Atmanirbhar QNA
Atmanirbhar QNA
Atmanirbhar QNA
Studies
3 case studies issued by ICAI
Past exam mock test paper (from May 2018 to
Nov 2021)
Past exam paper & solution (from May 2018 to
July 2021)
Query sheets for all past papers and mock test
papers
Case Study Digest
October 19 MTP
CS-3 Risk Grading/Rating, Classify Risk & Report
CS-2
CS-1 Key Risks NA
Stakeholders and impact NA
Impact areas NA
Risk Treatment NA
Risk Maturity NA
CS-2
Techniques to track the process of Rm NA
March 19 Political Risk' NA
DLT NA 138-155
MTP
Quantitative tools for Country Risk Assessment NA
May 18 QP CS-3
Co name different,
CS-3 Key Risks and Measure to Mitigate
Descriptive Q same,
Mcq-5 common
Nov 18 QP CS-2
Case study
background is
CS-2 Analytical Report on lending same, 5MCQs
common and
Descriptive Q is
May 20 MTP different 232-257
Nov 19 QP CS-2 ,
CS-3 Sample Risk Register 4th MCQ is
different
CS-4 Prevent fraud, credit risk CS-4 Nov 19 QP
Direct Q on pure risk, relevance of Operational risk,
CS-5
role and responsibility of CRO CS-5 Nov 19 QP
Understanding Topic Wise Coverage Done By ICAI
Particulars CS. No. Topic Covered Cross reference Page no.
CS-1
Credit Due Diligence NA
CS-2 Pandemic Situation NA
October-20
CS-3 Country Risk, Grading/Bucketing/Swot NA 258-285
MTP
Audit of IC-Financial Reporting, Car (Diesel or
CS-4
Petrol) NA
CS-5 RMF ,ERM NA
Scenario description
Impact of scenario
Current measures to
manage risks
Exhibit 2
Bank Fraud
In a leading multinational bank, a banking fraud of `400 has been taken place. The
fraud has happened because of the mastermind of an employee named Lalit. The
modus operandi of Lalit was to sell investment products to high net worth
individuals (HNIs). He falsely projected to the HNIs that these financial products
are authorised by the bank’s investment product committee.
So, he lured them by convincing them that their investments would be invested in
lucrative schemes giving good returns. Then, he transferred the funds accumulated
from HNIs to some fictitious accounts. Funds amounting to Rs 400 crore belonging
to about 20 customers were transferred to such accounts. He, then, used the
money to invest it into the stock market.
Modus operandi was simple. He lured customers with a fake circular by SEBI promising 2-
3% returns per month. The fake circular also mentioned a custodian that route investor
funds. Lalit also use some blank cheques and he used this to transfer money out of their
accounts directly to the brokerages to be invested in the stock market.
The RBI has issued master circular advising banks to set up internal control system
to combat frauds and to take pro-active fraud control and enforcement measures.
(Source : Extract from a leading financial daily)
Exhibit 5
Non-compliance with legal requirements leading to penalties
ZEO is a fintech company. Peer to Peer (P 2 P) lending is currently in vogue in
ZEO as is te case in other companies. P 2 P lending creates a market for lenders
and borrowers to connect immediately.
Further, with the use of P 2 P remittance platforms such as Transferwise creates a
market place where outgoing remittances are matched with incoming remittances.
For example, if a person in London wants to remit some money to India would
deposit the amount in platforms’ London office. The platforms’ algorithm would
detect another person in India who would want to transfer some money to London.
Then, the platform matches and “nets” the transaction. So, the money never
actually leaves the jurisdiction of a country.
However, the difficulty is that Indian rupee is not freely convertible and Foreign
Exchange Management Act, 1999 i.e. FEMA has provided certain regulations which
curbs the free flow of money. Compliance function has to ensure strict compliance
of Banking Regulation Act, RBI Act, FEMA, Prevention of Money Laundering Act
etc.
All peer-to-peer lending (P2P) platforms will be regulated by the Reserve Bank of
India (RBI), according to a government of India notification. The Reserve Bank of
India (RBI) said, through an 18 September, 2017 gazette notification, those peer-
to-peer lenders (P2P)—companies that provide loan facilitation services from their
platform—will be treated as non-banking financial companies (NBFCs).
The Reserve Bank of India's move to allow up to 100% foreign direct investment
(FDI) in regulated financial services companies other than banks or insurance
companies through the automatic route is likely to benefit several fintech startups
Exhibit 6
Corporate Governance Issues
ZEO Payment Technology is a small unlisted company willing to venture into the
field of Small Payment Bank. ZEO has 6 directors out of which one is independent
director. The paid up share capital of the company is `12 crore. However, the
company is yet to draft a suitable policy for training and performance evaluation of
directors.
Some of the provisions of the Companies Act, 2013 relating to Corporate
Governance have been given in the following sentences. Every company having a
paid up share capital of `10 crore or more has to constitute an audit committee and
shall have atleast two independent directors. Further, it is required to appoint a
Nomination and Remuneration Committee and draft a suitable policy for training
and performance evaluation of directors. Also, a company having a paid share
capital of `50 crore or more OR a turnover of `200 crore or more has to appoint an
internal auditor to conduct internal audit of the functions and activities of the
company.
The new Companies Act has given powers to Serious Fraud Investigation Office
(SFIO) to carry out arrests, raids and seizure in respect of certain offences of the
act which attract the punishment for fraud. Further, as per the section 212, on the
intimation of special resolution passed by the company, SFIO can investigate into
the affairs of the company or on the receipt of a report of the Registrar or inspector
or in the public interest or on request from any Department of the Central
Government or a State Government.
Moreover, the Companies Act, 2013 do not contain any compulsory provision for
constitution of a Risk Management Committee. However, it requires its Board to
develop and implement a risk management policy and identify risks which may
threaten the existence of the company.
Exhibit 8
Exhibit 9
Exhibit 10
EMAIL
From: Lee Port
To: Mr. Z (CEO of ZBO Payment Bank)
Dated:……………………………………
Subject: Pitch Presentation for financing of proposed small payment bank
under the FDI Scheme of Govt. of India
Hi Z,
This has reference to your last week’s Pitch Presentation at Singapore for making
investment in your proposed Small Payment bank in India. While the idea of this
type of banking is naïve in India but the most catchy feature of the same is to reach
consumers through mobile phones rather than traditional system of bank branches
as it is quite uneconomical affair for the banks to open branch in each and every
village of India. This is a good initiate by Govt. of India as a major step towards
financial inclusion in India where a major part of population is living in villages.
Before we forward your proposal of investing the funds in your start-up to the
Board please confirm the following unique features of the proposed Small Payment
Banks:
• Payment bank will reduce the dependency on Cash and will increase m-
commerce as mobile wallet will be used as payment option.
• Payment Bank will invest 75% of its demand deposits in Government
Securities and Treasury Bills and balance 25% can be held as fixed deposits
with other Scheduled Commercial Banks.
• Payment bank can also provide Forex Cards to the travellers.
• Payment Bank will get a big chunk of deposit comparing to commercial banks
due to reason of providing higher interest rates.
In case there is any deviation in above points please let us know immediately.
Thanks,
Lee Port
1.
Source- Exhibit 1
Scenario description The system of the Bank can be hacked to create may
face a claim for money when a foreign bank tries to
recover its money released against an LC.
Current measures to manage risks Bank should have in place a system of detecting any
unusual activity and how the staff shall respond when
such an untoward event happens.
Source- Exhibit 2
Impact of scenario Bank may lose its reputation and may face
unwarranted litigations.
Source- Exhibit 3
Scenario description Bank account can be used for illegal transfer of funds
and money laundering activities.
Impact of scenario Bank may face paucity of funds and its reputation
may also take a beating. It will be also being
answerable to various stakeholders.
Current measures to manage risks The bank should check the original identification
documents of individuals dealing in cash above the
prescribed threshold, to weed out the use of forged
or fake copies.
Source- Exhibit 4
Current measures to manage risks It can insure itself from any natural calamity.
Current measures to manage risks The risk can be managed to a large extent with the
compliance of RBI notifications.
Source- Exhibit 6
Scenario description The company is yet to draft a suitable policy for training and
performance evaluation of directors and it has not appointed any
committees.
Impact of scenario This may invite penalties from the court and wrath of the
investors.
Current measures to Constitute an audit committee and shall have atleast two
manage risks independent directors. Further, it is required to appoint a
Nomination and Remuneration Committee and draft a suitable
policy for training and performance evaluation of directors.
Source- Exhibit 7
Current measures to manage risks Banks may either replace or ask users to change
the security codes.
Source- Exhibit 8
Source- Exhibit 9
Scenario description The rumour that bank is the only bank which has
been hit directly by the recent disasters and it could
fail.
Current measures to manage risks Such rumour should be taken care of by proper
media and people management. There should be
a prompt response on the part of the Bank to ward
off such rumour with the help of media. Proper
people management requires action on the part of
banks to pacify and inform customers so that future
reoccurrences of such panic situations can be
avoided.
Source- Exhibit 10
Scenario description As banks can issue the Forex Card there may be
some variation in the rates at which same has been
acquired and disposed of.
Current measures to manage risks Hedging the forex and interest rate using various
techniques such as Forward, Futures and Option
contracts.
Note: Students are expected to design any 5 risk scenarios in the prescribed format out of
the above-mentioned 10 scenarios.
2.
Introduction
Conclusion
As a small bank, some of the risk which especially Risk Nos. 5,6 and 8 needs special
attention.
3. (i) (d)
(ii) (c)
(iii) (a)
(iv) (c)
(v) (b)
(vi) (c)
(vii) (b)
(viii) (b)
(ix) (a)
(x) (c)
CASE STUDY 2
ABC Ltd. is a Delhi based company. It was established in 2009 and deals in the manufacturing business of
high-end electronics distributed through retail superstore. The company is currently going through a rapid
growth phase. Its products are receiving good response from the market. The company is experiencing the
challenges of retaining good sales employees and developing an efficient financial system. Ravi Narain is
the CFO of the company.
ABC Ltd. has an outdated computerized accounting system which does not lock out the changes made after
the month end.
ABC is looking to develop a more effective and efficient financial system and considering implementing an
incentive plan for sales employees who are currently paid a flat salary.
ABC Ltd has a turnover of ` 800 crores in 2016-17 and was listed on Indian Stock exchange in 2014. Ajay
and Pawan are the newly appointed directors of Finance and Human Resource divisions respectively.
Ajay is a street smart finance professional and he played a critical role in the areas of budgeting and
forecasting, finance and asset management. He has a team of 25 people including Jatin and Mohit who
directly reports to Ajay.
In spite of a limited salary, Ajay maintains a lavish style of living. Jatin maintains the journal entries
according to Ajay’s directions. One day HSBC bank notified Ravi Narain that Ajay’s personal credit card
balances were being paid off by ABC’s account. Since, Ravi Narain was busy for Board Meeting confirmed
that this might be reimbursement of his Travelling Expenses.
Jatin records the internet sales from the company’s retail outlet as well as carries out following functions:
1. Reconciliation of accounts receivable sub-ledger to general ledger
2. Mailing checks to vendors
3. Coding and recording of checks received for deposit
Ravi normally never reviews financial details as he trusts Ajay.
On the Human Resource front, to overcome the problem of retaining the sales employees, the company has
recently hired Pawan as the HR director who is known for developing good HR policies to manage people
effectively and motivate them to perform well.
Pawan advised the management to implement a compensation plan of base salary and bonus instead of fixed
monthly salary. Sales incentive compensation is based on the performance of sales employees. The
performance can be measured by looking at the revenue they generate for the employees. The management
liked the proposal advised by Pawan and the compensation plan is finalized which was as follows.
Base Salary: 35,000/month
Commission: 5% of Sales exceeding 10,00,000/month + 5% extra commission on sales made over and
above 20,00,000/-
Consequently, the present organization structure comes out as follows:
Managing
director
Jatin
(Manager) HR Manager IT Manager Support Staff
Mohit
(Manager)
HR Analysts IT Analysts
After passing some time, the Board of Directors started realizing that the company is facing liquidity crunch.
Also, the introduction of new compensation plan resulted in unhealthy competition among employees.
Some employees were less willing to provide assistance to struggling co-workers and would prefer to improve
their own productivity. It also promoted an environment of excessive risk – taken by the sales employees for
pursuing short term profits.
The company has a system of identification of risk but only at the functional level and not for processes.
Further these Risks are not communicated among various organization levels.
A. Questions
The Board of Directors approaches you and requests you to submit a report on the following aspects:
(i) Identify the Risks that may be possible and their nature. (5 Marks)
(ii) Scaling of these identified risks based on ICAI Guide on Risk Based Internal Audit. (5 Marks)
(iii) Any three to four approaches to identify and assess the risk. (5 Marks)
(iv) Course of action to be followed to treat these risks. (5 Marks)
(v) Matters on which Risk Governance Framework can define a policy statement. (5 Marks)
(vi) Risk Maturity Level and reasons for the same. (5 Marks)
SUGGESTED SOLUTION
Case study 2
Note: Please note these solutions are for guidance purpose only.
(A)
1
© The Institute of Chartered Accountants of India
Page 24 of 492
stimulate and encourage free-flowing conversation amongst a group of knowledgeable and focussed
people with a fair/objective outlook. The group should not be biased or critical. It is one of the best and
most popular ways to identify both risks and key controls and is the basis for most successful risk
workshops.
• Questionnaires & Interviews - Focused on detecting the concerns of staff with respect to the risks or
threats that they perceive in their operating environment. During a Structured interview, interviewees
are asked through a set of prepared questions to encourage the interviewee to present their own
perspective and thus identify risks. Structured interviews are frequently used during consultation with
key stakeholders when designing the risk management framework. Structured interviews are good to
assess risk appetite and tolerance when developing risk appetite statements. A specialist in risk
prepares interviews with various management level members of the company in order to elicit the
concerns.
• Checklists are information aids to reduce the likelihood of failures from potential hazards, risks or
controls that have been developed usually from past experience, either as a result of a previous risk
assessment or as a result of past failures or incidents or history or industry learning. Auditors often
prepare checklists of key controls to aid in their assessment of control effectiveness and the internal
control environment. Checklists are good guiding tools; however, can lead to herd mentality and risk
managers can miss out on fresh risk thinking and the big picture.
Note: Students can also mention any four techniques other than above.
(iv) Suggested course of action to reduce/ manage risk i.e. risk treatment is as follows:
• Strengthening of Internal Controls System
• Setting up limits for the sanction of amounts.
• Setting up operational risk management department.
Note: Students can also mention other course of action based on their work experience.
(v) The Risk Management (Governance) Framework should define a policy statement on the following
matters:-
(i) Determining when to review the Risk Management Framework (RMF) and the frequency for undertaking
the review.
(ii) Deciding who is responsible for the review. The RMF is generally reviewed by the Audit Committee or
a team of Directors. Once in few years the RMF can be reviewed with external facilitation. This would
provide fresh insights and benchmarking information to the Board.
(iii) Selecting the scope and method for a review. The scope and boundary of the RMF review can be clearly
set out along with the most suited method for review.
(iv) Manner of circulation of results.
(vi) The risk maturity level of the company is “Risk Aware”. The reason is that the risks are identified within
functions and not across processes. Also, risks are not communicated across the enterprise. It is basically a
scattered silo based approach to risk management.
B. Answers to Multiple Choice Questions
1. (b)
2. (d)
3. (d)
2
© The Institute of Chartered Accountants of India
Page 25 of 492
4. (b)
5. (c)
6. (c)
7. (c)
8. (c)
9. (a)
10. (c)
3
© The Institute of Chartered Accountants of India
Page 26 of 492
PAPER – 6A: RISK MANAGEMENT
CASE STUDY 3
Sunshine Ltd. is a software company specialized in the software development for their clients. In the last
decade it has earned a good name and fame. For example, a super critical boiler in a thermal power plant
takes 10-12 days to be fine-tuned or synchronized. It means system is shut for power generation and lead to
loss of millions of dollars. Sunshine Ltd. came up with a solution that cuts the time taken to synchronize a
boiler from 10-12 days to 3-4 days through the use of software and services of IT Professionals. The main
strength of Sunshine is the IT professional they employed with it.
It captured data through sensors on the boilers, use the algorithm built in house to check nearly 240
parameters and over 10,000 combinations to tune the boiler.
It also helped a global heating, ventilation and air conditioning firm to bring down the time taken to design an
AC solution in a building or office from 9 days to just 2 hours now.
However, traditional outsourcing business of Sunshine Ltd is dying a slow death as clients cutting their
budgets on such services and shifting their focus on newer areas such as digi tal and cloud.
Three-fourth of the revenue of Sunshine Ltd is from traditional services. However, half of its revenue still
comes from fixed price projects which allow it the flexibility to determine the resources it deploys and use
software tools to deliver services. Now, the aim is to increase that goal by reducing the dependency on people
and more on software led services which coincide with it’s goal of IT Modernization.
Sunshine Ltd. derives a major portion of its revenues from customers discretionary spending which is linked
to their business outlook. It’s major revenues are from UK, USA and other European countries.
Some draft legislations in USA has been made to restrict the availability of work visas. Such protectionist
policies threaten the prospect of global mobility of people which may also affect the work of Sunshine Ltd. as
distributed software development requires free movement of people.
Appreciation of the rupee against any major currency results in the revenue denominated in that currency to
appear lesser in reported terms. Then, there may be different exchange rate when sale took place and when
invoice is collected.
The Internal Financial Control System
The internal Financial Control System of Sunshine Ltd. has been laid down as below:
• Recording and providing reliable financial and operation information.
• Safeguarding assets.
• Ensuring compliance with corporate policies.
• Well defined delegation of power.
• Efficient ERP system.
• Internal audit by one of the big audit firm.
• Periodic audit by specialized third party consultants.
• Audit Committee found internal financial control adequate.
Exhibit 1
Domestic ratings agency ICRA said that the appreciation in the rupee is aggravating the troubles of the Indian
IT sector, which is already hit by a change in the market landscape and compressing revenue growth.
It said the industry is already reeling under pressures like uncertain macroeconomic environment, lower deal
sizes in digital technologies, cloud adoption and high competitive intensity.
The agency said despite a 8.1 per cent growth in USD revenue, IT players have registered a growth of only
three per cent in the second quarter of the current fiscal, due to the rupee appreciation of four per cent during
the quarter.
Due to the difficulties on the currency front, the agency said the $160 -billion industry will be able to notch a
mid-to-high single digit growth till FY20.
Exhibit 2
The U.S. government is toughening up the process for renewing a popular foreign work visa.
This week, U.S. Citizenship and Immigration Services advised its officers to "apply the same level of scrutiny"
to extension requests for the H-1B visa, among other sought after visas.
In other words, officers are instructed to review requests for renewal as t horoughly as they would initial visa
applications.
The H-1B is a common visa pathway for high-skilled foreigners to work at companies in the U.S. It's valid for
three years, and can be renewed for another three years. It's a program that's particularly nea r and dear to
the tech community, with many talented engineers vying for one of the program's 85,000 visas each year.
The directive rescinds the previous guidance, which gave "deference" to previously approved visas "as long
as the key elements were unchanged and there was no evidence of a material error or fraud related to the
prior determination."
"This updated guidance provides clear direction to help advance policies that protect the interests of U.S.
workers," said new USCIS Director L. Francis Cissna, who was sworn in this month. President Donald Trump
announced his intent to nominate Cissna last spring.
In April, Trump directed federal agencies to implement a "Buy American, Hire American" strategy, which
included proposing new rules and guidance for preventing fraud and abuse of work visas. The H-1B program,
Exhibit 3
Effect on IT sector due to Brexit
The Indian IT sector, faced with multiple challenges, is already bracing itself for a tough ride with US tightening
its visa norms. Brexit only adds to the growing uncertainty in the business environment for the IT companies.
Of the $108-billion of the IT industry’s estimated exports in 2015-16, 17 per cent was to the UK and about
11.4 per cent to other nations within the EU. For large Indian IT companies, over a fourth of their revenues
come from Europe, in particular from the UK.
Currency has always been a wild card for the IT sector. Wild swings in the pound vis -à-vis dollar and the
rupee, will also impact revenues and profits for Indian IT companies. The British pound revenues make for
10-15 per cent of the overall revenues in the case of TCS, Tech Mahindra and Wipro. For Infosys, GBP
revenue makes for 6.7 per cent of the overall revenue.
With pound depreciating sharply over the past year, dollar revenues of Indian IT companies have been under
pressure. The pound has also depreciated over 20 per cent against the rupee. This can reduce cost arbitrage
for companies outsourcing to the UK.
(Extract from Hindu Business Line)
SUGGESTED SOLUTION
Case study 3
Note: Please note these solutions are for guidance purpose only.
– Derives a major portion of its revenues from customers discretionary spending which is linked to
their business outlook.
– Three-fourth of the revenue of is from traditional services.
– Dependence on the people.
Opportunity
– More focus on software led services which coincide with newer areas such as digital and cloud.
Threat
– Restrictive visa policy by USA may affect the work of sunshine Ltd. and threaten the prospect of
global mobility of people as distributed software development requires free movement of people.
– Appreciation of the rupee against any major currency results in the revenue denominated in that
currency to appear lesser in reported terms.
– Clients cutting their budgets on such services and shifting their focus on newer areas such as
digital and cloud.
(2) The first political risk is toughening of visa policies by present US Government. The new directive rescinds
the previous guidance, which gave "deference" to previously approved visas as long as the key elements
were unchanged and there was no evidence of a material error or fraud related to the prior determination.
This may affect the free movement of IT people from India across USA thereby also affecting the work of
Sunshine Ltd.
Secondly, the exit of Britain from European Union i.e. Brexit only added to the woes of the IT sector. Of the
$108-billion of the IT industry’s estimated exports in 2015-16, 17 per cent was to the UK and about 11.4 per
cent to other nations within the EU. For large Indian IT companies, over a fourth of their revenues come from
Europe, in particular from the UK. This may affect the profitability position of Sunshine because of the
currency fluctuations.
1
© The Institute of Chartered Accountants of India
Page 32 of 492
(3) The types of exposures risks to be encountered by Sunshine Ltd. are discussed as below:
Transaction Exposure - It measures the effect of an exchange rate change on outstanding obligations
that existed before exchange rates changed but were settled after the exchange rate changes. Thus, it
deals with cash flows that result from existing contractual obligations. For example, in the case of
Sunshine Ltd. if services are exported to USA for $10,00,000 due in one month and if the dollar
depreciates relative to the rupee, a cash loss occurs. Conversely, if the dollar appreciates relative to the
rupee, a cash gain occurs.
Further, domestic ratings agency ICRA has highlighted that the appreciation in the rupee is aggravating the
troubles of the Indian IT sector, which is already hit by a change in the market landscape and compressing
revenue growth.
Economic Exposure – It refers to the extent to which the economic value of a company can decline
due to changes in exchange rate. ICRA has said that despite an 8.1 per cent growth in USD revenue, IT
players have registered a growth of only three per cent in the second quarter of the current fiscal, due to the
rupee appreciation of four per cent during the quarter.
It also pointed out that IT Services players profitability also remains sensitive to rupee depreciation vis-a-vis
major currencies such as USD, GBP and Euro and the same too will have an impact.
(4) The company tackle the exposure of difference in exchange rates when sale took place and when invoice is
collected through hedging currency risks which are explained as below:
(i) Internal Techniques: These techniques explicitly do not involve transaction costs and can be used
to completely or partially offset the exposure. The techniques relevant to Sunshine Ltd. can be
further classified as follows:
– Invoicing in Domestic Currency : Should the seller (exporter) i.e. Sunshine Ltd. elect to
invoice in foreign currency, perhaps because the prospective customer prefers it that way or
because sellers tend to follow market leader, then the seller should choose only a major
currency in which there is an active forward market for maturities at least as long as the
payment period. Currencies, which are of limited convertibility, chronically weak, or with only
a limited forward market, should not be considered.
– The seller’s ideal currency is either his own, or one which is stable relative to it. But often the
seller is forced to choose the market leader’s currency. Whatever the chosen currency, it
should certainly be one with a deep forward market.
– Price Variation: Price variation involves increasing selling prices to counter the adverse
effects of exchange rate change. This tactic raises the question as to why the company has
not already raised prices if it is able to do so. In some countries, price increases are the only
legally available tactic of exposure management.
– Asset and Liability Management : This technique can be used to manage cash flow
exposures. In essence, asset and liability management can involve aggressive or defensive
postures. In the aggressive attitude, the firm simply increases exposed cash inflows
denominated in currencies expected to be strong or increases exposed cash outflows
denominated in weak currencies. By contrast, the defensive approach involves matching cash
inflows and outflows according to their currency of denomination, irrespective of whether they
are in strong or weak currencies.
(ii) External Techniques: Under this category range of various financial products are used which can
be categorized as follows:
– Money Market Hedging: At its simplest, a money market hedge is an agreement to exchange
a certain amount of one currency for a fixed amount of another currency, at a particular date.
2
© The Institute of Chartered Accountants of India
Page 33 of 492
For example, suppose a business owner in India expects to receive 1 Million USD in six
months. This Owner could create an agreement now (today) to exchange 1Million USD for
INR at roughly the current exchange rate. Thus, if the USD dropped in value by the time the
business owner got the payment, he would still be able to exchange the payment for the
original quantity of U.S. dollars specified.
– Derivative Instruments: A variety of derivative instruments such as Forward, Futures,
Options and Swap are available to hedge the exposure of foreign exchange .
(5) The Internal Financial Control System of the Sunshine Ltd. is more or less efficient. The reasons are
given as below:
• Recording and providing reliable financial and operation information.
• Safeguarding assets.
• Ensuring compliance with corporate policies.
• Well defined delegation of power.
• Efficient ERP system.
• Internal audit by one of the big audit firm.
• Periodic audit by specialized third party consultants.
And, finally Audit Committee found internal financial control adequate which shows that Sunshine Ltd. has a
good Internal Financial Control System.
B. Answers to Multiple Choice Questions
1. (a)
2. (a)
3. (c)
4. (a)
5. (d)
6. (c)
7. (d)
8. (c)
9. (c)
10. (c)
3
© The Institute of Chartered Accountants of India
Page 34 of 492
Query Sheet for Case studies 1,2 & 3
(Web Hosted By ICAI)
(same as March-18 Mock Test Paper)
CASE STUDY-1
1. Question on Type of Risk, Scenario Description, Impact of Scenario, and Measures to manage
risk:
Proper system
Strong password
Ensure itself
Hedge forex and interest rate using forward futures & options contract
Query:
The risk identified by ICAI is different from the one I have identified. Will I get the marks?
There are fewer chances of getting the marks if the risk identified by you is different from that of ICAI;
ideally, what you can do for this type of question identifies 2 or 3 types of risks and write it down in
answer. E.g., Fraud risk or Data Security risk instead of just writing fraud risk generally, if this type of
question needs to be solved at last or avoided since it involves lots of judgment.
2.
(i) Bucketing of the above risk_2.24
(ii)Likelihood Scale_2.25
Page 35 of 492
Query:
How is the Bucketing and Likelihood Scale decided?
