Top Banner
Operational Risk Management Systems 2008 Navigating through a fragmented market March 2008 RR08011
34

Operational Risk Management Systems 2008

Oct 27, 2014

Download

Documents

raul.rivera
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Operational Risk Management Systems 2008

Operational Risk Management Systems 2008Navigating through a fragmented market

March 2008

RR08011

Page 2: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 2

About Chartis Research Chartis Research is the leading provider of research and analysis on the global market for risk technology. Our goal is to support enterprises as they drive business performance through better risk management, corporate governance and compliance. We help clients make informed technology and business decisions by providing in-depth analysis and actionable advice on virtually all aspects of risk technology.

This includes technology for:

• Operational Risk Management

• Credit Risk Management

• Market Risk Management

• Asset & Liability Management

• Fraud and Anti-Money Laundering Prevention and Detection

• Basel II, Sarbanes-Oxley, Solvency 2

Chartis Research has a total focus on Risk Technology giving it significant advantage over generic market analysts.

Chartis Research has brought together a leading team of analysts and advisors from the risk management and financial services industries. This team has hands-on experience of implementing and developing risk management systems and programmes for Fortune 500 firms and leading consulting houses.

www.chartis-research.com

All Rights Reserved.No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of Chartis Research Ltd.

The facts of this report are believed to be correct at the time of publication but cannot be guaranteed. Please note that the findings, conclusions and recommendations that Chartis Research delivers will be based on information gathered in good faith, whose accuracy we cannot guarantee. Chartis Research accepts no liability whatever for actions taken based on any information that may subsequently prove to be incorrect or errors in our analysis.

Page 3: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page �

ContentsExecutive summary .................................................................................................................................... 5

Market requirements ................................................................................................................................. 8

Framework for evaluating ORM systems ..........................................................................................10

Operational risk and compliance under a common governance umbrella by RiskTech ...................................................................................................................................................12

The cyclicality of operational risk: The tracking phenomenon by Algorithmics ...........................................................................................................................................21

Related Chartis Research ........................................................................................................................��

Page 4: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page �

List of figures and tablesFigure 1: Competitive Landscape 2008 ...........................................................................................................................................6

Figure 2: Framework for navigating through a fragmented ORM software market .....................................................................................................................................................................................7

Figure �: Risk and Compliance Scorecard/Portal .............................................................................................................9

Figure �: Integrated GRC – from ‘Ad-hoc’ to Systematic ...................................................................................15

Figure 5: Risk and control self-assessment (RCSA) process example ..........................................17

Figure 6: (From the Chicago Board of Exchange and Algo FIRST*): VIX index and large operational risk loss events ............................................................................22

Figure 7: Changes in total frequency of operational risk loss events vs. changes in the average VIX. ..........................................................................................................2�

Figure 8: Changes in people risk class vs. changes in the VIX .................................................................25

Figure 9: Changes in relationship risk class vs. change in the VIX ....................................................26

Table 1: ORM System Vendor Evaluation Framework ........................................................................................11

Page 5: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 5

Executive summaryThe second wave of expenditure in operational risk management (ORM) systems is now fully visible. Chartis retains its 2007 forecast for the worldwide ORM market to grow to $1.55bn by 2011. This growth has been fuelled by:

1 Many US and European financial institutions continue to replace their first generation ORM systems. This is largely due to inflexible and rigid product design and the ongoing evolvement of ORM methodologies.

2 Some market segments, such as emerging regions (e.g. Middle-East, Asia-Pacific, South America), and vertical sectors (e.g. insurance, asset management) are investing in formal ORM systems for the first time.

3 Average investment in ORM projects is increasing, as more and more financial institutions are seeing ORM’s strategic business benefits and not just a tactical “tick-in-the-box” initiative.

Financial institutions working on the demand side of the market are re-examining their approach, culture and systems for managing operational risk. This is as a result of recent high profile losses, rogue trader events , failures in internal controls and processes surrounding the “credit crunch.” Furthermore, firms have realised that the traditional compliance “box-ticking” approaches to managing risk do not achieve the desired outcome. Operational risk needs to be treated as an integral part of the overall governance, risk and compliance (GRC) strategy.

Meanwhile, on the supply side of the market, Sarbanes-Oxley and Basel II have “chewed-up and spat-out” many first generation software vendors and products. Amongst the survivors, a hand-full of vendors have managed to emerge from the darkness, and have proved to the market and themselves that the operational risk software business is both a worthwhile and a profitable business to be in.

Operational risk management (ORM) software brands such as Horizon, OpRisk Analytics, Raft, Agena, and ORTOS have more or less disappeared from the radar. In most cases, this has been through a trade-sale or a dignified exit. In the meantime, a handful of software vendors have established themselves as clear leaders and form the “premier league”. These include SAS, OpenPages, RCS, Algorithmics and Reveleus. There is also healthy competition from a chasing pack of “second tier” vendors who have good niche capabilities or dominate one or two local/national markets, but have not been able to break into the global enterprise solution category. These include LIST, Interexa, Chase Cooper, BWise, Optial, SunGard/Ci3, eFront and Methodware. This has resulted in a highly fragmented market where selecting the right vendor is highly dependent on geography, methodology, experience and the complexity or sophistication of the buying organisation.

Page 6: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 6

High

Completeness of offering

Low

Market share potential

Low High

“Tier 2 Vendors”

“Premier Division”

n Methodware

n SAS

n RCSLIST n

n OpenPagesn Algorithmics

Reveleus n

Chase Cooper n

n Paisley n BWise

n Optialn eFront

SunGard n

n Interexa

Figure 1: Competitive Landscape 2008

Page 7: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 7

Figure 2 represents Chartis’ view on the top three vendors to be considered for different selection criteria and buyer characteristics.

Figure 2: Framework for navigating through a fragmented ORM software market

This report contains key extracts from Chartis’ “Operational Risk Management Systems 2008 – Market Analysis” report RR08012, published March 2008. Detailed vendor rankings, expenditure data and research can be obtained by accessing this report from www.chartis-research.com

Framework for navigating through a fragmented ORM software market – Dimensions of Selection

Size of Financial Institution

Tier 1 or 2• SAS• OpenPages• Reveleus

Tier 3 or 4• RCS• BWise• LIST

Tier 5 or 6• Methodware• ChaseCooper• eFront

Sophistication of functional requirements (directly proportional to price)

Advanced• SAS• Algorithmics• RCS

Intermediate• OpenPages• BWise• Reveleus

Geographical focus

Global• SAS• OpenPages• Reveleus

Europe• SAS• RCS• SunGard/Ci�

Americas• OpenPages• Paisley• Algorithmics

Asia-Pacific• SAS• Reveleus• Methodware

Middle-East & Africa• SAS• Reveleus• ChaseCooper

Primary focus on qualitative techniques• OpenPages• BWise• Paisley

Primary focus on quantitative techniques• SAS• Algorithmics• Reveleus

Page 8: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 8

Market requirementsBetween January and March 2008, Chartis conducted a global survey of banks and insurance companies across the financial services industry. We received 318 responses, which provided the following insights:

• 42% of respondents expect a decrease in operational risk losses, as a result of enhancements to their ORM systems and procedures in 2007.

• 68% of respondents expect their ORM budgets, both internal and external expenditure, to increase over the next 12 months. Key areas of expenditure include development of internal reporting processes and systems, and internal training.

