47
WWW.CHICAGOLANDRISKFORUM.ORG What’s New in Risk Assessment?

WHATs NEW IN RISK ASSESSMENT

Embed Size (px)

Citation preview

Page 1: WHATs NEW IN RISK ASSESSMENT

W W W . C H I C A G O L A N D R I S K F O R U M . O R GW W W . C H I C A G O L A N D R I S K F O R U M . O R G

What’s New in Risk Assessment?

Page 2: WHATs NEW IN RISK ASSESSMENT

22

Page 3: WHATs NEW IN RISK ASSESSMENT

33

Risk Management Depends on Risk AssessmentThe simplest definition of Risk Management involves 3 steps:

Page 4: WHATs NEW IN RISK ASSESSMENT
Page 5: WHATs NEW IN RISK ASSESSMENT

55

Risk Assessment Has Many Moving Parts!

Page 6: WHATs NEW IN RISK ASSESSMENT

66

Strategic Risk Assessment: What is Important to Achieving Organizational Objectives andNot Under [Complete] Control?• Identifying threats and exposures without measurement only

generates lists -- that may or may not be applicable or important to the organization.

• Some ERM projects create spreadsheets full of “Critical Risks” that frustrate management and fail to provide a blueprint for action.

• Instead of identification run rampant, Strategic Risk Assessment starts with corporate objectives and considers what is at risk, identifies potential threats, and assesses the impact and the effectiveness of current controls to counter those threats – and points to controls where objectives are threatened.

Page 7: WHATs NEW IN RISK ASSESSMENT

77

Strategic Risk Assessment IssuesTo be effective, risk assessment cannot be merely checklists or a process that is disconnected from business strategy. • Risk Assessment must be integrated in a way that provides

timely and relevant risk information to management. • For risk management to be a strategic process, risk assessment

must be owned by the business units and be embedded within the business cycle, starting with strategic planning.

• And: Risk assessment begins and ends with the organization’s specific objectives.

Page 8: WHATs NEW IN RISK ASSESSMENT

8

Strategic Risk Assessment

Qualitative AnalysisRisk Register ◄

Risk Map ◄Risk Categorization ◄

Quantitative Analysis► Decision Tree Analysis► Scenario Analysis► FMEA► Simulation & Modeling

Page 9: WHATs NEW IN RISK ASSESSMENT

99

Risk Assessment Basics• It is a matter of widespread understanding that risks should be

assessed in terms of the likelihood (probability) that an uncontrolled event will occur and the consequences (impact) to achieving one or more organizational objectives.– Applicable to both qualitative and quantitative methods of

assessment.

• Strategic Risk Assessment requires pursuing a systematic, logical set of actions to identify the magnitude of hazards and exposures, assess threats, and implement controls to mitigate, eliminate or control high-risk conditions.

Page 10: WHATs NEW IN RISK ASSESSMENT

Risk Maps Are Primarily Qualitative Assessments

Page 11: WHATs NEW IN RISK ASSESSMENT

Qualitative Methods & Risk Maps Highlight Critical Threats

Page 12: WHATs NEW IN RISK ASSESSMENT

Data gathering & representation

Select appropriate techniques(s)

Risk analysis & modeling Expert judgment

RISK

But Quantitative Methods are Often Required to Identify Corrective Actions

Page 13: WHATs NEW IN RISK ASSESSMENT

1313

Risk Assessment Tools & Techniques Are Rapidly EvolvingRisk Assessment needs to move beyond Probability x Severity and Risk Maps to evaluate emerging issues, warning & detectability, and other key threats to strategic objectives.• Over the past decade, developments in economic and

financial theory -- plus computing and data advancements –are providing new methods for quantitative risk assessment, as well as improvements to existing techniques.

• Risk Managers should understand available risk assessment techniques and adopt a set of tools they can apply to their organization's unique Risk Management requirements.

Page 14: WHATs NEW IN RISK ASSESSMENT

1414

Three Basic Types of Quantitative Assessment Tools – In Order of Complexity

1.Comparative methods; 2.Temporal methods; and,3.Functional methods.