It’s purely based on the understanding of the concept, and in few places, it is based on the best judgment
of ICAI generally if this type of question needs to be solved at last or avoided since it involves lots of
judgment.
3. MCQs
CASE STUDY - 2
A.
(i) Possible risk:
a. How many points should one write if the type of risk is asked?
Ideally, one should write that much risk, which is similar to marks allocated. E.g., for five marks, 5
types of risk should be quoted. (Generally, you will find Operational risk in ICAI answers easily)
b. What all things one should write in the type of risk identified:
One should try to include all the types of content given in the book and try to relate the risk with the
case study. (e.g., for financial risk, which is shown in the answer, ICAI has written all the point, i.e.,
one which is given in Page no. 1.11 & 1.19)
Page 36 of 492
B. Multiple Choice Questions
CASE STUDY- 3
A.
Page 37 of 492
Test Series: March, 2018
MOCK TEST PAPER
FINAL (NEW) COURSE: GROUP – II
PAPER – 6A: RISK MANAGEMENT
Question 1
ZEO Payment Technology is one of the promising Financial Technology Start Up Company in India. ZEO is
founded in 2015 and has emerged as one of the largest player in India’s Domestic Money Transfer (DMT)
(Cash to Bank) segment. It is an award winning Online Transaction platform for DMT, Payments and Travel.
ZEO has won several accolades and awards such as the prestigious National Payments Excellence Award
2016 organized by the National Payment Council of India for the largest number of transactions on the IMPS
(non-Bank category). ZEO has one of the largest cash collection network agents in the country to work on
cash collection and banking activities.
RA has founded ZEO and is now aspiring to apply for the Small Payment Bank License. The application has
to be made to a Statutory Authority. As per the Statutory Authority’s guidelines , the payment bank applicant
have to submit the top 10 risk scenarios that they would face while operating a Small Payment Bank in India.
The Board of ZEO would then evaluate the risk scenarios and prepare a formal report to adopt the risk
scenarios with specific risk management actions. Post discussions at the Board and adoption of the risk
scenarios, RA would make the application to the Statutory Authority for transforming ZEO in to a Small
Payment Bank.
Required:
1. Design risk scenarios in the following format out of the risk scenarios given in Exhibits.
Exhibit 1
Cyber-attack on the website and systems
Recently, the systems of a PSU Bank have been hacked to create fake documents that may have been used
to raise money outside India or help in dealing of prohibited items. The fake document may be letter of credit
(LC) or guarantees. The bank later realised that their SWIFT (Society for World Wide Interbank Financial
Telecommunication) system have been used to create fake documents. SWIFT is a financial messaging
service which is used by banks to move millions of dollars and documents in various countries.
Therefore, the person who hacked into the system to create a fake LC may put it before a foreign bank for
finance. However, the Indian Bank, whose system has been used to create a fake L.C., may face a claim for
money when a foreign bank tries to recover its money released against an LC.
Some measures have been taken to prevent such reoccurrences in future. Firstly, physical access to the
system must be controlled. Secondly, strong password and multi-layer authentication policy should be there.
And, lastly, identity and token management policies are needed to control who has access to data.
SWIFT customers should have in place a system of detecting any unusual activ ity and how the staff shall
respond when such an untoward event happens.
(Extract from an article)
Exhibit 2
Bank Fraud
In a leading multinational bank, a banking fraud of Rs. 400 has been taken place. The fraud has happened
because of the mastermind of an employee named Lalit. The modus operandi of Lalit was to sell investment
products to high net worth individuals (HNIs). He falsely projected to the HNIs that these financial products
are authorised by the bank’s investment product committee.
So, he lured them by convincing them that their investments would be invested in lucrative schemes giving
good returns. Then, he transferred the funds accumulated from HNIs to some fictitious accounts. Funds
amounting to Rs. 400 crore belonging to about 20 customers were transferred to such accounts. He, then,
used the money to invest it into the stock market.
Thanks,
Lee Port
Managing
director
Jatin
(Manager) HR Manager IT Manager Support Staff
Mohit
(Manager)
HR Analysts IT Analysts
After passing some time, the Board of Directors started realizing that the company is facing liquidity crunch.
Also, the introduction of new compensation plan resulted in unhealthy competition among employees.
Some employees were less willing to provide assistance to struggling co-workers and would prefer to improve
their own productivity. It also promoted an environment of excessive risk – taken by the sales employees for
pursuing short term profits.
The company has a system of identification of risk but only at the functional level and not for processes.
Further these Risks are not communicated among various organization levels.
A. Questions
The Board of Directors approaches you and requests you to submit a report on the following aspects:
(i) Identify the Risks that may be possible and their nature. (5 Marks)
(ii) Scaling of these identified risks based on ICAI Guide on Risk Based Internal Audit. (5 Marks)
(iii) Any three to four approaches to identify and assess the risk. (5 Marks)
(iv) Course of action to be followed to treat these risks. (5 Marks)
(v) Matters on which Risk Governance Framework can define a policy statement. (5 Marks)
(vi) Risk Maturity Level and reasons for the same. (5 Marks)
11
Exhibit 1
Domestic ratings agency ICRA said that the appreciation in the rupee is aggravating the troubles of the Indian
IT sector, which is already hit by a change in the market landscape and compressing revenue growth.
It said the industry is already reeling under pressures like uncertain macroeconomic environment, lower deal
sizes in digital technologies, cloud adoption and high competitive intensity.
The agency said despite a 8.1 per cent growth in USD revenue, IT players have registered a growth of only
three per cent in the second quarter of the current fiscal, due to the rupee appreciation of four per cent during
the quarter.
Due to the difficulties on the currency front, the agency said the $160 -billion industry will be able to notch a
mid-to-high single digit growth till FY20.
On margins, it said the industry should brace for an impact on margins as price led competition is likely to
intensify and will negatively impact the spreads.
12
Exhibit 2
The U.S. government is toughening up the process for renewing a popular foreign work visa.
This week, U.S. Citizenship and Immigration Services advised its officers to "apply the same level of scrutiny"
to extension requests for the H-1B visa, among other sought after visas.
In other words, officers are instructed to review requests for renewal as t horoughly as they would initial visa
applications.
The H-1B is a common visa pathway for high-skilled foreigners to work at companies in the U.S. It's valid for
three years, and can be renewed for another three years. It's a program that's particularly nea r and dear to
the tech community, with many talented engineers vying for one of the program's 85,000 visas each year.
The directive rescinds the previous guidance, which gave "deference" to previously approved visas "as long
as the key elements were unchanged and there was no evidence of a material error or fraud related to the
prior determination."
"This updated guidance provides clear direction to help advance policies that protect the interests of U.S.
workers," said new USCIS Director L. Francis Cissna, who was sworn in this month. President Donald Trump
announced his intent to nominate Cissna last spring.
In April, Trump directed federal agencies to implement a "Buy American, Hire American" strategy, which
included proposing new rules and guidance for preventing fraud and abuse of work visas. The H-1B program,
in particular, is one that President Trump has eyed for reform, criticizing abusers of the program who use the
visa to replace American workers.
13
Exhibit 3
Effect on IT sector due to Brexit
The Indian IT sector, faced with multiple challenges, is already bracing itself for a tough ride with US tightening
its visa norms. Brexit only adds to the growing uncertainty in the business environment for the IT companies.
Of the $108-billion of the IT industry’s estimated exports in 2015-16, 17 per cent was to the UK and about
11.4 per cent to other nations within the EU. For large Indian IT companies, over a fourth of their revenues
come from Europe, in particular from the UK.
Currency has always been a wild card for the IT sector. Wild swings in the pound vis -à-vis dollar and the
rupee, will also impact revenues and profits for Indian IT companies. The British pound revenues make for
10-15 per cent of the overall revenues in the case of TCS, Tech Mahindra and Wipro. For Infosys, GBP
revenue makes for 6.7 per cent of the overall revenue.
With pound depreciating sharply over the past year, dollar revenues of Indian IT companies have been under
pressure. The pound has also depreciated over 20 per cent against the rupee. This can reduce cost arbitrage
for companies outsourcing to the UK.
(Extract from Hindu Business Line)
14
SUGGESTED SOLUTION
Note: Please note these solutions are for guidance purpose only.
Source - Exhibit 1
Source - Exhibit 2
Source - Exhibit 3
1
© The Institute of Chartered Accountants of India
Page 52 of 492
Source - Exhibit 4
Source- Exhibit 5
(2)
To: The Board
From: ABC, Risk Consultant
Date: 6th April 2018
Subject: Risk Management
Introduction
This report covers
(i) Bucketing of above identified risks
(ii) Likelihood Scale of above identified risks
(i) Bucketing of above identified risks
Risk No. Risk Scenario Title Bucketing of identified risks
1 Fraud Risk Severe
2 Governance or Reputation Risk Major
3 Natural Hazardous Risk Severe
2
© The Institute of Chartered Accountants of India
Page 53 of 492
4 Regulatory or Governance Risk Major
5 Finance or Forex and Interest Rate Risk Moderate
Conclusion
As a small bank, some of the risk which especially Risk Nos. 2 and 4 needs special attention.
3
© The Institute of Chartered Accountants of India
Page 54 of 492
• Operational Risk - These risks are associated with the on-going, day-to-day operations of the
enterprise. In other words, these risks associated with the operations of an organization. It is the risk of
loss resulting from failure of people employed in the organization, internal process, systems or external
factors acting upon it to the detriment of the organization. It includes Legal Risk and excludes strategic
and Reputational Risks as they are not quantifiable.
(ii) Scaling of Risk as identified above:
• Measurement of the likelihood of risk
Financial Risk – Likely (score 4)
Operational Risk – Likely (score 4)
• Risk Consequences
Financial Risk – Major
Operational Risk – Major
(iii) Four approaches are suggested to identify and assess the risk as below:
• Analysis of processes – Under this technique, material or significant business processes are flow
chartered. This will facilitate identification of process level operational risks. An approach that helps
improves the performance of business activities by analysing current processes and making decisions
on new improvements.
• Brainstorming – Under brainstorming a group of employees put forward their ideas or sensation of
risk. The employees estimate the risk based on their past experience or intuition involves a focused
group of managers working together to identify potential risks, concerns, root causes, failure modes,
hazards, opportunities and criteria for decisions and/or options for treatment. Brainstorming should
stimulate and encourage free-flowing conversation amongst a group of knowledgeable and focussed
people with a fair/objective outlook. The group should not be biased or critical. It is one of the best and
most popular ways to identify both risks and key controls and is the basis for most successful risk
workshops.
• Questionnaires & Interviews - Focused on detecting the concerns of staff with respect to the risks or
threats that they perceive in their operating environment. During a Structured interview, interviewees
are asked through a set of prepared questions to encourage the interviewee to present their own
perspective and thus identify risks. Structured interviews are frequently used during consultation with
key stakeholders when designing the risk management framework. Structured interviews are good to
assess risk appetite and tolerance when developing risk appetite statements. A specialist in risk
prepares interviews with various management level members of the company in order to elicit the
concerns.
• Checklists are information aids to reduce the likelihood of failures from potential hazards, risks or
controls that have been developed usually from past experience, either as a result of a previous risk
assessment or as a result of past failures or incidents or history or industry learning. Auditors often
prepare checklists of key controls to aid in their assessment of control effectiveness and the internal
control environment. Checklists are good guiding tools; however, can lead to herd mentality and risk
managers can miss out on fresh risk thinking and the big picture.
Note: Students can also mention any four techniques other than above.
(iv) Suggested course of action to reduce/ manage risk i.e. risk treatment is as follows:
• Strengthening of Internal Controls System
4
© The Institute of Chartered Accountants of India
Page 55 of 492
• Setting up limits for the sanction of amounts.
• Setting up operational risk management department.
Note: Students can also mention other course of action based on their work experience.
(v) The Risk Management (Governance) Framework should define a policy statement on the following
matters:-
(i) Determining when to review the Risk Management Framework (RMF) and the frequency for undertaking
the review.
(ii) Deciding who is responsible for the review. The RMF is generally reviewed by the Audit Committee or
a team of Directors. Once in few years the RMF can be reviewed with external facilitation. This would
provide fresh insights and benchmarking information to the Board.
(iii) Selecting the scope and method for a review. The scope and boundary of the RMF review can be clearly
set out along with the most suited method for review.
(iv) Manner of circulation of results.
(vi) The risk maturity level of the company is “Risk Aware”. The reason is that the risks are identified within
functions and not across processes. Also, risks are not communicated across the enterprise. It is basically a
scattered silo based approach to risk management.
B. Answers to Multiple Choice Questions
1. (b)
2. (d)
3. (d)
4. (b)
5. (c)
6. (c)
7. (c)
8. (c)
9. (a)
10. (c)
5
© The Institute of Chartered Accountants of India
Page 56 of 492
– A major portion of revenue comes from fixed price projects which allow it the flexibility to determine
the resources it deploys and use software tools to deliver services.
Weakness
– Derives a major portion of its revenues from customers discretionary spending which is linked to
their business outlook.
– Three-fourth of the revenue of is from traditional services.
– Dependence on the people.
Opportunity
– More focus on software led services which coincide with newer areas such as digital and cloud.
Threat
– Restrictive visa policy by USA may affect the work of sunshine Ltd. and threaten the prospect of
global mobility of people as distributed software development requires free movement of people.
– Appreciation of the rupee against any major currency results in the revenue denominated in that
currency to appear lesser in reported terms.
– Clients cutting their budgets on such services and shifting their focus on newer areas such as
digital and cloud.
(2) The first political risk is toughening of visa policies by present US Government. The new directive rescinds
the previous guidance, which gave "deference" to previously approved visas as long as the key elements
were unchanged and there was no evidence of a material error or fraud related to the prior determination.
This may affect the free movement of IT people from India across USA thereby also affecting the work of
Sunshine Ltd.
Secondly, the exit of Britain from European Union i.e. Brexit only added to the woes of the IT sector. Of the
$108-billion of the IT industry’s estimated exports in 2015-16, 17 per cent was to the UK and about 11.4 per
cent to other nations within the EU. For large Indian IT companies, over a fourth of their revenues come from
Europe, in particular from the UK. This may affect the profitability position of Sunshine because of the
currency fluctuations.
(3) The types of exposures risks to be encountered by Sunshine Ltd. are discussed as below:
Transaction Exposure - It measures the effect of an exchange rate change on outstanding obligations
that existed before exchange rates changed but were settled after the exchange rate changes. Thus, it
deals with cash flows that result from existing contractual obligations. For example, in the case of
Sunshine Ltd. if services are exported to USA for $10,00,000 due in one month and if the dollar
depreciates relative to the rupee, a cash loss occurs. Conversely, if the dollar appreciates relative to the
rupee, a cash gain occurs.
Further, domestic ratings agency ICRA has highlighted that the appreciation in the rupee is aggravating the
troubles of the Indian IT sector, which is already hit by a change in the market landscape and compressing
revenue growth.
Economic Exposure – It refers to the extent to which the economic value of a company can decline
due to changes in exchange rate. ICRA has said that despite an 8.1 per cent growth in USD revenue, IT
players have registered a growth of only three per cent in the second quarter of the current fiscal, due to the
rupee appreciation of four per cent during the quarter.
6
© The Institute of Chartered Accountants of India
Page 57 of 492
It also pointed out that IT Services players profitability also remains sensitive to rupee depreciation vis-a-vis
major currencies such as USD, GBP and Euro and the same too will have an impact.
(4) The company tackle the exposure of difference in exchange rates when sale took place and when invoice is
collected through hedging currency risks which are explained as below:
(i) Internal Techniques: These techniques explicitly do not involve transaction costs and can be used
to completely or partially offset the exposure. The techniques relevant to Sunshine Ltd. can be
further classified as follows:
– Invoicing in Domestic Currency : Should the seller (exporter) i.e. Sunshine Ltd. elect to
invoice in foreign currency, perhaps because the prospective customer prefers it that way or
because sellers tend to follow market leader, then the seller should choose only a major
currency in which there is an active forward market for maturities at least as long as the
payment period. Currencies, which are of limited convertibility, chronically weak, or with only
a limited forward market, should not be considered.
– The seller’s ideal currency is either his own, or one which is stable relative to it. But often the
seller is forced to choose the market leader’s currency. Whatever the chosen currency, it
should certainly be one with a deep forward market.
– Price Variation: Price variation involves increasing selling prices to counter the adverse
effects of exchange rate change. This tactic raises the question as to why the company has
not already raised prices if it is able to do so. In some countries, price increases are the only
legally available tactic of exposure management.
– Asset and Liability Management : This technique can be used to manage cash flow
exposures. In essence, asset and liability management can involve aggressive or defensive
postures. In the aggressive attitude, the firm simply increases exposed cash inflows
denominated in currencies expected to be strong or increases exposed cash outflows
denominated in weak currencies. By contrast, the defensive approach involves matching cash
inflows and outflows according to their currency of denomination, irrespective of whether the y
are in strong or weak currencies.
(ii) External Techniques: Under this category range of various financial products are used which can
be categorized as follows:
– Money Market Hedging: At its simplest, a money market hedge is an agreement to exchange
a certain amount of one currency for a fixed amount of another currency, at a particular date.
For example, suppose a business owner in India expects to receive 1 Million USD in six
months. This Owner could create an agreement now (today) to exchange 1Million USD for
INR at roughly the current exchange rate. Thus, if the USD dropped in value by the time the
business owner got the payment, he would still be able to exchange the payment for the
original quantity of U.S. dollars specified.
– Derivative Instruments: A variety of derivative instruments such as Forward, Futures,
Options and Swap are available to hedge the exposure of foreign exchange .
(5) The Internal Financial Control System of the Sunshine Ltd. is more or less efficient. The reasons are
given as below:
• Recording and providing reliable financial and operation information.
• Safeguarding assets.
• Ensuring compliance with corporate policies.
• Well defined delegation of power.
7
© The Institute of Chartered Accountants of India
Page 58 of 492
• Efficient ERP system.
• Internal audit by one of the big audit firm.
• Periodic audit by specialized third party consultants.
And, finally Audit Committee found internal financial control adequate which shows that Sunshine Ltd. has a
good Internal Financial Control System.
B. Answers to Multiple Choice Questions
1. (a)
2. (a)
3. (c)
4. (a)
5. (d)
6. (c)
7. (d)
8. (c)
9. (c)
10. (c)
8
© The Institute of Chartered Accountants of India
Page 59 of 492
March-18 Mock Test Paper Query Sheet
(same as 3 case studies Web-Hosted by ICAI)
CASE STUDY-1
1. The question looks easy at first, but it is not so. How can we answer the impact and
measures part?
These parts of the answers need to be based on a thoughtful insight into your experience and overall
knowledge and understanding of the subject. Some are related to the SFM (FOREX and Interest
Rate Risk Management) and Audit subjects while some can be found in Chapter-1,7 and 9 of the
RM ICAI SM. Also, page 282 of the Complete Guidance Module by CA Shivam Palan can also be
used to frame the answers.
2. The answers are based on conceptual knowledge related to the matter given on page 2.25 and
9.14 of ICAI SM.
Case Study-2 and 3 are the same as CS-2 and CS-3 Web hosted by ICAI.
Page 60 of 492
SUGGESTED ANSWERS TO QUESTIONS
FINAL EXAMINATION – GROUP II
(UNDER REVISED SCHEME OF EDUCATION AND TRAINING)
MAY, 2018
BOARD OF STUDIES
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA
(Set up by an Act of Parliament)
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
Website : www.icai.org
E-mail : [email protected]
ISBN No. :
Price :
Printed by :
This Suggested Answer do not constitute the basis for evaluation of the
Faculty of the Board of Studies with a view to assist the students in their
error or omission is noticed, the same may be brought to the attention of the
herein.
Further, in the Elective Papers which are Case Study based, the solutions
from the facts given in the question or language used in the question. It may
be possible to work out the solution to the case studies in a different manner
The Question Paper comprises three case study questions. The candidates are required to answer
any two case study questions out of three.
Answers to Multi Choice Questions should be indicated clearly, by writing the option chosen (i.e. A
or B or C or D) in capital letters along with reasoning for your choice.
In case, any candidate answers extra question(s)/ sub-question(s) over and above the required
number, then only the requisite number of questions first answered in the answer book shall be
valued and subsequent extra question (s) answered shall be ignored.
Wherever necessary, suitable assumption may be made and disclosed by way of a note.
QUESTION NUMBER - I
(1) ABCD Ltd. is a diversified business group. The consolidated Balance Sheet, Statement of
Profit & Loss and Cash Flow Statement of ABCD Ltd. prepared in analytical format are
given below:
Customer Name : ABCD LTD INR (`) Thousand
31-Mar-16 31-Mar-17
12 months 12 months
Balance Sheet
CORE ASSETS
Land and Buildings 249,572 249,594
Construction in Progress 2,744 7,592
Plant and Machinery 189,892 194,166
Furniture and Fixtures 72,952 71,580
Vehicles 14,339 11,788
Less: Accumulated Depreciation - 307,198 - 320,054
TOTAL FIXED ASSETS 222,301 214,666
Stock 309,806 272,547
Trade Debtors 366,246 308,547
Finance Lease Receivables (Current) 18,728 28,702
Other Debtors 27,988 28,357
Cash and Near Liquid Funds 31,873 31,623
(6) Which one is an external factor in respect of risks for an insurance company?
(A) Financial position
(B) Machine failure
(C) Staff Morale
(D) Earthquake
(7) If Risk rating is 5, then the risk is called
(A) Severe
(B) High
(C) Moderate
(D) Low
(8) If Corr (X, Y) = -1, then X and Y have
(A) Perfect positive correlation
(B) No correlation
(C) Perfect negative correlation
(D) None of the above.
(9) Which of the following statements is NOT true with respect to Risk Management?
(A) Risk management is as much about identifying opportunities as avoiding or mitigating
losses.
(B) Risk management can be described as 'coordinated activities to direct and control an
organization'
(C) Risk management is an essential business activity for enterprises of all sizes.
(D) Risk management is recognized as an integral component of good management and
governance.
(10) Code of conduct for employees would most likely be contained in which type of Operational
Risk Management Policy?
(A) Departmental Policies
(B) High-Level Policies
(C) Human Resource Polices
(D) Operational Policies
(11) In respect of an enterprise, Knowledge risks are associated with
(A) Management and protection of knowledge and information within the enterprise.
(B) Primary long-term purpose, objectives and direction of the business
(17) Which of the following would NOT be included as a principle in determining the risk appetite
of the company?
(A) Risk appetite is not a single, fixed concept.
(B) Risk appetite can be complex.
(C) Risk appetite needs to measurable.
(D) Risk appetite is about identifying opportunities.
(18) The risk manager would like to know the risk that refers to ineffective and unethical
management of a company by its executives and managerial levels. The risk is known as :
(A) Staffing Risk
(B) Management Risk
(C) Strategic Risk
(D) Governance Risk
(19) Which one of the following that a company would LEAST likely choose as a common risk
management objective when framing the risk management approach?
(A) Enhance the level of risk maturity
(B) Allocate capital more efficiently
(C) Build safeguards against earnings-related surprises
(D) Achieve a better understanding of risk for competitive advantage
(20) The risk manager, in his approach, chose a method for structuring a group communication
process so that the process is effective in allowing a group of individuals as a whole to
deal with a complex problem. This method is BEST known as:
(A) Scoring
(B) Delphi Technique
(C) Judgement and intuition
(D) Simulation.
(21) As per the Standards on Auditing issued by the ICAI, a risk resulting from significant
conditions, events, circumstances, actions or inactions that could adversely affect an
entity's ability to achieve its objectives and execute its strategies, or from the setting of
inappropriate objectives and strategies is BEST known as :
(A) Significant Risk
(B) Business Risk
(C) Inherent Risk
(D) Control Risk. (1 x 20 = 20 Marks)
Answer
(10) (B) or (C) Code of Conduct for employees would most likely be contained in High Level
Policies of Operational Risk Management Policy. They may also be contained in the
human resource policies.
(11) (A) As per ICAI’s Standard of Internal Audit, Knowledge Risks are associated with the
management and protection of knowledge and information within the e nterprise.
(12) (A) The process of disclosure and communications is the responsibility of the Board.
(13) (B) Risk-adjusted return on capital (RAROC) is a risk-based profitability measurement
framework for analysing risk-adjusted financial performance and providing a
consistent view of profitability across businesses.
(14) (C) Loan Given Default refers to the loss likely to be suffered in the event of a default
occurring in an exposure. It takes into account the amount of recoveries likely to be
made post default.
(15) (A) the other two indexes are Corruption Perception Index and Global Peace Index.
(16) (B) Enterprise risk governance framework would not normally include Risk Management
Procedures.
(17) (D) Determination of Risk Appetite starts after identifying opportunities .
(18) (D) Governance relates to in-effective and un-ethical management of a company by its
executives.
(19) (A) Some common risk management objectives chosen by companies to frame their risk
management approach do not include the option “enhance the level of risk maturity”
(20) (B) The Delphi technique is defined as: 'a method for structuring a group communication
process so that the process is effective in allowing a group of individuals as a whole
to deal with a complex problem'.
(21) (B) Other risks are indirectly related to entity’s ability to achieve its objectives and execute
its objectives.
QUESTION NUMBER - II
About the Company
XYZ Limited is a public limited company incorporated in the year 2003. It has the registered
head office in Bhubaneswar, Odisha. The Company has iron ore mines situated in five places
in the State. The main business of the Company is extraction and sale of iron ore to many iron
and steel industries both inside and outside states.
The Company has decided to diversify its business in trading of shares. Also, the Company is
considering the possibility of setting up a Non-Banking Finance Company. For these purposes,
the Company is in the process of doing feasibility studies.
Risk Manager
The Company has approached you, being a senior Risk Manager to look into the proposals. The role
performed by you would include:
• To gather regular risk management related information from external and internal sources.
• Identify the problems and provide possible solutions to the various issues arising in the risk
management.
• To effectively manage specific risk circumstances.
• To monitor the risk of anti-money laundering (AML).
• To monitor the investment portfolio and to analyse the unfavourable movements.
• Advise and make recommendations to the management in the matters of identifying the risks
and quantifying the same.
• Help the management in designing and implementing various risk management strategies and
their related processes in the banking & investment portfolio and to suggest improvements.
• Get updated with the advances happening in the relevant software technology.
• Have a detailed understanding and knowledge of the credit, operational and market risks of the
portfolio and also the software tools used to assess them.
• Understand and reduce the exposures in financial risks by using strategies such as hedging,
credit default swap, insurance etc.
• Proactively analyse the market trends for finding out opportunities in expanding the portfolio.
• Adhere to various laws, procedures relating to the financial operations.
• Gather various information relating to the operations of NBFC in India including credit risk
management and the underlying Guidelines of RBI with respect to capital adequacy norms,
provisioning etc.
Required by the Risk Manager
In order to have a better understanding of the risk factors involved thereon, the Risk Manager
needs a better understanding on the following issues:
(i) The purchase order for a script would be authorised by a manager. The risk manager is
bothered about authorising the order for a wrong script, instead of the intended one by the
manager. Thus, he is interested to learn the controls placed and if any weakness is found
he wants to strengthen the same.