• 52% of respondents are aiming for the Advanced Measurement Approach (AMA) for Basel II compliance by 2011.

• In Europe, 62% of respondents are applying the Loss Distribution Approach (LDA), 42% are using a COSO-based approach, and 63% are using a combination of both.

• In North America, 48% of respondents are applying LDA, 67% are using a Coso-based approach, and 63% are using a combination of both.

• In Asia-Pacific region 44% of respondents are using LDA, 60% are using a Coso-based approach, and 56% are using a combination of both.

• In terms of data inputs into the ORM system, the following data types are being utilised: 83% of respondents use internal loss data, 72% of respondents use risk/control self-assessment data, 52% of respondents use scenario analysis data, 46% use external loss data, 32% use KRI data and 9% use near-miss data.

• 68% of respondents expect to increase their ORM technology budget over the next 12 months.

• In the emerging markets of Middle-East, Africa and Eastern Europe, 71% of respondents are aiming for the Standardized approach within the next two years, and the Advanced Measurement Approach (AMA) in 2010 – 2011.

Page 9: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 9

The figure below represents a framework for an integrated ORM system.

Figure �: Risk and Compliance Scorecard/Portal

Risk and Compliance Scorecard/Portal

Reporting and Query Engine Risk Analytics

Aggregation Engine

Risk and Compliance

Data Warehouse

Learning Management

Workflow Management

Process Management

Document Management

Data Quality Management Engine

Extract, Transform and Load

Enterprise ApplicationsOpRisk Applications/Data

Risk and Control Self Assessment

External LossData/

Consortium Data

Fraud & Anti-Money Laundering

System

Internal Loss – Event System

Manual KRI Collection

Scenario Analysis

Transaction Systems

HR Systems

IT Management Systems

Financial Systems

Credit and Market

Risk Systems

CRM/ Marketing

Systems

OpRisk Data KRIs

Page 10: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 10

Framework for evaluating ORM systemsThe market for ORM software is highly competitive. Financial institutions have sometimes had some doubts about the benefits of investing in this area, however, they remain prepared to spend significant time and money on it. That is partly as a result of the spread and the success of ORM regulations and methodologies.

The demand for software to automate the ORM process has grown rapidly, particularly over the last two years. Many vendors have offered new ORM applications and there are very few barriers to entry at the lower end of the market. The requisite skills, such as database development, questionnaire or form design, and report creation, have been available for some time.

This has resulted in a diverse range of products that offer a variety of technical approaches and different degrees of functionality, as well as quality.

A financial firm has to compare its individual requirements with the solutions on offer. The decision to opt for one particular product or vendor will depend on a number of factors. These include: functionality, vendor size, customer service, user-friendliness, where and how the data is stored, and – last but not least – size of budget. Organisations have to consider all of these factors, as well as any demand for specific features, and examine every available solution.

Organisations face a difficult choice; there are numerous vendors with different approaches and packages. Often, the short-term solution is not the right long-term investment.

Chartis has developed an Evaluation Framework, described in the table below, to guide firms through the choices they must make when selecting ORM software. Practitioners and end-users have helped to develop the framework so that it reflects the needs of the purchaser. The evaluation criteria carry weightings; organisations may need to adapt these to reflect their specific priorities.

The framework represents the decision-making process used by a financial institution seeking to implement an ORM software application. It includes the key considerations and questions for a potential buyer. It examines:

• Core functionality

• Data management capability

• Vendor characteristics

• Implementation process

• User friendliness

• Complexity

• Customisability/flexibility

• Costs

Page 11: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 11

Table 1: ORM System Vendor Evaluation Framework

CRITERIA WEIGHTINGFunctionality:

Loss Event data capture and reporting 7%Risk & Control Self Assessment 7%

KRIs/Scorecards 7%Scenario Analysis �%

External Loss Data �%Basic Reporting �%

Process Modelling �%Advanced Analytics and Modelling 5%

Total 40%Data Management:

Reference Data Management 2%Data Access 2%

Data Quality Management/Cleansing 2%Data Storage 2%Data Security 2%

Total 10%Vendor characteristics:

Operational Risk Expertise 2%Number and quality of ORM customers 2%

Consulting and Training Support 1%Strategic Direction and level R&D Investment 2%

Help-line Support 1%Geographical Support 1%

Number ORM system support staff 1%Financial/Future Stability �%

Terms & Conditions of Licence 1%Total 15%

Customisability/Flexibility:Data collection forms/questionnaires 5%

Scorecard/KRIs �%Reports: drill-down, OLAP, ad-hoc �%

Interfacing with other applications �%Total 15%

Usability:Intuitive Navigation �%

Presentation/Visualisation capability �%On-line help/documentation 2%

Use of language 2%Total 10%

Implementation:Implementation Time 2%

Time-effort to train users 0.5%Training Requirements 0.5%

Vendor’s commitment and competing projects 2%Total 5%

Total Cost of OwnershipLicence cost (cost per user) 1%

Annual support & Maintenance 1%Implementation and training costs (external) 1%

Implementation costs (internal) 1%On-going internal support & administration costs 1%

Total 5%

TOTAL 100%

Page 12: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 12

Operational risk and compliance under a common governance umbrellaPat Medapa, Director, Operational Risk and GRC Practice

RiskTech

1. Introduction

The Basel II Accord identifies operational risk as a stand alone exposure which not only needs to be adequately capitalized for, but also well managed by banks. Separately, banks have always been subject to meeting a raft of compliance mandates related to the various jurisdictions in which they operate. Even prior to the finalization of the Accord in 2004, several pioneering banks had invested time and resources in addressing the unique challenges and demands of effective operational risk management. Driven by conclusions from data analysis and lessons learnt in implementation of underlying processes, GRC (Governance, Risk and Compliance) software solutions have evolved into mature second generation platforms. Such solutions provide a single platform that:

• delivers an integrated view of a financial institution’s governance framework,

• enables the end-to-end management of operational risk, and

• enables compliance to various central bank regulations, other applicable standards as well as compliance to key internal policies.

This article explores GRC drivers and trends, best practices around assessment planning and the broad functional capability required from a technology solution to address the overlaps between the requirements of multiple risk and compliance initiatives, placing them under a common governance umbrella. Such a platform would enable financial institutions to re-use the output of a Risk and Control Self-assessment (RCSA) across multiple control and oversight programs such as Audit, IT, Security, Sarbanes-Oxley (SOX) and Operational Risk Management (ORM).

2. GRC drivers

External and internal drivers have contributed to the need for change in a financial institutions’ approach and processes for meeting GRC requirements. To add to the challenge, these drivers have been constantly changing in scope and impact, very often driven by the ever growing capability of underlying supporting technologies.

External drivers include:• Pressures on business from the political environment – political action in response to

events such as 9/11, or issues such as global warming, bring pressure on businesses to comply with government sponsored sanctions and requirements. Corporate scandals, varying from questionable management practices, to outright fraud, have focused both investor and public attention. This in turn has motivated regulatory bodies across the

Page 13: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 1�

globe to formulate new and improved public initiatives and regulations, such as Anti Money Laundering (AML) and the Sarbanes Oxley Act (SOX).

