disparate methods of understanding, assessing and
managing operational risk.
145
2. Market Developments
Learning Objective
7.1.1 Know how the following directives, regulations, codes and regimes impact operational risk:
corporate governance; Sarbanes-Oxley; MiFID, MiFID II, MiFIR; Dodd-Frank; FATCA; conduct
risk, GDPR; SFDR
As the acceptance of the importance of operational risk has grown, there has been a gathering
momentum from international regulators to ensure that it is managed in an objective and consistent
manner. There is now an accepted belief that it should be assessed separately from credit risk and
market risk perspectives, and that regulatory capital should be provided for addressing operational risk
separately.
The concepts for risk management have been developed by the industry to the point where several
reasonably sophisticated techniques are now being employed. However, there is no commonly
accepted approach, nor is there a convincing argument that there should be one. Unlike credit risk
and market risk, operational risk involves the assessment and management of risks whose cause can lie
outside a firm’s control and whose effects are not capable of being limited or capped. In addition, each
firm has a unique environment and a unique risk appetite, so it is becoming accepted that operational
risk will be managed differently as a result. This is understood by the regulators and is being reflected in
their new rules.
Each of these sections is further supported by a number of related principles which can be found in
table 8.1 below.
146
Operational Risk in the Regulatory Environment
Table 8.1
7
e. The board should ensure that workforce policies and practices are
consistent with the company’s values and support its long-term
sustainable success. The workforce should be able to raise any
matters of concern
f. The chair leads the board and is responsible for its overall
effectiveness in directing the company. They should demonstrate
objective judgement throughout their tenure and promote a
culture of openness and debate. In addition, the chair facilitates
constructive board relations and the effective contribution of
all non-executive directors, and ensures that directors receive
accurate, timely and clear information.
g. The board should include an appropriate combination of executive
and non-executive (and, in particular, independent non-executive)
directors, such that no one individual or small group of individuals
2. Division of responsibilities
dominates the board’s decision making. There should be a clear
division of responsibilities between the leadership of the board
and the executive leadership of the company’s business.
h. Non-executive directors should have sufficient time to meet
their board responsibilities. They should provide constructive
challenge, strategic guidance, offer specialist advice and hold
management to account.
i. The board, supported by the company secretary, should ensure
that it has the policies, processes, information, time and resources
it needs in order to function effectively and efficiently.
147
The 18 Principles of the Corporate Governance Code 2018
Section Principle
j. Appointments to the board should be subject to a formal, rigorous
and transparent procedure, and an effective succession plan
should be maintained for board and senior management. Both
appointments and succession plans should be based on merit
and objective criteria and, within this context, should promote
diversity of gender, social and ethnic backgrounds, cognitive and
personal strengths.
3. Composition, succession
k. The board and its committees should have a combination of skills,
and evaluation
experience and knowledge. Consideration should be given to
the length of service of the board as a whole and membership
regularly refreshed.
l. Annual evaluation of the board should consider its composition,
diversity and how effectively members work together to achieve
objectives. Individual evaluation should demonstrate whether
each director continues to contribute effectively.
m. The board should establish formal and transparent policies and
procedures to ensure the independence and effectiveness of
internal and external audit functions and to satisfy itself on the
integrity of financial and narrative statements.
4. Audit, risk and internal n. The board should present a fair, balanced and understandable
control assessment of the company’s position and prospects.
o. The board should establish procedures to manage risks, oversee
the internal control framework, and determine the nature and
extent of the principal risks the company is willing to take in order
to achieve its long-term strategic objectives.
p. Remuneration policies and practices should be designed to
support strategy and promote long-term sustainable success.
Executive remuneration should be aligned to the company’s
purpose and values, and be clearly linked to the successful
delivery of the company’s long-term strategy.
q. A formal and transparent procedure for developing policy on
executive remuneration and determining director and senior
5. Remuneration
management remuneration should be established. No director
should be involved in deciding their own remuneration outcome.
r. Directors should exercise independent judgement and discretion
when authorising remuneration outcomes, taking account of
company and individual performance, and wider circumstances.
The board should use general meetings to communicate with
investors and to encourage their participation.
148
Operational Risk in the Regulatory Environment
While this set of principles applies only to companies listed on the London Stock Exchange (LSE),
private companies are also encouraged to conform; however, there is no requirement for disclosure of
7
compliance in private company accounts.
2.2 Sarbanes-Oxley
Sarbanes-Oxley is a very significant piece of US legislation that was enacted in 2002 following major
corporate failures and accounting scandals.
The principal purpose of the legislation was to protect investors by improving the accuracy and
reliability of corporate financial reporting and disclosures.
Following sharp stock market falls in 2001, particularly the collapse of technology, media and telecom
stocks that resulted in significant investor losses, the New York Attorney General conducted an
investigation into the quality and impartiality of advice given by research analysts.
Serious conflicts of interest in the production of investment research were uncovered and US regulatory
action therefore followed with the enactment of the Sarbanes-Oxley Act 2002. The Act brought in
new rules relating to public company accounting, auditor independence, corporate responsibility and
analysts’ conflicts of interest. It also gave the US Securities and Exchange Commission (SEC) the power
to regulate or to require securities associations and national securities exchanges to create rules to
protect investors and the public interest. Subsequently, many more rules have been introduced, for
example, the requirement that analysts now certify the truthfulness of their views and disclose if they
have received payment for them.
149
2.3 MiFID, MiFID II and MiFIR
The Markets in Financial Instruments Directive (MiFID I) is a large piece of EU legislation affecting all
financial firms in the EU and the UK. Coming into force in 2007, the main objectives of MiFID I were
to increase competition and investor protection, in addition to levelling the playing field for market
participants in financial services. This was significantly amended in 2018 by MiFID II and the Markets in
Financial Instruments Regulation (MiFIR), which was one of the most complex pieces of regulatory
change the financial industry has ever seen.