(ii) A machine learning program dynamically responds to change in data / situation by
changing the rules that govern the behavior and the algorithm "learns" from new data inputs
and gets better over time. The risk manager tries to explore the possibility of employing a
new software towards the same.
(iii) Calculation or measuring the loss in the value of the portfolio in a given period of time for
a distribution of historical returns.
(iv) The risk manager is interested to find out as to how the portfolio would fare during the
period of a financial crisis. He is also interested to build the stress testing capabilities and
to explore the ways of using them to meet the broader risk management and business
objectives.
(v) The rules and regulations existing in a foreign country and also the risk factors involved
with reference to the investment climate of that country that are to be considered before
buying shares of a foreign company.
(vi) While applying for a bank loan for the expansion of the portfolio, the parameters of credit
risk that the bank might consider and also the credit scoring model that might be applied
by the bank, while approving such loan to the company. The Company would be offering
some of its immovable properties as collateral to the proposed loan with the bank.
(vii) The certainty equivalence is a guaranteed return that the management would accept rather
than accepting a higher but uncertain return. The risk manager would like to explore the
possibility of "certainty equivalent” technique.
(viii) Effectively employing big data analytics in analysis of various transactions to study the
patterns of investments and also the possibility of using block-chain technology in ensuring
the veracity of the transactions.
You are appointed as a risk management consultant and you are expected to give your valuable
inputs by answering the following.
(a) Multiple Choice Questions:
Answer all of the following – Each MCQ carries one mark (1 x 20 = 20 Marks)
Choose the most appropriate answer from the answer options, and give brief reasoning
for your choice.
(i) The Risk Manager is trying to quantify the level of financial risk in the portfolio using
VaR. Which of the following VaR methods draws a sample from the dataset and
records its VaR ?
(A) Historical Simulation
(B) Delta-Normal Methods
(C) Monte Carlo Simulation
(D) Bootstrap Simulation
(ii) A measure of an investment's excess return, above the risk-free return, per unit of
standard deviation is known as
(A) Beta
(B) Jensen Index
(xviii) Which method under a machine learning program would MOST primarily deal with
variables that are quantitative in nature.?
(A) Regression methods
(B) Bayesian methods
(C) Analytical methods
(D) Inferential methods
(xix) In the context of credit risk management techniques, conditions imposed by the lender
on the borrower that certain activities will or will not be carried out and which can be
affirmative or negative in nature are called
(A) Letter of Credit
(B) Due Diligence
(C) Well defined credit approval matrix
(D) Covenants
(xx) The banks while considering the proposal for a wholesale credit, the detailed
appraisal would NOT include
(A) Risk identification, risk allocation and risk mitigation
(B) Covenants/conditions to be stipulated
(C) Internal credit rating model
(D) Nature of Security and its enforceability
(b) Descriptive Questions
(i) There is a 30% probability of increase in a particular share price on Monday. If that
share price increased on Monday, there is a 20% probability that it will increase on
Tuesday. If the price did not increase on Monday, there is a 70% probability that it
will increase on Tuesday. Give your workings.
Using Baye's Theorem, calculate the probability of increase in that share price on
Monday, if the price increased on Tuesday. (4 Marks)
(ii) Briefly explain how big data analytics help in improve the existing processes in Anti -
Money Laundering operations. (4 Marks)
(iii) Calculate the compounded Geometric Mean rate of return for the previous two year -
period. The stock had a return for the three years as follows:
Year 2016 2017 2018
Return 8% -5% 15%
(2 Marks)
(c) (i) The risk manager would like to have your opinion in deciding between VaR and
Expected short fall method as a risk measure. Give your advice explaining the
reasons thereof. (3 Marks)
(ii) What are the advantages of Monte Carlo Simulation? (3 Marks)
(iii) If investment proposal is ` 50,00,000/- and risk-free rate is 6% p.a., calculate Net
Present Value under certainty equivalent technique, given the following inform ation:
Certainty Equivalent
Year Expected Cash Flow (in `)
Coefficient
1 12,00,000 0.87
2 14,00,000 0.84
3 18,00,000 0.93
4 27,00,000 0.82
(4 Marks)
(d) (i) The Manager is looking at the viability of Credit Default Swap contracts. He learnt
that it has similarities with credit insurance. Discuss the differences between CDS
and credit insurance. (6 Marks)
(ii) In the present days, banks face a lot of problems in collections from customers
resulting in increase of NPAs. Hence the banks make attempts to mitigate the risks
of lending to unworthy borrowers by reviewing their five C's of Credit. Briefly explain
them. (4 Marks)
Answer
(a) Multiple Choice Questions (MCQs)
(i) (D) The Bootstrap Simulation is an extension of historical simulation. It draws a
sample from the dataset and records its VaR.
(ii) (C) Sharpe Ratio, is a measure of an investment’s excess return, above the risk -
free return, per unit of standard deviation.
(iii) (C) Option A, B and D are the properties of correlation coefficient, while C is a
distractor.
(iv) (C) One of the limitations of VaR is that it can discourage diversification.
(v) (C) As per Capital Adequacy Rules, banks should operate with a holding period of
two weeks.
(vi) (A) or (B) In the well cited example of real-time risk in the US market, where millions
of dollars were lost in a matter of just 30 minutes, the chief reason was a poorly-
tested algorithm. Further, as mentioned in the question itself, malicious activity
done by a hacker on a computer belonging to a financial services company
P(B | A) * P(A)
P [A|B] = P(B)
P(B | A) * P(A)
=
P(B | A) * P(A) + P(B | A' ) * P(A')
Accordingly let us assume
Prob. of increasing price on Monday = A
Prob. of increasing price on Tuesday = B
0.20 × 0.30
P [Increase on Monday if price increased on Tuesday] =
0.30 ×0.20+ 0.70 × 0.70
0.06
= = 0.1091 or 10.91%
0.55
(ii) The high cost of money laundering cases has prompted banks to seek new ways to
address the severe limitations in current anti-money laundering risk management.
Traditional approaches to anti money laundering remain dependent on rule -based,
descriptive analytics to process structured data. This system clearly has limitations -
without automated algorithms, detecting information within the wealth of data requires
laborious keyword searches and manual sifting through reports.
Big Data analytics can improve the existing processes in AML operations. Its
approaches allow for the advanced statistical analysis of structured data, and
advanced visualization and statistical text mining of unstructured data. These
approaches can provide a means to quickly draw out hidden links between
transactions and accounts, and uncover suspicious transaction patterns.
Advanced analytics can generate real-time actionable insights, stopping potential
money laundering in its tracks, whilst still allowing fund transfers for crucial economic
and human aid to troubled regions. Big data technologies can identify incidents, help
draw a wider picture, and allow a bank to raise the alarm before it’s too late.
=
(1 0.05)(1 0.15) - 1= 0.04522 i.e. 4.52%
(c) (i) Despite the VaR measure being better known than the expected shortfall, the latter
has more advantages:
• Expected shortfall is sensitive to the entire tail of the distribution, whereas VaR
will not change even if there are large increases in some of the losses beyond
the cut-off percentile at which the VaR is being measured.
• Expected Shortfall is a more stable measure than VaR in showing less sensitivity
to data errors and less day to day movement due to irrelevant changes in the
input data.
• With VaR, negative diversification effects can arise whereas expected shortfall
never displays negative diversification effects.
(ii) The main advantage of the use of Monte Carlo simulation is that we can generate
correlated scenarios based on a statistical distribution. Due to which it models
multiple risk factors.
Moreover, we can specifically focus on the tails of extreme loss scenarios. So, Monte
Carlo Simulation method can be used both to calculate VaR as well as to complement
it. Also, it can work both for linear and non linear risks. As unlimited number of
scenarios is generated, this helps in creating correct distributions.
(iii) Calculation of NPV
Year Expected Certainty Equi. Certain Cash PVF PV of Cash
Cash Flow Cash Flow Flow (`) Flow
(`) (`) (`)
1 12,00,000 0.87 10,44,000 0.943 9,84,492
2 14,00,000 0.84 11,76,000 0.890 10,46,640
3 18,00,000 0.93 16,74,000 0.840 14,06,160
4 27,00,000 0.82 22,14,000 0.792 17,53,488
51,90,780
0 Cash Outflow (50,00,000)
1,90,780
Alternative Presentation
n
t NCFt
NPV=
t 0 1 rf t
I
= 51,90,760 –50,00,000
= 1,90,760
(d) (i) CDS contracts have obvious similarities with insurance, because the buyer pays a
premium and, in return, receives a sum of money if an adverse event occurs.
However, there are also many differences, the most important being that an insurance
contract provides an indemnity against the losses actually suffered by the policy
holder on an asset in which it holds an insurable interest. By contrast a CDS provides
an equal payout to all holders, calculated using an agreed, market-wide method. The
holder does not need to own the underlying security and does not even have to suffer
a loss from the default event. The CDS can therefore be used to speculate on debt
objects. The other differences include:
• The seller might in principle not be a regulated entity (though in practice most are
banks);
• The seller is not required to maintain reserves to cover the protection sold (this was
a principal cause of AIG's financial distress in 2008; it had insufficient reserves to
meet the "run" of expected payouts caused by the collapse of the housing bubble);
• Insurance requires the buyer to disclose all known risks, while CDSs do not (the
CDS seller can in many cases still determine potential risk, as the debt instrument
being "insured" is a market commodity available for inspection, but in the case of
certain instruments like CDOs made up of "slices" of debt packages, it can be difficult
to tell exactly what is being insured);
• Insurers manage risk primarily by setting loss reserves based on the Law of large
numbers and actuarial analysis. Dealers in CDSs manage risk primarily by means
of hedging with other CDS deals and in the underlying bond markets;
• CDS contracts are generally subject to mark-to-market accounting, introducing
income statement and balance sheet volatility while insurance contracts are not;
• To cancel the insurance contract the buyer can typically stop paying premiums, while
for CDS the contract needs to be unwound.
(ii) Five C’s of Credit that reviewed by banks in an attempt to mitigate the risk of lending
to unworthy borrowers:
(a) Capacity – This refers to the borrower’s ability to repay the loan. The lenders /
banks will consider the cash flows generated from the underlying business,
timing of repayment and the probability of successful payment of the loan under
various stressed scenarios.
(b) Capital – It is the promoters / borrower money invested in the business and is
an indicator of how much of promoters / borrowers money is at risk if the
business fails. FIs / banks will generally consider the borrowers debt to equity
ratio to understand how much money the lender is being asked to lend as against
the money invested by the promoters / borrower in the business. High debt to
equity ratio indicates that the promoters / borrower already have high levels of
debt / loans and could be having a higher financial risk.
(c) Character – It is the obligation that the borrower feels to repay the loan.
Emphasis is given on the past loan repayment track record, credit history, credit
bureau score. This analysis pertains to the softer aspect of the borrower’s intent
to pay rather emphasis on financials, ratios and cash flows.
(d) Collateral – It is a form of security for the lender in case there is default on the
loan. In case of default, the lender will take possession of the collateral in place
of debt. Collateral can be in the form of tangible assets like land, building, plant,
machinery, cash flows, receivables, project assets etc. and also in the form of
intangible assets like patents, trademarks etc. The loan agreement should be
suitably drafted to include all the relevant details of the collateral. The lender
would ideally want the term of the loan to match the useful life of the collateral.
(e) Conditions – Additionally, apart from the borrower specific criteria’s, lenders
may also consider external factors which may affect borrower’s financials, cash
flows and its underlying ability to repay the loan obligations. End use of the loan/
purpose for taking the loan / debt will also be carefully assessed and the
transaction will be suitably structured.
QUESTION NUMBER - III
(1) You have been recently appointed as Chief Risk Officer of a company which is in Steel
Castings business. Name of the Company is ABC Electro Steel Castings Ltd. [in short,
ABC].
You have been told that ABC is fully committed to strengthen its risk management
capability on continuous basis in order to protect and enhance shareholder value. You
have been told that the risk management framework ensures compliance with the
requirements of amended Clause 49 of the Listing Agreement. The framework establishes
risk management processes across all businesses and functions of the Company. These
processes are periodically reviewed to ensure that the Management controls risks through
properly defined framework.
You are also made aware that the Company has already undertaken an extensive Risk
Management effort that includes introducing Risk Management Manual, comp iling a
comprehensive profile of the key risks to the Company, identifying key gaps in managing
those risks and developing preliminary action plans to address those risks. This effort
accomplishes the following goals:
• responds to the Board's need for enhanced risk information and improved mitigation
plan;
• provides the ability to prioritize, manage and monitor the risk in the business; and
• formalizes the explicit requirements for assessing risks on an ongoing basis, including an
effective internal control and management reporting system.
You are also given information that the Company uses raw materials to manufacture the
steel castings. It is faced with the threat of pressure on margins on sales. To counter the
threat, the Company has taken various steps which include backward integration which
comprises coal mines and iron mines, and brownfield expansions, e.g. sinter plant, sponge
iron plant, coke oven plant, power plant from waste head recovery. It also set up an R & D
to expand its manufacturing capacities with a view to control costs.
You came to know that the Company is ISO-140001-2004 certified and is adhering strictly
to the emission norms applicable for industry.
You are also told that with the thrust given by Government of India on water and water
related projects and with the estimated growth in water requirement, the demand of DI
Pipes is expected to grow substantially and the Company is confident of retaining its
market share.
Labour relations have been excellent throughout the year in spite of number of unions. It
is the result of such cordial and harmonious relations that not a single man -day has been
lost in the last 8 years. The Company believes that labour relations will continue to remain
excellent.
The Company has also Credit insurance policy.
Now, you have been asked to give a report to the Company's Management, which should
contain the key risks affecting the Company, and the measure that can be taken to mitigate
such risks. (30 Marks)
Multiple Choice Questions (2) to (6): Briefly explain the reasoning for your choice
which is mandatory
(2) An excess payment made to a vendor, which is accounted correctly, would be categorized
under which of the following risks?
(A) Financial Reporting risk
(B) Legal risk
(C) Reputation risk
(D) Financial risk (2 Marks)
(3) In Information Technology General Controls, under change management, the risk of
incorrect change is NOT mainly due to
(A) Change being wrongly conceived by the user groups
(B) Change control audit trail not maintained
(C) Change is wrongly executed
(D) Change being carried out without approvals (2 Marks)
(4) Annual Report of the Board of Directors must include a statement indicating the
development and implementation of a risk management policy for a company. This is
mandated by
(A) SEBI through 'Issue of Capital and Disclosure Requirements Regulations'
(B) Information Technology (Amendment) Act, 2008
India on water and water related projects and with the estimated growth in water
requirement, the demand of DI pipes is expected to grow substantially, and the
company is confident of retaining its market share.
(c) Foreign Exchange Risk: Considering the large export and imports of raw material,
the Company is exposed to the risk of fluctuation in the exchange rates.
The Company has adopted a comprehensive risk management review system
wherein it actively hedges its foreign exchange exposures within defined parameters,
through use of hedging instruments such as forward contracts, options and swaps.
The company periodically reviews and audits its risk management initiatives through
an independent expert.
(d) Industrial Risk: The company is exposed to labour unrest risk, which may lead to
production slowdown ultimately resulting in plant shutdown.
Labour relations have been excellent throughout the year in spite of number of unions.
It is result of such cordial and harmonious relations that not a single man -day has
been lost in the last 8 years. The Company believes that labour relations will continue
to remain excellent.
(e) Environment Risk: The company is exposed to the risk of Environment and Pollution
Controls, which is associated with such types of industries.
The Company is committed to the conversation of the environment and has adopted
the latest technology for pollution control. The Company is ISO-140001-2004 certified
and is adhering strictly to the emission norms applicable for the industry.
(e) Payment Risk: The company is exposed to the risk of defaults by the customers in
payments.
Since major water infrastructure projects are government founded or foreign aided,
the risk involved in payment defaults is minimum. Further, evaluation of the credit
worthiness of the customers has minimized the risk of default by other segment
customer. Besides, the risk of export receivables is covered under Credit Insurance.
Alternative Answer
Report to Company’s Management
To: The Management
From: Chief Risk Officer
Date: 12 May 2018
Subject: Key risks affecting the company and its mitigation
Introduction
This report covers
(i) Key risks affecting the company
• To contain the risks to a tolerable level within the risk appetite of the organization
(i.e., how much risk the management is ready to accept).
• To give a response to risks (i.e., aspects of addressing risks).
Broadly, the risk responses are categorized into the following buckets:
Sr. Risk action Description
No
1 Avoid Exiting the activities which are increasing the risk of the
organization. For instance, in case of ABC, risk avoidance
may involve the company in exiting some of the activities
initiated under backward integration which is causing
problems and seeing as a potential threat in future. This
way company’s process risk can be mitigated to a great
extent.
2 Reduce/ Action is taken to reduce the risk likelihood or impact, or
Manage/Treat both or treat it altogether. This involves introducing internal
control measures such as introducing internal audit which
ensures the authenticity of the financial transactions and
helps to treat financial risk as well as audit risk.
The company already has credit insurance to manage
credit risk which is a good thing. However, Insurance can
be taken by ABC to mitigate operational risks such as
risks arising out of fire, for instance. Depending on the
cover available and opted for, other losses due to
terrorist attacks, natural disasters etc. can also be
covered. Cash transit insurance and fidelity insurance
are off quoted examples.
Further, implementation of occupational health and safety
management for the health and safety of the workers shall
be initiated by the management to treat such risks, if they
occur in future. The reason is that the workers of the
companies are engaging in such manufacturing process
which may jeopardize their health and safety and
consequently the organization may suffer because of this.
Political Risks cannot be mitigated. The only way is to
establish good relations and complying with all the legal
requirements on a continuous basis.
It seems from the question itself that the management is
ethical and doing its tasks effectively and thereby reducing
its Governance Risk.
(2) (D) The situation mentioned in the question would be categorised under Financial Risk
because it would lead to possible financial loss to the organisation.
(3) (B) Option A, C and D are the causes of the risk of incorrect change, while option B is a
distractor.
(4) (C) As per section 134(3)(n) of the Companies Act, 2013, Annual Report of the Board of
Directors shall include a statement indicating development and implementation of a
risk management policy for the company including identification therein of elements
of risk, if any, which in the opinion of the Board may threaten the existence of the
company.
(5) (A) The high impact low probability often skips the management decision purely because
these incidents are either not foreseen at all in reality or even if they are, they are so
rare but with severe impact that putting a risk mitigation plan for them is very difficult.
(6) (B) Governance risks include inability of the Board to identify principal risk factors that
can impact business continuity. Therefore option (B) does not include among the
deficiencies covered under governance risks.
(7) Ten tasks in respect of the role of the risk manager are as follows:-
(i) Manage the implementation of all aspects of the risk function, including implementation
of processes, tools and systems to identify, assess, measure, manage, monitor and report
risks.
(ii) Select the most suited risk identification techniques and approaches.
(iii) Manage the process for developing risk policies and procedures, risk limits and approval
authorities.
(iv) Monitor major, critical and minor risk issues.
(v) Manage the process for elevating control risks to more senior levels when appropriate.
(vi) Management of risk reporting, including reporting to senior management.
(vii) Prepare high-level user requirements to assist in preparation of Project Initiation
documents.
(viii) Liaison with Business users to prepare Functional risk specifications. Translate business
requirements and functional needs into business / reporting and system specifications.
Ensure technical specifications meet the stated needs of the business.
(ix) Generate project management documents.
(x) Provide User Training for in-house developed risk management systems.
(xi) Conduct compliance & risk assessments.
(xii) Conduct and document audits of risk related compliance to industry standards
(xiii) Define & develop risk policies, procedures, processes & other documentation as required.
(xiv) Implement the risk management program and risk strategy. Ensure the risk management
program is effectively integrated into product development and delivery methodology.
(xv) Participate in local and global discussions to formulate new or enhance existing risk
management processes, policies and standards.
(8) Usefulness of ‘Artificial Intelligence’
Artificial Intelligence is the science that makes intelligent machines especially computer
programs. It is a way of making a computer in a manner in which the intelligent humans think.
It works by studying how human brain thinks and how humans learn, decide and work while
trying to solve a problem, and then the outcomes of this study is used in developing intelligent
software and systems. It has been dominant in many fields such as:
Gaming – It plays a crucial role in strategic games such as chess, poker etc.
Natural Language Processing – It is possible to interact with the computer that understands
natural language spoken by humans.
Expert Systems - There are some applications which integrate machine, software, and special
information to impart reasoning and advising. They provide explanation and advice to the users.
Vision Systems - These systems understand, interpret, and comprehend visual input on the
computer.
For example,
• Doctors use clinical expert system to diagnose the patient.
• Police use computer software that can recognize the face of criminal with the stored
portrait made by forensic artist.
AI is also used in Speech Recognition, Handwriting Recognition, and Intelligent Robots etc.
Artificial Intelligence is dependent on large amounts of data. So proper big data architecture
needs to be set up for AI that involves architecture like Hadoop clusters, Spark Clusters etc. so
that the processing of the data is faster and smooth.
Descriptive Questions:
1- It is conceptual with the addition of the Capital structure aspect for which D/E is the perfect
ratio. The analysis requires a conceptual understanding of Financial Ratios. (similar Question
in OCT-19 MTP)
Case Study 2
a. Multiple Choice Questions:
Page 97 of 492
(xi) Refer page no 6.23 of ICAI SM.
(xii) Concept-Based Approach on Analytics.
(xiii) Concept -Based on Stress Testing
(xiv) Old Chapter 4 of ICAI SM.
(xv) Refer page no 6.11 of ICAI SM.
(xvi) Old Chapter 4 of ICAI SM.
(xvii) Refer page no 6.34 of ICAI SM
(xviii) Refer page no 9.33 of ICAI SM.
(xix) Refer page no 6.12 of ICAI SM.
(xx) Refer page no 6.15 of ICAI SM.
c. (i) -Difference between VAR and Expected Shortfall (Refer page no. 5.6 of ICAI SM)
(ii) - Advantages of Monte Carlo Simulation (Refer page no. 5.5 of ICAI SM)
d. (i)- Difference between CDS and Credit Insurance (Refer page no. 6.24 of ICAI SM)
Case Study 3 (March 19 CS-3 Co name different, Descriptive Question are same, 5 MCQs are
common)
(1)- How can we answer the mitigation measures part- There is hardly any content in the ICAI
SM for the same?
Manageable answer from page 1.19 of the ICAI SM- Also, conceptual understanding is required for the
mitigation measures. (Also, You can refer to page 282 of the Complete Guidance module by CA Shivam
Palan for the mitigation measure summary)
(2) General, You may get an idea from the Types of risk given on Page no. 1.19
(3) Refer to Page no 9.19 of ICAI SM.
(4) Refer to Page no 7.10 of ICAI SM
(5) Refer to Page no 9.14 of ICAI SM
(6) Refer to Page no 7.1-7.2 of ICAI SM.
(7) Direct answer from Page 2.30 of ICAI SM.
(8) Direct answer from Page 9.35 of ICAI SM.
Page 98 of 492
Test Series: August, 2018
MOCK TEST PAPER - 1
FINAL (NEW) COURSE: GROUP – II
PAPER – 6A: RISK MANAGEMENT
Case Study Question Number One
(A) The ABC Bank Ltd. is a bank in India and has a credit portfolio of Rs. 10 billion. The key portfolio features
are given below:
The largest sector exposure is in construction which accounted for 20% of the credit portfolio (others
sectors in the portfolio include cement/steel manufacturers, building material distributors, real estate
developers/builders, automobile manufacturers, tyre manufacturers and investment banks).
The two largest customers account for 30% (they belong to the construction and building materi als
sector).
All obligors in the credit portfolio are situated within India.
The credit products offered by the bank include both short and long term – but the majority is long term
exceeding one year, accounting for 60% of the portfolio.
Most of the funding sources are short term – i.e. short-term deposits and inter-bank borrowings, which
accounted for about 75% of the total funding requirements.
Although entire lending was in Rupees, 45% of the short-term deposits were in non-rupee currencies.
The only collateral it accepts is real estate.
Discuss the portfolio level risks in this portfolio. Is there any significant undiversified risk in this credit
portfolio? If so, suggest how further diversification can be achieved. (30 Marks)
(B) Multiple Choice Questions
(i) A ……….. is the threat that an event or action will adversely affect an enterprise’s ability to
maximize stakeholder value and to achieve its business objectives.
(a) Enterprise Risk
(b) Business Risk
(c) Operational Risk
(d) Financial Risk
(ii) ……… defines financial risk as the risk that the cash flow of an issuer will not be adequate to meet
its financial obligations.
(a) Basel II
(b) Institute of Risk Management
(c) NASDAQ
(d) NYSE
(iii) …….. is the process of evaluating and defining the cost and benefits associated with the risk
consequences.
(a) Risk Quantification
(b) Risk Assessment
(c) Risk Measurement
(d) None of the above
Case Study 1
(A) How can we write such answers?
(Portfolio Risks- key portfolio features are given and we have to frame the answer from the Case
study. Purely Conceptual Based on - Diversification of Risk and Portfolio Risk)
Case Study 2
A. (i) Manageable answer from page 1.06; + 1.19 of ICAI SM.
(ii) Related to a case study. Can be easily answered if you have read the case study carefully.
B. (i) Related to concepts of Chapter 9 and related to the case study. Manageable.
(ii) Answers are mostly there in the case study’. A careful read through the case study is required.
(iii) Answer is mostly there in the question part of the case study. A careful read through the case
study is required.
C. Multiple-choice Questions
(i) Direct answer from page no. 2.07 of ICAI SM.
(ii) Direct answer from page no. 1.10 of ICAI SM.
(iii) Direct answer from page no. 1.09 of ICAI SM.
(iv) Direct answer from page no. 1.14 of ICAI SM.
(v) Direct answer from page no. 5.12; +5.13 of ICAI SM.
(vi) The correct option should be Causal instead of Casual, and therefore, it is kind of
common sense that causal/factor analysis helps to relate the characteristics of an event
to the probability of operational losses.
(vii) Direct answer from page no. 1.17 of ICAI SM.
(viii) Direct answer from page no. 2.05 of ICAI SM.
(ix) Direct answer from page no. 1.09 of ICAI SM.
(x) Direct answer from page no. 3.02 of ICAI SM.
(i)- Direct answer from page no. 5.15 of ICAI SM. (Types of Risk)
(ii)- Direct answer from page no. 5.16+5.17 of ICAI SM. (Quantitative Tools to assess the above risks)
B. Direct answer from page no. 6.12 of ICAI SM. (Credit Risk Mitigation)
D. Direct answer from page no. 7.03+7.04 of ICAI SM. (Sound Practices to improve Risk Governance)
E. Easy calculation, formula based question from old chapter 4 of ICAI SM. (Probability)----Not in the
syllabus now
This Suggested Answer hosted on the website do not constitute the basis for evaluation of the
student’s answers in the examination. The answers are prepared by the Faculty of the Board of
Studies with a view to assist the students in their education. While due care is taken in preparation
of the answers, if any error or omission is noticed, the same may be brought to the attention of the
Director of Board of Studies. The Council of the Institute is not in anyway responsible for the
Further, in the Elective Papers which are Case Study based, the solutions have been worked out on
the basis of certain assumptions/views derived from the facts given in the question or language used
in the question. It may be possible to work out the solution to the case studies in a different manner
The Question paper comprises three case study questions. The candidates are required
to answer any two case study questions out of three.
