Risk Management Project Report
Risk Management Project Report
Risk Management Project Report
strategies to manage it, the practice by which a firm optimizes the manner in
which it takes business risks is called risk management. The point of risk
management is not to eliminate it; that would eliminate reward. Hence this Risk
needs to be managed.
The design of a risk appetite framework does not have to start from scratch. It
should build on and unify existing risk and business management processes and
reports.
Approaches – TOP DOWN or BOTTOM UP APPROACH
The ‘top-down’ desired risk profile must be compared with the ‘bottom-up’
reality
Organisations use different ways to measure their Risk Appetite, ranging from
simple qualitative measures such as defining risk categories and setting
target levels around these, to developing complex quantitative models of
economic capital and earnings volatility. Again, risk appetite is not a magic number, nor
always quantifiable. It is dependent upon the aims of the business and what risks have to
be taken to achieve those aims.
The final aspect of risk appetite is the target risk/reward balance of the
organization. Organizations setting a lower risk/reward premium will be able take on a
wider range of opportunities, thus potentially building a larger organization, albeit one with a
lower return on capital.
KEY RISK INDICATORS
Indictors can be leading, lagging or current in nature. Most managers want leading or
preventative indicators – to predict problems far enough in advance to prevent or
eliminate them or at least mitigate the damage.
All companies face the challenge of developing leading indicators that can effectively
provide early warnings of potential future losses. Clearly, the challenge is to
implement KRIs in such a way as to improve consistency, relevance, transparency and
completeness. To achieve this, some standardisation is required across the firm and,
across the industry.
Monitor
Control
Assess Risks
Identify
Risks
Set
Objectives
Roles and Responsibilities
Operational risks:
Control risks + Inherent risks for which controls are not in place.
EVENTS
b)Predictive Model - account for the unexpected losses and to predict them over
extended periods.
2. Identification and Measurement of Operational Risks:
a)Top Down Approach – financial data from the balance sheet and profit and loss accounts
are converted into a risk amount.
b)Bottom Up Approach - risks are analyzed for each line of business and their occurrence
and losses incurred are identified and measured.
a)Causality - Knowing "what causes what," gives an ability to intervene in the environment and
implement the necessary controls.
b)Self assessment
c)Calculating reserves and capital requirements
d)Creating culture supportive of risk mitigation
e)Strengthening internal controls, including internal and external audits of systems, processes and
controls (this includes IS audit and assurance)
f)Setting up operational risks limits (so businesses will have to reduce one or more of frequency of
loss, severity of loss or size of operations)
g)Setting up independent operational risk management departments
h)Establishing a disaster recovery plan and backup systems
i)Insurance
j)Outsourcing operations with strict service level agreements so operational risk is transferred
4. Forecasting and Prediction:
The whole exercise of the operational risk management is the exercise to identify events that
are likely to cause losses.
“VaR” (Value at Risk) and Scenario Analysis are used as techniques for prediction by taking
historical data or simulation and qualitative factors.
RISK MANAGEMENT AND INTERNAL CONTROLS
• Interpreting and reconciling the volume and disparity of risk and control
information from across the enterprise
• Addressing the “war for talent” through staff recruitment, development, career
planning, and retention for experienced risk management and internal control
professionals
Types of
System Risk
Fire damage:
Some of the major ways of protecting the installation against water damage are
as follows:
• In flood areas have the installation above the high water level.
Energy
Variations
Increase in Loss of
power power
Stabilizer/
Circuit Battery
Voltage Generator
breakers Back-Up
Regulator
Hardware Failures:
There are cases when hardware failures cause the operating system to crash.
There could also be cases of system failures which cause the whole segment of
memory to be dumped to disks and printers resulting in unintentional disclosure of
confidential information.
Backing-up data:
Backing up data is the single most important step in preventing data loss. Regular
backups are vital insurance against a data-loss catastrophe, yet many organizations
learn this lesson the hard way.
By far the best method of taking a back-up is replication of data to an off-site location
using local mirrors of systems.
Following are some rules of thumb to guide you in developing a solid backup strategy.
• Develop a written backup plan
• Your database and accounting files are your most critical data assets. They should be
backed up before and after any significant use. For most organizations, this means
backing up these files daily. Nonprofits that do a lot of data entry should consider
backing up their databases after each major data-entry session.
• Store a copy of your backups off-site to insure against a site-specific disaster such as
a fire, break-in, or flood. Ideally, you should store your backups in a safety-deposit
box.
DISASTER RECOVERY PLAN (DRP)
Objectives of DRP:
1.Emergency Plan
2.Recovery Plan
3.Back-up Plan
It is estimated that most large companies spend between 2% and 4% of their IT
budget on disaster recovery planning, with the aim of avoiding larger losses in the
event that the business cannot continue to function due to loss of IT infrastructure
and data.