In brief, MiFID II and MiFIR seek to enhance the protections offered by MiFID I, which has been criticised
for not going far enough in order to protect investors. The key difference between them is that MiFID
sets out the goals that EU member states should strive to meet, while MiFIR imposes rules that all
countries must follow.
MiFID was transposed into the FCA Handbook upon its implementation. For MiFIR, this framework was
transposed and implemented into UK law following the end of the UK’s transition period with the EU,
under the EU (Withdrawal) Act 2018 (as amended by the European (Withdrawal Agreement) Act 2020),
in a process known as ‘onshoring’.
Initially, the degree of similarity between UK MiFID and EU MiFID, and between UK MiFIR and EU MiFIR,
was high. However, the UK and the EU have since been making amendments to their respective MiFID
and MiFIR regimes in order to address any aspects that they identified are not working effectively, such
that the regimes are now diverging.
The implementation of MiFID had a significant impact on financial services regulation in the UK, how
firms operate their businesses and the way they interact with their customers.
Most firms that fall within the scope of MiFID will also have to comply with the Capital Requirements
Directive (CRD), which sets requirements for the regulatory capital that a firm must hold.
MiFID requires financial services firms to have an effective risk management policy in place, together
with internal control mechanisms that are appropriate to each individual firm. Firms are asked to
identify the risks relating to their activities, processes and systems and to set their risk tolerance level.
There were many changes for financial firms including client classification, best execution, information
that is provided to clients, execution-only business, suitability and conflicts of interest.
The MiFID requirements for compliance and internal risk functions are broadly the same as the rules of
the then UK financial services regulator, the Financial Services Authority (FSA), that were already in
place at that time, including the following:
• Firms must establish and maintain policies and procedures aimed at ensuring effective compliance.
• Firms must establish procedures that identify the risks associated with a failure by the firm to
comply with its obligations.
• Firms must establish a monitoring programme to regularly assess and review any inadequacies or
deficiencies arising in the firm’s compliance and address any issues arising.
• Firms must have an independent compliance function (unless inappropriate or impractical to do so)
which possesses the necessary authority and is structured, resourced and operated effectively.
150
Operational Risk in the Regulatory Environment
• Firms must appoint a compliance officer who has the necessary authority and also the responsibility
for the compliance oversight function.
• If appropriate and proportionate, firms must establish and maintain an internal audit function which
is separate and independent.
• Firms must establish, implement and maintain adequate risk management policies and procedures
which identify and set the tolerable level of risk relating to a firm’s activities including employees’
compliance with them.
• Firms must have a separate risk control function, if this is proportionate, depending on the nature,
scale and complexity of its business. The risk function must document the organisation and
responsibilities of the risk assessment function.
2.4 Dodd-Frank
The Dodd-Frank Wall Street Reform and Consumer Protection Act (more commonly known as the Dodd-
Frank Act, or simply, ‘Dodd-Frank’) is a far-reaching piece of legislation in the US. It was enacted in July
2010 and was made law following the global financial crisis of 2007–08, with the aim of preventing
another one by improving the level of accountability and transparency in the US financial system. It also
aims to end the concept that a US firm is ‘too big to fail’ so as to protect the US taxpayer by ending the
system of providing bailouts to struggling firms and also to protect consumers from abusive financial
services practices.
7
One particular measure within Dodd-Frank requires that high-risk over-the-counter (OTC) derivatives,
such as credit default swaps (CDSs), are regulated in the US by the SEC or the Commodity Futures
Trading Commission (CFTC). The intention is that firms that take excessive risks can be identified and be
brought to the attention of the US regulators before another major financial crisis occurs.
This US law, therefore, makes it more difficult for both resident and non-resident US persons to own
assets that are not held in the US itself.
151
Conduct risk has been closely linked to the FCA’s Fair Treatment of Customers (FTOC) initiative. Initially
called Treating Customers Fairly (TCF), FTOC looks at what a fair deal for retail consumers should actually
mean and look like in practice. The FCA has defined six consumer outcomes to explain to firms what it
believes TCF/FTOC should do for its customers:
1. Consumers can be confident that they are dealing with firms where the fair treatment of customers
is central to the corporate culture.
2. Products and services marketed and sold in the retail market are designed to meet the needs of
identified consumer groups and are targeted accordingly.
3. Consumers are provided with clear information and are kept appropriately informed before, during
and after the point of sale.
4. When consumers receive advice, the advice is suitable and takes account of their circumstances.
5. Consumers are provided with products that perform as firms have led them to expect, and the
associated service is both of an acceptable standard and as they have been led to expect.
6. Consumers do not face unreasonable post-sale barriers imposed by firms to change product, switch
provider, submit a claim or make a complaint.
Whilst there are similarities between conduct risk and TCF, conduct risk is considered to be wider in
context. It is expected that conduct risk can broadly be managed in the same way that firms manage
their operational risks. Many conduct risks may already be included as operational risks in the first place.
Firms are expected to identify, measure, mitigate and monitor their conduct risks.
An example of a conduct risk might relate to the governance procedures around the products of a firm,
ie, how they are created, considered, signed off, marketed and distributed, and reviewed on an ongoing
basis.
The GDPR also introduced the role of a data protection officer (DPO), an individial who has overall
responsibility to ensure the organisation processes data in accordance with several principles, as
highlighted below:
152
Operational Risk in the Regulatory Environment
In the UK, the GDPR is regulated by the Information Commissioner’s Office (ICO) and penalties for non-
compliance can be up to £17.5 million or 4% of global turnover.
Globally, privacy laws have in recent years seen an increase in adoption across non-EU countries, such as
Turkey, China, Canada, as well as a growing number of state-level privacy laws within the US. Following
the UK’s departure from the EU (Brexit) UK GDPR was introduced on 31 January 2020. It is essentially a
continuation of the EU regulation enshrined into UK Law.