Answers in respect of Multiple Choice Questions are to be indicated in capital letters, i.e. A or
B or C or D as the case may be.
Candidates may use calculator
CASE STUDY: 1
1.1 ABC Co. Ltd. is a manufacturing company and is listed. It has 10000 workers and 1200
employees. The Company is subject to Ind AS 19 in respect of its employee benefits which
include gratuity.
Ind AS 19 is an Accounting Standard applicable to companies which are required to
measure and disclose the amount of accrued liability (Present Value of Benefit Obligation)
in respect of employee benefits in statements of accounts.
As per the Accounting Standard, the accrued liability in respect of, employee benefits can
be determined using actuarial principles. Accordingly, the Company engaged an actuary
for the purposes of the Ind AS 19.
The Company is, liable to make payment of gratuity benefit to its employees as per
Payment of Gratuity Act, 1972. As per the Act, the gratuity benefit is determined using a
formula, which is [15/26] x monthly salary (which is relevant for gratuity calculation) x
number of completed years of service at the date of cessation of service of the employee.
There are terms and conditions mentioned in the Act for payment of gratuity benefit, which
the company is required to comply with the same.
The Company engaged Mr. X, a consultant actuary, to get the actuarial reports certified by
Mr. X as per Ind AS 19 for the last two years.
After submission of the actuarial report by Mr. X, in the third year, Auditors (who were
recently appointed by the Board) observed that Mr. X does not hold any certificate of
fellowship issued by the Indian Actuarial professional body. They pointed out and qualified
the Accounts in their Auditors' Report. They also observed that the Mr. X's reports were
accepted during last two years.
Since the Management is worried over GRC (Governance, Risk and Compliance), the CRO
(Chief Risk Officer) was asked to address the issue pointed out by the Auditors and submit
a report to the Company giving details of the risks and how they can be mitigated.
Now, you are recently appointed as the CRO and you are asked to draft the Report to be
submitted to the Board, and the Report should include:
(a) What is the type of risk the Company is subjected to?
(b) What is the impact of the risk on the Company's performance?
CASE STUDY: 2
(2.1) Quality Paper Mills Limited is an unlisted company formed in the year' 2003 having the
head office and factory situated at Visakhapatnam. It was manufacturing and selling
papers. The manufacturing of paper was based on bamboo and soft wood.
Some key Profitability Ratios for the FY 2011-12 were:
Percentage of profit after tax to:
Sales 1.84
Fixed Assets 0.83
Capital Employed 1.09
Net-worth 2.01
Equity Capital 3.27
Due to various issues such as, insufficient availability of raw materials, labour unrest,
power problems, environmental pollution etc., the Company stopped production in the
month of March, 2012.
The Company owned a total land of 38 acres as on 31 st March, 2012 in which the factory
and office were situated. It sold 5 acres of vacant land for ` 3 crores and settled the Bank
dues, outstanding wages and statutory liabilities during September 2012.
Extract from Balance Sheet as on 31st March, 2018 ` (in crores)
Investments 2.00
(in the form of shares, debentures, units in mutual funds)
Land (at cost) 3.00
Other fixed assets 1.50
Liabilities Nil
Equity capital 1.00
In April, 2018, the Managing Director of the Company, Mr. Ajit, got the approval of the
Board to revive the Company. He appointed a project consultant to conduct a feasibility
study and also to come out with alternate proposals.
The consultant, after a 3-month study, came out with the following proposals.
Proposal 1 :
To demolish all the buildings and construct residential villas, apartments and independent
houses ans sell them to the public.
Projections of Proposal 1
Project time 3 years
Total sales price ` 30 crores
Cost of construction ` 20 crores
Other expenses (including interest) ` 6 crores
3-year Term Loan from Bank ` 10 crores
Profit ` 4 crores
Suitable modifications to be done in Memorandum and Articles of Association of the
Company. Necessary approvals to be obtained from the Town Planning authorities of the
State government.
Proposal 2 :
To commence paper manufacturing using sugarcane bagasse, which is used as a
substitute for bamboo and soft wood for the production of paper pulp. It is estimated that
30% wet bagasse could be obtained from crushing sugarcane. There are a lot of sugar
mills that are around the place and it may not be a problem to obtain such raw material.
After removing pith (waste fiber) and leftover sugar from the wet bagasse, it could be
converted to pulp. Since sugarcane production is seasonal, suitable preservative
arrangements for the bagasse are to be undertaken.
Since the Company was already producing paper using bamboo and soft wood, it was
suggested to have 20% of total production by using the existing machinery after sufficient
reconditioning. The consultant also suggested to manufacture (i) boards and (ii) newsprint
paper besides production of papers, as there is a growing market both in India and foreign
countries.
Key factors of Proposal 2 ` ( in crores)
Cost of new machineries 10.00
Infrastructure development expenditure etc., (laying of roads and 3.00
conversion of meter-gauge rails to broad-gauge rails in the factory)
Cost towards revamping old machineries 1.25
Initial cost towards purchase of raw materials 1.00
Renovation expenses of staff quarters, office and factory buildings 2.30
Other expenditure 2.45
TOTAL COST 20.00
This was proposed to be met as under:
Fresh share capital from existing shareholders 2.00
(2.4) Strategic risks are associated with (as per ICAI's Standard of Internal Audit) the following
purpose, objectives and direction of business:
(A) Short-term purpose
(B) Medium term purpose
(C) Long-term purpose
(D) None of the above
(2.5) The managing director wanted to know the difference between Risk Capacity and Risk
Appetite. It can be BEST described as
(A) Risk Appetite is the overall ability and financial boundary above which the Board can
play their business bets; whereas Risk Capacity is the hard stop limit above which
the Board would like to restrict its business actions.
(B) Risk Capacity is the overall ability and financial boundary within which the Board can
play their business bets; whereas Risk Appetite is the hard stop limit within which the
Board would like to restrict its business actions.
(C) Risk Appetite is the overall ability and financial boundary within which the Board can
play their business bets; whereas Risk Capacity is the hard stop limit within which the
Board would like to restrict its business actions.
(D) Risk Capacity is the overall ability and financial boundary above which the Board can
play their business bets; whereas Risk Appetite is the hard stop limit above which the
Board would like to restrict its business actions.
(2.6) A company's decision to move into immature or emerging markets or to launch products
outside its core competencies is BEST known as
(A) Uncertainty
(B) Ambiguity
(C) Complexity
(D) Volatility
(2.7) The global risk indicators, according to the World Economic Forum, that are currently in
trend do not include:
(A) Increasing disparity between the rich and poor.
(B) Global warming and climate changes.
(C) Terrorism leading to intensified nationalism and regional conflicts.
(D) None of the above
(2.8) In an organisation having high risk-maturity, the internal auditor would need to:
(A) consult by promoting and advising on identification of and response to risks.
(B) evaluate all types of risks impacting all categories of stakeholders and find solutions
to pre-empt the threats before the risk occurs.
(C) concentrate more on carrying out process audits of the risk management processes.
(D) update their risk management processes as they become aware of new or developing
practices.
(2.9) Which one of the following economic variables would be CHIEFLY used to identify
sovereign risk in advance?
(A) Ratio of Import to its Export
(B) Expropriation Risk
(C) Inefficient Legal System
(D) Exchange Control Risk
(2.10) In case of Impact of Business Risk, the Impact area of 'customer' has the following nature
of impact:
(A) Morale
(B) Loyalty
(C) Loss of confidence
(D) Defaults
(2.11) According to ISO 31000 on keys to ERM implementation, which one of the following keys
would provide an opportunity to change and further tailor ERM processes?
(A) Leverage existing resources
(B) Winning support and sponsorship from the top management is a precursor
(C) Building ERM using small but solid steps
(D) Focus on a simple risk model with small number of Top Risks
Answer to Case Study 2
2.1 (a) While discharging the roles and responsibilities associated with the risk function, the
Risk Managers and Risk Committees should refer to the principles recommended by
OECD. The principles are re-produced hereunder: -
1. It should be fully understood by regulators and other standard setters that
effective risk management is not about eliminating risk taking, which is a
fundamental driving force in business and entrepreneurship. The aim is to
ensure that risks are understood, managed and, when appropriate,
communicated.
2. Effective implementation of risk management requires an enterprise-wide
approach rather than treating each business unit individually. It should be
10 4 16
Total = 30 50
Mean (µ) = 6
50
Var(X) = = 10
5
50
Standard Deviation (σ) = = 3.16
5
(c) Functions of Risk Management
(i) It is independent of business lines (i.e. it is not involved in revenue generation)
and reports to the CRO;
(ii) It has authority to influence decisions that affect the firm’s risk exposures;
(iii) It is responsible for establishing and periodically reviewing the enterprise risk
governance framework which incorporates the Risk Appetite Framework (RAF),
Risk Appetite Statement (RAS) and risk limits.
(I) The RAF incorporates an RAS that is forward-looking as well as information
on the types of risks that the firm is willing or not willing to undertake and
under what circumstances. It contains an outline of the roles and
responsibilities of the parties involved, the risk limits established to ensure
that the framework is adhered to, and the escalation process where
breaches occur.
(II) The RAS is linked to the firm’s strategic, capital, and financial plans and
includes both qualitative and quantitative measures that can be aggregated
and disaggregated such as measures of loss or negative events (e.g.,
earnings, capital, and liquidity) that the board and senior management are
willing to accept in normal and stressed scenarios.
(III) Risk limits are linked to the firm’s RAS and allocated by risk types, business
units, business lines or product level. Risk limits are used by management
to control the risk profile and linked to compensation programmes and
assessment.
(iv) It has access to relevant affiliates, subsidiaries, and concise and complete risk
information on a consolidated basis; risk-bearing affiliates and subsidiaries are
captured by the firm wide risk management system and are a part of the overall
risk governance framework;
(v) It provides risk information to the board and senior management that is accurate
and reliable and periodically reviewed by a third party (internal audit) to ensure
completeness and integrity;
(vi) It conducts stress tests (including reverse stress tests) periodically and by
demand. Stress test programs and results (group-wide stress tests, risk
categories and stress test metrics) are adequately reviewed and updated to the
board or risk committee. Where stress limits are breached or unexpected losses
are incurred, proposed management actions are discussed at the board or risk
committee. Results of stress tests are incorporated in the review of budgets,
RAF and ICAAP processes, and in the establishment of contingency plans
against stressed conditions.
(d) (i) Business Risk according to SA 315: A risk resulting from significant conditions,
events, circumstances, actions or inactions that could adversely affect an
entity’s ability to achieve its objectives and execute its strategies, or from the
setting of inappropriate objectives and strategies.
(ii) Internal Control according to SA 315: The process designed, implemented and
maintained by those charged with governance, management and other
personnel to provide reasonable assurance about the achievement of an entity’s
objectives with regard to reliability of financial reporting, effectiveness and
efficiency of operations, safeguarding of assets, and compliance with applicable
laws and regulations.
(iii) Significant Risk according to SA 315: An identified and assessed risk of material
misstatement that, in the auditor’s judgment, requires special audit
consideration.
(iv) Internal Financial Control according to Companies Act 2013: The policies and
procedures adopted by the company for ensuring the orderly and efficient
conduct of its business, including adherence to company’s policies, the
safeguarding of its assets, the prevention and detection of frauds and errors, the
accuracy and completeness of the accounting records, and the timely
preparation of reliable financial information.
(e) Basic Principles on which the bank would assess the loan proposal of the Company
as follows:
(i) Understand the reality: As a lender you need to ensure that you made your
customer aware of all the charges and fees associated with the credit which you
are planning to extend to the customer. This is critical as customer might be at
negotiation stance to have maximum benefit from your line of credit. Longer time
he takes to negotiate, there is high possibility that pay off will be late. So
communicate the implicit and non-implicit costs that associated with it. Even
administrative aspects are also important as they sometime drive the business
decision to have line of credit or not.
(ii) Check the credibility: It may be possible that customer externally looks reliable
to the organization, but that does not mean that the customer has full ability to
pay off appropriately and regularly. You need to understand the credibility that
the customer possesses. And for that purpose, lender organization should rely
on the reports which are available. Or they can consider going through the credit
scoring agencies to ensure the customer has the paying ability. Even asking for
the basic information will provide you a rough idea about the c redit history of the
customer. It always better to take the help of professionals during this step.
Engage the professional and rely on their expertise. During this stage, credit
evaluation is very critical.
(iii) Ask and Check the references: It’s absolutely ok to ask customer for the
references, list of creditable clients are much more reliable source than anything
else. It’s important to ask for the lender organization to understand who all have
been giving trade credit in the past and how old are the relationship with such
counterparty. This will establish a pattern to understand if the customer has a
tendency to maintain the business relation or it’s just a pure business. Also,
asking reference from the third party proves to be independent source to verify
the commitment made by the customers.
(iv) Due Diligence: When a lender is convinced to provide a line of credit to the
customer, it is his duty to have proper due diligence in place to ensure the line
of credit is being placed in safe pair of hands. Irrespective of the professionals’
involvement in due diligence process, lender still has the moral responsibility to
perform the due diligence on its own. This can be achieved by simply visiting the
website, assessing the market creditability etc. Basically, publicly sourced
information is pretty useful in such cases.
(v) Recovery: Lender organization or its employee must understand that every
single rupee invested in the customer has cost involved in it. An effort should be
made to ensure that this minimal cost of capital should be recovered from the
customer. This can be achieved by simply asking your prospect for a deposit or
the collateral.
(vi) Nature of business: Once should not hesitate to ask for the nature of business
in which borrower is dealing with. This will give a fair bit item on risk exposure
and also provide adequate comfort to the lender.
(f) A holistic risk management framework would empower Board to act early and take
the right decision by:
• Identify top threats to entity and asset protection measures.
• Link risks to more efficient capital allocations and business strategy.
• Develop a common language in the organization for problem solving.
• Effectively respond to an evolving business environment.
2.2 (B)
2.3 (A)
2.4 (C)
2.5 (B)
2.6 (B)
2.7 (D)
2.8 (C)
2.9 (A)
2.10 (B)
2.11 (C)
CASE STUDY: 3
(3.1) Ms. X is new to operational risk management. While analysing the risks of an established
airline based on the Risk Grading /Rating model, she identified the following risks:
(1) Stagnant business growth resulting from competition from other airlines.
(2) Aggressive fleet expansion, which may lead to over-capacities. There are about 170
aircrafts under order, which could also result in massive financial commitments. A
comprehensive feasibility study has been shared by the Company, justifying the
expansion strategy.
(3) Safety standards resulting in crash/disastrous hijacking.
(4) Volatile oil prices. There is a risk of failure to address adequately the challenges of
fluctuating oil prices. Whilst it is usually rising oil prices that hurt airlines, during 2008,
several airlines suffered significant hedging losses as the hedging strategies went
awry, when oil prices plummeted from $147 p/b in July 2008 to $35-40 p/b level.
Please, help Ms. X to classify the above risks, by giving a report to her. (30 Marks)
Choose the accurate or near accurate answer in the following Multiple Choice Questions.
(10 x 2 Marks = 20 Marks)
(3.2) One of the principles of Basel Committee on Banking Supervision Principles for sound
stress testing practices and supervision is:
(A) Stress testing should form an integral part of the overall governance and risk
management culture of the bank.
(B) Stress testing should be done in case of mergers or take overs only.
(C) Stress testing should be done at the direction of Reserve Bank of India only.
Although this risk has a high impact but has low probability as investment involved in
the Airline business is very huge. Accordingly, this risk often skips the management’s
decision as these type events cannot be foreseen. Hence, this risk is bucked in the
category of ‘High Impact – Low Probability’.
(2) Aggressive fleet expansion leading to over-capacities.
Since Airline has already ordered 170 aircrafts there is high probability that it will involve
financial commitments and impact will also be high. Hence, this risk is bucked in the
category of ‘High Impact – High Probability’ and it needs immediate and sufficient
attention of management.
(3) Safety Standards resulting in Crash/ disastrous hijacking
Any crash or dangerous hijacking incidents will create negative publicity, poor image
resulting in a decline in revenue and similar consequences.
Whilst the probability is low, the strong impac t ought to force the seeking of appropriate
mitigants. Hence, the impact is high and can be classified as ‘Low Probability – High
Impact’. It is suggested to ensure the adequacy of safety systems, to establish the
average age of the aircraft and if necessary, to seek the help of an external expert.
(4) Volatile Oil Prices
Oil price fluctuation is a business risk that has serious implications for the profitability of
the airline business. However, since this affects almost all competitors, the impact can be
considered as low and can be categorized as ‘Low Probability – Low Impact’.
Signed
Chief Risk Officer
3.2 (A)
3.3 (B)
3.4 (C)
3.5 (A)
3.6 (D)
3.7 (B)
3.8 (B)
3.9 (A)
3.10 (A)
3.11 (B)
Case Study 2
(May 20 MTP CS-2 Case study background is same, 5MCQs common and Descriptive Q is different )
2.1(a)- Refer page no. page no. 2.33 of ICAI SM. (OECD Principles for Effective Implementation of
Risk Management)
2.1(c)- Refer page no. 7.05 of ICAI SM. (Functions of Risk Management)
2.1-(f)- Refer page no. 3.10 of ICAI SM. (Benefits of Holistic Risk Management Framework)
=
(1 0.05)(1 0.15) - 1= 0.04522 i.e. 4.52%
(d) (i) Despite the VaR measure being better known than the expected shortfall, the latter has
more advantages:
• Expected shortfall is sensitive to the entire tail of the distribution, whereas VaR will no t
change even if there are large increases in some of the losses beyond the cut-off
percentile at which the VaR is being measured.
• Expected Shortfall is a more stable measure than VaR in showing less sensitivity to
data errors and less day to day movement due to irrelevant changes in the input data.
• With VaR, negative diversification effects can arise whereas expected shortfall never
displays negative diversification effects.
(ii) The main advantage of the use of Monte Carlo simulation is that we can generate correlated
scenarios based on a statistical distribution. Due to which it models multiple risk factors.
= 51,90,760 –50,00,000
= 1,90,760
(e) (i) CDS contracts have obvious similarities with insurance, because the buyer pays a premium
and, in return, receives a sum of money if an adverse event occurs.
However, there are also many differences, the most important being that an insurance
contract provides an indemnity against the losses actually suffered by the policy holder on
an asset in which it holds an insurable interest. By contrast a CDS provides an equal payout
to all holders, calculated using an agreed, market-wide method. The holder does not need
to own the underlying security and does not even have to suffer a loss from the default
event. The CDS can therefore be used to speculate on debt objects. The other differences
include:
• The seller might in principle not be a regulated entity (though in practice most are banks);
• The seller is not required to maintain reserves to cover the protection sold (this was a
principal cause of AIG's financial distress in 2008; it had insufficient reserves to meet the
"run" of expected payouts caused by the collapse of the housing bubble);
• Insurance requires the buyer to disclose all known risks, while CDSs do not (the CDS seller
can in many cases still determine potential risk, as the debt instrument being "insured" is a
market commodity available for inspection, but in the case of certain instruments like CDOs
made up of "slices" of debt packages, it can be difficult to tell exactly what is being
insured);
1.1- Manageable answer (case study related May Refer page no.1.19 of the ICAI SM. Please note down
some new risks as are given in the suggested answers- for future answer purposes, although, if you
mention some other risks and you have conceptually justified it, then also it will be acceptable.
Case Study 2
(a) Related to Bayes theorem concept from old chapter 4 of ICAI SM.
(b) Refer page no. 9.34 of ICAI SM. (Big Data Analytics)
(c) Refer old chapter 4 of ICAI SM. (Geometric Mean)
(d) (i)- Refer page no. 5.06 of ICAI SM. (Difference between VaR and Expected Shortfall)
(d) (ii)- Refer page no. 5.05 of ICAI SM. (Advantages of Monte Carlo Simulation)
(d) (iii)- Related to page no. 8.16 of ICAI SM of IPCC Chapter of Capital Budgeting.
(e) (i)- Refer page no. 6.24 of ICAI SM. (CDS v/s Credit Insurance)
(e) (ii)- Refer page no. 6.13 of ICAI SM(5 Cs of Credit)
for evaluation of the student’s answers in the examination. The answers are
prepared by the Faculty of the Board of Studies with a view to assist the
answers, if any error or omission is noticed, the same may be brought to the
published herein.
Further, in the Elective Papers which are Case Study based, the solutions
from the facts given in the question or language used in the question. It may
be possible to work out the solution to the case studies in a different manner
The Question paper comprises three case study questions. The candidates are required
to answer any two case study questions out of three.
Answers in respect of Multiple Choice Questions are to be indicated in capital letters, i.e. A or
B or C or D as the case may be.
Candidates may use calculator
CASE STUDY: 1
Mr. Krish is having an experience of 15 years in manufacturing and selling pharmaceutical
products. He is the managing partner of M/s. Krish Pharma situated in Mumbai.
In the month of May 2018, he came across a notification No. F. No. 10(6)/2016- DBA-II/NER
dated 12th April, 2018 issued by Ministry of Commerce and Industry which announced a scheme
called “North East Industrial Development Scheme (NEIDS), 2017”.
The scheme provides
(i) Central Capital Investment Incentive (30% of the investment in plant & machinery with an
upper limit of ` 5 crore),
(ii) Central Interest Incentive (3% interest on working capital for 5 years),
(iii) Central Comprehensive Insurance Incentive (Reimbursement of 100% insurance premium
for 5 years),
(iv) Income Tax Reimbursement of centre’s share for 5 years,
(v) GST reimbursement of Central Govt. share of CGST & IGST for 5 years,
(vi) Employment Incentive under which additional 3.67% of the employer’s contribution to EPF
in addition to Govt. bearing 8.33% Employee Pension Scheme (EPS) contribution of the
employer in PMRPY and
(vii) Transport incentive on finished goods movement by Railways (20% cost of the
transportation), by Inland Waterways Authority (20% of the cost of transportation) & by air
(33% of cost transportation of air freight) from the station/port/airport nearest to unit to the
station/port/airport nearest to the destination point. Also, under this scheme, a single unit
can avail overall benefits up to ` 200 crores.
He immediately formulated an idea to commence a private limited company in the state of
Assam to commence manufacturing and selling of pharmaceutical products. He checked the
said scheme and ensured that the proposed manufacturing of products would be eligible under
the scheme.
With the help of a consultant he floated a private limited company in Assam and constructed
factory and office buildings in a 15-year leased land of 30000 sq.ft. The initial contribution of
` 10 crores was made by him along with his other family members. The consultant, who was
appointed for preparing the project proposal, totally estimated a cost of ` 20 crores for the entire
project including purchase of new machinery. He also estimated that there might be a probable
project cost overrun of 5%. The company could manufacture the pharma products from 1 st April,
2019.
The consultant putforth the following:
• The consultant has employed various statistical tools for arriving out at various projections
made in the project. He had also prepared a detailed cash / funds flow analysis for three
years commencing from 1 st April, 2019.
• To approach the bank for a 10-year term loan of ` 10 crores
• Initially, for two years, the company could face liquidity problems and suggested to go for
a working capital loan of ` 2 crores initially.
• To consider alternative logistic arrangements for moving the finished goods to various
parts of the country.
• To consider the possibility of exporting the finished products to friendly foreign countries.
• To appoint (i) an internal auditor to look into various control aspects and (ii) a statutory
auditor for ensuring required compliances.
• A risk committee would be constituted with a main focus to conduct a detailed company-
wide risk management program including the possible oversights and as far as possible
strive to include all the foreseeable risk situations, possible measures to prevent the same
and steps to be taken for mitigation.
• Prepare a detailed process manual and safety manual and periodically to revise the same
with the improvements happening.
As a risk management consultant, you are required to clarify the following to the management.
1. Multiple Choice Questions:
Choose the correct answer in the following Multiple Choice Questions:
1.1 For calculating ‘the cash flow available to pay current debt obligations’, the bank would
most likely use which of the following calculations?
(A) (PAT + Dep + Interest) / (Current portion of long-term debt + Dep + Interest)
(B) (PAT + Dep) / (Current portion of long-term debt + Dep)
(C) (PAT + Dep + Interest). / (Current portion of long-term debt + Interest)
1.7 If the company, in its estimation, has over-stated the revenue without considering any
internal controls, the same would be classified under:
(A) Residual Risk
(B) Operational Risk
(C) Knowledge Risk
(D) Inherent Risk
1.8 The bank while processing the application for the loan would like to measure the interest
rate risk. Which of the following techniques, the bank would not consider for measuring
such interest rate risk?
(A) Value at Risk
(B) Simulation
(C) Frequency of Loss
(D) Maturity Gap Analysis
1.9 The company would like to make an analysis based on sequence or development of events
which start from one set of assumptions in order to evaluate or map various outcomes of
a particular situation. This is better known as:
(A) Scenario analysis
(B) Risk appetite analysis
(C) Historical experience analysis
(D) Stress test analysis
1.10 The company, in its risk management process, tries to minimise the probability of the
negative risks as well as enhancing the opportunities by creating risk mitigation strategies,
preventive plans and contingency plans. This step would be performed under:
(A) Evaluate the Risk
(B) Treat the Risk
(C) Analyse the Risk
(D) Review the Risk (10 x 2 Marks = 20 Marks)
Descriptive Questions:
1.11 As per the suggestion of the consultant to Mr. Krish, a risk committee was constituted
appointing an Independent Director as chair of the Committee. The committee identified
the risks that the company would face, but did not give any solutions to mitigate the same.
A consultant was asked to provide the advice on mitigation of the risks and sound practices
that should be adopted. Now you are appointed as the consultant, please give a report
describing the advices that would be given to the company. (6 Marks)
1.12 In the above report under 1.11, it was mentioned ‘a loss would occur or no loss would
occur and there would be no possibility for gain’. Explain this risk and different types of
such risks. (4 Marks)
1.13 Since Mr. Krish wanted to export his company’s goods, describe the various qualitative
tools that may be used to measure country risk assessment. (4 Marks)
1.14 In view of the company’s exposure to various stakeholders not only in India and also
outside India, describe the challenges that the company would be facing while developing
the risk management and oversight practices. (4 Marks)
1.15 Mr. Krish wanted to analyse the cash flows, explain to him any two types of cash flows that
you wish to consider. (2 Marks)
1.16 The company is expecting the following risks and opportunities in the installation of various
machinery:
(1) There is a 7% probability of belatedly receiving the parts for the machinery and this
would cause an additional cost of ` 7 Lakhs.
(2) By effective dealings with the suppliers of the machinery parts, the probability that
the company could save ` 3 Lakhs is 40%.
(3) When fitting the machinery there is a 60% probability that the two parts would not fit
together and the expected cost of the same is ` 6 Lakhs.
(4) By simplifying the processes, the company expects to save ` 1.60 Lakhs in the
installation of machinery with a probability of 6%
(5) The expected defects in the design would cost the company a sum of ` 1 Lakh with
a probability of 10% :
Calculate the expected monetary value of the cost of these risks and opportunities.