Page 15: WHATs NEW IN RISK ASSESSMENT

1515

Comparative Assessment MethodsA Comparative Analysis takes an explicit standard – eg., “Best Practices”– and compares a system, process and/or set of procedures to that standard, resulting in a “Gap Analysis”. • A “good standard” is prepared and maintained as “the distillation of

continually developing expert opinion and experience in the face of a continually changing environment”.

• One of the strengths of this approach is its simplicity. Comparative methods can be ideal for organizations as they begin to focus attention on specific systems, processes or threats.

• A weakness is that there is no explicit list of threats as there is in other approaches.

Page 16: WHATs NEW IN RISK ASSESSMENT

1616

Sample “Best Practices” Matrix –Claims Handling

O Managerial OversightP PrimaryS SecondaryC Consultative InputD Data Resource

Dire

ctor o

f Ins

uran

ce

Dire

ctor o

f Leg

al Su

ppor

t &

Claim

s

Exec

utive

Vice

Pres

ident

, Aon

Senio

r Vice

Pres

ident

, Clai

ms

Vice

Pres

ident

, Clai

ms

Assis

tant

VP,

Claim

s

Senio

r Con

sulta

nt, C

laim

s

Senio

r Clie

nt Sp

ecial

ist,

Claim

s (M

egan

)

Senio

r Clie

nt Sp

ecial

ist,

Claim

s (M

arth

a)

Claim

Ass

istan

t

CLAIM MANAGEMENT PROCEDURES

1)Establish formal claims service standards for TPA's, carriers and other vendors C P C P C C

2)Develop annual written service plan for TPA's and other vendors and monitor performance C P O P C C

3) Develop written Claims Procedures or Manual C O C P C C

4)Establish internal claims reporting and management procedures and monitor compliance C O C O P S

5)Develop claim reports, distribute and review with business units as necessary C O C O C P S S S D

6) Maintain listing of all insured claims O O O C P S S S D7) Maintain listing of all self-insured claims O O O C P S S S D8) Establish and monitor WC post-injury management program C O O O D P S9) Manage claims litigation process C O O P D S D10) Administer OCIP claims C O O O P S11) Administer non-litigated GL claims O O O P S S D D12) Administer auto claims O O O P S S D D13) Administer D&O, fidelity, fiduciary, EPL C P C14) Administer Litigated GL claims O O P D S D15) Administer Property claims O O O P D S D16) Pursue subrogation activities O O O P S S S D17) Review losses and identify trends C C C O C P S S S D18) Conduct/coordinate periodic claims audits D D19) Monitor large loss activity C O O P D D

20)

Review and adjust safety/loss control initiatives as needed to proactively treat risk and address trends observed in claims management activities

O C C C D C D

Management assures activ ity is addressed

Principally responsible for driv ing the activ ity

Responsible to perform or drive certain aspects of the activ ity , but is not the leader

Can prov ide guidance or feedback at a high level for activ ity

Prov ides data or information that is used in the activ ity

Page 17: WHATs NEW IN RISK ASSESSMENT

1717

Sample “Best Practices” Gap Analysis –RM Strategy

Page 18: WHATs NEW IN RISK ASSESSMENT

1818

Temporal Analysis MethodsA Temporal Assessment applies quantitative tests to a system, process or set of procedures. These “tests” involve analyzing the results of specific threats or attacks against actual protections and controls, subject to some constraints.• Since it is often impractical to test a system directly, a model of the

system is generally used instead. – However, a model introduces the question of fidelity: an

inaccurate model may not only confuse matters; it may provide a false sense of security that is even worse than confusion.

• A key weakness of a temporal method is that it is not possible to model all possible threats; it is not even possible to list them all.

Page 19: WHATs NEW IN RISK ASSESSMENT

1919

Temporal Method: Scenario AnalysisScenario analysis considers the questions ‘what might happen and what should/would we do?’ It can not only highlight risks and opportunities in the short and long term; but also test the effectiveness and efficiency of specific controls and plans.• The central idea is to consider a variety of possible futures that

include many of the important uncertainties in the system, rather than to focus on the accurate prediction of any particular outcome.