• Article 6 – products either integrate environmental, social and governance (ESG) risk considerations
into the investment decision-making process, or explain why sustainability risk is not relevant, but
do not meet the additional criteria of Article 8 or Article 9 strategies.
• Article 8 – products promote social and/or environmental characteristics, and may invest in
sustainable investments, but do not have sustainable investing as a core objective.
• Article 9 – products have a sustainable investment objective.
The SFDR provides a common taxonomy for sustainability and is expected to reduce ‘greenwashing’
7
(the practice where firms make false claims about the sustainability of their products), thus making it
easier for consumers to compare the products and services of financial institutions on the basis of their
environmental impact.
3. Basel Accords
3.1 Introduction
Learning Objectives
7.2.1 Know the basic requirements of the operational risk aspects of: Basel Accords; the Capital
Requirements Directive
7.2.2 Understand the main operational risk features of the Basel Accords
153
Having set capital adequacy standards for banks in respect of credit risk since 1988, the Basel Committee
began addressing the need for setting aside additional capital for both market risk and operational risk
during the 1990s in response to market events including the Barings crisis and other high-profile cases.
The original requirement for banks to hold capital of at least 8% of their risk-weighted assets has gradually
been extended over the years. Market risk as a result of a value-at-risk (VaR) measurement was added to
the capital requirement formula in 1996.
In Europe, Basel II was adopted under the Capital Adequacy Directive (CAD). First issued in 1993, the
CAD was a European directive that, as its name suggests, established uniform capital requirements
applicable to both universal banks’ securities operations and non-bank securities firms. Essentially,
Europe was pursuing locally what Basel was pursuing globally.
Example
A universal bank would identify a portion of its statement of financial position (balance sheet) as
comprising a ‘trading book’.
Capital for the trading book would be held in accordance with the CAD, while capital for the
remainder of the bank’s statement of financial position would be held in accordance with the Basel
Accord.
Europe developed the CAD at the same time that the Basel Committee was developing an amendment
covering market risk for the Accords. While the two initiatives influenced each other, they were not
completed simultaneously.
The Basel Committee’s Risk Management Group has set out some principles that provided a framework
for the effective management and supervision of operational risk for use by banks and supervisory
authorities when evaluating operational risk management policies and practices. The Committee
realised that the exact approach for operational risk management chosen by an individual bank will
depend on a range of factors – for example, its size, sophistication, and the nature and complexity of its
business activities.
In 2006, the CAD was superseded by the Capital Requirements Directive (CRD). The CRD represents the
EU’s interpretation of Basel II, and the EU capital requirements for implementation by national regulators
across member states are based upon the Basel II approach. Applying to all financial institutions (not
just banks), the CRD aims to:
154
Operational Risk in the Regulatory Environment
With Basel II having formed the basis for the EU CRD, this provided the basis for new national ‘rulebooks’
for all firms in the EU. Hence, in the UK (which was, at that time, still a member of the EU), the then
regulator implemented the Basel II Accord via the CRD. Finalised Handbook changes appeared towards
the end of 2006, with implementation from 2007.
Global implementation of Basel II began at the end of 2006 (individual country timetables varied), with
full international implementation continuing well beyond that. Again, the new capital rules apply to all
financial institutions, not just banks.
The process to reach this agreed framework took many turns among the world’s leading banks and their
regulators, with its form being amended since its early stages. The revised Basel capital framework aims
to make the requirements which apply to internationally active banks (both, wholesale and retail) more
risk sensitive and representative of modern risk management practices.
Basel III
The third Basel Accord (Basel III) was developed by the Basel Committee in response to the global
financial crisis. Building on the previous Basel I and II Accords, Basel III introduced a set of reforms
designed to mitigate risk within the international financial services sector by requiring banks, credit
institutions and investment firms to maintain minimum leverage ratios and levels of reserve capital in
7
order to limit the likelihood and impact of future financial crises. This capital must be of a higher quality
against more conservatively calculated risk-weighted assets (RWAs).
Basel III also aims to ensure that there is sufficient liquidity during times of economic stress, improve risk
management, strengthen the transparency and reduce bank leverage by setting voluntary regulatory
standards on the level of bank capital adequacy, stress testing and market liquidity risk.
155
In summary, here are the main additions introduced under Basel III:
• Capital requirements – ‘additional capital buffers’ relating to the amount and quality of capital
held that will be mandatory and also some that will be discretionary, which would allow national
regulators to insist that an additional 2.5% of capital would need to be held by banks during periods
of high credit growth.
• Leverage ratio – a minimum ‘leverage ratio’ that requires banks to hold in excess of 3% of their
average total consolidated assets to provide more protection.
• Liquidity requirements – two new required liquidity ratios have been introduced:
• Liquidity coverage ratio – this requires a bank to hold sufficient liquid assets that are of a
higher quality and are in excess of its total net outflows over a 30-day period.
• Net stable funding ratio – this requires a bank to hold an amount of stable funding that is in
excess of the required amount of stable funding over a one-year period of extended stress.
• Standardised approach – this replaces the advanced measurement approach (AMA) with a
single approach for all firms, focusing on a bank’s income and historical internal losses over a ten
year period.
The additional Basel III requirements started to be introduced from 2013–19, with further requirements
expected to be rolled out in 2023.
7.2.3 Understand the differences between Pillars 1, 2 and 3 of the Basel Accords relating to
operational risk
Pillar 1
Pillar 1 is the calculation of the minimum capital requirement.
Capital requirement
Capital ratio=
Credit risk exposure + market risk exposure + operational risk exposure
The minimum overall capital ratio remains at 8% of its risk-weighted assets (RWA) but the methods of
measuring market, credit and operational risk exposure are now more elaborate.