• The demand for more ethical business processes and actions – during the 1980’s and 90’s, interest in business ethics accelerated dramatically. Today, most major corporate websites place emphasis on their commitment to promoting non-economic social values under a variety of headings (e.g. ethics codes, social responsibility charters). In some cases, corporations have redefined their core values in the light of business ethical considerations.

• Swings in the economic environment increase business risk – economic downturns are typically the periods when financial institutions experience losses due to credit defaults, litigation around operational practices, and decrease in the value of their investment portfolio.

• The expansion of the legal and regulatory risk environment – the scope and scale of regulatory and legal requirements are continuously growing to meet the load imposed by a world enabled by technology, leading to a move away from a checklist based approach, to one based on risk-based principles and frameworks such as COSO and Basel II.

• Increasing legal and regulatory liability – aggressive action by regulatory bodies leads to increasing litigation, fines, and settlements, and increased scrutiny from rating agencies and listing exchanges.

Internal drivers include• The changing scale and scope of business activity – globalization has resulted in a trend

towards large global financial institutions, as evidenced by recent large scale mergers and acquisitions. The expansion of a financial institution’s reach through organic and/or inorganic growth increases the magnitude of this driver – in large, complex global banks, the number of dependencies and the severity of losses resulting from breaks in such dependencies is magnified.

• Geographical distribution and the intricate web of business partner relationships – as a financial institution expands, it operates in different geographical and political environments. “Going global” increases the level of risk, as well as the number of compliance requirements that a financial institution is subject to.

• Changing and diverse technology environments – organizational ability to generate business through technology, coupled with the need to cut costs, has resulted in a patchwork of applications and hardware, sometimes requiring manual intervention in order to achieve what ideally should be a straight through automated process.

• Limited and scattered siloed approach to risk and compliance – traditional siloed approaches to GRC have resulted in redundancy, inconsistency and sub optimal utilization of information across related programs

3. GRC trends

In response to the drivers described above, financial institutions need to first establish a framework that addresses the varying requirements of, not only various internal control and oversight functions, but also those of business, management and external supervisory bodies. This common framework will allow GRC to be adequately measured and monitored on a sustainable, consistent, efficient and transparent basis. The following trends are emerging in response to the drivers described in the previous section:

• An integrated view of a financial institution’s governance framework across risk and compliance – the current trend in financial institutions today is towards an enterprise risk management framework and the creation of roles such as the chief risk officer and

Page 14: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 1�

chief compliance officer. The role of Finance has also assumed importance in the wake of regulations such as SOX.

• Integration of GRC with Corporate Social Responsibility (CSR) – CSR is a concept whereby financial institutions consider the interests of society by taking responsibility for the impact of their activities on customers, employees, shareholders, communities and the environment, in all aspects of their operations. This obligation is seen to extend beyond the statutory obligation to comply with legislation and sees financial institutions voluntarily taking further steps to improve the quality of life for employees and their families, as well as for the local community and society at large. Internal policies very often are more stringent in scope and requirement than the external requirements that they have been formulated to address. As discussed earlier, the move away from a checklist based approach, to one based on guiding principles, has resulted in those financial institutions with a strong control culture incorporating elements of CSR into the actual GRC program itself. Initiatives such as training, and the active discouragement by management of poor risk management practices and unethical behavior, are some examples of how the trend has developed over the past few years.

• Move to the formalization of a “new products and/or business process” methodology – financial institutions are moving towards a formalized framework to evaluate the impact of the addition or change to a firm’s existing product mix or process structure. Under such a framework, relevant departments evaluate the risk impact of the delta required to accommodate either the new product/process or change to the same, identifying risks associated with the proposed change. Only after all relevant departments have provided their analysis will a consensus “go/no-go” decision be arrived at. These formalized “new products and/or business process” review mechanisms will replace the traditional practice at some large financial institutions where individual locations or business units independently define or alter corporate policies, procedures, controls, and business practices without any central authority or oversight. This formalized approach will lead to standardized business processes, policies and controls, and the establishment of a single corporate policy portal.

• Technology changes to accommodate the emerging requirements of GRC – technology solutions that address risk and compliance requirements are evolving from stand alone point solutions to a single platform upon which solutions are crafted, utilizing the toolkits that accompany such platforms. The “holy grail” of GRC technology solutions is to provide a forms-based data capture capability, with flexible workflow and forms definition, overlaying a single enterprise-wide data warehouse to support cross use of information and reporting across multiple solution packs.

4. The federation of “islands”

The traditional approach to managing risk and compliance was siloed, fragmented and on a case by case basis. For example, theft of a firm’s assets by an employee typically entailed the involvement of the concerned line of business, security and human resources. Lack of a centralized role, such as an operational risk management department, meant that this data would not be utilized to derive and disseminate useful information across other areas of the firm, and potentially avert a repeat instance. As such, a bank should first conceptualize an optimal structure in establishing a governance framework that not only addresses the needs of stand alone control departments, but also serves the oversight requirements of the board, senior management and Audit. Achieving this could even entail a re-structuring of the firm’s overall control and oversight structure, to allow the cross sharing of data analysis/assessments between various departments without compromising the rationale for the existence of such departments. Effective scheduling entails the deliberate consideration of

Page 15: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 15

the frequency and intensity around control assessments required to satisfy the needs of the relevant stakeholders. The figure below depicts the key areas involved in a GRC framework.

Figure �: Integrated GRC – from ‘Ad-hoc’ to Systematic

5. Areas of commonality

For the purpose of identifying areas of data overlap and redundancy, we have set out below the key categories for data collection for ORM and Compliance programs. From a data capture and follow-up perspective, ORM requires the following data across the enterprise

• Operational risk events – events arising from failed or inadequate people, processes, systems or the external environment. Such data is historical and “backward looking”.

• Risk and Control Assessments – the evaluation of the quality of the control environment in mitigating the operational risk exposure of the firm. This process involves risk identification, control identification, control test set-up, control testing, control assessment and risk assessment. Such data provides a “current snapshot” of the quality of the firm’s control environment.

• Key Risk Indicators – the capture of metrics related to indicators that could predict operational failure. Such data provides a “forward looking” view of the firm’s exposure to operational risk.

• Issues and Action Planning – captures, consolidates and tracks the firm’s risk mitigation efforts around control weaknesses identified in each of the three data groups above. Such data provides insight into the proactive nature and effectiveness of a firm’s ORM program.

Note: Operational Risk Management Entities – In order to associate the data to relevant dimensions, initially, the focal points of operational risk management need to be defined. This critical definition may be achieved through a process mapping exercise, whereby the product and services mix of the firm is matched up against the geographical locations where the firm operates. Once the combination of the organizational unit, product and

ComplianceBDRP

IT Security Customer Service

Corporate Communications

ControllersHR

Security

LegalAudit

Facilities Mgt

Individual LoB Mgt Insurance

Legal IT

Risk Mgt

HR

Finance

SecurityMgt

LOB’s

Compliance

Facilities

G R C

‘Ad-hoc’ GRC Systematic GRC

Page 16: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 16

location is defined, all the necessary processes and support functions required to sustain the chain of origination, execution and settlement may be comprehensively identified.

From a Compliance perspective, the following data is required:

• Policy on-boarding – In the event of a new regulation or a change to an existing regulation, the Compliance department is responsible for reviewing the impact; identifying the applicability and setting up of internal deadlines to comply with the change. The result of such analysis will be incorporated into an existing policy repository.