• A strength of scenario analysis is that it can consider “existential threats” that involve large swaths of the organization.

Page 20: WHATs NEW IN RISK ASSESSMENT

2020

Four Critical Components of Scenario Analysis1. Determining which factors the scenarios will be built around. In

general, analysts should focus on the two or three most critical factors.

2. Determining the number of scenarios to analyze for each factor. Depends upon how different the scenarios are, and how well the results of each scenario can be forecast.

3. Estimating results – e.g., asset cash flows, control failures, unexpected breakdowns, etc. -- under each scenario.

4. Assigning probabilities to each scenario. Note that this makes sense only if the scenarios cover the full spectrum of possibilities; otherwise, the probabilities will not add up to 100%

Page 21: WHATs NEW IN RISK ASSESSMENT

2121

Sample ScenarioA Scenario Analysis can be used to ensure effective and reliable insurance coverage. • It typically involves sitting down with brokers, underwriters, lawyers,

adjusters and managers to analyze and talk through how each insurance policy would respond to different circumstances.

• The results are compiled in systematic tables and charts that point out problem areas and suggest solutions.

• One of the strengths of Scenario Analysis is that it tests the system itself (or a model), clearing away misconceptions and uncovering specific elements or issues needing attention.

Page 22: WHATs NEW IN RISK ASSESSMENT

2222

Other Temporal Analysis MethodsThe most important Temporal Assessment methods use Predictive Analytics to not only determine What might happen, but How Much it could impact objectives.• Two useful tools are:

– Decision Tree Analysis; and,– Modeling & Simulation.

Page 23: WHATs NEW IN RISK ASSESSMENT

2323

Decision Tree AnalysisA Decision Tree is a structure in which each internal node represents a "test" on an attribute; each “branch” represents the outcome of the test; and each “leaf” represents a decision taken after computing all attributes. • The paths from root to leaf represent classification rules:

– A Root node represents the start of the decision tree, where a decision maker is faced with an uncertain outcome. The objective is to evaluate the overall net positive or negative outcomes at this node.

– Event nodes represent outcomes based upon the probable occurrence of various events.

– Decision branches represent choices that are made by the decision maker.

– End nodes represent final outcomes where a payoff value is identified.

Page 24: WHATs NEW IN RISK ASSESSMENT

2424

Sample Decision Tree: Jenny Lind• Jenny Lind is a writer of romance novels. A movie company

and a TV network both want exclusive rights to one of her more popular works.

• If she signs with the network, she will receive a single lump sum, but if she signs with the movie company, the amount she will receive depends on the market response to her movie.

• What should she do?

Page 25: WHATs NEW IN RISK ASSESSMENT

Jenny Lind Decision TreeSmall Box Office

Medium Box Office

Large Box Office

Small Box Office

Medium Box Office

Large Box Office

Sign with Movie Co.

Sign with TV Network

$200,000

$1,000,000

$3,000,000

$900,000

$900,000

$900,000

.3

.6

.1

.3

.6

.1

Estimated OutcomesEstimated

Likelihood

Root Node

Event Nodes

Page 26: WHATs NEW IN RISK ASSESSMENT

Jenny Lind Decision Tree - SolvedSmall Box Office

Medium Box Office

Large Box Office

Small Box Office

Medium Box Office

Large Box Office

Sign with Movie Co.

Sign with TV Network

$200,000

$1,000,000

$3,000,000

$900,000

$900,000

$900,000

.3

.6

.1

.3

.6

.1

Expected$900,000

Expected$960,000

Best Result$960,000

Page 27: WHATs NEW IN RISK ASSESSMENT

2727

Modeling & SimulationWhere Scenario Analysis and Decision Tree Analysis are techniques to assess discrete risk events, simulation methods measure continuous risk exposures and outcomes.• Simulations yield a distribution of outcomes rather than a single point

estimate. • One simulation tool is an “Exceedance Probability Curve” that

measures whether an outcome will exceed a specific estimate, based upon predetermined probabilities.