156
Operational Risk in the Regulatory Environment
Pillar 2
Pillar 2 relates to the supervisory review process. This pillar requires supervisors to ensure that the bank
has sound internal processes in place in order assess capital adequacy based on a thorough evaluation
of its risks.
The importance of institutions developing their own processes is stressed, together with the need for
appropriate targets for capital that are in line with the firm’s risk profile and control environment.
It is worth noting that an unsatisfactory review can result in an immediate additional capital charge, and/
or force changes in senior management responsibilities. For the first time, the Accord provided guidance
for the independent review of a firm’s operational risk and its management. Recommendations included
reviewing:
• the firm’s framework and processes for determining its operational risk capital charge
• the effectiveness of the firm’s risk management process
• the effectiveness of the firm’s monitoring and reporting systems
• the firm’s procedures to ensure the timely resolution of risk events, and
• the effectiveness of the firm’s ‘action’ strategies for managing risk.
Pillar 3
Pillar 3 is concerned with market disclosure. It aims to enhance market visibility by requiring greater
7
public disclosure to allow more transparency of banks’ risk profiles and the capital adequacy of their
positions.
7.2.4 Understand the three measurement approaches for operational risk capital requirements under
Basel: basic indicator approach; standardised approach; advanced measurement approach
(AMA)
Pillar 1 of Basel II breaks up regulatory capital into three parts, to match credit risk, market risk and
operational risk. The market risk element, dealing with trading losses, was unchanged from Basel 1,
which was amended for this purpose in 1997.
The ‘operational risk capital requirements’ part of Pillar 1 was new for the time. This requirement was
that banks’ capital should reflect the risk of mistakes and wrongdoing. An example might be a fine levied
on a bank for overcharging its credit card customers.
From the operational risk capital requirements perspective, Pillar 1 requires a more detailed explanation.
It lays down a new means of measurement acceptable to international regulators. In seeking to provide
common standards, it outlines three different measurement approaches for calculating risk exposure:
157
Each approach is discussed in more detail below, along with the criteria that firms must satisfy in order
for those approaches to apply. Note that the the complexity increases for each one.
The Basel Committee anticipated that smaller, domestic institutions that do not possess sophisticated
risk management tools and techniques would use the basic indicator approach.
Like the basic indicator approach, the standardised approach uses gross income as a broad indicator
that reflects the scale of business operations within each business line and, therefore, the likely scale of
operational risk.
Gross income is split between eight defined business lines and then each is multiplied by a factor (denoted
‘beta’) specific to that business line in order to produce the amount required to be held as operational risk
capital for that particular part of the business. The overall amount of operational risk capital is then the sum
of all these calculations. The relationship between business unit and indicator is shown in the table below.
So, for example, for a firm’s corporate finance (CF) business line, the regulator has set a beta factor of
18%. This means that the CF business is required to maintain capital of:
The relationship between each business unit, indicator and factor for this firm is shown in Table 8.2
below.
The standardised approach relies on indicators and factors set by the regulators and recognises that
many institutions may not have had sufficient loss data and analytical risk processes to calculate their
own capital charge. It provides a basis for moving towards a more sophisticated methodology and
encourages better operational risk management.
In order to qualify to use the standardised approach, a firm must meet the following criteria:
• Its board of directors and senior management must be actively involved in the oversight of the
operational risk management framework.
• It must have an operational risk management system that is conceptually sound and implemented
with integrity.
• It must have sufficient resources to staff its approach within its business lines, and control and audit
areas.
158
Operational Risk in the Regulatory Environment
• Internationally active banks must have clear responsibilities assigned to an operational risk
management (ORM) function. This function should be responsible for managing the process.
• It must perform systematic tracking of operational risk data, including losses by business line.
• It must use an effective risk-reporting system.
• It must have an independent, well-documented risk management and control process.
• It must conduct regular internal audits of the operational risk process.
• It must develop criteria for mapping current business lines to the standardised framework.
Table 8.2
The Standardised Approach
7
Banking
Banking
Payment &
Gross Income beta 5 = 18%
Settlement
Agency Services Gross Income beta 6 = 15%
The AMA can cover a range of measurement techniques (both qualitative and quantitative, and usually
VaR-based), providing that these measurement techniques have been approved by the regulators.
159
In order to qualify to use the AMA, banks must comply with the qualifying criteria required under the
standardised approach. Additionally, they must comply with even more stringent requirements – these
requirements aim to ensure that banks have satisfactory risk management processes, risk measurement
systems and risk infrastructure in place. Some key quantitative requirements specific to the AMA are as
follows:
• The bank must establish rigorous procedures for the development and validation of risk models.
• The risk measure must incorporate the impact of infrequent, high-impact losses.
• The bank must be able to demonstrate that the risk measure reflects the equivalent of a holding
period of one year and a confidence level of 99.9%. Note that while this confidence limit is stipulated
by the Basel Committee, there are exceptions to its application.
• The bank must develop specific criteria for assigning loss data to specific risk types within business
lines. The seven defined risk types (as discussed in chapter 3) are:
• internal fraud
• external fraud
• employment practices and workplace safety
• clients, products and business practice
• damage to physical assets
• business disruption and systems failures, and
• execution, delivery and process management.
• The risk process must include external, as well as internal, loss data.
• Measures must be based on a minimum five-year observation period of loss data (with a minimum
three years required when a bank first moves to the AMA).
• The risk mitigation impact of insurance can be recognised up to a limit of 20% of the total
operational risk capital.
If qualitative measures are used, they must have an ability to be validated objectively.
• Pillar 1 includes rules relating to ‘enhanced minimum capital and liquidity requirements’ (Basel II
related to ‘minimum capital requirements’ only).