• Compliance obligations – From the policy repository, a list of compliance obligations is extracted. To be kept in mind is the fact that obligations could arise from both external and internal policies. This list details all the compliance obligations that a firm needs to meet in order to be compliant with all the regulations from the multiple jurisdictions that it is subject to.

• Controls – Against each obligation that has been defined, one or more controls with their associated control tests needs to be identified. It is to be noted that the same control may have also been associated with a risk that had been identified in the ORM Risk and Control Assessment process.

• Issues and actions planning – The risk mitigation efforts around any control weaknesses that were identified in meeting the compliance obligations of the firm need to be captured, consolidated and tracked.

Note: Compliance Entities – as with the definition of Operational Risk Management Entities, Compliance Entities also need to be defined, compliance obligations typically being associated to the product or service being offered by an organization unit in a particular geography.

Having completed a comprehensive review of the data requirements of both the ORM and Compliance programs, RiskTech has identified the following two areas with the greatest overlap and duplication, and hence the greatest opportunity for integration:

1. Risk and Control Assessments2. Issues and Action Planning

Control Assessment is a key area for data re-use and eliminating duplication. This is illustrated in the example Risk and Control Self-Assessment (RCSA) process described in Figure 5.

Page 17: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 17

Figure 5: Risk and control self-assessment (RCSA) process example

Org Unit

Mapping to

• Legal entity

• Product

• Standard BII business lines

Proc 1

Action 1

Action 2

Action ‘N’

Ctrl Audit Issue 1

Ctrl Audit Issue 2

Ctrl Audit Issue ‘N’

Ctrl Audit 1

Ctrl Audit 2

Ctrl Audit ‘N’

Ctrl Test 2

Ctrl Test ‘N’Proc 2

Proc ‘N’

Risk 1

Risk 2

Risk ‘N’

Ctrl 1

Ctrl 2

Ctrl ‘N’

Ctrl Test Issue 1

Ctrl Test Issue 2

Ctrl Test Issue ‘N’

Ctrl Test 1

RCSAIdentification and evaluation of risks to process/resources and product

Identification and evaluation of controls around the risks

Calculation (configurable) of inherent • Risk rating• Effectiveness of controls rating• Residual risk rating

Mitigating actions – control gaps acceptance with justification

‘N’ – Classifications or attributes may be attached to Process, Risk, Control, Action, Control Test, Control Test Issue, Control Audit, Control Audit Issue

Flexible workflow definition

Management RSCA Independent Control Testing and Control Audit

Control TestingIndependently test the controls defined and evaluated in the RCSA

Access (read only) to the entire RCSA and related action planning

Management response enabled to Test Issues identified

Control AuditIndependently test the controls defined and evaluated in the RCSA and also evaluate the Control Testing

Access (read only) to the entire RCSA and related action planning

Access (read only) to the Control Testing and Test Issues

Page 18: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 18

Similarly, the integration of “Issues and Action Planning” activities across Compliance and ORM programs would provide a significant opportunity to eliminate duplication, reducing the cost and time required to complete associated action plans and increase consistency across the enterprise.

6. Assessment planning

While ORM is still an evolving discipline, financial institutions have always been subject to a multitude of regulations and compliance obligations that are unambiguous, well defined and well understood. The consequences of non compliance are relatively severe – while ORM best practice is defined by the firm’s adherence to a set of prescriptive guidelines, non compliance to a regulation could result in steep regulatory fines or even the closure of the firm’s operations. The outcome of control testing is utilized ultimately to arrive at an overall Control Assessment of the applicable entity against which the control is associated. Control Testing has two key variables:

1. Control Test Frequency – the periodicity of the control test, be it daily, weekly, monthly, quarterly, semi annually or annually.

2. Control Test Intensity – the rigor with which the control test is performed. This typically relates to the sample size of control test data which could range from the entire set of transactions that have occurred within the period of the control test to a rule based proportion of such set of transactions within the timeframe of the control test frequency.

Control Assessments based on frequent and intense control testing are obviously more reliable than Control Assessments based on less frequent and/or less intense control testing. It is reasonable to assume that, given the consequences of non compliance, the testing and assessment of controls related to key compliance obligations will, while not necessarily more frequent, at least be more intense than the control assessment requirements of an ORM program.

A common pain point being experienced by large financial institutions today is the time and effort being consumed in the Risk and Control Assessment process. Control Testing is the area that requires the largest set of resources and time to complete. Very often, a line of business is required to provide evidence to the Compliance program of the quality of controls that have been mapped to a compliance obligation, shortly followed by a similar requirement from the ORM program. This redundancy, and wasted time and effort, may be limited by effective assessment planning that requires the involvement of the stakeholders, supported by the appropriate technology platform.

The key elements of effective and efficient assessment planning are:

• Identification and participation of the stakeholders, such as business lines, ORM, Compliance, other specialist and support departments such as Legal, HR, Finance, Audit, IT, Security, Facilities and Vendor Management, etc.

• A mapping of the risks that have been identified in the ORM program to the obligations as defined by the compliance program. This mapping could be explicit or implicit via the common control(s)

• A mapping of the different entities involved, e.g. ORM, Compliance and Audit entities

• The establishment of trigger conditions for assessments, related messages and notifications – including subscriptions, content, and type – task or alert

• The identification of those controls whose assessments could be re-used and the areas that potentially would re-use this information

Page 19: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 19

7. Broad functional capability of an integrated operational risk management and compliance platform

The following broad functionality must be available on a technology platform to meet the needs of ORM, Compliance and Audit

• Definition of entities – the capability of combining stand alone hierarchies such as organization unit, product, process, location into individual entities

• Policy and procedure management – serves as a repository for all policies and procedures to be followed across the enterprise. Document management capability is required to track changes to existing policies and procedures. Alternatively, a link to an institution’s formal central corporate policy management portal would meet this requirement.

• Policy repository – a repository of the current policies that are being followed across the enterprise

• Compliance obligations – captures the entire set of compliance obligations that an enterprise must meet to satisfy its regulatory requirements

• Risk – the library of risks that have been identified, to be made available across the enterprise. Such risks may be tagged by the appropriate centralized department, as applicable to an entity, or could be used as reference and customized to local conditions.

• Controls – the library of controls (and associated control tests) and made available across the enterprise

• Key risk indicators – collects and collates configurable risk indicator information

• Event Management – collects Loss and Near miss Event data from around the Organization

• Workflow – configurable workflow across data capture modules and related entities

• Assessments – Planning and capturing assessments of controls and risks, including certifications required by certain compliance regulations, e.g. SOX

• Economic capital – the estimation of Operational Risk Capital utilizing the Advanced Measurement Approach

• Issues and action planning – the consolidated capture of Issues arising across programs, and their associated Action Plans.

• Audit – this requirement is focused on Risk-based Audit. Risk-based Audit is a system of random and more frequent audits based on the risk profile of individual business units/support functions/products. The annual audit plan should include the schedule and the rationale for audit work planned. It should also include the areas and their prioritization based on the level and direction of risk. At minimum, an independent area within Assessments and Issues and Action Planning must be provided to support Audit’s oversight role.