(6 Marks)
1.17 Explain the safety risks that the company has to address. (4 Marks)
Answer Case Study 1
Multiple Choice Questions
1.1 (C)
1.2 (B)
1.3 (D)
1.4 (A)
1.5 (C)
1.6 (B) or (D)
1.7 (D)
1.8 (C)
1.9 (A)
1.10 (B)
Descriptive Questions:
1.11 Report to Management
To: Management of Krish Pharma Ltd.
From: Risk Management Consultant
Date: 7 June 2019
Subject: Measures to Mitigate Risks and Sound Practices to be followed.
The Risk committee:
(a) Is required to be a standalone committee, distinct from the audit committee;
(b) Has a chair who is an independent director and avoids “dual – hatting” with the chair
of the board, or any other committee;
(c) Includes members who are independent;
(d) Includes members who have experience with regard to risk management issues and
practices;
(e) Discusses al risk strategies on both an aggregated basis and by type of risk;
(f) Is required to review and approve the firms risk policies at least annually;
(g) Oversees that management has in place process to ensure the firms adherence to
the approved risk policies.
1.12 These Risks are called ‘Pure Risks’. In a pure risk situation, a loss occurs or no loss occurs
– there is no possibility for gain. These uncertainties may be due to perils such as fire,
floods, etc. or may arise from human action such as theft, accident etc. There are certain
risk events that can only result in negative outcomes such as fire accidents or leakage of
harmful chemicals from a manufacturing plant. These risks are hazard risks or pure risks,
and these may be thought of as operational or insurable risks.
A good example of a hazard risk faced by many organizations is that of theft.
There are different types of pure risks:
1.15 Two types of Cash flows that Krish can consider are as follows:
(a) Operating Cash flow - The first set of cash flow transactions is from operational
business activities. Cash flows from operations starts with net income and then
reconciles all noncash items to cash items within business operations. For example,
accounts receivable is a noncash account. If accounts receivables go up, it means
sales are up, but no cash was received at the time of sale. The cash flow statement
deducts receivables from net income because it is not cash. Also included in cash
flows from operations are accounts payable, depreciation, amortization and
numerous prepaid items booked as revenue or expenses but with no associated cash
flow
(b) Investment cash flow - Cash flows from investing activities includes cash spent on
property, plant and equipment. This is where analysts look to find changes in capital
expenditures (CAPEX). While positive cash flows from investing activities is a good
thing, investors prefer companies that generate cash flows primarily from business
operations, not investing and financing activities.
(c) Financing cash flow - Cash flows from financing is the last business activity detailed
on the cash flow statement. The section provides an overview of cash used in
business financing.
Analysts use the cash flows from financing section to find the amount paid out in
dividends or share buybacks. Cash obtained or paid back from capital fundraising
efforts, such as equity or debt, is also listed.
1.16 Expected Monetary Value of Risks and Opportunities
S. Particulars Risks Opportunity
No.
1 Belatedly receiving the parts for 0.07 x ` 7 Lakhs
the machinery = ` 49,000 -----
2 Effective Dealing with suppliers 0.40 x ` 3 Lakhs
of the machinery parts ----- = ` 1,20,000
3 Two parts of machine does fit 0.60 x ` 6 Lakhs
together. = ` 3,60,000 -----
4 Simplifying the Process 0.06 x ` 1.60 Lakhs
----- = ` 9,600
5 Defects in the Design 0.10 x ` 1 Lakh
= ` 10,000 -----
Total ` 4,19,000 ` 1,29,600
CASE STUDY: 2
Peer Group Analysis
ABC Constructions, a customer prospect, is compared against two peers :
` Cr. New Customer Peer 1: Peer 2: Non
Latest FYE ABC Constructions Customer Customer
31.03.2011 PQR XYZ
Constructions Construct*
31.03.2011 31.03.2011
Sales 259.7 458.4 689.7
Gross Profit Margin (GPM) 25.4% 17.7% 18.1%
Net Profit Margin 5.63% 6.10% 5.9%
Bank Borrowings (Funded) Nil 50 147.1
Provision for Bad Debts (2011) 12.1 32 4.81
Trade Debtors on 31.03.2011 59.7 160.3 480
% of Provision to Trade Debtors 20.3% 20.0% 1.0%
EBITDA 22 51 87.3
EBITDA Margin 8.2% 11.1% 12.6%
Net Debt Net Cash Position 18 30
Net Debt/EBITDA N.A. 0.35x 0.24x
S&P/Moody's Rating BBB+ BBB BBB-
* Listed company in the stock market
Comments
A comparison with two other prominent peer group companies shows that ABC is more
conservative and enjoys relatively better GPM. The better Margin is attributable to the careful
selection of contracts and efficiency of operations. The relatively lower Net Profit Margin reflects
the aggressive debtors provisioning policy adopted by ABC compared to its peers. ABC
continues to be nil geared. In view of the recent construction sector slowdown, ABC and PQR
Constructions had booked substantial additional provision on debtors, however ABC is more
conservative. However, XYZ Construct hardly increased the provisions during 2010, despite
having significant exposure to some of the troubled companies, which drew criticisms from a
few equity analysts (such as Silverman Sachs), who cover this stock. Overall, ABC can be
considered as a reasonably strong player in this market segment.
Multiple Choice Questions
Choose the correct answer in the following:
2.1 ABC Constructions has holdings in a Bank, which is subject to Basel Il norms. In that bank,
Operation Risk states :
(A) the risk of loss resulting from inadequate or failed processes, people and systems
and from external events.
(B) the risk of loss resulting from inadequate or failed processes, people and systems
and from internal events.
(C) the risk which is not an overarching concept interrelated with several other types of
risk, and cannot be viewed in isolation.
(D) None of the above.
2.2 In the measurement of ‘Risk consequences’, if the level on a scale of 5 is 3, then it is :
(A) Insignificant
(B) Minor
(C) Moderate
(D) Major
2.3 According to WEF [World Economic Forum] and current trend, the following one is not a
global risk indicator :
(A) Increasing disparity between the rich and the poor.
(B) Global warming and climate changes.
(C) Intelligent devices replacing human intervention, impacting employment,
manufacturing and services sector
(D) Population has more females.
2.4 Based on the data: Default: 10%; Amount of Exposure: ` 1,00,000; and Recovery Rate:
1%, the random loss is ` --- -----:
(A) 9,900
(B) 1,000
(C) 9,000
(D) 1,00,000
2.5 According to the UN International Strategy for Disaster Reduction (ISDR), Mumbai is the
most vulnerable in the world in terms of total population exposed to coastal flood hazard.
Is the statement True?
(A) Yes
(B) No
2.6 Every company has risk appetite. One of the following key principles has not underpinned
Risk Appetite:
(A) which can be complex.
(B) which needs to be measurable.
(C) which is not a single, fixed concept.
(D) which is none of the above.
2.7 Probability of an event always is a number which is:
(A) 0 to 1
(B) -1 to +1
(C) 0 to 10
(D) 0 to 100
2.8 If the long term instrument is rated as “BBB”, this means that the instrument carries:
(A) Highest Safety
(B) Moderate Safety
(C) High Risk
(D) Moderate Risk
2.9 In a listed company, the ‘risk committee’ is required to be:
(A) Audit committee
(B) Stand-alone committee
• What is the probability that things can go wrong? (Probability) This view will have to
be taken strictly on the technical point of view and should not be mixed up with past
experience. While deciding on the class to be accorded, one has to focus on the
available measures that can prevent such happening.
• What is the cost if what can go wrong does go wrong? (Exposure)
The following key principles have underpinned risk appetite:
(1) Risk appetite can be complex. Excessive simplicity, while superficially attractive,
leads to dangerous waters: far better to acknowledge the complexity and deal with it,
rather than ignoring it.
(2) Risk appetite needs to be measurable. Otherwise there is a risk that a statement may
become empty and vacuous.
(3) Risk appetite is not a single, fixed concept. There will be a range of appetites or
ranges for different risks which need to be aligned and these appetites may vary over
time. Like in sourcing decisions, the Board may set vendor business share limits as
they would be make the entity dependent on few vendor companies that could
eventually impact business continuity or range of quality defects.
(4) Risk appetite should be developed in the context of an organization’s risk
management capability, which is a function of risk capacity and risk management
maturity. Risk management remains an emerging discipline and some organizations,
irrespective of size or complexity, do it much better than others. This is in part due to
their risk management culture (a subset of the overall culture), partly due to their
systems and processes, and partly due to the nature of their business. However, until
an organization has a clear view of both its risk capacity and its risk management
maturity, it cannot be clear as to what approach would work or how it should be
implemented.
(5) Risk appetite must be integrated with the control culture of the organization. The Risk
Management framework explores this by looking at both the propensity to take risk
and the propensity to exercise control. The framework promotes the idea that the
strategic level is proportionately more about risk taking than exercising control, while
at the operational level the proportions are broadly reversed. Clearly the relative
proportions will depend on the organization itself, the nature of the risks it faces and
the regulatory environment within which it operates.
2.12 Rating of ‘BBB’ indicates the Moderate Safety Level.
Few leading credit rating agencies in India are as follows:
• Credit Rating Information Services of India Limited (CRISIL)
• The exchange rate fluctuated resulting in reduction of anticipated selling prices on export
sales made to foreign countries. Few foreign buyers of a particular country did not pay their
dues, citing violence in their country.
• Due to stiff competition, the company is forced to sell some varieties of yarn manufactured,
below the cost price. It was observed that existing machinery used in manufacturing, where
regular maintenance was not done, required reconditioning so as to have better
productivity. This could involve an additional cost of ` 2 crores.
• In lieu of the above observations, the consultant suggested to address the above issues,
assess and evaluate the risks faced and then proceed with the proposal to go-in for public
issue. The board of directors has taken note of the risks and have decided to address
these by appropriate consideration at their level.
As the risk management consultant, you are required to assist the management in answering
the following questions raised by them.
Multiple Choice Questions. Each question carries 2 marks.
Choose the correct answer in the following:
3.1 A software error, in the automated computer-controlled imported machinery, in case of raw
material may lead to wasted production.
This would more LIKELY be called as:
(A) Operational Loss
(B) Business Disruption Loss
(C) Propagation Error Loss
(D) Program Error Loss
3.2 From the present and proposed operations of the company which of the following is NOT
an opportunity risk?
(A) purchase of new machinery
(B) diversifying into new products
(C) payment of purchase advance
(D) stiff competition faced by the company
3.3 The company's proposal for the new project would LEAST likely to have the specific risk
of:
(A) error of estimation in resources and allocation
(B) completion of the project in scheduled time
3.8 When deciding on the selection of maintenance policies of the machinery, the same should
be based on:
(A) minimizing the potential consequences
(B) some form of Monte Carlo analysis
(C) reliability instead of risk
(D) risk instead of reliability
3.9 The economic risks faced by the company would LEAST likely to include which of the
following?
(A) disruptions in a production process
(B) lapsing of deadlines for construction of a new operating facility
(C) payment of contractual penalties for delayed sales
(D) hike in the price for raw materials
3.10 The default by the foreign buyers could have been avoided, if the company referred to the:
(A) Global Peace Index
(B) Gini Coefficient Index
(C) Delinquency Index
(D) Democracy Index (10 x 2 Marks = 20 Marks)
Descriptive Questions on CASE STUDY:
3.11 The movement of data to the proposed ERP system would involve certain operational risks
to be addressed. Describe the points that have to be covered in such deployment exercise.
(4 Marks)
3.12 What issues the board of directors would consider and questions they would ask in
addressing the present and future risks of the company at the board level? (4 Marks)
3.13 Briefly discuss the role of risk assessment with respect to financial reporting. (2 Marks)
3.14 One way of completely or partially offsetting the exposure from the fluctuations in the prices
of foreign currencies would be to raise the sale bills in Indian currency without affecting
the transaction costs Explain the same. (4 Marks)
3.15 The Bank while extending loan facilities to the company would be facing a number of risks
such as refusal or inability of the company to pay the loan partially or in full or in time.
Briefly describe the internal and external factors affecting such risks. (4 Marks)
3.16 Suggest the types of countermeasures for vulnerabilities faced by the company while
assessing and evaluating risks. (2 Marks)
3.17 The company at present is facing a number of risks. There are also some indirect risks that
the company may be necessitated to face. Enumerate them. (4 Marks)
3.18 Briefly enumerate the risks of dealing with the buyers of a foreign country, in which there
are changes in the political scenarios as well as adverse decisions taken by the ruling
Government of that foreign country. (4 Marks)
3.19 Briefly explain the risk mitigation process in providing the letter of credit facility to the
company. (2 Marks)
Answer Case Study 3
Multiple Choice Questions
3.1 (A)
3.2 (D)
3.3 (D)
3.4 (B)
3.5 (C)
3.6 (A)
3.7 (A)
3.8 (D)
3.9 (C)
3.10 (A)
3.11 Point to be covered before deployment of ERP System.
• Data, both dynamic and static
• Functionality mapping from old to new system, and any changes to be adequately
familiarised within user groups
• Exception reports that could help track any incorrect migration points
• User acceptance test scripts to be intelligent enough to enable the usage of the new
system after adequate granular review
• An emergency roll back plan in case some significant unpredictable issue comes up
in migration deployment.
• An auditor or operational risk manager is required to carry out a review of the data
integrity and the functionality of the systems that have an impact on the financials of
the organisation. This risk is not only restricted to financial reporting, but any risk that
could jeopardise the business process, including regulatory, financial and other risks.
3.12 The following are some of the issues that directors may have to consider and the questions
they should ask:
A degree of risk is inevitable in business operations. To obtain higher returns, innovate
and secure market leadership one may need to adopt a higher risk strategy. Not innovating
and being risk averse can result in the stagnation of the enterprise. A Board should
establish and communicate its risk appetite and agree to the level of risk it is prepared to
accept in different areas of corporate operation. Which stakeholder should be involved and
how should they be engaged? Does the risk culture of the board match to that of the
organization and its aspirations? If not, what changes are required and how might they be
brought about?
What are the risk oversight functions of the board and how effectively are they being
discharged? For example, is annual reporting of risk to shareholders fair and balanced?
Would confidence accounting present a clearer picture? Within the governance structure,
what arrangements have been made for risk governance which involves setting a strategy
and policies for the management of risks and monitoring the performance of those to whom
risk and security responsibilities are delegated?
Policies could cover the transfer of risk, such as whether or not to hedge or insure against
certain risks, depending upon the costs and practicalities involved. They could establish
criteria and thresholds for reporting and guiding management responses. Directors need
to ensure effective processes and practices are in place for the identification and
management of risks. How complex and comprehensive do these needs to be once the
most likely and significant risks have been addressed?
Assumptions and business models should be periodically challenged. An assessment of
the implications, consequences and dependencies of certain corporate strategies, policies
and projects might reveal exposure and vulnerability. Corporate systems and processes
need to be sufficiently resilient to be able to withstand the simultaneous materialization of
multiple risks.
3.13 A direct relationship exists between the degrees of risk that a significant deficiency or
material weakness could exist in a particular area of the company's internal financial
controls over financial reporting and the amount of audit attention that should be devoted
to that area. In addition, the risk that a company's internal financial controls over financial
reporting will fail to prevent or detect a misstatement caused by fraud usually is higher than
the risk of failure to prevent or detect error.
The auditor should focus more of his or her attention on the areas of highest risk. On the
other hand, it is not necessary to test controls that, even if deficient, would not present a
reasonable possibility of material misstatement to the financial statements. The complexity
of the organisation, business unit, or process, will play an important role in the auditor's
risk assessment and the determination of the necessary procedures.
3.14 Yes, raising of sale bills in Indian Currency avoids foreign exchange exposure. But buyers'
preferences may be for other currencies. Many markets, such as oil or aluminium, in effect
require that sales be made in the same currency as that quoted by major competitors,
which may not be the seller's own currency.
In a buyer's market, sellers tend increasingly to invoice in the buyer's ideal currency. The
closer the seller can approximate the buyer's aims, the greater chance he or she has to
make the sale.
Should the seller elect to invoice in foreign currency, perhaps because the prospective
customer prefers it that way or because sellers tend to follow market leader, then the seller
should choose only a major currency in which there is an active forward market for
maturities at least as long as the payment period. Currencies, which are of limited
convertibility, chronically weak, or with only a limited forward market, should not be
considered.
The seller’s ideal currency is either his own, or one which is stable relative to it. But often
the seller is forced to choose the market leader’s currency. Whatever the chosen currency,
it should certainly be one with a deep forward market. For the buyer, the ideal currency is
usually its own or one that is stable relative to it, or it may be a currency of which the
purchaser has reserves.
3.15 The Internal and External factors affecting the risks such as refusal or inability to pay the
loan partially or in full or in time are as follows:
(i) Internal Factors: These factors are internal to the bank, some of these are as follows:
(a) Concentration of credit in particular geographical locations or business
segments.
(b) Excessive lending to particular industry is subject to cyclical fluctuations.
(c) Ignoring the purpose for which loan was sought by the customer.
(d) Poor Quality or Liberal Credit Appraisal while granting the loan.
(e) Absence of efficient recovery mechanism.
(ii) External Factors: These factors are external to the bank and beyond its controls.
These factors not only impact the profitability of borrower but also effect their
repayment capability. Some of such external factors are as follows:
(a) Fluctuation in Exchange Rate.
(b) Change in Govt. Policies.
(c) Fluctuation in Interest Rates.
(d) Change in Political Environment of the own country.
(e) In case of Foreign project change in Country Risk profile.
(iv) Inefficient Legal System: High level of red tapism and corruption at local and higher
level pose a serious risk for MNCs operating in the host country as it leads to
uncertainty and high cost of operation.
(v) Repudiation of Contracts: This type of risk arises on account revocation of earlier
awarded turnkey projects by the Government of host country without adequate
consideration and damages. This risk is also called indirect expropriation risk.
3.19 Following are the different types of credit risk mitigation methods in the process of
providing the Letter of Credit (if fully funded):
(a) On Balance Sheet Netting: On balance sheet netting of mutual claims/reciprocal cash
balances between the bank and the counterparty creates effective security and
collaterals.
This norm accordingly be recognised as an acceptable form of credit risk; in order take
in account a funded credit risk mitigation, the underlying arrangement has to go
through the legal test.
(b) Collateral: The assets/security which are retained or deposited with bank against
grant of any loan advances, debt or credit lines. The typical examples are
• Cash or cash equivalents – Cash or Hand loans
• Gold Pledging
• Corporal Debt Securities
• Debt securities issued by banks, local authorities and certain other entities which
meet stated credit quality criteria;
• Short term debt securities with an acceptable rating;
• equities or convertible bonds listed on the various indices
• units in a collective investment scheme such as mutual funds, provided that they
have a daily price quotation and invest only in instruments which are themselves
eligible for recognition as specified under the by-laws.
Case Study 2
Multiple Choice Questions:
2.4- Direct answer based on the formula on page no. 6.03+6.04 of ICAI SM
2.12- Direct answer from page no. 6.15+6.16+6.18 of ICAI SM (Credit Ratings)
Case Study 3
Multiple Choice Questions:
3.1- Concept-based; Anything related to a fault in the process will have operational risk involved.
3.4- Conceptual answer based on the matter given on page 3.06 of ICAI SM.
3.7- Based on the case study and ICAI old chapter 4 concept
3.10- Global Peace Index is derived from key information such as level of crimes, violence. Thus it
helps understand the default by the foreign buyers.
3.14- Direct answer from page no. 9.22 of ICAI SM SFM FOREX chapter.
3.17- Related to a case study; Manageable (Types of risks faced by the company)
Descriptive Questions:
1.1-Application based question, involving the ratio analysis as studied in Intermediate or IPCC;
Content/Formulae on page 6.31 of ICAI SM.
1.3- Indirect answer from page 1.20 of ICAI SM and direct from page 9.11 of ICAI SM.
2.1- Linked to page no. 9.14 of ICAI SM, but conceptual understanding is required for relating with the
case study.
Case Study 3
Descriptive Questions:
3.1- The suggested answer contains only 6 risks, most of which are completely different from the
ones given in the ICAI SM. How can we be expected to answer those specific risks, and how many
risks should we aim to identify and write in the answer?
Multiple-choice Questions:
3.2- Query- There is a bit of confusion prevailing with regards to the first and last options; Please
clarify.
(page no. 9.11 of ICAI SM Financial reporting risk arises due to the misstatements of the financials,
while financial risk arises due to the risk of possible financial loss to the organization. Therefore, the
answer is financial risk.
3.4- Direct answer from page 7.09 and 7.10 of ICAI SM.
3.6- Direct answer from page 7.01 of ICAI SM( Principal risk facts instead of trivial).
Case Study 4 (Nov 18 Question Paper CS-1, 5 MCQs are common, first 2 descriptive Questions
are same)
Descriptive Questions:
4.1- How can we write such short answers as suggested and still be certain about fetching 15
Marks. Also, we don’t have enough material regarding the impact of Legal risk. How do we
elaborate on that?
The answer suggested by ICAI is, although, very short- but this is what they expect from us- to act and
answer like risk professionals; If we write crisp, to the point answers- proper marks will certainly be
awarded. And for the impact of Legal risk- there is some content on pages 9.11 and 1.20 of the ICAI
SM- but I do agree, it is lesser than what is required to frame the answer as suggested. Again, we need
to think as risk professionals and link our FR and Audit knowledge with the Risk management scenario-
and that is how we can certainly reach near to the quality of answer as suggested. (For more
understanding of linkage of subject Refer concept building batch of Sir)
Case Study 5
Descriptive Questions:
5.1- (a)- Are we expected to write all 9 points as mentioned in the ICAI SM and the suggested
answers?
RBI guidelines on CDS are given on page 6.22 of the ICAI SM; Although, writing just 6 points should
suffice, but if you do not have time constraints during your paper- it is always on the safer side to write
all the 9 points.
This Suggested Answer hosted on the website do not constitute the basis for evaluation of the
student’s answers in the examination. The answers are prepared by the Faculty of the Board of
Studies with a view to assist the students in their education. While due care is taken in
preparation of the answers, if any error or omission is noticed, the same may be brought to the
attention of the Director of Board of Studies. The Council of the Institute is not in anyway
Further, in the Elective Papers which are Case Study based, the solutions have been worked
out on the basis of certain assumptions/views derived from the facts given in the question or
language used in the question. It may be possible to work out the solution to the case studies
The Question paper comprises five case study questions. The candidates are required
to answer any four case study questions out of five.
Answers in respect of Multiple Choice Questions are to be marked on the OMR Answer Sheet
only. Candidates may use calculator
CASE STUDY: 1
Environmental concerns and various issues relating to availability of oil have made it necessary
for the automobile sector to adopt battery operated/electric technology. ABC Scooters Limited
decided to commence production of battery-operated electric scooters under Startup India
Programme from April, 2019. The said company is a two-wheeler manufacturing company in
Maharashtra. It was formed in the year 1997. It was manufacturing and selling 125-cc gearless
scooters. The project technical manager of the company studied the feasibility of the project
and noted the following:
• The battery-operated electric scooter falls under the category of Battery Electric Vehicle
(BEV). It will get the power to run from battery packs. It will not have an internal combus tion
engine or a fuel tank.
• It has a choice to use either of the two types of batteries (i) nickel metal hydride (NiMH) (ii)
Lithium-ion (Li-ion)
• The usage of Li-ion batteries has become the industry standard and is preferred over NiMH
batteries.
• The vehicle can be fitted with an in-built wireless connectivity, GPS navigator, digital
console and mobile charger.
• Data such as the speed of the vehicle, mileage, time taken to charge, the condition of the
battery and health of the engine could be collected and shared with the central sever
through an application installed in the user's mobile. Such data would be automatically
analyzed by software in the company's server and which in turn would give automated
response to the users on various parameters.
• The mobile application would also provide the user information about the availability of
nearby charging station, facility to reserve the time for charging and to make online
payment.
• Standard charges can be used for charging the vehicles. A charge for four hou rs would
make the vehicle run for 150 kms. at an average speed of 30 kms. per hour.
• Charging Stations to be established in petrol pumps on trial basis.
Suitable modifications were done to the manufacturing facility and trial production
commenced in January, 2019.
The risk management consultant engaged to explore the various risk aspects of the
proposal made the following observations:
• The estimated project cost of manufacturing NiMH Batteries (Project A) and Li-ion Batteries
(Project B) ` 30 Lakhs and ` 34 Lakhs respectively.
• During the trial run of 50 vehicles for 100 kms. at an average speed of 30 kms. per hour,
five vehicles broke down due to battery failure.
• Based on projections made, the worst-case and best-case scenarios were analyzed using
statistical tools. There are no precedents available to compare the results projected in the
scenarios.
• The company can export the vehicles to neighboring countries. Thus, forward exchange
contract with bank could be entered. The estimated US Dollar rate on 30th April, 2019 was
` 69.50 per dollar and it was expected that the rupee would weaken by 2% at the end of 3
months.
• The consultant stressed upon. to the management that the risk management should be a
continuous and developing process which runs throughout the company and improvements
are to be made proactively in the areas of: Strategy, dynamically adopted Tactics,
achieving Operational Objectives and Compliances.
• The consultant elaborated on counter measures such as, periodic inspections of the supply
chain mechanisms (SCM) and periodic staff training. The same to consider measures to
be taken in case of shortage of availability of raw materials, skilled man -power and
reduction in sales. There would be a disruption in company's SCM but that would not
impact the ERM process and there is a 10% probability that the project would not be
successful.
You are required to answer the following questions:
Multiple Choice Questions
Choose the most appropriate answer from the answer options.
(1.1) During second trial run of another 50 vehicles with the same conditions as that of the first
trial run, it was found that three vehicles broke down due to battery failure. The combined
probability of vehicle break-down due to battery failure is:
(A) 0.006
(B) 0.080
(C) 0.160
(D) 0.06
(1.2) Forward exchange contract was entered into on 30th April 2019 with the bank for USD
10,000 for 3 months with its expected figure. The actual USD Rate on expiry of contract
was ` 71/-. The company has:
(1.6) Discuss the methodology that you would suggest for analyzing the data on vehicular
movement. (6 Marks)
(1.7) Net present value and probability distribution for Project A and Project B:
Project A Project B
NPV estimates (`) Probability NPV estimates ( `) Probability
12,00,000 0.10 12,00,000 0.40
11,00,000 0.20 11,00,000 0.30
9,00,000 0.30 9,00,000 0.20
1.6 The data on vehicular movement is available to the company and the same creates
probabilities for near real-time analysis.
Machine learning which is a standard software code is characterized by explicit rules that
a computer is supposed to perform.
Deep learning and reinforced learning are good examples of newly developed machine
learning techniques.
Machine learning techniques can be divided into two primary groups; 1) Supervised
Learning and 2) Unsupervised Learning
For the company to process and analyse the data from the vehicles, the method of
Unsupervised Machine Learning is suggested for the following reasons:
• As the data obtained from the vehicle is huge, statistical methods that aim to delve
into the challenging realm of data that has no dependent or response variable i.e.
there is no variable that supervises the behaviour of the algorithm.
• The primary aim of this kind of analysis is to understand the relationships between
the variables or between the observations.