• Pillar 2 includes rules relating to an ‘enhanced supervisory review process for firm-wide risk
management and capital planning’ (Basel II related to the ‘supervisory review process’ only).
• Pillar 3 includes rules relating to ‘enhanced risk disclosure and market discipline’ (Basel II only
related to ‘disclosure and market discipline’).
Going forward, it is expected that the capital requirements that banks must meet will continue to
increase, and the cost of capital will need to be closely monitored by banks.
There is ongoing research and debate over the impact and implementation of Basel III. A few recent
topics discussed have included:
• Whether capital requirements for loans to small- and medium-sized businesses (SMEs) should
be lower than present rules require, given that they tend to be widely diversified and in order to
encourage credit to these smaller firms.
160
Operational Risk in the Regulatory Environment
• Whether capital adequacy rules are successful in lowering systemic risk among the largest of firms.
• What is the appropriate amount of customisation which should be allowed in how firms implement
the range of directives included in Basel I, II and III?
Source: www.centralbanking.com
There are two broad assumptions underpinning the revised standardised approach:
1. Operational risk increases within firms with higher income (ie, larger firms pose more potential risk
to consumers and/or markets).
2. Firms that have a higher rate of historical operational risk losses are more likely to incur greater
operational risk losses in the future (ie, risker firms, or those with weaker internal controls
environments, will continue to see higher loss rates).
These assumptions are seen in the operational risk capital (ORC) calculation as:
7
Operational risk Business indicator Internal loss
Capital component multiplier
161
The Internal Loss Multiplier (ILM)
The internal loss multiplier (ILM) is a measure of the firm’s average historical operational risk losses
during the previous 10 years, it is calculated at 15 times the average annual operational risk losses. For
firms to produce an accurate ILM there is a clear requirement to have appropriate controls around loss
data identification, collection and aggregation; firms must also disclose their annual loss data for each of
the 10 years used within in the ILM.
The new standardised approach for operational risk measurement must have been implemented by 1
January 2023.
162
Operational Risk in the Regulatory Environment
1. What must firms ensure when creating a compliance function under the MiFID rules?
Answer Reference: Section 2.2
3. What issues does theSustainable Finance Disclosure Regulation (SFDR) attempt to address?
Answer Reference: Section 2.8
5. Which regulatory guideline was issued in 1988 and what were its objectives?
Answer Reference: Section 3.1
6. List three additions that were introduced under the Basel III directive.
Answer Reference: Section 3.1
7. What are the three approaches for measuring capital adequacy requirements under Basel II?
7
Answer Reference: Section 3.2.1
8. List four of the criteria with which a firm must comply if it is to qualify for assessment using the
standardised approach.
Answer Reference: Section 3.2.1
9. What is the Operational Risk Capital (ORC) calculation under the new standardised approach
under BASEL III?
Answer Reference: Section 3.2.1
163
164
Glossary
166
Glossary
Business Risk
Asset Securitisation
The risk of loss due to an adverse external
The practice of pooling bonds or loans with
environment, such as high inflation affecting
credit risk and selling them as a package to
labour costs, an over-competitive market
outside investors.
reducing margins, or legal, tax or regulatory
changes in the markets. See also Risk Profile.
Back Testing
The practice of comparing actual data with
Cash Netting
predicted data in order to ensure the veracity of
The practice whereby two parties who exchange
a predictive model.
multiple cash flows during a given day agree
bilaterally to net those cash flows to one payment
Basel Committee per currency, thereby reducing settlement
A committee of central bankers which publishes risk. Multilateral netting between a group of
a set of minimal capital requirements for banks counterparties is performed by a clearing house.
known as the Basel Accord.
167
Compliance Risk Credit Event
The risk to reputation, earnings or capital arising An adverse change such as bankruptcy,
from violations or non-conformance with laws, insolvency, receivership, material adverse
rules, regulations, prescribed practices or ethical restructuring of debt, or failure to meet payment
standards. obligations when due.
Corrective Control
One of four control types designed to correct Credit Rating Agency
errors or losses as a result of risk events, or Organisations that ranks the credit worthiness
control weaknesses. of a firm, usually by assigning the firm a ‘credit
rating’. Fitch, Moody’s and S&P are considered
the ‘big three’ ratings agencies.
Correlation Simulation
A value at risk (VaR) measure that calculates the
volatility of each risk factor from historical data Credit Rating
and estimates its effect on the portfolio so as to An assessment of the creditworthiness of a firm
give an overall composite VaR that includes all that is used by lenders to manage their credit
risk factors. exposure.
168
Glossary
Diversification
Fitch Ratings
A means of reducing the concentration of credit
A credit rating agency.
risk by spreading it across borrowers, sometimes
in different, negatively correlating industry
sectors. General Data Protection Regulation (GDPR)
An EU law related to the protection of personal
data and privacy. The EU GDPR’s requirements
Downside
have been enacted into UK law.
The potential negative aspects of incurring risk.
Hedging
Enterprise Risk Management (ERM)
A means of reducing the risk of adverse price
A firm-wide, holistic approach to managing the
movements by taking an offsetting position in a
range of risks across an organisation.
negatively correlated product.
169
Historical Loss Analysis Issuer Risk
The process of identifying previous loss events The risk of default, with respect to redemption
and attributing them to operational risk event or interest servicing, when one institution holds
types or causes. debt securities issued by another institution.
170
Glossary
Negative Correlation
Market Liquidity Risk
An inverse or opposite relationship between two
The risk of loss through not being able to
factors.
trade in a market or obtain a price on a desired
product when required.
Net Stable Funding Ratio
The proportion of stable funding relative to the
Mark-to-Market
required levels of stable funding.
Valuing assets against the present value of an
instrument.
Normal Distribution Curve
A common form of probability distribution which
Market Risk
is continuous, symmetrical about its mean and is
The potential loss of earnings or capital arising
defined by its mean and standard deviation.
from changes in the value of portfolios of
financial instruments.