The intruder by physically entering the room may steal assets or carry out
sabotage. Alternatively, the intruder may eavesdrop on the installation by wire
tapping, installing an electronic bug or using a receiver that picks up electro-
magnetic signals.
The Intentional attacks can be from Intruders outside the organization or even
from privileged personnel who abuse their authority (Ex: Disgruntled
employees).
1. Log on Procedures
3. Firewalls
4. Encryption
5. Anti-Virus Software
• Financial risks resulting from internal actions or failures of
the organization, particularly people, processes, and systems.
TYPES OF FINANCIAL RISK
Pure Risk:
The situation in which a gain will not occur. The best possible outcome is
that of no loss occurring.
Speculative Risk:
Diversifiable Risk & Non-diversifiable Risk:
CAPM or the Capital Asset Pricing model is the most frequently used financial
model to enable portfolio diversification. If returns on risky assets have less
than perfect correlation, i.e., they do not naturally hedge against each other,
risk averse individuals diversify risk in their holding of assets. A well
diversified portfolio would have less fluctuation than returns on individually
held financial assets.
Where, Rf is the Risk Free Rate, β is the Beta of the portfolio and Rm is the
Market Rate.
WHAT IS HEDGING?
Hedge - In finance, a hedge is a position established in one market in an attempt to offset
exposure to the price risk of an equal but opposite obligation or position in another market —
usually, but not always, in the context of one's commercial activity.
SPOT CONTRACTS
FORWARD CONTRACTS
• Open Forwards - Open forwards set a window of time during which any portion of the
contract can be settled, as long as the entire contract is settled by the end date.
A Swiss exporter company accepts to receive $ 1,000,000 after 3 months. The exporter
has collected following information.
Forward Cover:
Instead of using money market cover, if the exporter takes forward cover then he can get
this at CHF / USD 1.8075 which will give him cash flow in CHF of (1,000,000)(1.8075)=
CHF 1,807,500.00. In this case the exporter shall go for forward cover.
Interest Rate Options –
Interest Rate Options are options on the spot yield of U.S. Treasury securities.
Available to meet the investor’s needs are options on short, medium and long-term
rates. The following contracts are available for trading at the Chicago Board Options
Exchange:
Options on the short-term rate (ticker symbol IRX) are based on the annualized
discount
rate on the most recently auctioned 13-week Treasury bill.
Options on the 5-year rate (ticker symbol FVX) are based on the yield-to-maturity of the
most recently auctioned 5-year Treasury note.
Options on the 10-year rate (ticker symbol TNX) are based on the yield-to-maturity of
the most recently auctioned 10-year Treasury note.
Options on the 30-year rate (ticker symbol TYX) are based on the yield-to-maturity of
the most recently auctioned 30-year Treasury bond.
How do interest rate options work?
A call buyer anticipates interest rates will go up, increasing the value of the call position. A put
buyer anticipates that rates will go down, increasing the value of the put position.
A yield-based call option holder will profit if, by expiration, the underlying interest rate rises
above the strike price plus the premium paid for the call.
Conversely, a yield-based put option holder will profit if, by expiration, the interest rate has
declined below the strike price less the premium.
Contract size: Interest Rate Options use the same $100 multiplier as options on equities
and stock indexes
European-style exercise: The holder of the option can exercise the right to buy or sell
only at expiration. This eliminates the risk of early exercise and simplifies investment
decisions.
Foreign Currency Swaps - A financial foreign currency contract whereby the buyer and
seller exchange equal initial principal amounts of two different currencies at the spot rate.
Example:
A company needs to borrow euros to fund an investment project. The cash flows will also
be in euros. It transpires that by issuing a loan in USD the company can obtain the
required funds more cheaply than by issuing a loan in EUR. However, in that case, the
company would be faced with the situation where the interest payments would be in USD
whereas the income would be in EUR. The company therefore decides to enter into a CC
Swap whereby it receives the USD interest rate and pays the EUR interest rate.
The following three examples show how, through a CC Swap, the standard interest rate
for the term and currency of the debenture loan are swapped.
Swap of the principal amounts at the beginning of the CC Swap
Principal in USD Principal in USD
Swap of interest flows during the CC Swap
A financial interest rate contracts whereby the buyer and seller swap interest rate exposure over
the term of the contract. The most common swap contract is the fixed-to-float swap whereby
the swap buyer receives a floating rate from the swap seller, and the swap seller receives a
fixed rate from the swap buyer.
• Futures
1.Commodity
2.Interest Rate
3.Currency
4.Index
5.Stock
•Credit Derivatives
1.Credit Default
2.Total Return Swap
3.Credit Linked Note
RISK MANAGED ?