• The algorithms behind the unsupervised learning allow the computer systems to
process complex processing tasks than the supervised learning method.
• As the data obtained are clustered into various groups by the unsupervised learning
method, the reporting part is made easy.
1.7 Calculation of NPV and Profitability Index
(i) Expected NPV of the Projects:
Project A
= ` 12,00,000 x 0.10 + ` 11,00,000 x 0.20 + ` 9,00,000 x 0.30 + ` 7,50,000 x 0.40
= ` 1,20,000 + ` 2,20,000 + ` 2,70,000 + ` 3,00,000
= ` 9,10,000
Project B
= ` 12,00,000 x 0.40 + ` 11,00,000 x 0.30 + ` 9,00,000 x 0.20 + ` 7,50,000 x 0.10
= ` 4,80,000 + ` 3,30,000 + ` 1,80,000 + ` 75,000
= ` 10,65,000 or ` 10.65 Lakh
(ii) Computation of Profitability Index (PI)
Project A
PV of Cash Inflows = ` 30,00,000 + ` 9,10,000 = ` 39,10,000 or ` 39.10 Lakh
` 39.10Lakh
PIA = = 1.3033
` 30.00Lakh
Project B
PV of Cash Inflows = ` 34,00,000 + ` 10,65,000 = ` 44,65,000 or ` 44.65 Lakh
` 44.65Lakh
PI = = 1.3132
B `34.00Lakh
Decision: Since NPV as well PI of Project B is more, the same project should be
chosen.
1.8 The areas of improvement suggested by consultants with reference to the operation of
company are:
Strategy: Strategic decisions are mostly long term and taken by the top management,
such as, to become the market leader in the e-scooter category. As the company is
venturing into new realms, periodical risk assessment is to be done exploring the
possibilities of different strategic options, analyse them and adopting the best strategic
decisions.
Dynamically adopting tactics: Tactical decisions are mostly taken by the middle level of
management. In order to achieve the strategic decision of achieving the goal to be come
the market leader, many tactical decisions, such as, expanding the business to new areas,
introducing new products and services are to be taken periodically.
Achieving operational objectives: Any disruption to the operations would cause
inconvenience to the company in achieving the various targets, reduction in profits etc.,
The company has to identify such disruptions and bottlenecks well in advance and take
proactive actions to reduce the likelihood of such events occurring and therefore limit the
damages, such as, ensuring continuous supply of raw materials to the production unit
which in turn would ensure smooth production.
Compliances with various regulatory mechanisms: Of late, significant changes are
made in various regulatory authorities in the country. Much time and cost could be saved
in ensuring the timely compliances, such as, timely filing of various returns, payment of
taxes, adherence to the rules and regulations etc.
CASE STUDY: 2
M/s. Modern Realty Developers is a partnership concern situated in Chennai. The current project
of the firm is construction of 20 luxury apartments in the outskirts of Chennai. Each apartment
is identical and the ultimate selling price of each apartment is ` 2.50 crores. The project had
commenced in April, 2018 and the project completion is scheduled to be completed in
September, 2019. Two apartments remained un-booked. A term loan was taken for ` 12 crores
in April 2018 with no moratorium period.
Key figures :
The construction industry today favours low cost housing aimed at the middle-class section of
people. This is due to the availability of concessions in the form of reduced interest rates,
interest subsidy and tax benefits. The workers at the construction site faced dust and pollution
problems. The neighbours around the site were complaining about the increasing dust levels.
It was suggested that the workers use protective face masks and spray water to the buildings
under construction. Data variables about the (i) dust control measures and (ii) dust levels were
collected and correlation between the above two variables was calculated for further analysis.
When preparing the cement mortar, it was decided to use 1 part of cement and 6 parts of sand.
Drawing samples from 20 places, where cement mortar was applied, it was found that at 3
places such ratio was not maintained. The management contemplated to provide training in (i)
handling the equipment, (ii) work culture, (iii) safety programs.
Funds were earmarked for payment of income-tax. The same was utilized to purchase cement
and bricks. Hence the payment of income-tax could not be made on the due date.
The firm received a notice from the bank asking for repayment of the outstanding dues
immediately failing which, the bank would take precautionary steps to make the firm to prepay
the loan.
Answer the following:
Multiple Choice Questions
Choose the most appropriate from the answer options:
(2.1) Instance of non-payment of income-tax on the due date would most likely show:
(A) Risk appetite is lower than the risk capacity.
(B) The firm has taken an internal risk.
(C) The firm has considered it as a residual risk.
(D) Risk appetite is higher than the risk capacity.
(2.2) Which of the following is MOST likely the reason that prompted the bank to issue such a
notice?
(A) The bank felt that it is facing Exposure Risk.
(B) The bank felt that it is facing Default Risk.
(C) The bank felt that it is facing Recovery Risk.
(D) The bank felt that it is facing Guarantee Risk.
(2.3) The proposed action of the management to provide training and safety programs would
fall under:
(A) Risk Alternatives.
(ii) Operational Risk: Risk of loss resulting from failure of people employed in the
organization as workers are not adequately trained and accidents are occurring at the
site. In addition to this workers and supervisors are not following safety instructions.
The inefficiency of the workers resulted in wastage of material and caused delay. The
substitute for natural sand might result in poor finishing and less mortar bonding.
Water scarcity forced the firm to pay extra money for the construction.
(iii) Compliance Risk: As payment of Income Tax not made out on time. Hence it might
face action from the Income Tax Department.
(iv) Strategic Risk: Since the current and prospective impact on earning is adverse.
(v) Financial Risk: The risks in connection with the cash flows and the pressure given
by the bank in its notice for the repayment of the loan.
(vi) Credit Risk: The inability of the firm to repay the outstanding dues to the bank.
(vii) Liquidity Risk: The act of paying for the purchase of bricks and cement from out of
the funds earmarked for the payment of Income Tax shows the firm is facing the
same.
(viii) Reputation Risk: As the project is getting delayed, the firm is subject to reputation
risk.
(ix) Legal Risk: The persons who have booked the apartments may sue the firm or ask
for compensation for the delay in completion.
(x) Safety Risk: The workers are not following the safety standards.
(xi) Environment Risk: The increased dust and pollution cause environmental risks
2.7 Sample Risk Register on dust and pollution risk faced by the firm
Risk Dust and Pollution Risk.
Causes Usage of electric drills, hammers, cement & sand mixing
etc.,
Consequences Workers health affected, complaints from neighbours,
regulatory authorities imposing fines etc.
Ownership Owned by the site supervisors.
Inherent risk score Seven out ten. This is calculated before implementing
controls towards containing the dust and pollution
Controls Provide safety masks, helmets, boots, hand gloves to
workers. Sprinkle water periodically so that the minute
waste does not fly.
Residual risk score Four out of ten. After implementing the controls, residual
risk stands at this level.
of such a huge loan amount. Due to sudden power spike, the computer server crashed resulting
in 15-day data loss. Hence, Ms. Rita proposes to outsource the back-up services to a service
provider situated in Hyderabad, besides installing a back-up server at the office.
Ms. Rita is estimating the sales of various products. She came out with the following:
• She is forecasting the sales performance for the FY 2019-2020 conditional on the market
state of the country in which her business is based. She divides the market's
performance into three categories of good, neutral and poor and the sales performance
into three categories of increase, constant and decrease. The estimates are:
• Probability that the market state is good is 45%. In this state, probability for increase in
sales is 70% and probability for decrease in sales is 15%.
• Probability that the market state is neutral is 30%. In this state, probability for increase in
sales is 50% and probability for decrease in sales is 30%.
• If the market state is poor, probability of increase in sales is 25% and probability of
decrease in sales is 60%.
You are requested to help Ms. Rita by answering the following:
Multiple Choice Questions
Choose the most appropriate answer from the answer options.
(3.1) The bank transfer off ` 5 lakhs could have been avoided if there was a strong:
(A) Segregation of duties control
(B) Data encryption
(C) User access management
(D) Firewall mechanism
(3.2) The samples are drawn out from the profiles of the customers for further analysis. Such
an act of drawing the sample is known as:
(A) Stratified sampling method.
(B) Purposive sampling method.
(C) Systematic sampling method.
(D) Clustered sampling method.
(3.3) In the decision to include the damages due to flash floods in risk consideration, which of
the following MOST likely should be given importance?
(A) Strategic Plan.
(B) Contingency Plan.
0.06
= 0.0675 + 0.06 + 0.0375
= 0.3636 i.e. 36.36%
3.7 The table given below shows the levels of risk maturity. Key Characteristics at Different
Levels of Risk Maturity: -
Risk Maturity Key Characteristics
Risk Naive No formal approach developed for risk management.
Risk Aware Scattered silo based approach to risk management. Risks
identified within functions and not across processes. Also risks
not communicated across enterprise.
Risk Defined Strategy and policy in place and communicated. Risk appetite
defined.
Risk Managed Enterprise wide approach to risk management developed and
communicated. Risk register in place.
Risk Enabled Risk management and internal control fully embedded into
operations. Organization in readiness to convert market
uncertainties into opportunities.
3.8 The various economic risks that could be faced by Ms. Rita are as follows:
(i) The competitor opening a shopping mall nearby reduced the sales of the concern.
(ii) Lower income received as the sales are declining.
(iii) Increased cost of operations due to outsourcing back-up services to a service
provider situated in Hyderabad.
(iv) Increased interest burden of loan services of Rs. 2 crores proposed to be taken for
modernisation of Mall.
(v) Lack of capital for modernisation of the shopping mall has necessitated to obtain loan
from the bank which would result in payment of interest to the bank.
(vi) Liquidity crunch would have a bearing on operational expenses.
CASE STUDY: 4
A company in the financial services sector has been fined by the Regulator for various breaches
of relevant regulations owing to which they suffered Reputation Loss and Credibility among
customers and the public. There is a possibility that some of the Directors and Officers may be
penalised and could be sued by the shareholders for losses suffered and wrongs committed.
The Board and the Top Management of the company were quite worried about this tum of events
as breach of Corporate Governance norms and non-compliance of laws and regulations were
not expected to happen in the company.
You have been appointed as the new Chief Risk Officer to review and ensure best practices
in Corporate Governance particularly in the areas of compliance, disclosures, consumer
protection, management of frauds and financial crime and ethical conduct in the organisation. It
is a well understood fact that in the financial services sector, Regulators are active and
regulatory risk is one of the major risks faced by companies in this sector. You are also aware
that there have been many scandals and collapses in the financial sector world-wide and you
share the concern of the Board that it is important to set benchmarks for governance in the
company.
Keeping in mind that disclosures are information that is meant for shareholders, consumers who
have bought products from the company and for other stakeholders such as employees, agents,
other intermediaries and those in the ecosystem of the company, you are asked to reshape the
disclosure policy of the company in tune with regulations and best practices.
Consumer protection is increasingly being focused on by Regulators. Consumer Forums, Courts
and other bodies raise their voices against customer service deficiencies and penalise
companies. They are shamed when such information is circulated in the media. The CRO is
asked to ensure that conduct risk is better managed by a cultural change in the organisation.
Fraud and financial crime are on the rise and these can be happening with the connivance of or
wholly by employees and even at senior management levels. Cyber-crimes, frauds and losses
are becoming common place and there is a need to ensure that systems are security proofed
and employees are made aware of the risks. This can be further risk proofed by raising the
ethical standards and putting place necessary controls to ensure that the conduct of everyone
in the institution is ethical and upright.
You have been asked to advise the Board and draft suitable policies for upgrading corporate
governance practices and risk management. To bring about cultural change in areas that is
dependent on management and employee conduct. To create a culture that is customer oriented
and strongly against violations of regulations. To discourage opaque practices that give rise to
arbitrary decisions at operational levels as these work against customers, reputation and bottom
line of the company.
Based on such a background and considering the OECD guidelines on corporate Governance,
please answer the following questions.
Multiple Choice Questions
Choose the most appropriate answer from the following
(4.1) Corporate Governance risk is intended to identify deficiencies that can damage the
following important existential aspects of the company.
Point out the wrong answer.
(A) Reputation.
(B) Existence.
(4.7) What is the type of risk management that is to be initiated by the Board/Management so
as to prevent frauds and financial crimes? (5 Marks)
(4.8) How can Credit Risk Management be upgraded to ensure that risk of default is kept to the
minimum. (5 Marks)
Answer
Multiple Choice Questions
4.1 (C)
4.2 (D)
4.3 (B)
4.4 (D)
4.5 (A)
4.6 There are many areas of risk that a company may face relating to governance risks. The
absence of an effective corporate governance framework and properly documented
governance policies can create serious risks. There has to be equitable treatment of
shareholders, and the role of stakeholders have to be defined, communicated and
monitored, to prevent risks in these areas.
There are disclosure and transparency norms and if they are not articulated, considerable
risks arise. The various responsibilities of the Board cannot be left undefined, nor
undocumented or not reviewed. If the Board has not defined risk capacity, appetite and
risk response strategies, and initiated a proper enterprise risk management policy and
approach to risks, there can arise risks for governance.
The Board cannot be ignorant of the risks facing the company. Risk managers should be
independent and be not implementing strategy. The Risk management function and the
CRO should report directly report to the Board. Board should ensure that risk management
and oversight practices should not face challenges and all stakeholder concerns should be
met. Boards need to look at the long term; many risks will arise if the focus is on the short
term. They need to disclose the process of risk management and the results of risk
assessments. They should ensure that whistle-blower matters are attended, and shield the
company against negative media reports, shareholder activism, unauthorised related party
transactions, disputes among promoter/owners and other shareholders.
An independent assessment of risk governance framework has to be initiated so that there
is an improving risk management capability for the company. The risk management
framework (RMF) should define a policy statement on matters such as determining when
to review the RMF and the frequency for undertaking the review, and deciding who is
responsible for the review. This may be done by the Audit Committee or a team of Directors
or with external facilitation and selecting the scope and review. The results have to be sent
to the various layers of the company and risk management tightened and enhanced.
4.7 Fraud risk is an inherent risk which arises from the opportunities to make an unlawful gain
by an internal employee or an external person or entity by exploiting the gaps in the
processes of the organisation. Fraud risk in financial reporting also has assumed
importance. The COSO framework has been enhanced to ensure highest degree of
accuracy and completeness in financial statements. Operational control failures such as
those that allow an employee to deliberately tamper with the data can lead to fraud risk
owing to poorly designed reporting of data.
Fraud risk can be reduced by ensuring that there are controls in place, such as proper
verification by the same or another person. There has to be reconciliation of facts and
figures. Equally important is the segregation of duties which will not allow a person of one
department to carry out the entire transaction on his own. There is also the need fo r
physical controls such as safekeeping of money, documents, legal agreements in safe
vaults etc. Use of two keys may be required when dealing with high amounts of cash or
high value documents. There has to be supervisory controls, exception triggers and p roper
authorisation and approval. There has to be proper preventive controls, detective controls,
manual controls and automated controls.
The Board has to see that the Internal Audit Function has carried out their management
function in ensuring that internal controls and other defences are in place so that the
chances of fraud and financial crimes are minimised and there is a tightening based on
reviews.
4.8 The first step is to identify credit risks and hence there is need to study borrower’s profile
to understand the borrower’s financial stability, regularity in payments, possibility of default
risk, the source of income etc.
Credit risk has to be migrated through means such as funded and non -funded risk
mitigation. Funded credit is when the bank has recourse to cash or assets of the buyers.
Funded credit mitigation methods include On Balance Sheet Netting of mutual
claims/reciprocal cash balances between the bank and counterparty. Another method is
collateral method whereby assets or security is retained or deposited with the bank against
grant of any loan advances, debit or credit lines. These can be in the form of cash, gold,
Corporate Debt Securities etc.
Unfunded credit risk mitigation process involves an unsecured obligation of third party ,
where this entity is more credit worthy than the primary borrower.
BASEL II has provided updated norms for the financial market, which has three main
pillars. The first is more focussed on credit risk. It provides three different ways of
managing credit risks:
1. Standardised approach based on credit rating and risk weight,
2. Internal rating-based approach with a basic foundational and higher-level advanced
approach,
3. Credit risk mitigation steps through CDS and counter party risk approaches as also
through securitisation.
There are other methods to enable proper credit rating:
1. Risk based pricing: Where the risk of default is higher, the interest rate will be
increased.
2. Credit insurance: The lender can transfer the risk to an insurer such as in housing
loans to ensure that the mortgage is secured.
3. Tightening: Lender can tighten the norms for lending.
4. Diversification: By lending to a greater number and kinds of small borrowers to
diversify the lending pool.
5. Covenants: Covenants may be entered into with the borrowers for review, full
payment in case of improvement in debt coverage ratio, audit of business operation
etc.
There can also be qualitative techniques of credit risk management duly implemented by
three levels of approach as under:
a. Transaction risk management
b. Portfolio risk management
c. Policies and processes that keep improving the risk management of all lending
activities.
Financial institutions also attempt to mitigate lending risks by performing credit analysis o n
individuals and businesses by a review of the borrower’s five C’s which are capacity,
capital, character, collateral and conditions.
CASE STUDY: 5
A manufacturing company had a major loss occurring to them in the pure risk category, namely
a flood loss in its premises. The loss caused severe damage to buildings, compound walls, plant
and machinery on the main factory floor and basements as also stock including stock in the
open. Motor vehicles and other mechanised transport were also damaged by entry of water into
their engines. The loss happened in the middle of the monsoon season. The factory was insured
and as the company did not have any claim for the last 10 years the insurance department and
risk management department had become careless and the level of underinsurance was overall
40% in relation to the replacement value of the assets.
The claim process was slow and tedious as the company did not have any knowledge of claim
processes and the kind of papers and documents that were needed to be submitted to prove
the various kinds of losses and how to make the estimates to compute the amount to be claimed.
It had to depend on the insurance company's agent and surveyor to help them to see that they
complied with the obligations that have to be met when losses occur such as informing the civil
and police authorities of the loss; and in saving damaged materials from further loss and
segregating them; in measuring the physical dimensions of the loss and estimating the cost of
repairs and reconstruction; in producing the account books showing the value of assets and
stocks lost etc.
There had to be many visits by the surveyor and many rounds of negotiations for the claim to
process and the company did not get the claim for a long period.
The company also found that the expected loss reimbursement or indemnity, as is technically
known in insurance terminology, did not get allowed as the policies taken had terms which made
deduction of depreciation necessary and also because all assets were not insured at full value
and hence underinsurance applied. This caused not only considerable delay in the formalities
of the claim, but also the amount assessed was below the expectations of those who took the
decisions relating to insurance as their knowledge was incomplete and the advice. The
concerned department could not explain under what risk management policy and practices of
the company they had taken decisions which made the company ineffective in getting indemnity
to the extent they could have got and that also by through a speedier settlement.
In view of the delay in the settlement of the claim the company faced a financial struggle to get
the factory back to normalcy during which the company made losses and its interest cost rose
very high. It had to lay off workers owing to which the employee morale was hit. As production
could not be resumed early enough, the loyalty of stockists and customers began to fall. In view
of all this, the insurance and risk management departments were asked to review its risk
management policies and practices with regard to pure or insurable risks. The final decisions
included steps such as to insure the factory on reinstatement value, to ensure review of the sum
insured every year, to take on add on covers for debris removal and the like.
The company appointed a new Insurance Officer, with additional duties to assist the Risk
Management Department in the management of pure risks. He researched and found that
insurance is essential in areas such as property protection, loss of earnings, liability insurance
for the firm, its Directors and other employees. Protection of employee lives and health was
becoming a norm in organised industries. Health Insurance had become necessary as an
employee benefit. The Board of Directors were concerned about the emerging risks that faced
the Directors on the Board and the Officers of the company for wrongful actions and the need
to have a well-designed Directors and Officers Liability insurance cover; as also insurance for
product liability and any other liabilities that can arise because liability claims can be very large
and may lie hidden for many years. Increasingly authorities are directly s lapping criminal and
civil cases against the company when loss of lives take place and where products are concerned
especially those exported to foreign countries; product liability insurance has become almost a
compulsory requirement.
In examining existing insurance practices, many poor practices were identified. For instance,
many low-level losses which were claimable the concerned departments were not reporting the
claims to the insurance department and hence many claims which were of lower amounts but
were claimable were found to be unrecovered. Hence reporting processes had to be reworked
and made known across the organisation. Similarly, loss prevention in tune with insurance
requirements were not properly carried out and, in the process, there were p ossibilities that the
insurance claim, if such arise could have been turned down or paid at a lower amount on account
of breach of conditions and warranties in the policy.
There are still questions that were to be examined relating to risks in the context of insurance
and risks which cannot be insured. You are asked to look at some of these questions.
Multiple Choice Questions
Choose the correct answer to the following questions.
(5.1) Insurable risks are most likely to arise from which of the following categorisation of risks.
(A) Hazard Risks.
(B) Control Risks.
(C) Opportunity Risks.
(D) None of the above.
(5.2) In Annual Reports it is necessary to have a section on Management Discussion and
Analysis. One of the following is not necessary to be discussed in the above section.
(A) Opportunities and Threats.
(B) Risk and concerns.
(C) Details of managing insurance risks.
(D) Internal Control systems and their adequacy.
(5.3) Credit risk is insurable and has various components as per list seen below except one -
point out the exception.
(A) Recovery Risk.
(B) Collateral Risk.
Case Study 1
Multiple Choice Questions:
1.1 – Probability based MCQ related to the case study from old chapter 4 of ICAI SM.
1.2 – How is the answer a loss of 1100/-?
FOREX related question. Exchange rate expected after Rupee weakening by 2% is 69.5+2%=70.89 Rs.
Per $. Now 71-70.89=0.11; 0.11*10000= 1100/- loss (Could have received Rs. 710000 but due to the
contracted rate, the received amount is only Rs. 708900.)
1.3 – Slightly related to the thing mentioned on page no. 6.21 under CDS heading; Mainly conceptual
1.4 – Answer related to the last para of the case study- if carefully read; a bit conceptual;
1.5 - Related to the case study; Also, based on conceptual understanding
Descriptive Questions
1.6- Indirect answer from page 9.33 of the ICAI SM. A bit conceptual though, since you need to relate
the data and matter mentioned in the case study with the concepts that you have understood regarding
Machine Learning;
1.7- Manageable practical question from the IPCC chapter concepts. (NPV and Profitability Index)
1.8- Related to the second last para of the case study. Conceptual understanding is required to frame the
answer, but still manageable. You just need to explain thoroughly, what you have written and relate it
with the case study- such that it justifies the point.
2.1- Based on conceptual understanding and related to the case study– If the income tax has not been
paid on the due date, then that means that the enough finances were not available for the payment of
income-tax. And this can happen only when the risk has been taken more than the capacity to take risks
and this, in turn, will happen only when the appetite to take risks is greater than the risk capacity;
2.2- The options are really confusing; 3 out of the 4 are also looking correct answers; How can we
arrive at the correct answer?
Page 6.3 of ICAI SM- The confusion can arise amongst the exposure, default and recovery options. But
there has been no default on the part of the firm till now, and since there is no default, therefore, there
has been no recovery risk as well. It is just the uncertainty associated with the future ability of the firm
that has made the bank issue the notice- which happens only due to the exposure risk.
Training programs are a kind of risk mitigation measure, and insurance is also the same. Rest all the
options are not the risk mitigation measures. So, instead of getting insurance, the firm can go for training
programs so that the risk of failure during the operations reduces – and it’s even a better mitigation
measure than the insurance since insurance acts as a cure in terms of providing for the lost finances
whereas training acts as a preventive measure.
2.4- Related to the concepts of Standard deviation and Covariance. (SD is there in the IPCC Chapter,
but mostly you can find both in SFM Portfolio Management Chapter).
2.5- How is the control risk high in case of the given scenario?
The control risk is high in the case under consideration because against the prescribed tolerable limit of
6% and there is a mismatch of 15% in the samples. (As clarified by ICAI over mail)
Descriptive Questions:
2.6- Linked to the case study and understanding of the types of risks as given on page 1.19 of ICAI SM.
2.7- How can we prepare the risk register. There is no proforma given in the SM, as such?
Although, there is no proforma given as such – related to the risk register – but there is still the
availability of contents of a risk register, as on page 8.4 of the ICAI SM, and those contents can be
converted to a table and related with the case study to answer this question.
Case Study 3
Multiple Choice Questions:
3.2- Common sense based question, although, not present in the ICAI SM.
3.3- Concept based; Since flood is a type of contingency that no one can foresee, therefore, that is the
answer.
3.5- Related to the Risk Mitigation concepts as on page 2.10+2.20 of ICAI SM. But more of a concept
based question.
Descriptive Questions:
3.7- Direct answer from page no. 8.07 of ICAI SM. (Risk Maturity levels)
3.8- Concept based, related to the case study; Manageable; (Economic Risks)
4.1- The options are really confusing. How the answer is Sales Growth?
Common sense -based question. Sales growth is the primary factor that will drive the existential aspect
of any company; Even if a company is having good reputation, is existing and is continuing its business-
but then also – if it is not growing its sales quantum, then it would not be able to survive in the future
and that’s why it is important for the existence;
4.3- Based on the conceptual understanding of the stress testing, as given in chapter 5(Refer page no.
5.7 of ICAI SM).
Descriptive Questions:
4.6- Answer suggested by ICAI, but it seems like we will never be able to frame such an answer.
What do we do as students?
The concepts of seventh chapter are a mix of theoretical concepts and what is happening in the practical
world regarding the corporate governance. As students, certainly the answer would not match the one
as suggested by ICAI, but still it can be framed from the OECD guidelines as on page 7.20 and the Risk
Management framework as on page 7.06. Also, please keep yourself updated as to what all is happening
in the corporate world- so that points related to whistle blowers and media reports, etc. come to your
mind while writing such answers.
4.7- Manageable answer from page 9.11, 1.21, 9.13 and a bit of the learning from the audit world,
regarding internal control, etc.
4.8-It is not certain as to what the question is asking. How do we write such answers?
The answer is manageable from the content mentioned in 6th chapter of ICAI SM. In such a situation, it
is safer to cover more concepts and write small points about all of them.
Descriptive Questions:
5.6- Direct answer from page 1.16 and 1.17 of ICAI SM.
5.7- Direct answer from page 9.02 and 9.03 of ICAI SM (write 4 reasonably sized points)
5.8- Direct answer from page 2.30 of ICAI SM. (write 12 small points)
Descriptive Questions
4.6 Explain Corporate Governance referring to OECD guidelines and explain how the Board can shield
against Corporate Governance Risks. (4 Marks)
4.7 What is the type of risk management that is to be initiated by the Board/Management so as to prevent
frauds and financial crimes? (3 Marks)
4.8 How can Credit Risk Management be upgraded to ensure that risk of default is kept to the minimum.
(8 Marks)
CASE STUDY: 5
A manufacturing company had a major loss occurring to them in the pure risk category, namely a flood loss
in its premises. The loss caused severe damage to buildings, compound walls, plant and machinery on the
main factory floor and basements as also stock including stock in the open. Motor vehicles and other
mechanised transport were also damaged by entry of water into their engines. The loss happened in the
middle of the monsoon season. The factory was insured and as the company did not have any claim fo r the
last 10 years the insurance department and risk management department had become careless and the level
of underinsurance was overall 40% in relation to the replacement value of the assets.