Nostro Account
The record of money on deposit at another bank
Market Risk Limit
or institution (‘our account’).
See Stop-Loss Limit.
Obligor
Markets in Financial Instruments Regula-
A party that has a financial obligation to another
tion (MiFIR)
party.
An EU regulation designed to ensure that
markets are transparent, operate efficiently and
provides investor protection. Off-Balance Sheet Transaction
A transaction that is not required to be reported
in a firm’s financial accounts.
Markets in Financial Instruments Directive
(MiFID)
An EU directive that allows firms authorised in On-Balance Sheet Transaction
one member state to provide/offer financial A transaction that is required to be reported in a
services to customers in another member state, firm’s financial accounts.
subject to certain restrictions. There is also MiFID
II and MiFIR.
171
Operational Risk Controls Post-Settlement Stage
Activities that are inserted into a process to The third stage of a transaction’s life cycle
protect it against specific operational risks. involving the movement of, and control over,
cash and physical assets.
Operational Risk
The risk of loss resulting from inadequate or Potential Future Exposure
failed internal processes, people and systems, or The likely maximum loss (for a specified
from external events. confidence level) in the event of default at a
particular point in time.
172
Glossary
Reconciliation Securitisation
A control function that ensures the firm’s record See Asset Securitisation.
of stock and cash movements, among other
things, agrees with its statement of balance and
Sensitivity Analysis
holdings.
A means of understanding how the price of
a financial instrument or value of a portfolio
Regulatory Risk changes in response to influencing effects.
See Compliance Risk.
Settlement
Risk The fulfilment of contractual commitments such as
The possibility of negative consequences or loss payment of cash for securities. The conclusion of a
occurring. securities transaction by delivery against payment
(DvP).
Risk Management
The implementation of a strategic process that Settlement Risk
reduces the likelihood or the impact of risks The risk that there is a non-simultaneous exchange
being realised. of value, and one or more parties will fail to deliver
on the terms of the contract.
Risk Measurement
A process that is concerned with understanding Set-Up Stage
the size of a risk and, therefore, the impact on a The first stage of a transaction’s life cycle
firm by trying to predict a future event using past involving all pre-transaction activities.
knowledge.
Society for the Worldwide Interbank
Risk Profile Financial Telecommunication (SWIFT)
The types of risks that are faced by a firm and its The global standard for financial transactions
exposure to those risks at any given time. See and operates a messaging service between its
also Business Risk. members.
173
Standard Deviation (SD) Ultra Vires
A means of measuring variability, uncertainty Translates as ‘beyond the powers’. The terms
or volatility of return. It measures how far a describes actions taken by government bodies
variable moves over time away from its average or corporations that exceed the scope of their
(or mean). authority, which leads to legal risk.
Variance/Covariance Simulation
Suitability
See Correlation Simulation.
An assessment to ensure that products being
sold to, or investments being traded on behalf
of, a customer, are appropriate for their needs. Variation Margin
A demand for extra cash cover for margins made
by brokers and clearing houses on a daily basis to
Top-Down Risk Assessment
reflect changes in the market value of positions.
This involves the senior management reviewing
the key risks that their business may be exposed to
and then implementing a process to combat these Volatility
risks. The relative rate by which a financial instrument’s
price moves up and down.
Transaction Capture
The activity of capturing details of trades in
systems.
174
Glossary
Volatility Risk
The risk of price movements that are more
uncertain than usual affecting the pricing of
products.
Volume Sensitivity
A process cause of operational risk where the
workload increases in proportion to increasing
volumes.
175
176
Multiple Choice Questions
178
Multiple Choice Questions
1. A company which introduces straight-through processing (STP) systems reduces its process risk.
However, this may increase:
A. People risk
B. Systems risk
C. Event risk
D. Reputational risk
5. The key role of the compliance function is to ensure that the firm:
A. defines programmes to enhance individual accountability
B. issues guidelines on collateral and margin usage
C. operates according to corporate governance parameters
D. accurately compiles reports of its assets and liabilities
179
7. The risk of a difference in the impact of market factors on the price of two similar investments is
known as:
A. volatility risk
B. basis risk
C. settlement risk
D. liquidity risk
9. Where value-at-risk (VaR) backtesting shows unsatisfactory differences between the estimates
and reality, what action is normally taken?
A. Additional capital is sought
B. The methodology model is reviewed
C. A report is immediately issued to the regulator
D. Extra hedging is arranged
180
Multiple Choice Questions
15. What stage normally immediately follows the risk measurement and assessment stage in a
typical risk management process?
A. Risk identification
B. Risk reporting
C. Risk treatment
D. Risk monitoring
16. Most firms that fall within the scope of MiFID will also have to comply with which one of the
following?
A. The Retail Distribution Review (RDR)
B. The Capital Requirements Directive (CRD)
C. UCITS V
D. Solvency II
17. Where a firm’s various risks are plotted on a standard risk-ranking chart, the highest risks will
normally appear in the:
A. top right-hand quadrant
B. top left-hand quadrant
C. bottom right-hand quadrant
D. bottom left-hand quadrant
18. Which type of measure of operational risk is a means of peer-group comparison within the
industry?
A. Scenario analysis
B. Cost-based provisioning
C. Benchmarking
D. Ranking
181
19. The self-assessment approach to risk identification normally utilises which other method of
assessing operational risk?
A. Ranking
B. Scenario analysis
C. Key risk indicators
D. Benchmarking
20. When establishing key risk indicators (KRIs), which of the following is an example of a non-
process-related indicator?