• New product and process assessment – prior to the addition of a new product or process to the firm’s current mix or a change to an existing process being followed, an assessment of the impact must be performed to support the final decision.

8. The business benefits and value proposition

The identified clear cut benefits of integrated GRC to an enterprise can be summarized as:

• Reduced complexity and redundancy – re-use of control assessments reduces the complexity and decreases cross program redundancy

Page 20: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 20

• Decreased cost – reduced effort in control testing results in cost and time savings

• Improved reliability – the re-use of control assessments based on high control test frequency and intensity to satisfy less demanding requirements results in improved reliability

GRC allows financial institutions to realize sustained benefits from an integrated solution for risk management, internal audit, corporate governance and compliance management. Some of the key value additions are as follows:

• An integrated and standardised approach to manage risk and compliance from a single platform

• Ability to leverage common controls and tests for managing complex regulatory requirements as well as risks

• Enhanced management analytics, reporting and performance metrics

• Improved overall quality of information and decision-making ability

About the authorPat Medapa Director, Operational Risk and GRC Practice, RiskTech

Pat Medapa is the Head of the Operational Risk and GRC practice at RiskTech. He has been involved in the field of operational risk management for over twelve years. Previously, he was Operational Risk Practice Head at i-flex Consulting and has been a key member of the ORM consulting team at Pricewaterhousecoopers. Over the last ten years, Pat has led successful ORM and GRC programs for financial institutions in the US, Europe and Asia-Pacific. He started his career in operational risk in the 1990s as a key member of the team that conceived, developed and implemented the operational risk management and modeling framework at Bankers Trust. He holds a Masters degree in Business Administration (Finance) from the University of Nevada, Las Vegas and is a graduate in Science from the University of Bangalore, India.

Contact: [email protected]

About RiskTechRiskTech’s (Risk Technology International) mission is to be the worldwide, first-choice resource for all financial institutions involved in implementing and managing risk and compliance technology solutions. Our pool of experts is drawn from leading financial institutions, ‘top four’ consulting firms and top risk software vendors with ‘real-life,’ practical experience. With offices in New York, London and Mumbai, RiskTech’s global consulting services include:

• Credit risk management

• Market risk management

• Asset & liability management

• Operational risk management

• ERM technology selection and implementation

• Value-based compliance covering: Basel II, Sarbanes-Oxley, Solvency II, AML and MiFID

For more information: www.risk-technology.com

Page 21: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 21

The cyclicality of operational risk: The tracking phenomenonPenny Cagan, Managing Director, Operational Risk Research and Content, Algorithmics and Yakov Lantsman, Senior Vice President, Algorithmics

Introduction

The genesis of this paper came from a simple observation. We noticed that when we plotted out operational risk data, there were spikes in the number and severity of loss events in 1994, 1998, and 2002. This led to more in-depth research, comparing changes in operational risk loss events with a standard measure of volatility.

The first thing we noted was that these years were all periods of significant market swings, so we set out to find a measure that we could test against our emerging theory that operational risk events track market volatility. We are familiar with the work others have done on tracking stock prices and shareholder value with operational risk; we supplied loss event data to many of these studies. (See “Operational Risk in the Insurance Industry” by Ran Wei, http://irm.wharton.upenn.edu/F03-Wei.pdf and “Managing Operational Risk in Banking” from McKinsey & Co, authored by Robert S. Dunnet, Cindy B. Levy and Antonio Simoes.” http://fs.mckinsey.com/Display.aspx?id=66e9b645-704c-4d1f-911d-6c4b38d2015a)

This time, we wanted to test our hypothesis against a standard measure of market volatility. This approach was influenced by the events of the summer of 2007, when the stock markets experienced a liquidity crisis on the heels of the discovery of inherent problems in the subprime mortgage sector. At the time, we had no idea that the markets would experience the largest unauthorized trading event in modern banking history, although we had a sense that the environment was conducive to such an occurrence. We set out to pull together analytics to explain what we intuitively felt was a probable occurrence in the near future.

We settled upon the Volatility Index, or VIX, from the Chicago Board of Exchange (CBOE) as our standard measure of market volatility. The CBOE defines the VIX as “a key measure of market expectations of near-term volatility conveyed by S&P 500 stock index option prices.” The CBOE also states that the VIX has come to be known since 1993 as “the world’s premier barometer of investor sentiment and market volatility.” The VIX index tracks investor sentiment and is reflective of what is happening in the markets. Our supposition, given some unique features of operational risk events, and the lag between “begin” and “end” date, was that there are at least certain categories of risk types that might track alongside market volatility.

Page 22: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 22

Figure 6: (From the Chicago Board of Exchange and Algo FIRST*): VIX index and large operational risk loss events

Tracking changes: Mapping operational risk loss events against the VIXThe CBOE states that the VIX has come to be known, since 1993, as “the world’s premier barometer of investor sentiment and market volatility.” The start date for the VIX was ideal for our purposes, as it approximately coincided with the date when we first started collecting loss event data in the early 1990s. An empirical observation of spikes in the VIX corroborated that we were using the right index for our study and that we were onto something (see Figure 6).

Both the VIX graph, and that representing loss events in our internal operational risk loss database, represented in the broader sense, the patterns of a Sine Wave, which, if graphed to display the outline of a stone dropped into a still lake, would form waves at the moment of impact. We started thinking of operational risk loss events in this same way: we noticed an increase in the disclosure of operational risk loss events around the same time as the formation of “volatility waves” in the market and what we came to name the “tracking phenomenon.”

Our next step was to map loss events against the VIX index. We experimented with frequencies and slices of the data, until we were able to present the two data sets in a way that made sense, from both a quantitative, and business perspective. Although we believe that daily data is the best barometer of volatility, for purposes of comparing both data sets, we aggregated the VIX data to an average annual frequency. We continue to investigate the use of daily volatility data in our research work in a mission to uncover a “point in time” measure that makes sense from the perspective of both the volatility and loss event data sets.

It is difficult when “dates of occurrence” are considered in an examination of operational risk events, because, with a few exceptions, operational risk events do not represent a point in

CBOE Volatility index (VIX) since 1990

VIX

Dai

ly c

losi

ng p

rices

Sources: CBOE and Bloomberg (Jan 2, 1990 – Jan 14, 2008

10

20

�0

�0

50

01/2/90 12/31/91 12/29/93 12/28/95 12/26/97 12/29/99 1/4/02 1/7/04 1/9/06 1/11/08

Kidder Peabody/J.Jett $�50m UAT

Codelco $170m UAT

Barings $1.�bn UAT

BankBoston $7�m fraud

WGZ $2�0m UAT

Enron $2.2bn

fraud

AIB Allfirst $691m UAT

Hamilton Bank $1�0m fraud

SocGen $7.2bn UAT

Calyon 2�7m UAT

Page 23: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 2�

time, but a continuum that encompasses a breakdown of internal controls, and a trigger that leads to the actual loss event. For this reason, we also decided that it made the most sense to use “end date” or “discovery date” as an approximation for a “point in time” when comparing loss data with volatility.

Because what we were after was volatility and a measure of change, which is essentially what the VIX measures, we mapped loss events against the volatility measure according to the change in number of total frequency of events. This also allowed us to adjust for a collection bias and the probability that as the disclosure of events becomes more transparent in the industry and media, it is more likely that we have identified a larger collection of losses during later years. When we plot the change in frequency of the total number of loss events against the changes in the average VIX, it becomes evident that changes in the two indexes track each other during key periods of volatility (see Figure 7).