The claim process was slow and tedious as the company did not have any knowledge of claim processes and
the kind of papers and documents that were needed to be submitted to prove the various kinds of losses and
how to make the estimates to compute the amount to be claimed. It had to depend on the insurance
company's agent and surveyor to help them to see that they complied with the obligations that have to be
met when losses occur such as informing the civil and police authorities of the loss; and in saving damaged
materials from further loss and segregating them; in measuring the physical dimensions of the loss and
estimating the cost of repairs and reconstruction; in producing the account books showing the value of assets
and stocks lost etc.
There had to be many visits by the surveyor and many rounds of negotiatio ns for the claim to process and
the company did not get the claim for a long period.
The company also found that the expected loss reimbursement or indemnity, as is technically known in
insurance terminology, did not get allowed as the policies taken had terms which made deduction of
depreciation necessary and also because all assets were not insured at full value and hence underinsurance
applied. This caused not only considerable delay in the formalities of the claim, but also the amount assessed
was below the expectations of those who took the decisions relating to insurance as their knowledge was
incomplete and the advice. The concerned department could not explain under what risk management policy
and practices of the company they had taken decisions which made the company ineffective in getting
indemnity to the extent they could have got and that also by through a speedier settlement.
In view of the delay in the settlement of the claim the company faced a financial struggle to get the factory
back to normalcy during which the company made losses and its interest cost rose very high. It had to lay off
workers owing to which the employee morale was hit. As production could not be resumed early enough, the
loyalty of stockists and customers began to fall. In view of all this, the insurance and risk management
departments were asked to review its risk management policies and practices with regard to pure or insurable
risks. The final decisions included steps such as to insure the factory on reinstatem ent value, to ensure review
of the sum insured every year, to take on add on covers for debris removal and the like.
10
12
1.2 (C)
1.3 (C)
1.4 (B)
1.5 (B)
1.6 (C)
With this additional borrowing the Current Liabilities shall become Rs. 6 Crore (3 + 3) and the new Current
Ratio shall become 1.33 (Rs. 8 Crore/Rs. 6 Crore).
(4 Marks)
2.2 (A)
2.3 (B)
2.4 (B)
2.5 (B)
2.6 (C)
3.6 The types of risk can be faced by the firm are as follows:
(i) Market Risk: The firm is facing Market Risk due to adverse change in raw material cost and scarcity of
water. There is lull in the demand for big housing projects as most of the middle-class households are
moving towards low cost housing. Hence the firm could not sell/ book the two apartments.
(ii) Operational Risk: Risk of loss resulting from failure of people employed in the organization as workers
are not adequately trained and accidents are occurring at the site. In addition to this workers and
supervisors are not following safety instructions. The inefficiency of the workers resulted in wastage of
material and caused delay. The substitute for natural sand might result in poor finishing and less mortar
bonding. Water scarcity forced the firm to pay extra money for the construction.
(iii) Compliance Risk: As payment of Income Tax not made out on time. Hence it might face action from the
Income Tax Department.
(iv) Strategic Risk: Since the current and prospective impact on earning is adverse.
(v) Financial Risk: The risks in connection with the cash flows and the pressure given by the bank in its
notice for the repayment of the loan.
3.7 Sample Risk Register on dust and pollution risk faced by the firm
Risk Dust and Pollution Risk.
Causes Usage of electric drills, hammers, cement & sand mixing etc.,
Consequences Workers health affected, complaints from neighbours, regulatory authorities
imposing fines etc.
Ownership Owned by the site supervisors.
Inherent risk score Seven out ten. This is calculated before implementing controls towards
containing the dust and pollution
Controls Provide safety masks, helmets, boots, hand gloves to workers. Sprinkle water
periodically so that the minute waste does not fly.
Residual risk score Four out of ten. After implementing the controls, residual risk stands at this
level.
Process Processes to control the dust are implemented
Action for further mitigation To explore and study measures adopted by the other industry players. To
educate and train the workers.
Action owner Site Manager.
Due Date Within three months.
3.8 The Risk Management Payoff Model of Epstein and Rejc, 2005, demonstrates how improved risk
measurement and management provides benefits throughout the organization. Benefits extend to:
1. Enhanced working environment
Safety measures are to be addressed by giving training which in turn would increase the performance of the
workers.
2. Improved allocation of resources to the risks that really matter
4
4.1 (C)
4.2 (D)
4.3 (B)
4.4 (D)
4.5 (A)
4.6 There are many areas of risk that a company may face relating to governance risks. The absence of an
effective corporate governance framework and properly documented governance policies can create serious
risks. There has to be equitable treatment of shareholders, and the role of stakeholders have to be defined,
communicated and monitored, to prevent risks in these areas.
There are disclosure and transparency norms and if they are not articulated, considerable risks arise. The
various responsibilities of the Board cannot be left undefined, nor undocumented or not reviewed. If the Board
has not defined risk capacity, appetite and risk response strategies, and initiated a proper enterprise risk
management policy and approach to risks, there can arise risks for governance.
The Board cannot be ignorant of the risks facing the company. Risk managers should be independent and be not
implementing strategy. The Risk management function and the CRO should report directly report to the Board.
Board should ensure that risk management and oversight practices should not face challenges and all
stakeholder concerns should be met. Boards need to look at the long term; many risks will arise if the focus is on
the short term. They need to disclose the process of risk management and the results of risk assessments. They
should ensure that whistle-blower matters are attended, and shield the company against negative media reports,
shareholder activism, unauthorised related party transactions, disputes among promoter/owners and other
shareholders.
An independent assessment of risk governance framework has to be initiated so that there is an improving risk
management capability for the company. The risk management framework (RMF) should define a policy
statement on matters such as determining when to review the RMF and the frequency for undertaking the review,
and deciding who is responsible for the review. This may be done by the Audit Committee or a team of Directors
or with external facilitation and selecting the scope and review. The results have to be sent to the various layers
of the company and risk management tightened and enhanced.
5
4.7 Fraud risk is an inherent risk which arises from the opportunities to make an unlawful gain by an internal
employee or an external person or entity by exploiting the gaps in the processes of the organisation. Fraud risk in
financial reporting also has assumed importance. The COSO framework has been enhanced to ensure highest
degree of accuracy and completeness in financial statements. Operational control failures such as those that
allow an employee to deliberately tamper with the data can lead to fraud risk owing to poorly designed reporting
of data.
Fraud risk can be reduced by ensuring that there are controls in place, such as proper verification by the same or
another person. There has to be reconciliation of facts and figures. Equally important is the segregation of duties
which will not allow a person of one department to carry out the entire transaction on his own. There is also the
need for physical controls such as safekeeping of money, documents, legal agreements in safe vaults etc. Use of
two keys may be required when dealing with high amounts of cash or high value documents. There has to be
supervisory controls, exception triggers and proper authorisation and approval. There has to be proper
preventive controls, detective controls, manual controls and automated controls.
The Board has to see that the Internal Audit Function has carried out their management function in ensuring that
internal controls and other defences are in place so that the chances of fraud and financial crimes are minimised
and there is a tightening based on reviews.
(3 Marks)
4.8 The first step is to identify credit risks and hence there is need to study borrower’s profile to understand the
borrower’s financial stability, regularity in payments, possibility of default risk, the source of income etc.
Credit risk has to be migrated through means such as funded and non-funded risk mitigation. Funded credit is
when the bank has recourse to cash or assets of the buyers. Funded credit mitigation methods include On
Balance Sheet Netting of mutual claims/reciprocal cash balances between the bank and counterparty. Another
method is collateral method whereby assets or security is retained or deposited with the bank against grant of
any loan advances, debit or credit lines. These can be in the form of cash, gold, Corporate Debt Securities etc.
Unfunded credit risk mitigation process involves an unsecured obligation of third party, where this entity is more
credit worthy than the primary borrower.
(1 Mark)
BASEL II has provided updated norms for the financial market, which has three main pillars. The first is more
focussed on credit risk. It provides three different ways of managing credit risks:
2. Internal rating-based approach with a basic foundational and higher-level advanced approach,
3. Credit risk mitigation steps through CDS and counter party risk approaches as also through securitisation.
1. Risk based pricing: Where the risk of default is higher, the interest rate will be increased.
2. Credit insurance: The lender can transfer the risk to an insurer such as in housing loans to ensure that the
mortgage is secured.
4. Diversification: By lending to a greater number and kinds of small borrowers to diversify the lending pool.
5. Covenants: Covenants may be entered into with the borrowers for review, full payment in case of
improvement in debt coverage ratio, audit of business operation etc.
There can also be qualitative techniques of credit risk management duly implemented by three levels of
approach as under:
c. Policies and processes that keep improving the risk management of all lending activities.
Financial institutions also attempt to mitigate lending risks by performing credit analysis on individuals and
businesses by a review of the borrower’s five C’s which are capacity, capital, character, collateral and conditions.
(2 Marks)
ANSWERS TO CASE STUDY: 5
Multiple Choice Questions
5.1 (A)
5.2 (C)
5.3 (D)
5.4 (D)
5.5 (C)
Pure Risks are associated with uncertainties which may cause loss. In a pure risk situation, a loss occurs or no
loss occurs – there is no possibility for gain. These uncertainties may be due to perils such as fire, floods, etc. or
may arise from human action such as theft, accident etc.
There are certain risk events that can only result in negative outcomes such as fire accidents or leakage of
harmful chemicals from a manufacturing plant. These risks are hazard risks or pure risks, and these may be
thought of as operational or insurable risks. A good example of a hazard risk faced by many organizations is that
of theft. There are different types of pure risks:
• Personal risks - It includes early death, sudden accident and disability, unemployment, etc.
• Property risks - reduction in value of assets due to physical damage, fire, theft, etc.
• Liability Risks - the risk of legal liability for damages accruing to customer, suppliers, vendors, etc. Such risks
are also connected with compensation payable to employees for injuries and other harm afflicted in the
workplace.
There are risks which are not insurable even though there may be no gain in them. These include:
Fundamental Risks which are impersonal in nature, present in the nature and the economy which has pervasive
effects. Such include war, inflation, mass unemployment etc. Generally, these are not insurable and it is left to
the government to deal with the effect of these events.
Dynamic Risks are risks which arise due to changes in the economy like fluctuations in price levels, consumer
preferences, shift in technology etc. These are again not considered insurable as they are less predictable and
pervasive.
However, Particular Risks are risks which have their origin in individual events which can be clearly controlled
such as road accidents. These risks are considered insurable subject to conditions.
Risks are also categorized into hazard risks which is another term for pure risks which are insurable, while
Control risks are pure uncertainty risks and are associated with project management and these risks are hard to
quantify. Finally, there are opportunity risks which are also called speculative risks. These have opportunity for
gain and hence are not insurable.
(1 Mark)
5.7 The operational risk is important for management of company because of following reasons:
(a) The Companies Act 2013 (Sections 134 and 177) lays down clear expectations from Boards of organisations
in assessing the robustness of risk management framework implemented by the company. Section 134 instructs
that Board of Directors should include a statement on development and implementation of risk management
Clause (e) of Sub-section 5 of Section 134 explains the meaning of the term ‘internal financial controls’ as “the
policies and procedures adopted by the company for ensuring the orderly and efficient conduct of its business,
including adherence to company’s policies, the safeguarding of its assets, the prevention and detection of frauds
and errors, the accuracy and completeness of the accounting records, and the timely preparation of reliable
financial information.”
Section 177 instructs that the Audit Committee shall review the risk management procedures implemented by the
management.
Schedule IV instructs that Independent Directors are required to get assurance that systems of risk management
are robust and defensible.
(b) Paragraph 4(c) of the Standard on Auditing (SA) 315 “Identifying and Assessing the Risks of Material
Misstatement Through Understanding the Entity and Its Environment” defines the term ‘internal control’ as “the
process designed, implemented and maintained by those charged with governance, management and other
personnel to provide reasonable assurance about the achievement of an entity’s objectives with regard to
reliability of financial reporting, effectiveness and efficiency of operations, safeguarding of assets, and
compliance with applicable laws and regulations. The term “controls” refers to any aspects of one or more of the
components of internal control.”
(c) Clause 49 of the Listing Agreement, indicates that disclosures are to be made to the Board of Directors on
risk management, on whether the company has laid down any procedures to inform Board members about the
risk assessment and mitigation procedures.
(d) The ICAI Guidance Note on Audit of Internal Financial Controls over Financial Reporting has several
sections pertinent to the understanding of operational controls underlying in the processes;
While the Guidance Note does not explicitly dwell on operational risk per se, the overall approach and
methodologies mentioned in the Note rest on, and derive from an implied understanding of the auditor’s
understanding of operational risks and the mitigating controls of the organisation; for instance, the auditor is
expected to have a thorough understanding of the automated and manual controls that lie in each of the
processes that have a direct bearing on the financials of the organisation.
1. Manage the implementation of all aspects of the risk function, including implementation of processes, tools
and systems to identify, assess, measure, manage, monitor and report risks.
3. Manage the process for developing risk policies and procedures, risk limits and approval authorities.
8. Liaison with Business users to prepare Functional risk specifications. Translate business requirements and
functional needs into business / reporting and system specifications. Ensure technical specifications meet the
stated needs of the business.
10. Provide User Training for in-house developed risk management systems.
12. Conduct and document audits of risk related compliance to industry standards
13. Define & develop risk policies, procedures, processes & other documentation as required.
14. Implement the risk management program and risk strategy. Ensure the risk management program is
effectively integrated into product development and delivery methodology.
15. Participate in local and global discussions to formulate new or enhance existing risk management processes,
policies and standards.
10
Although some of these answers can be found in the Study Material itself, questions like these can be
answered only if the Study Material has been read twice at least, with all the conceptual clarity and
inter-linkage of the fundamentals. It is certainly not going to be easy to find the answers in the book
and therefore, for every point, the student needs to think like a risk manager, and believe that he/she is
a risk professional, per se.
1.3- Direct answer from page 5.04 of ICAI SM(heading VaR Parameters).
1.5- Conceptual answer from Translation Exposure heading of SFM ICAI SM.
1.6- Direct answer from page 6.15 of ICAI SM. (Rest 3 options are given under Credit Due diligence
for wholesale financing);
Case Study 2 (Nov 18 Question Paper CS-2 Case study background is same, 5MCQs common and
Descriptive Question is different)
Descriptive Questions:
2.1- (i)- Direct answer from page 6.02 and 6.03 of ICAI SM.
2.1-(ii)- There is a typographical error in the question. Consider the value of WIP as Rs. 1 crore and
then solve the question. (As clarified by ICAI)
(Some Clarifications: This question talks about the term loan amount only as the working capital loan
is decided as per Tandon Committee.
This Question asks your opinion, and the amount may differ from ICAI’s Suggested Answers. We have
to decide the amount of loan considering various factors such as collaterals i.e. investments value,
existing borrowings etc. So, you can suggest an amount of loan as per your opinion but will have to
give justification for the same.)
When the LGD is given, then the formula given on page 6.03 of the ICAI SM can be modified to replace
the formula’s recovery rate portion. LGD can also be viewed as the direct figure of (1-r), i.e., here if
LGD=80%, then the recovery rate is 20%.
2.2- Based on concepts. Market risk is caused by changes in the market variables like changes in demand
and supply, or technological changes and not by changes in the weather or natural disasters.
2.3- Direct answer from page 3.03 and 3.04 of ICAI SM.
3.1- Based on conceptual understanding and related to the case study– If the income tax has not been
paid on the due then that means that enough finances were not available for the income-tax payment.
And this can happen only when the risk has been taken more than the capacity to take risks and this, in
turn, will happen only when the appetite to take risks is greater than the risk capacity;
3.2- The options are really confusing; 3 out of the 4 are looking for correct answers; How can we
arrive at the correct answer?
Page 6.3 of ICAI SM- The confusion can arise amongst the exposure, default and recovery options. But
there has been no default on the part of the firm until now, and since there is no default, there has been
no recovery risk. It is just the uncertainty associated with the firm’s e future ability that has made the
bank issue the notice- which happens only due to the exposure risk.
Training programs are a kind of risk mitigation measure, and insurance is also the same. Rest all the
options are not the risk mitigation measures. So, instead of getting insurance, the firm can go for training
programs so that the risk of failure during the operations reduces – and it’s even a better mitigation
measure than the insurance since insurance acts as a cure in terms of providing for the lost finances
whereas training acts as a preventive measure.
The control risk is high in the case under consideration because against the prescribed tolerable limit of
6% and there is a mismatch of 15% in the samples. (As clarified by ICAI over mail)
3.6- Linked to the case study and understanding of the types of risks given on page 1.19 of ICAI SM.
3.7- How can we prepare the risk register. There is no proforma given in the SM, as such?
Although there is no proforma given as such – related to the risk register – there is still the availability
of contents of a risk register, as on page 8.4 of the ICAI SM, and those contents can be converted to a
table and related with the case study to answer this question.
(While preparing the risk register, inherent risk score and residual risk score is subjective. You can
mention the score and give justification for the same. This may not match with ICAI’s Suggested
Answer)
4.1- The options are really confusing. How the answer is Sales Growth?
Common sense based question. Sales growth is the primary factor that will drive the existential aspect
of any company; Even if a company has a good reputation, is existing and is continuing its business-
but then also – if it is not growing its sales quantum, then it would not be able to survive in the future
and that’s why it is important for the existence;
4.3- Based on the conceptual understanding of the stress testing, as given in chapter 5(page no.5.7 of
ICAI SM).
4.5- Direct answer from page 7.03 and 7.04 of ICAI SM.
Descriptive Questions:
4.6- Answer which is suggested by ICAI, seems like we will never be able to frame such an answer.
What do we do as students?
The concepts of the seventh chapter are a mix of theoretical concepts and what is happening in the
practical world regarding corporate governance. As students, certainly, the answer would not match the
one as suggested by ICAI, but still, it can be framed from the OECD guidelines as on page 7.20 and the
Risk Management framework as on page 7.06. Also, keep yourself updated as to what all is happening
in the corporate world- so that points related to whistle blowers and media reports, etc. come to your
mind while writing such answers.
4.7- Answer from page 9.11, 1.21, 9.13 and a bit of the learning from the audit world, internal control,
etc.
The answer is from the content mentioned in the 6th chapter of ICAI SM. In such a situation, it is safer
to cover more concepts and write small points about all of them.
5.4- Refer page no. 2.14 of ICAI SM. (Basic Conceptual question of Risk evaluation)
5.5-Refer page no.1.16-1.17. (Basic Conceptual question on Categorization of Risks by Paul Hopkins)
Descriptive Questions:
5.6- Direct answer from page 1.16 and 1.17 of ICAI SM.
5.7- Direct answer from page 9.02 and 9.03 of ICAI SM. (write four reasonably sized points)
5.8- Direct answer from page 2.30 of ICAI SM. (write 12 small points)
Descriptive Questions
1.1 Assume you are a credit analyst in a Debt Mutual fund. How would you do the credit due diligence for
recommending the subscription of the debenture issue? (Mention any six aspects and justify it with the
facts of the case) (7 Marks)
1.2 Market interest rate increased to 11% after 1 year for the debentures having similar credit risk profile.
What action would investor/issuer take to optimize its return on capital given no transaction cost?
Mention the risks that issuer will face immediately after exercise of the call/put option by investor/iss uer?
(2 Marks)
1.3 Calculate the Debt Service Coverage Ratio (DSCR) considering opening Cash Balance and Free Cash
Flow available for all the year in which debenture repayment is scheduled. In which year the r isk of
default is maximum? (6 Marks)
Multiple Choice Questions
Choose the most appropriate answer from the answer options.
1.4 Arjun Limited’s assessment that the new product portfolio will help them to achieve long term desired
growth carries which type of risk?
(A) Operational Risk
(B) Assumption Risk
(C) Strategic Risk
(D) Model Risk
1.5 ABC mutual fund is likely to face following risk on account of subscribing to the issue of listed debentures
of Arjun Limited, except one…………..
(A) Credit Risk
(B) Operational Risk
(C) Interest Rate Risk
(D) Market Risk
1.6 Credit Rating assigned to the debenture issued by Arjun Limited represents……….
(A) High Safety
(B) Adequate Safety
3
CASE STUDY: 3
SELFIE Ltd. is a lifestyle product company head-quartered in New Delhi. The company was established in
the year 1863 by Mr. Khalid Topiwala. The company’s business model is to manufacture and sell lifestyle
products and accessories targeted towards young population.
The main product includes:- digital and analog wrist watches, compact music players, mobile accessories
and eye wear.
Influenced by the rapid growth and high margins of SELFIE Ltd., another player Facelift Ltd. entered the
market in the year 1885 producing similar products in the life style segment. However, Facelift Ltd. targets
its products to teenagers and young women.
Since, 2008 equity shares of both SELFIE Ltd. and Facelift Ltd. are being traded on Leading Stock
Exchanges.
The financial data of the companies are as follows:
` in Crores
Particulars SELFIE Ltd. Facelift Ltd.
Fixed Assets 35 24
Inventory 14.50 13.19
Trade Creditors 6.95 4.95
Trade Debtors 5.25 5.25
Total Debt – Short Term 9.5 5
SELFIE Ltd. pays dividend on a regular basis, whereas Facelift Ltd. retains profits into the business and
maintain a zero- dividend policy.
SELFIE Ltd. follows a conservative approach and makes cautious decisions. It also launches products in a
phased manner.
6
There has been drastic fall in the revenue of the company for the year ended 31st March 2020. With increasing
competition, there has been significant loss of market share. A new competitor has entered the market with
the concept of Self Drive Cars which provide the customers with the cab without driv ers. Further the existing
major market players like Oola and Uberia are able to erode the customer base of ‘Go Where’ with the
introduction of their new schemes of providing instant cabs for the whole day at much competitive prices as
compared to the company concerned.
9
10
11
Descriptive Questions
5.1 On his appointment, what risks AG will identify related to Company’s activities? Draw out a framework
to manage these risks. (6 Marks)
5.2 Other than risks covered above identify the other two major risks ABC Ltd. is facing. (2 Marks)
5.3 What do the statements (in italics) quoted by CEO indicates. (2 Marks)
5.4 What type of major Risk being faced by TTC plc for investment in ABC Ltd. Explain the process to
manage the same risk. (5 Marks)
12
13
Strengths Weakness
1. Continuous dividend payout attracting 1. Slow decision-making process
investors 2. Skeptical Corporate governance
2. Extensive expansion plan to meet future policies
demand
Opportunities Threats
1. Expansion in other countries 1. Competition from Facelift Ltd.
2. Growing market demand due to population 2. Country risk from Japan
(1 Mark for each correct Box covering two points = Max. 4 Marks)
1.3) How do we tackle this type of practical question and how is the amount spent on CAPEX
calculated?
Probably ICAI should not have asked this question because it contains the FCFE concept given
in the “Security Valuation” chapter of SFM. So, try to avoid such questions- but since you have
the SFM module – then the direct formula is there under the heading 6.3.2 CALCULATION
OF FCFE on page 4.11 of the SFM study material.
Here, the trick of CAPEX calculation is the attention to the figure of the fixed assets as given
in the Balance Sheet- which is the same in all the years. And since depreciation is given in the
P/L as 100, therefore, the addition is also 100 –which is making the figure of fixed assets to
stay the same at 3500.
1.4 How and why is the answer strategic risk and not model risk?
As per the question, Arjun Ltd. has decided to adopt the strategy to grow inorganically (meaning thereby
that Growth by way of mergers or takeovers rather than by its own operations), and it is under this
strategy that the new product portfolio has been designed in order to achieve long term desired growth.
Since it is directly related to a business strategy, therefore, it is a Strategic Risk. Moreover, it is not
associated with any financial model or any assumption or any product, process, or system, making it
impossible to have any of the other 3 types of risks as mentioned in the other options.
Whenever you subscribe to the debentures of any company, there will always be credit risk, interest
rate risk, and market risk; Because there will always be a risk of the company not paying back( credit
risk ), there will always be a risk of the company paying lower interest rates as compared to the market
since interest rates in the market may rise (Interest Rate risk) and there will always be a risk of the
market variables getting more favorable for investment in higher return fetching instruments- when you
can remain stuck in the debentures of a company( Market Risk ); The operations of any company are
1.7) How are all the options helping in avoiding liquidity risk/refinancing risk?
Liquidity risk we all know. Refinancing risk refers to the possibility that an individual or company
would not be able to replace a debt obligation with new debt at a critical time for the borrower. Your
level of refinancing risk is strongly tied to your credit rating. To avoid refinancing risk, lenders place
great value on a borrower's history of paying down his or her debt reliably.
Here, if we think carefully, we will come to know that all three options are favouring the ability of
Arjun Ltd. to have greater liquidity than without these options. (A) option will not give any option or
the right to sell the debentures to the holders, that’s why – the company will continue to have the money
of the debenture holders. (B) option will allow continuous cash access like the facility of cash credit,
and the (C) option will allow the liquidity to remain in the hands of the company for a longer period of
time. Therefore, it is All of the above.
1.8) Options are really confusing. How can we arrive at the correct answer?
This question is related to basic understanding. However, yes, it is confusing- but we need to think
carefully as to which answer is the best, most specific, and most relevant answer when sometimes all
or >1 options are apparently falling right. We also need to think about which new point can arise because
of the thing mentioned in the question. Interest Rate risk and liquidity risk are related to any and every
issuance but not specifically only because of issuance in the foreign currency. Out of the country risk
and FOREX risk, we should choose FOREX risk since it is certain to happen and it is a widely
concerning factor. Moreover, lower interest rates are there in the primary FOREX markets – and here
since the US dollar market is mentioned, we can see it on Google that the interest rates are lower there.
Case Study 2
Descriptive Questions:
2.1 – Manageable question since types of risks are given on page 1.19;
Also, on page no. 44 of the Complete Guidance book by CA Shivam Palan- you can find the types of
risks faced due to COVID-19.
2.2- From page 8.2, There is no classification as such of ERM given in the study material; One can
confuse the answer with page 1.11, but it talks about the types of risks as per ERM instead of the ERM
classification. Although it would have been better if it was answered on the basis of the content on page
1.11 only, but ICAI has given advantages of ERM given on page no. 8.2 of ICAI SM.
2.3- How can the Paul Hopkins risks be related or linked to the case study?
The simple content is given on pages no.1.16 & 1.17 of the ICAI SM. However, the main risk related
to the above case study is that of Control Risk, since the scenario of a pandemic is highly uncertain and
it is completely uncontrollable.
2.4 – Options are really confusing, which option to choose in such a case?
Here, we need to think that since the main, biggest and most impactful risk is due to the pandemic,
therefore, it is common sense that the risk due to the coronavirus is uncontrollable
2.5- Why is the answer related to both systematic and unsystematic risk, since systematic risk
cannot be controlled the answer should be the only unsystematic risk?
The answer is indirectly given as per page no. 1.21 and 2.22, where the systematic risk is given.
Unsystematic risk is a natural, spontaneous answer. However, for the systematic risk, we need to
understand that it cannot be controlled but we can prepare against it and try to hedge it- and that is what
risk mitigation does (as per page 2.22); Therefore, the answer is both A & B.