A. Volume of transactions per head
B. Number of times a trader exceeds agreed credit limits
C. Annual level of staff turnover
D. Average duration of unsigned confirmations
21. Which of the following is an example of the risk transfer method of treating risk?
A. Introducing internal detection controls
B. Designing a contingency planning policy
C. Taking out a fire and theft insurance policy
D. Setting market and credit risk limits
22. One of the primary changes brought about by the Basel II Accord was to:
A. impose quarterly internal reviews of the risk measurement process
B. introduce incentives for better risk management
C. exempt MiFID-compliant firms from extra risk requirements
D. incorporate the requirements of the Sarbanes-Oxley regulations
23. Focus workshops are used to identify risks and their causes because they have the ability to:
A. ensure risk reporting is being performed
B. show clearly the adequacy of controls
C. satisfy regulators that an adequate control environment exists
D. investigate cross-functional dependencies
24. Which of the following statements is not true in relation to risk appetite?
A. It must be documented
B. It should be sponsored by the board
C. It provides an objective benchmark for assessing risk
D. It must be used in combination with value-at-risk (VaR)
182
Multiple Choice Questions
25. Under the standardised approach adopted for Pillar 1 of Basel II, the beta factor used to calculate
the required capital varies according to:
A. the relative risk level as measured by ranking
B. the relative risk level as measured by benchmarking
C. the firm’s business lines
D. the firm’s age
26. Which of the following methods of measurement has the disadvantage that it depends upon the
expertise of the professional involved?
A. External loss data analysis
B. Scenario analysis
C. Internal risk event data analysis
D. Benchmarking
27. Which of the following methods of credit risk treatment best reduces settlement risk?
A. Diversification
B. Delivery versus payment
C. Credit derivatives
D. Credit limits
28. Which Basel II operational risk category does money laundering fall into?
A. Internal fraud
B. External fraud
C. Employment practices and workplace safety
D. Clients, products and business practice
30. Which of the following is the best reason for using external detective controls?
A. To reduce the likelihood of risk occurring
B. To prevent a risk occurring
C. To reduce the impact of a risk occurring
D. To provide feedback in the risk-reporting process
183
31. How can risks be calculated when using the ranking method of prioritisation?
A. Impact x likelihood
B. Impact ÷ likelihood
C. Impact + likelihood
D. Impact only
33. A key reason why firms have controls in place to ensure segregation of duties between front-
office and back-office functions is to:
A. reduce settlement risk
B. speed up the processing time
C. achieve best execution
D. minimise fraudulent opportunities
34. A series of documentary omissions occurring in a firm is often an early indication of:
A. data capture errors
B. cultural difficulties
C. process weaknesses
D. capital adequacy problems
35. A life office breached compliance rules by missing a reporting deadline and exceeding
an investment limit. In which of these two breaches (if either) could the cause result from
technology issues?
A. In neither case
B. Only in the case of the missed deadline
C. Only in the case of the exceeded limit
D. In both cases
36. The primary difference between enterprise risk management (ERM) and market risk management,
is that ERM:
A. focuses primarily on long-term issues
B. aims to integrate the management of all risks
C. covers non-financial risks only
D. operates on a bottom-up approach basis
184
Multiple Choice Questions
37. A key impact of the Sarbanes-Oxley Act 2002 was to increase the level of corporate responsibility
in the specific area of:
A. company accounting
B. competitor activities
C. product range
D. remuneration terms
38. Where a firm’s compliance risk is realised, which of the following results is most likely to
consequently occur?
A. A cross-compensating reduction in the firm’s market risk level
B. Damage to the firm’s credit risk
C. A fall in the firm’s costs
D. Damage to the firm’s reputation
39. Where data has been wrongly captured by a firm, which of the four main root causes will be to
blame?
A. Technology, external events and processes
B. Environment, people and processes
C. Processes, people and technology
D. People, processes, technology and external events
40. The primary role of the front office of a financial institution is to:
A. oversee strategy
B. earn revenue
C. settle transactions
D. monitor risk
41. Which specific requirement is normally addressed by the employee of a financial institution by
completing a fact-find?
A. Status disclosure
B. Money laundering
C. Best execution
D. Know Your Customer
185
43. Which of the following is most likely to be a key risk indicator (KRI) for the positioning stage of
the settlement process?
A. Time taken to formulate a legal agreement
B. Time taken for counterparties to return confirmations
C. Number of late-settled transactions due to lack of funds
D. Number of transactions not captured within a specified time frame
44. The number of breaks is often used as a risk indicator in connection with which stage of the
front-office support function activities?
A. Transaction instruction
B. Positioning
C. Settlement
D. Reconciliation
45. If standard settlement instruction data is not used for a particular transaction instruction, this
will often result in:
A. faster processing
B. additional risk
C. the involvement of an extra third party
D. problems occurring at the positioning stage
46. If an independent internal audit section is required under MiFID, this team must:
A. have sufficient authority
B. report directly to the compliance officer
C. include a qualified accountant or solicitor
D. be separately funded from the firm’s reserves
47. The main difference between direct and indirect financial loss, which can result from a risk being
realised, mainly relates to whether the loss:
A. is borne by a third party
B. is long lasting
C. can be quantified
D. can seriously impact profitability
48. Where a firm carries out an ultra vires check, this is done in an attempt to mitigate which
particular risk?
A. Volatility risk
B. Liquidity risk
C. Basis risk
D. Legal risk
186
Multiple Choice Questions
49. Contractual ambiguity is a common aspect of which one of the following types of risk?
A. Regulatory risk
B. Basis risk
C. Legal risk
D. Pre-settlement risk
50. Which of the four main root causes of operational risk is most likely to have a recognised
separate internal and external dimension?
A. People
B. Systems
C. Processes
D. Events
187
Answers to Multiple Choice Questions
1. B Chapter 4, Section 1
Where a firm places greater reliance on systems, the impact of a system failure is increased.