• Simulation has few limitations in terms of events, probabilities and outcomes – very robust models may be constructed, evaluated and displayed graphically.

Page 28: WHATs NEW IN RISK ASSESSMENT

2828

Simulation Example: Quantifying the Risk of Natural CatastrophesHow do companies prepare for the financial impact of natural catastrophes? How can they possibly have an idea of what the potential cost can be for events that haven't yet happened?Catastrophe Modeling provides the answers. A catastrophe model can be roughly divided into three modules:• The Hazard Module looks at the physical characteristics of potential

disasters and their frequency.• The Vulnerability Module assesses the vulnerability (or

“damageability”) of buildings and their contents.• The Damage Module determines the overall loss distribution for a

specific event by multiplying building values by potential damage.

Page 29: WHATs NEW IN RISK ASSESSMENT

Sample Catastrophe Model Results

Page 30: WHATs NEW IN RISK ASSESSMENT

3030

Functional Assessment MethodsA Functional Analysis focuses on specific threats and protections. • A threat model -- a list of system vulnerabilities, and the likelihood of

successful threats against those vulnerabilities -- is weighed against organizational objectives, assets, protections, and the likelihood of available protections successfully defending those assets against specified threats.

• Temporal Assessment methods, such as statistical modeling; and Comparative Assessment techniques, such as expert systems, are often employed jointly.

• The key strength of a Functional Assessment is its ability to consider a wide range of threats, vulnerabilities, assets and countermeasures.

Page 31: WHATs NEW IN RISK ASSESSMENT

3131

Failure Mode & Effects Analysis (FMEA)FMEA identifies where & how failures can occur within processes and measures the impact of those failures.• The FMEA Process has 4 basic steps:

1. Determine the failure modes of specific process elements; 2. Analyze the effects on other elements and the overall system; 3. Rank criticality; and,4. Identify existing and potential controls.

• FMEA is particularly useful for evaluating critical risks in very complex systems.

Page 32: WHATs NEW IN RISK ASSESSMENT

FMEA Thought Process

Page 33: WHATs NEW IN RISK ASSESSMENT

3333

Sample FMEA TemplateAction Results

Item / FunctionPotential Failure

Mode(s)

Potential Effect(s) of Failure

Sev

Potential Cause(s)/

Mechanism(s) of Failure

Prob

Current Design Controls

Det

RPN

Recommended Action(s)

Responsibility & Target

Completion DateActions Taken

New

Sev

New

Occ

New

Det

New

RP

N

Coolant containment. Hose connection. Coolant fill. M

Crack/break. Burst. Side wall flex. Bad seal. Poor hose rete

Leak 8 Over pressure 8 Burst, validation pressure cycle.

1 64 Test included in prototype and production validation testing.

J.P. Aguire 11/1/95 E. Eglin 8/1/96

Response Plans and Tracking

Risk Priority Number - The combined weighting of Severity, Likelihood, and Detectability.RPN = Sev X Occ X Det

Likelihood - Write down the potential cause(s), and on a scale of 1-10, rate the Likelihood of each failure (10= most likely). See

Severity - On a scale of 1-10, rate the Severity of each failure (10= most severe). See Severity

Detectability - Examine the current design, then, on a scale of 1-10, rate the Detectability of each failure(10 = least detectable). See Detectability sheet.

Write down each failure mode and potential consequence(s) of that

Page 34: WHATs NEW IN RISK ASSESSMENT

FMEA Path Model Example

Page 35: WHATs NEW IN RISK ASSESSMENT

3535

FMEA Technique: Fault Tree Analysis• A Fault Tree is a logical diagram that starts with an actual or

potential failure and works backward to identify all of the possible causes or origins of that failure.