Figure 7: Changes in total frequency of operational risk loss events vs. changes in the average VIX.

Figure 7, which demonstrates a link between market changes and the change in number of loss events, was a good starting point in our analysis. The graph displays a pattern between the two data sets. They appear to increase and decrease in tandem during our targets periods of market volatility: 1994, 1998, and 2001 – 2002.

Our next task was to split the operational risk loss data into its five risk class components and examine if there was a type of risk that might be more pronounced, either in terms of a point in time action, or discovery during times of volatility. Figure 7 examines all the risk classes aggregated together. We proceeded to compare the VIX data against our five risk classes: people, process, relationship, external, and technology. (See definition of the risk classes in the following discussion.) Our supposition was that when we tested the data against individual risk classes that are more homogenous groups of data, we would discover stronger dependencies between operational risk loss events and volatility.

An examination of the VIX shows that times of great volatility tend to last for relatively short, intense periods. This is very different from the profile of large risk events that can continue for years, or in the most extreme examples decades, before they are uncovered or discovered. We track duration of operational risk loss events from the onset of the initial fraud, until its settlement or discovery date. What we have observed is that the point in time when a large

0.0

0.2

0.�

0.6

0.8

1.0

1.2

1.�

1.6

1.8

1991 199� 1997 2000 200� 2006

Changes in Total FrequencyChanges in Average VIX

Page 24: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 2�

fraud or unauthorized trading event is revealed, is often concurrent with market volatility. This is evident in the examples of real loss events that we provide in this paper.

The loss data itself and the sample loss events demonstrate that an event may be ongoing for a relatively long period of time, but market volatility increases the probability that it will become discovered. In the case of unauthorized trading events, for instance, as market conditions become more volatile, the rogue trader continues to increase his losses while he tries to trade himself out of an ever-increasing hole. (See Codelco and Kidder Peabody cases discussed in this paper.) It becomes increasingly difficult to hide the accumulating losses until, almost by serendipity, they are uncovered. In addition, times of volatility lead to a “tightening of the belt” mentality in financial institutions, which also raises the likelihood that a risk event will be discovered.

What this means is that contrary to general sentiment, losses do not lag behind market swings and volatility does not necessarily create a more fertile ground for operational risk losses. The rogue individuals and fraudsters are often long at work in perpetrating their misdeeds before the markets turn volatile. Instead, it enhances the severity of such losses and leads to their eventual unravelling. In other words, there is a greater chance that loss events will be ferreted out from the holes in which they have been hiding during market swings.

What is interesting is that while the largest operational risk events are uncovered during volatile market conditions (Societe Generale, Enron, Barings, BCCI, Kidder Peabody, Codelco), they were ongoing during times of relative calm and prosperity. We believe this is consistent with the general belief in credit risk,that times of exuberance and positive market conditions can lead to a lax risk culture. This also holds true for operational risk cultures, which might operate under a more fluid control environment during growth periods. When markets start turning downward, both credit and operational risk officers have a tendency to “tighten their belts.”

Page 25: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 25

The impact of volatility on risk classesWe track loss events according to five risk classes:1. People Risk: The risk of a loss intentionally or unintentionally caused by an employee—

i.e. employee error, employee misdeeds— or involving employees, such as in the area of employment disputes. This risk class covers internal organizational problems and losses.

2. Process Risk: Risks related to the execution and maintenance of transactions, and the various aspects of running a business, including products and services.

3. Relationship Risk: Losses arising from the relationship or contact that a firm has with its clients, shareholders, third parties, or regulators.

4. Technology Risk: The risk of loss caused by a piracy, theft, failure, breakdown or other disruption in technology, data or information; also includes technology that fails to meet business needs.

5. External Risk: The risk of loss due to damage to physical property, or assets from natural or non-natural causes. This category also includes the risk presented by actions of external parties, such as the perpetration of fraud, or in the case of regulators, the execution of change that would alter the firm’s ability to continue operating in certain markets.

When we examined the change in number of events in each of the five risk classes separately against changes in the VIX, it became evident that the closest match was the people risk class, which includes embezzlement, fraud, trading misdeeds, and other acts of intentional employee related malfeasance (see Figure 8). We noticed a less pronounced but still notable tracking effect when we isolated changes in relationship risk events vs. changes in the VIX (see Figure 9).

Figure 8: Changes in people risk class vs. changes in the VIX

0.0

0.2

0.�

0.6

0.8

1.0

1.2

1.�

Year 199� 1996

1.6

1999 2002 2005

Changes in People FrequencyChanges in Average VIX

Page 26: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 26

Figure 9: Changes in relationship risk class vs. change in the VIX

People risk losses: The key to monitoring potential operational risk losses during times of volatilityThe tracking phenomenon demonstrated in our people risk category of events, as viewed in Figure 8, suggests the importance of enhancing monitoring of this category of potential events during times of volatility, such as we witnessed in the summer of 2007. We continue to be in the throes of extreme market volatility, but it is apparent that the number and severity of people risk events have increased. We have experienced two notable unauthorized trading events which impacted two French banks: the first $347 million event surfaced during the turbulent 2007 summer. The second significantly larger loss event, valued at an estimated $7.2 billion, was discovered in early 2008.

There are a variety of archetypical people risk events that can occur during times of volatility. These include unauthorized trading, front-running, embezzlement, misappropriation of funds, and aiding and abetting. Below, we have provided excerpts from the full case studies in our operational risk database, in order to demonstrate the scope and severity of events that have occurred in the past, during times of market volatility. The following is a list of market events that led to volatility and associated people risk events.

Market Event of 1994: The Federal Reserve raises interest rates multiple timesThe US Federal Reserve raised interest rates several times in 1994, which resulted in substantial losses across the industry for derivative products with underlying securities tied to interest rates. Interest rates had been low for a long time before this period and interest-rate derivatives felt like a safe and profitable investment; the markets appeared to forget that rates would start heading upwards at some point. Some managers of conservative mutual funds during this period added derivatives “kickers” to their portfolios. When rates started being raised month after month by the Federal Reserve, a large number of institutions that had purchased derivatives lost money, including Gibson Greetings, Procter & Gamble, and mutual fund managers. Examples of large people risk events from 1994:

• The Joseph Jett bond-trading scandal was one of a series of problems that plagued Kidder Peabody and eventually prompted the sale of the once highly profitable and elite firm by parent entity General Electric to PaineWebber in 1994. The SEC alleged that between 1991 and 1994, Joseph Jett faked nearly $350 million in profits in order to hide

Changes in Relationship FrequencyChanges in Average VIX0.0

1991 20011996

0.5

1.0

1.5

2.0

2.5

2006

Page 27: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 27

$80 million in losses through a complex trading scheme. The SEC ultimately targeted lax controls within the company as a contributing factor to the event and criticized Kidder’s management for poor supervision and judgment, and for creating an environment where "employees were unwilling to ask tough questions when money was being made." In March 2000, GE agreed to pay $19 million to settle a class action shareholder suit. In a final resolution of the case, the Southern District Court of New York entered a judgment on September 7, 2007 that ordered Jett to repay $8.21 million and a $200,000 fine.