4. B Chapter 4, Section 1
A lack of capacity can lead to firms being unable to process business demand.
188
Multiple Choice Questions
After a risk has been identified and quantified, steps should be taken to try and treat it.
The Capital Requirements Directive (CRD) sets requirements for the regulatory capital that a firm must
hold.
189
25. C Chapter 7, Section 3.2.1
The beta factor used is specific to each business line.
190
Multiple Choice Questions
191
192
Syllabus Learning Map
194
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
195
Syllabus
Chapter/
Unit/
Section
Element
196
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
Value-at-Risk (VaR)
2.6
On completion, the candidate should:
2.6.1 Understand the meaning of VaR and its constituents 3.3
2.6.4 Know the limitations of using VaR for market risk management 3.3
Market Risk Management and Reporting
2.7
On completion, the candidate should:
Understand the following techniques for mitigating market risk:
• hedging
2.7.1 4.1
• market risk limits
• diversification
2.7.2 Understand the role of the market risk management function 4.2
The Nature of Liquidity Risk
2.8
On completion, the candidate should:
Know the basic terms used in the subject of liquidity risk:
• asset and liability management
• maturity ladders
• actual and contractual cash receipts
2.8.1 5.1
• asset liquidity risk
• funding liquidity risk
• liquidity coverage ratio
• net stable funding ratio
Be able to apply the concept of liquidity risk to simple, practical
2.8.2 5.1
situations
Measuring Asset Liquidity Risk
2.9
On completion, the candidate should:
Know the key measures of asset liquidity risk:
• bid-offer spread
2.9.1 • market depth 5.2.1
• immediacy
• resilience
197
Syllabus
Chapter/
Unit/
Section
Element
198
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
3.5.3 Be able to apply risk classification in accordance with Basel II categories 5.2
Understand the following methods for identifying operational risk:
• risk and control self-assessment
• reviews and audits
3.5.4 5.3
• focus workshops
• risk event analysis
• management information
199
Syllabus
Chapter/
Unit/
Section
Element
200
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
201
Syllabus
Chapter/
Unit/
Section
Element
Operational Resilience
3.10
On completion, the candidate should:
Understand the difference between operational risk and operational
3.10.1 resilience and the significance placed upon operational resilience by 10
the regulators
202
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
203
Syllabus
Chapter/
Unit/
Section
Element
Understand the key controls and indicators associated with the pre-
5.3.2 3.1
settlement phase
Settlement Phase
5.4
On completion, the candidate should:
Understand the components of the settlement phase:
• payment instructions
5.4.1 3.2
• payment receipts
• securities transfers and custody
Understand the key controls and indicators associated with the
5.4.2 3.2
settlement phase
Post-Settlement Phase
5.5
On completion, the candidate should:
Understand the components of the post-settlement phase:
• reconciliation
5.5.1 3.2
• inventory management
• margin/collateral monitoring
Understand the key controls and indicators associated with the post-
5.5.2 3.2
settlement phase
Asset Servicing
5.6
On completion, the candidate should:
Know the main types of corporate action:
• dividend and coupon payments
• redemption of fixed-income securities
• rights issues
5.6.1 3.2
• stock buy-backs
• takeovers and mergers
• conversion of convertible bonds
• proxy voting
Understand the main risks associated with corporate action
processing:
• missed announcements
5.6.2 • complex structure of information and instruction flows between 3.2
participants
• late election
• incomplete or incorrect information or instructions
204
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
205
Syllabus
Chapter/
Unit/
Section
Element
IT
6.7
On completion, the candidate should:
Understand the role of the IT function in the context of the
6.7.1 1.7
operational risk environment
Legal
6.8
On completion, the candidate should:
Understand the role of the legal function in the context of the
6.8.1 1.8
operational risk environment
6.8.2 Know the common legal areas where operational risk issues arise 1.8
The Product Development and Marketing
6.9
On completion, the candidate should:
Understand the role of the product development and marketing
6.9.1 1.9
function in the context of the operational risk environment
The Project Management and Change Management
6.10
On completion, the candidate should:
Understand the role of the project management and change
6.10.1 management function in the context of the operational risk 1.10
environment
206
Syllabus Learning Map
Syllabus
Chapter/
Unit/
Section
Element
7.2.2 Understand the main operational risk features of the Basel Accords 3.1
Understand the differences between Pillars 1, 2 & 3 of the Basel
7.2.3 3.2
Accords relating to operational risk
Understand the three measurement approaches for operational risk
capital requirements under Basel:
7.2.4 • basic indicator approach 3.2.1
• standardised approach
• advanced measurement approach (AMA)
207
Examination Specification
Each examination paper is constructed from a specification that determines the weightings that will be
given to each element. The specification is given below.
It is important to note that the numbers quoted may vary slightly from examination to examination as
there is some flexibility to ensure that each examination has a consistent level of difficulty. However, the
number of questions tested in each element should not change by more than plus or minus 2.
Element
Element Questions
Number
1 Risk Basics 3
Total 50
208
Enhance your studies
with the MyCISI App
As a student member, you can also access all the
first-class CPD resources we offer such as Professional
Refresher online learning modules, CISI TV videos and
more – all in one easy to use app.
500+ 500+
videos on demand events every year
120,000+ 24
on-demand videos UK Branches and
watched last year 9 National Advisory
Councils who represent
local members and guide our offering
Key Features
Special end-of-module practice exam to
reflect as closely as possible the standard Questions throughout to reaffirm
understanding of the subject
you will experience in your exam (please
note, however, they are not the CISI exam Extensive glossary of terms
questions themselves) Allows you to study whenever you like,
and on any device
Please note: The questions in Revision Express should not be viewed as sample exam questions as sample papers are available for this purpose.
The possibilities are endless
with CISI qualifications
Globally recognised qualifications that will
allow you to spread your wings in the world
of finance.