• Made up of branches connected by AND nodes and ORnodes.– ALL of the branches below an AND node must occur for the

event above the node to occur.– Only ONE of the branches below an OR node needs to occur for

the event above the node to occur

Page 36: WHATs NEW IN RISK ASSESSMENT

3636

Fault Tree Example

Identified “Fault”

Both Required

Any of These

Required

Page 37: WHATs NEW IN RISK ASSESSMENT

3737

FMEA Technique: Event Tree Analysis• An Event Tree is a logical diagram that starts with an actual or

potential event and works forward to identify all of the possible corrective actions -- and failures that could result.

• Essentially the reverse of a Fault Tree; in an analysis, one Event Tree may lead to multiple Fault Trees and vice-versa.

• Although initially developed by engineers to determine vulnerabilities in nuclear power generators; it is applicable, and has been applied, to assess many complex processes.

Page 38: WHATs NEW IN RISK ASSESSMENT

.302

.034

.084

.180

.400

Page 39: WHATs NEW IN RISK ASSESSMENT

3939

Summary – Strategic Risk AssessmentVarious strategic risk assessment methods view the landscape from different heights, so to speak -- altitude is a tradeoff between scope and detail.• The more abstract the method, the greater the scope but the

coarser the detail; the more concrete the method, the smaller the scope and the finer the detail.

• Different objectives, systems, threats, perils, hazards, controls, etc. dictate the use of different assessment tools and methods.

• Identifying the appropriate technique should be the first – and most important – step in risk assessment.

Page 40: WHATs NEW IN RISK ASSESSMENT

4040

And, Don’t Forget – the Real Objective is to Manage Risk

• The techniques examined in this discussion should only be used when you need to identify exposures, risks, perils and/or hazards that can be eliminated, mitigated or otherwise managed.

• NO measurement is necessary when you KNOW what to DO – and everyone AGREES!

Page 41: WHATs NEW IN RISK ASSESSMENT

QUESTIONS?

Thank you very much for listening!

Page 42: WHATs NEW IN RISK ASSESSMENT

Backup

Page 43: WHATs NEW IN RISK ASSESSMENT
Page 44: WHATs NEW IN RISK ASSESSMENT

4444

Categorizing Risk Assessment Techniques• Three basic types of assessment tools are:

1. Temporal methods;2. Comparative methods; and,3. Functional methods.

• Assessment techniques and tools can be classified on three axes:1. by their level of formality on a continuum from abstract to

concrete; 2. the type of analysis performed; and 3. the threats they are attempting to find and address.

Page 45: WHATs NEW IN RISK ASSESSMENT

4545

Types of Temporal Assessment Methods

• An Engagement consists of experts looking for any way, within given bounds, to compromise assets.

• An Exercise links experts and owners together in order to test the protection on assets particular to a particular system.

• Compliance Testing includes methods that the owner can execute them himself without the aid of an expert.

Page 46: WHATs NEW IN RISK ASSESSMENT

4646

Types of Comparative Assessment Methods• A Principles Method type, like all of the Comparative types, is a list.

This type asks the user to apply the principles to their system. • A Best Practices list consists of directives: Do this, Don’t do that. This

method type asks the user to compare what they do—their current practice—with the best practice list: the list of differences represents the “Gaps” between actual practices and ideal.

• An Audit is based on an explicit standard, such as a Best Practice list or a Principles list. This type asks the user to evaluate the effectiveness of the controls in place in fulfilling each item in the standard.

Page 47: WHATs NEW IN RISK ASSESSMENT

4747

Types of Functional Assessment Methods• Sequence Methods are the epitome of abstract methods. A simple

sequence method asks the questions:1. What can happen? (i.e., What can go wrong?)2. How likely is [it] that that will happen?3. If it does happen, what are the consequences?

• An Assistant Method type keeps track of details; best instances of this type “walk” the user through the process, prompting for the input needed to populate and rank lists of threats, vulnerabilities and remedial actions.

• A Matrix Method asks the user to select ranges for n dimensions – assets, threats, vulnerabilities and protections. The information in the cells of the corresponding n-dimensional subspace is the result of analysis.

• An Expert System is one implementation that is representative of the functional approach.