• In 1994 and in an unauthorized trading case, Corporacion Nacional Del Cobre De Chile (Codelco), the world's largest copper mining company, incurred a $170 million loss from the activities of rogue trader Juan Pablo Davila. During the course of the 1994 copper futures scandal, Codelco discovered Davila, its chief futures trader, had engaged in unauthorized trading activities. Between 1993 and 1994, Mr. Davila was alleged to have made unauthorized trades that cost the company $170 million.

Market Event of 1998: Russia defaultsRussia was into its sixth year of economic reform in 1998, and the first one of positive economic growth since the fall of communism, when it failed to meet its debt obligations. Russia was in the process of renegotiating the sovereign debt it had inherited from the former Soviet Union when it defaulted in August 1998. On August 17, 1998, the Russian government floated the exchange rate, devalued the ruble, defaulted on its domestic debt, and restructured its ruble-denominated debt. It also suspended all payments to foreign creditors for 90 days. This led to a collapse in other unrelated sectors of the emerging markets and multi-billion dollar losses at US hedge fund Long Term Capital Management (LTCM). The effect on the market of LTCM’s unwinding its position was so enormous that the Federal Reserve Bank, in a historic move, initiated a bailout of the hedge fund.

Examples of large people risk events from 1998:

• On October 23, 1998, Westdeutsche Genossenschafts-Zentralbank eG (WGZ Bank) uncovered a people risk incident that cost the German co-operative bank $230 million. Two currency/FX option traders had manipulated data since the second quarter of 1997, in order to cover up losses they had incurred due to unauthorized trading. The perpetrators worked at WGZ Bank for many years and knew the vulnerabilities in the bank’s computer system that allowed them to circumvent internal controls. In order to hide their losses from detection by daily market risk control systems, the traders entered incorrect values into a system that calculated dollar exchange rates.

• In a case of people risk, the former executive at BankBoston's international private bank in New York, Ricardo Carrasco, was charged with defrauding the bank of $73 million. In February 1998, Carrasco disappeared and a month later it was alleged that he had embezzled money by making fraudulent loans. BankBoston filed a $67 million lawsuit in May 1998, alleging that Carrasco had "fraudulently induced" the bank to grant $73 million loans to Argentine businessman Barreiro Laborda and companies controlled by Laborda. The Federal Reserve said that Carrasco opened at least 26 accounts for Laborda over a three year period, beginning in 1994.

Market Event of 2001 – 2002: Spitzer focuses on market practice issues; Enron collapses2001 and 2002 were years of great change in the financial services industry, as a result of the activist stance of former New York State Attorney General Eliot Spitzer. The former Attorney General changed the rules of the game for what was acceptable on Wall Street when he focused attention on consumer issues and how small investors are impacted by market practices.

Page 28: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 28

Regulators of the financial services industry, such as the Securities and Exchange Commission and the Federal Reserve Bank, previously focused on issues of solvency and an institution’s ability to preserve capital during times of volatility. This period also saw the dissolution of Enron and Worldcom – two of the largest companies in the United States – and accounting frauds that surfaced in many other institutions. Eliot Spitzer was later named “Man of the Year” by the Financial Times, in recognition of the global impact he had on the financial markets. Examples of large people risk events from 2002:

• In what the Financial Times (2/7/2002) called "another chapter in the cult of the rogue trader," and the largest such case since Nick Leeson managed to topple Barings Bank, Allied Irish, Ireland's largest bank, revealed on February 6, 2002 that a currency trader had disappeared after defrauding a US-based subsidiary of $691.2 million. John Rusnak was identified as the rogue trader who worked at Allied Irish’s Maryland-based subsidiary, Allfirst. He initially went into hiding after the event was made public. Mr. Rusnak later surfaced and pled guilty to one count of bank fraud on October 24, 2002. He was sentenced to a prison term of seven and a half years in January 2003. It was later determined that the small Maryland-branch operation did not have the proper controls in place in order to oversee a proprietary trading operation.

• The US Office of the Comptroller of the Currency (OCC) and the Federal Deposit Insurance Corporation (FDIC) shut down Hamilton Bank N.A. of Miami, on January 11, 2002. Hamilton Bank had about $130 million of potentially uninsured deposits held in approximately 3,600 accounts at the time of its closing. In 2006, Hamilton's chairman, Eduardo Masferrer was sentenced to 30 years and 2 senior officers of the bank drew shorter prison terms. A law firm that represented Hamilton’s audit committee also agreed to pay fines in settlements with the OCC and FDIC.

Market Events of 2007 & 2008: Crunch in credit markets and subprime blow-up lead to volatile trading conditionsMarket conditions for all financial institutions and lenders became so precarious during August 2007 that the Federal Reserve stepped in to add liquidity to the markets. The Federal Reserve last provided cash to the banking system in 1998, during the collapse of hedge fund Long-Term Capital Management. When the Federal Reserve moved to cut the discount borrowing rate, it released a statement saying that risk in the markets had increased “appreciably.” With short-term borrowing all but shut down by an associated freeze in the bank wholesale lending sector, and capital market transactions halted, trading markets drifted wildly between highs and lows.

Examples of large people risk events from 2007 and 2008:

• Credit Agricole released a statement on September 18, 2007 indicating that a “large market position on the books” of subsidiary Calyon’s New York-based “proprietary trading desk” had been uncovered. The position was in unidentified credit market indices that were acquired “during the last days of August and in excess of unauthorized internal limits.” The bank said that when the cost of unwinding the trade is accounted for it will result in a €250 million ($347 million) loss. The position in question was taken by Calyon’s proprietary trading desk. An unidentified six traders were allegedly involved in building up the unauthorized position. The accumulation of unauthorized positions occurred in late August 2007 and at the height of the market volatility that was caused by the credit crunch and problems in the subprime mortgage sector.

• Societe Generale announced a €4.9 billion (USD $7.2 billion) loss on January 24, 2008 as a result of the misdeeds of one rogue trader. The bank characterized the largest rogue trading event to date as the result of “elaborate fictitious transactions” that allowed the 31-year-old trader to circumvent a series of internal controls. The trades in question

Page 29: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page 29

involved “plain vanilla” stock-index futures. The trader previously worked in a back office function for the bank and is believed to have gained knowledge of how to circumvent the bank’s systems through this prior position. He was characterized by the governor of the Bank of France as a “computer genius.” SocGen estimated that the value of Kerviel’s positions was 50 billion euros ($73.26 billion). A recent report published by the French Finance Ministry estimated that Kerviel’s rogue trades started in 2005.

Conclusions: Market volatility and operational riskIt is generally believed in the risk world that market booms lead to “irrational exuberance” and a certain laxity in lending standards that can create losses later on when market conditions turn downward. We especially believe that this is true with operational risk and business practices. The operating environment and control structure of a financial institution may become “more fluid” and “adaptive” during exuberant times, when the implementation of controls might be viewed as counter to growth and entrepreneurship. With the present identification of people risk losses that are in particular tracking market volatility, we believe it will become possible for risk managers to more accurately and astutely track potential weaknesses within their organizations.

There are a number of controls that were apparently missing, weak, or nonperforming in the loss events that are excerpted in this paper. Supervision is a key issue and, in many of these cases, a lack of supervision was cited as a prominent omission by regulators. These events may have been perpetrated by a single individual, or group of wayward employees, but management was seemingly looking the other way. In many of the unauthorized trading events, the rogue trader was booking returns significantly above the average. In these cases, management often abdicates its role to “manage,” in favor of looking the other way. Managers and supervisors need to be willing to “ask the tough questions” at all times, but especially during times of high market volatility.

Testing for data accuracy is another contributing factor that was present in many of the events discussed above. Many of the internal frauds and rogue trading events involved some sort of manipulation of data. Many of the traders had knowledge of how their company’s systems operated and had the wherewithal to figure out how to manipulate inputs into company accounts, trading books, risk management systems, or ledgers. For the most part their inputs went unchecked and were not validated by another set of eyes. Times of high market volatility demand not just double verification, but perhaps triple verification of such inputs. It is also wise to run tests on internal risk systems, in order to determine where there could be vulnerabilities.

This emphasis on people risk and internal fraud does not mean that other types of risks, such as relationship risk, involving regulatory authorities, clients, and market practices, do not increase during times of volatility. In fact, some of the largest risk events fall into this category. This includes the large Enron, WorldCom, and conflict of interest settlements that global banking organizations reached with shareholders and regulators. The people risk category most closely tracks market events, but in general, all risk categories increased in terms of their rate of change along with an increase in volatility.

Times of volatility raise the stakes in the risk management game. Risk climates are established during times of relative calm and quiet. Risk managers always face the challenge to maintain their independence and receive senior management approval for their risk management initiatives. These times demand enhanced scrutiny of operational risk, with the associated prospect that additional capital may need to be set aside to cover

Page 30: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page �0

associated losses that surface during this period. This suggests an associated move during such extraordinary times from “loss prevention” in a stable operating environment to “loss control” in a more tumultuous one. It may be that we will come to a time when we can more accurately track risk capital to market volatility and adjust the levels as necessary, and according to market demands.

It is our belief that market volatility is a powerful indicator of increased frequency of operational risk events – and especially in the category of internal fraud. Extreme swings in volatility in a market or sector should serve as a warning that it is no longer a “status quo” situation. We hope this research will help create a proactive response to operational risk during times of volatility and an opportunity for our clients to approach such times with an “all hands on deck” attitude.

We will continue to track and monitor loss events against volatility measures and deepen our analytical research into the topic. Our continuing effort includes the tracking of operational risk events and the further development of an analytical framework in order to model dependencies between the VIX and possible additional indices and operational risk loss data. Our goal is to eventually develop best practices and business approaches toward the understanding of how volatility impacts the management of operational risk and what specific actions need to be taken, or practices modified, during times of high volatility.

*Note: all loss data used in this study is from Algo FIRST, Algorithmics’ database of external risk loss events.

Page 31: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page �1

About the authorsPenny CaganManaging Director, Operational Risk Research and Content, Algorithmics

Penny Cagan is a Managing Director with the operational risk division of Algorithmics. Leveraging over twenty-five years experience in financial services research, Penny manages the operational risk loss event databases Algo FIRST and Algo OpData, and leads research for the group. A highly-regarded and frequently requested speaker, Penny has delivered many keynote presentations and has published numerous articles in Risk magazine, Operational Risk newsletter, FOW, and the John Liner Review. Penny developed the case study approach to operational risk based on external events, and was the first person to go to market with an operational risk case study database. As manager of Algo FIRST for the past seven years, she has established the best practice standard for examining and analyzing industry case studies. Earlier in her career, she served as Head of Research for Deutsche Bank’s North American Business Information Services division and as Head of Reference Services with PaineWebber’s investment banking division. Penny holds a MLS in Library Science and a BA and MFA in English Literature and Creative Writing. [email protected]

Yakov LantsmanSenior Vice President, Algorithmics

Yakov Lantsman is a Senior Vice President at Algorithmics, where he guides the company’s quantitative modeling efforts. A twenty-year veteran with vast industry experience in applied mathematics and risk modeling, Yakov is a frequent presenter and author on modeling very complex processes, including fitting distributions, identifying theoretically valid computational short-cuts, and econometric modeling. Prior to joining Algorithmics, Yakov was Senior Vice President at Willis Re, leading the company’s Research and Development efforts. This role built on Yakov’s experience with Fitch Risk Management Services, where he was Senior Vice President and Head of Quantitative Services, as well as his experience as Assistant Vice President at Guy Carpenter & Company, where he was responsible for research and statistical modeling. Yakov received a PhD in Mathematics from Tashkent Institute of Technology and a MS in Mathematics from Tashkent State University.

Page 32: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page �2

About AlgorithmicsAlgorithmics is the world’s leading provider of enterprise risk solutions. Financial organizations from around the world use Algorithmics’ software, analytics and advisory services to help them make risk-aware business decisions, maximize shareholder value, and meet regulatory requirements. Supported by a global team of risk experts based in all major financial centers, Algorithmics offers proven, award-winning solutions for market, credit and operational risk, as well as collateral and capital management. Algorithmics is a member of the Fitch Group.

© 2007 Algorithmics Software LLC. All rights reserved. You may not reproduce or transmit any part of this document in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the express written permission of Algorithmics Software LLC or any other member of the Algorithmics’ group of companies.

ALGO, ALGORITHMICS, Ai & design, ALGORITHMICS & Ai & design, KNOW YOUR RISK, MARK-TO-FUTURE, RISKWATCH, ALGO RISK SERVICE, ALGO CAPITAL, ALGO COLLATERAL, ALGO CREDIT, ALGO MARKET, ALGO OPVANTAGE, ALGO OPVANTAGE FIRST, ALGO RISK, and ALGO SUITE are trademarks of Algorithmics Trademarks LLC.

Page 33: Operational Risk Management Systems 2008

© Chartis Research Ltd 2008 Page ��

Related Chartis ResearchOperational Risk Management Systems 2008 – Market Analysis March 2008 – Doc #RR0801 • Research Report

RiskTech 100 – 2007November, 2007 – Doc # RR0703 • Research Report

RiskTech 100 – 2006November, 2006 – Doc # RR0603 • Research Report

Operational Risk Management Systems 2006May, 2006 – Doc # RR061 • Research Report

Operational Risk Management Systems – Case StudyMay, 2005 – Doc # RN056 • Research Notes

Operational Risk Management – Key Risk Indicators and ScorecardsMay, 2005 – Doc # RN055 • Research Notes

Operational Risk Management – The Quantification Challenge May, 2005 – Doc # RN054 • Research Notes

Regulatory Capital Assessments for Banks – Key Challenges March, 2005 – Doc # RP0604 • Research Notes

Economic Capital Best Practice – Life InsuranceFebruary, 2006 – Doc # RP0603 • Research Notes

Economic Capital Best Practice – BankingFebruary, 2006 – Doc # RP0602 • Research Notes

Riak Aggregation – Best PracticeMarch, 2006 – Doc # RP0601 • Research Notes

All related research can be found at www.chartis-research.com

Page 34: Operational Risk Management Systems 2008

Chartis Research Europe Chartis Research USThe City Arc �� Wall StreetCurtain Court 12th Floor7 Curtain Road New YorkLondon EC2A �LT NY 1005

+�� (0)2078�09661 +1 212 �61 7127

www.chartis-research.com