2.6 – Direct answer from page 1.20, where the D option is actually interest rate risk but it is mentioned
Financial risk;
2.7- Common sense question- the impact that the coronavirus has on the company XYZ Ltd., as given
in the case study is very significant - both in terms of finances and operations. Therefore, consequences
have to be none other than Catastrophic;
2.8- How are all three risks being faced by XYZ Ltd.?
All 3 types of risks – HR risk (people leaving the organization), Operational risk (shutdown in the
operations), and Negative cash flow risk - are the kind of risks that most businesses have faced during
the pandemic.
Case Study 3
Multiple-choice Questions:
3.1 and 3.2 How have the SD and coefficient of variation been calculated, because none of the
answers are matching with the given options?
Yes, there has been a mistake on the ICAI’s part. The options given in the question have been given as
per the data of all 7 years as mentioned in the question. If we calculate the SD of all 7 years, then we
can arrive at 1.06%. Similarly, if the Coefficient of variation for these 7 years is calculated as per the
correct formula, then we can arrive at 0.230. ( Both concepts are covered in the Intermediate of Capital
Budgeting
3.4- Simple calculation on the basis of formula on page 5.3 of ICAI SM.
The answer is a market risk because there is a mention of a certain cannibalization effect in the question
which is the reduction of the sales of a company's own products as a consequence of its introduction of
another similar product. This definitely happens because of the external supply and demand forces of
the market, when the consumers in general, begin to like a product more than the previous one – and
automatically the demand of the previous product is wiped out. Therefore, the answer is Market Risk;
Descriptive Questions:
3.7-Refer Page No. 9.14 of ICAI SM; based on the conceptual understanding and relation with the case
study. Turmoil in the exchange rates will be caused only very seldom – therefore, the probability is very
low for that; (Risk Grading/Bucketing)
Case Study 4
Multiple Choice Questions:
4.1- How has the expected sales growth rate been calculated?
4.3- Simple calculation based on the formula given on page 6.28 of ICAI SM.
4.5- The Net Benefit obtained by the company due to change in the payment policy to its drivers is-
(A) ` 2,01,50,000
(B) ` 2,20,75,000
(C) ` 7,50,000
(D) ` 2,50,000
=600,00,000 =360,00,000
=52,50,000 =70,00,000
Descriptive Questions:
4.6- ICAI’s answer is a bit complex to understand? Also, the distribution of marks is very
uncertain.
The answer has mostly been framed from pages 7.6 and 9.2 of the ICAI SM. It just needs to be related
with the case study- which is manageable provided the case study has been read carefully. In the
situation of the uncertainty of marks, we need to assume that the 2 parts of the question carry equal
weightage.
If the RM paper is being attempted, then the Paper 5 preparations are a given in the CA finals. This
question belongs to the Costing subject – relating to the Decision-making chapter. With a slight
application of the analytical side of the brain, it can be managed. The presentation can be in any manner
but attempts should be made to solve it in such a manner – which makes it easier for the examiner to
check your solution;
Case Study 5
Descriptive Questions:
5.1- How do we prepare the kind of RMF as has been given in the suggested answers of ICAI?
(Relevant content is available on page 282 of Complete Guidance book + Notes of concept Building
batch by CA ShivamPalan) Although, prima facie anyone will draw just 2 columns – one with risks and
the other one with the management of risk, the “risk arising from” and “risk measurement” columns
can be inculcated in the practice of answering such types of questions in the future.
5.3- Refer Pages No. 3.3 and 3.4 of the ICAI SM, plus a basic understanding of concepts
5.4- Refer Page No. 5.16 of the ICAI Study Mat- Direct question;
This Suggested Answer hosted on the website do not constitute the basis for evaluation of the
student’s answers in the examination. The answers are prepared by the Faculty of the Board of
Studies with a view to assist the students in their education. While due care is taken in
preparation of the answers, if any error or omission is noticed, the same may be brought to the
attention of the Director of Board of Studies. The Council of the Institute is not in anyway
Further, in the Elective Papers which are Case Study based, the solutions have been worked
out on the basis of certain assumptions/views derived from the facts given in the question or
language used in the question. It may be possible to work out the solution to the case studies
iv. Risk of theft of products by employees resulting in breach of confidence and loss of
money.
Appointment of a Risk Management consultant:
To study the issues faced by CRPL, a risk management consultant, Mr. Kannan, was appointed
to go through issues and risks and suggest a robust risk management system and formulate
risk policies and procedures relevant to CRPL.
• He conducted a meeting of all the staff and the management and explained to them:
i. risks are those uncertainties of outcome, whether an opportunity or threat, arising out
of actions and events
ii. the importance of capturing and recording the incidents that would adversely affect
the operations of CRPL,
iii. the need for a proper and periodic risk management process which would enable the
management to deal with risks by reducing their likelihood or downside impact as the
same aims to protect the value already created by the company, but also enhances
its future opportunities,
iv. the commitment required of the Board to fix the quantum and extent of risk that it is
willing to take to pursue the objectives, in other words known as Risk Appetite and,
v. the need for implementation of proper controls and ensure their working to alleviate
the issues faced by CRPL.
• He advised them to have values, attitudes, competencies, and behaviour which would in-
tum determine the company's commitment and style of Operational Risk Management.
Children mini theme park project:
• In the main store, adjacent to the building, CRPL is maintaining a garden having an area
of 5,000 sft., which is company-owned. It was observed that an average of 1,000 customers
visited the store per day and out of them 150 families visited with children.
• To tap the potential, Mr. Deepak, the Managing Director (MD), suggested a proposal to
build a children mini theme park in that area. Only children with age group of 3 to 12 would
be admitted from whom entrance fee would be collected. This project is expected to have
a life of 5 years and the initial project cost is estimated at ` 2.50 crores.
On the basis of above, you are required to answer the following questions:
Multiple Choice Questions
Choose the most appropriate answer from the given options.
(1.1) In which of the following processes of Risk Management, the Risk Register would least
likely be considered?
(1.7) The proposed theme park project, as suggested by Mr. Deepak, is estimated to have i) an
annual cash inflow of ` 75 lakhs and ii) cost of capital is 10%.
Identify which of the three factors, viz., initial project cost, annual cash inflow and project
life in years, the project is most sensitive if the variable is adversely affected by 10%? (Use
annuity factors: for 10% = 3.7908 and 11 % = 3.6959) (5 Marks)
(1.8) Write the risk actions and risk responses for the risks faced by CRPL as extracted from
its Risk and Control Matrix. (4 Marks)
Answer
Multiple Choice Questions
1.1 (D)
1.2 (B)
1.3 (A)
1.4 (C)
1.5 (C)
Descriptive Questions
1.6 Specific controls suggested for the issues observed by CRPL:
There are several different, but closely related or similar categorisations used in different
kinds of control framework, organisations, but mostly they would fall under these
categories.
(i) Verification: Refers to a control where a control step necessitates the transaction is
verified by a different individual before it is completed.
Cash shortage of ` 5 lakhs could have been avoided if two different persons count
the cash and place it in the safety locker, after signing the cash register. Cash in the
safety locker to be held as a joint custody of a senior officer of the store and the
cashier.
(ii) Reconciliations: Refers to a control where an output of a process step is reconciled
against other known, established sources of information.
One store has sent 100 quantities and the other store has received only 80 quantities.
Proper acknowledgement of receipt / delivery of goods transfer must be in place. This
helps in reconciliation of stock transfer within stores.
(iii) Segregation of duties: Refers to a control where part of the transaction is executed
across two segregated departments / functions / verticals thereby eliminating the risk
of the originating department to carry out the entire transaction on its own.
The purchase manager having initiated the purchases cannot be the same person
who can pass the payment for the purchases. Procedures must be evolved that such
things do not happen in future.
(iv) Physical control: Refers to a control type where physical custody of an asset is the
control.
The area where bar-coding is done is not having access control restrictions. Control
measures are to be implemented that only authorised persons should be able to enter
that area
(v) Supervisory control: Refers to a control where the primary transaction / process is
executed at a particular level in an organisation, but before finalising it, the supervisor
is required to review it and accord an approval.
The sales managers must verify the discounts given by the salesmen periodically. If
a particular salesman is always passing on 2% discount to the customers, he can be
questioned and properly advised on such practice.
(vi) Exception triggers: Refers to a control where a system, or a responsible individual,
throws up regular reports of transactions which are deviant from the accepted,
established process.
The software has not been designed according to the credit policy of the company
and it should not have allowed the excess credit over ` 50,000/-. Controls must be
placed in the software that such violation is not repeated.
(vii) Authorisation / approval: Refers to a control step where, after a processing of a
transaction basis built in controls is almost complete, a final authority reviews it and
approves it.
Even if emergency purchases are made necessary approvals are to be obtained from
the superiors, e.g. store manager without getting approval from the manager issued
manual order.
1.7 To compute the sensitivity of various factors, first we compute the NPV of the project
NPV = - ` 2,50,00,000 + ` 75,00,000 x 3.7908
= - ` 2,50,00,000 + ` 2,84,31,000
= ` 34,31,000
Sensitivity Analysis
(i) Initial Project Cost
If project is increased adversely by 10%
= - ` 2,75,00,000 + ` 2,84,31,000
= ` 9,31,000
34.31 − 9.31
Change in NPV = 100 = 72.865% or 72.87%
34.31
(ii) Annual Cash Flow
If Annual Cash Flow adversely effected by 10%
= -` 2,50,00,000 + ` 67,50,000 3.7908
= -` 2,50,00,000 + ` 2,55,87,900
= ` 5,87,900
34,31,000 − 5,87,900
Change in NPV = 100 = 82.865% or 82.87%
34,31,000
(iii) Present Value of Cash Inflow of each year
Year Present Value Factor Cash Flow Present Value of Cash Flow
(` Lakhs) (` Lakhs)
1 0.9091 75 68.1825
2 0.8264 75 61.9800
3 0.7513 75 56.3475
4 0.6830 75 51.2250
237.735
Balance Left 12.2650
Thus, the period required to in fifth year
12.2650 12.2650
= = 0.263 Years
75 × 0.6209 46.5675
Thus, if project runs for 4 years and 0.263 years then Break Even would occur
representing a fall in
(5 - 4.263)
× 100 = 14.74%
5
Thus, the most sensitive factor is Annual Cash Flow.
1.8 – The action and risk response to various risks identified are as follows:
Risk actions and risk responses for the risks faced by CRPL:
1. Risk: The risk of certain products being discarded after the expiry date due to slow
moving of the products.
Term 5 years
Reference credit Prime 5-year bond
Credit event The business day following occurrence of specified credit event
Default payment Nominal value of bond x [100 - price of bond after credit event]
Swap premium 3.35%
The management of SUN is concerned about the reputation of the company. Despite making
best efforts in past the reputation of the company has not improved to the level enjoyed by the
close competitor. There is a feeling that existing model also needs to be changed in view of
changed circumstances. Since the inception the company has not reviewed its business model.
The demand and revenue loss are the cause of concern of the company. The management is
worried that despite best quality products they are lagging behind the competitor. There are
multiple suggestions within the organization ranging from change in product, diversification,
increase in geography etc. The board does not have formal strategy document and operational
issues are mainly based on the understanding of the CEO who is promoter also. The company
has been following same strategy since inception in tackling competition.
Except treasury; the risk management in SUN is mostly done at business unit level. The
management is thinking about an integrated risk management system especially considering
the recent investment in South African country by opening a small but new factory. The
management is also concerned about the country risk. In one of the board meetings, it was
highlighted that a risk management framework is missing in the company. The risk department
has promised to inform the Board in this respect. Also risk register is not being maintained in
the company. One version is that it is not useful. The other set of senior executives want it to
be maintained. They have decided to take help of a consultant in this.
The company has recently adopted IND-AS. And it is in the process of establishing a robust
system of expected credit loss (ECL). A recently qualified chartered accountant who is a part
of the treasury team is ready to accept this work and has promised to the treasury head that
she will do it. SUN currently operates with separate and independent risk management,
compliance and audit functions.
On the basis of above, you are required to answer the following questions:
Multiple Choice Questions
Choose the most appropriate answer from the given options.
(2.1) Assuming now that during the life of the swap, there is a technical default on the Prime 5-
year bond, such that its price now stands at 58. Under the terms of the swap, the protection
buyer delivers the bond to the seller who pays to the protection buyer INR........................
(A) INR 4.2 million
(B) INR 42 million
(C) INR 5 million
Descriptive Questions
(2.6) Briefly explain the strategic risks SUN is facing and what broad key risk drivers you would
like to consider assessing that risk? (4 Marks)
(2.7) What is reputational risk? You are hired by the SUN to assess reputational risk. What are
the steps needed to assess reputational risks? (3 Marks)
(2.8) What is the purpose of risk management framework? What could be the steps in
developing risk management framework? (2 Marks)
(2.9) In your opinion what should be done to establish in-house process to analyze country risk
of SUN ? (3 Marks)
(2.10) While you were in the board room one member remarked as under.
"Having too much on the risk register runs the risk of diluting the focus on the key risks "
What would be your response to the above and why? (3 Marks)
Answer
Multiple Choice Questions
2.1 (A)
2.2 (C)
2.3 (D)
2.4 (D)
2.5 (C) or (D)
2.6 The main strategic risks faced by SUN Ltd. are as follows:
❖ Old Business model not reviewed for a long period of time
❖ Country Risk
❖ Adoption of Ind-AS.
❖ Risk management Framework / Proper risk management strategies are not present
The main key drivers to be considered to assess these risks
❖ Loss of Demand and Revenue
❖ No formal strategy document
❖ Missing of Risk Management in the company
❖ No Risk Register is maintained in the company
2.7 Reputational risk – Adverse publicity regarding an entity’s practices leading to a loss of
revenue or litigation. Any event which affects the name or brand image of the entity is
Reputational Risk. Any adverse publicity, news coverage, comments etc. that has the
ability to dent the trust created by the entity and becomes detrimental to the business of
the entity.
❖ It is a process, involving the following steps:
❖ identifying business functions, assets, vulnerabilities and threats;
❖ assessing the reputational risk
❖ developing a reputational risk management plan;
❖ implementing reputational risk management actions, and
❖ re-evaluating the reputational risks.
2.8 A holistic risk management framework would empower Boards to:
❖ Identify top threats to entity and asset protection measures.
❖ Link risks to more efficient capital allocations and business strategy.
❖ Develop a common language in the organisation for problem solving.
❖ Effectively respond to an evolving business environment.
The RMF should define a policy statement on the following matters:-
(i) Determining when to review the RMF and the frequency for undertaking the review.
(ii) Deciding who is responsible for the review. The RMF is generally reviewed by the
Audit Committee or a team of Directors. Once in few years the RMF can be reviewed
with external facilitation this would provide fresh insights and benchmarking
information to the Board.
(iii) Selecting the scope and method for a review. The scope and boundary of the RMF
review can be clearly set out along with the most suited method for review.
(iv) Manner of circulation of results.
2.9 Country Risk is a major issue of concern in overall management of business. Broadly
speaking the country risk management process involves the following steps:
(i) Identification of Risk: First and foremost, step in country risk management is
identification of risk. The various quantitative and qualitative techniques can be used
to identify the risks.
(ii) Analysis of Risk: Once the risk is identified the next step is analyse the same from
various angles.
(iii) Evaluation of Risk Management Techniques: Evaluation of various techniques to
manage the risk is carried out.
(iv) Selection of suitable techniques: Once various techniques have been evaluated
next steps comes of selection of most suitable technique to manage the risk.
(v) Implementation of Techniques: The techniques to manage the risk are
implemented.
(vi) Control: Once the selected techniques are implemented they need to be reviewed
on periodic and if required they are revised.
2.10 To some extent the given statement is true, as in creating Risk Register Inherent Risks are
identified and recorded. Inherent Risks is their level of risk assuming no internal control.
Accordingly, if all risks are covered whether Residual Risk then it will lose its importance.
CASE STUDY: 3
Headquartered in Mumbai, STEPOIL is one of the India's top 10 oil and gas producers. In 2020,
the company had revenues of INR 700 billion. In the same year, it had over 23,000 employees.
Known for its operational excellence, STEPOIL is a leader in offshore oil production below water
depths of 100 meters. In 2010, STEPOIL's shares were listed on the NSE and BSE. After having
sold its downstream and petrochemical businesses over the past few years, STEPOIL is today
heavily focused on upstream activities (i.e., exploration and development of oil and gas
reserves). Its two business areas focusing on development are divided according to
geographical regions (India and International with the latter being much smaller).
The company maintains a trading portfolio which is managed by a qualified portfolio manager.
In addition, it has four more business areas focusing on marketing, technology, exploration, and
strategy. Considering its complexity of business STEPOIL started to implement enterprise risk
management (ERM) since 2014. Initially, it hired Mr. Aman who had been asked to systemize
the management of risk in finance which previously had been carried out in a fragmented and
uncoordinated way. The result of such exercise was that the risks managed by the finance
department were measured and managed as a portfolio of risks with central oversight. The CEO
of STEPOIL has realized that the same principles could be applied to the whole company, and
that there would be benefits to the company from managing its risks in an integrated way.
An important early milestone in the implementation of ERM came in 2016, when the Risk
Committee, a cross-disciplinary advisory body on risk, was formed. It consists of a broad range
of professionals with different backgrounds, such as the head of strategy, the heads of the
treasury, the chief controllers of different business units, and the head of internal control, in
addition to the CRO. The CRO is yet to get authority and functional autonomy and is facing
obstacle from the CEO.
The idea behind creating the committee was to obtain a forum to which people could put
proposals and general risk issues for analysis and recommendations. However, the internal
audit team is not providing required support in the ERM implementation exercise as they believe
this will reduce their authority in the organization. While STEPOIL's executive officers were
generally positive to the idea behind ERM, they still demanded to know "What is in it for us?" A
large number of executives and some board members still feel that ERM is an administrative
burden. The CRO demonstrated efforts of Mr. Aman and the benefits STEPOIL is getting after
analysis of the costs and benefits from various financial transactions, mostly hedging and
foreign exchange (FX) transactions going on in the company. Mr Aman and the CRO were able
to show that the number of transactions was staggeringly high, and that they were mostly based
on a silo thinking that made no sense at all as seen from the corporate perspective. ERM had
demonstrated the economic justification it needed.
A clear mandate was given in 2018, the risk department was formally set up headed by the
CRO, and started work on developing a common methodology on risk, as well as continuing the
work on developing the company's consolidated risk model that had been initiated four years
earlier. The CRO wants to use Value at Risk (VAR) techniques for quantifying risk so that it
would be easier for the Board to understand the risk. Some of the members of the board has
apprehension about effectiveness of the technique considering mechanical process and
limitation of the model. The CRO is trying best to convince the Board about developing 'a
sophisticated approach to ERM that centers on the principle of value creation and has a vision
to ensure that ERM is thoroughly embedded in the business units' way of doing things despite
the fact it is yet to enjoy the wholehearted support of STEPOIL's executive officers and board
of directors.
The board is concerned about the current risk culture and wants to have an understanding about
the risk culture. The CRO has promised to get an assessment of risk culture done from an
independent consultant.
The business continuity plan (BCP) is currently managed by cyber security team and is not part
of the ERM. The cyber security team's argument is that these two not linked and should be
managed separately.
On the basis of above, you are required to answer the following questions:
Multiple Choice Questions
Choose the most appropriate answer from the given options.
(3.1) Which one of the following is incorrect with respect to VAR?
(A) It is a unified method of measuring risk.
(B) VAR does not measure liquidity risk.
(C) VAR does not measure operational risk.
(D) VAR is not risk management.
(3.2) Which one of the following is incorrect with respect to ERM?
(A) It is a process effected by an entity's board of directors, management and other
personnel.
(B) It is applied in strategic setting and across the enterprise.
(C) It manages risk to be within risk appetite.
portfolio of a 10 standard deviation move? You are required to identify and describe a
technique that can fulfil the objective of the board member. (3 Marks)
(3.9) Is there a standard way of stress testing? What information it would provide? How does
stress testing complement the VAR framework? (3 Marks)
Answer
3.1 (A)
3.2 (D)
3.3 (A) or (B)
3.4 (B)
3.5 (C)
3.6 The Chief Risk Officer (CRO)
(a) has the organisational stature, skill set, authority, and character needed to oversee
and monitor the firm’s risk management and related processes and to ensure that key
management and board constituents are apprised of the firm’s risk profile and
relevant risk issues on a timely and regular basis; the CRO should have a direct
reporting line to the CEO and a distinct role from other executive functions and
business line responsibilities as well as a direct reporting line to the board and/or risk
committee;
(b) meets periodically with the board and risk committee without executive directors or
management present;
(c) is appointed and dismissed with input or approval from the risk committee or the board
and such appointments and dismissals are disclosed publicly;
(d) is independent of business lines and has the appropriate stature in the firm as his/her
performance, compensation and budget is reviewed and approved by the risk
committee;
(e) is responsible for ensuring that the risk management function is adequately
resourced, taking into account the complexity and risks of the firm as well as its Risk
Assessment Framework (RAF) and strategic business plans;
(f) is actively involved in key decision-making processes from a risk perspective (e.g.,
the review of the business strategy/strategic planning, new product approvals, stress
testing, recovery and resolution planning, mergers and acquisitions, funding and
liquidity management planning) and can challenge management’s decisions and
recommendations;
(g) is involved in the setting of risk-related performance indicators for business units;
(h) meets, at a minimum quarterly, with the firm’s supervisor to discuss the scope and
coverage of the work of the risk management function.
3.7 (A) The obstacle in implementing ERM in the company is lack of support from top
management.
Lack of knowledge of managers in using the risk tools in ERM implementation.
Using improper or unsuitable risk modelling tools would cause an obstacle while
implementing ERM.
This can be done by assessing, managing and communicating business risks.
(B) There is an important relationship between ERM and BCP. The risk assessment that
is required as part of the risk management process and the business impact analysis
that is the basis of business continuity planning (BCP) are closely related. The normal
approach to risk management is to evaluate objectives and identify the individual risks
that could impact these objectives. The output from a business impact analysis is the
identification of the critical activities that must be maintained for the organization to
continue to function.
It can be seen that the ERM approach and the business impact analysis approach
are very similar, because both approaches are based on the identification of the key
dependencies and functions that must be in place for the continuity and success of
the business.
The next activity differs between ERM and BCP, because the former is concerned
with the management of the risks that could impact processes, whereas business
continuity is concerned with actions that should be taken to maintain the continuity of
individual activities.
The business continuity approach, therefore, has the very specific function of
identifying actions that should be taken after the risk has materialized in order to
minimize its impact.
BCP relates to the damage-limitation and cost-containment components of the loss
control. BCP as a part of operational risk should always be part of the ERM and should
be managed separately.
3.8 An approach used by risk managers is to simulate extreme market moves over a range of
different scenarios. One method is to use Monte Carlo simulation.
Monte Carlo Simulation, is more flexible than other methods of estimating VAR. As with
historical simulation, Monte Carlo simulation allows the risk manager to use actual
historical distributions for risk factor returns rather than having to assume normal returns.
A large number of randomly generated simulations are run forward in time using volatility
and correlation estimates chosen by the risk manager. Each simulation will be different,
but in total the simulations will aggregate to the chosen statistical parameters (i.e.,
historical distributions and volatility and correlation estimates). This method is more
realistic as compared to other methods and, therefore, is more likely to estimate VaR more
accurately. However, its implementation requires powerful computers and there is also a
trade-off in that the time to perform calculations is longer.
3.9 Yes, there is a standard way of stress testing Process.
The Stress Test process can be applied to generate current assessments of income and
expenses, losses and capital ratios etc. of a portfolio.
Yes, it complements VAR measure, whose calculations tends to underestimate extreme
losses.
CASE STUDY: 4
Famous Textiles Limited (FTL):
FTL is manufacturing and selling export varieties of textile home furnishings, such as bed, sofa
and pillow covers, curtains, towels etc. made of cotton, rayon, and silk. FTL is based in Karur,
Tamilnadu and the town is famous for manufacturing such products. Out of the total sales of
FTL, nearly 90% were export sales.
vii. A cheque for ` 20,000/- was issued to Mr. Kumar, an employee of FTL on 14th Sep 2019
and the entries were passed by the accounts department then and there. In January 2020,
the accountant found out that such cheque was passed for ` 2 lakhs by the bank. The
accountant approached the bank, who accepted the wrong passing of the cheque and
immediately credited the balance of ` 1.80 lakhs to FTL' s bank account.
viii. Pen drives and other portable media devices were extensively used and most of the
computer systems were connected to Internet and the employees were often found to be
surfing various websites that are unconnected to the business of FTL. These resulted in
viruses affecting the computer systems.
Suggestions made by Ms. Meena:
i. The purpose of ISO 31000 is to provide principles and generic guidelines on risk
management that could achieve convergence from a variety of standards, methodologies
and procedures that differ between industries, subject matters, and countries. She
suggested to the management to prepare Risk Management Checklist (RMC) as
enunciated by ISO 31000.
ii. Ms. Meena suggested to the management to consider approaching the bank for a term
loan of ` 3 crores for overhauling the machinery and a working capital loan of ` 1 crore
which would enable the company to benefit from the cash discounts offered by the raw
material suppliers.
iii. The inherent risks in outsourcing would include, i) that the quality in the activities of the
service providers are not according to the quality expectations of the company, ii) the
service providers lack knowledge of the processes to be carried out by them, iii) service
providers failing to meet the deadlines in time schedule etc, She requested the
management to realise the importance of identifying risks and controls associated with the
above risks and advised the management that this could be done through Risk Control
Self-Assessment (RCSA) activity through an objective, quantitative review.
iv. As FTL is exporting its products to various countries, it is highly essential to assess Country
Risk (CR) of those countries. It is a broader concept and covers the adverse impact of host
country's economic, financial, and political environment. For assessing such risks, she
suggested to the management to study the concept of Quantitative Tools and the
connected indices that can be used for Country Risk Analysis (CRA).
v. She also suggested to appoint internal auditors to periodically review various operations
of the company.
vi. She suggested to the management to hold regular and periodic meetings of the
management with departmental and functional heads to discuss various problems faced
by them and to find out solutions for the same.
Therefore, to further study the implications, she was assigned by the management, an additional
task of assessing the post loss risk management.
On the basis of above, you are required to answer the following questions:
Multiple Choice Questions
Choose the most appropriate answer from the given options.
(4.1) Which of the following is not an index that would be used in the CRA that Ms. Meena was
suggesting to the management to be studied by them?
(A) Human Development Index
(B) Democracy Index
(C) Gini Coefficient Index
(D) Event Driven Index
(4.2) The most important objective in the additional task assigned to Ms. Meena would be?
(A) To reduce the legal requirements.
(B) To ensure the survival of the company.
(C) To lessen the concerns of the management.
(D) To review the available risk management procedures.
(4.3) Which of the following control would have best addressed the wrong passing of the cheque
issued to Mr. Kumar?
(A) Taking photostat copies of all the cheques issued by the company.
(B) Obtaining printouts of statement of accounts from the bank.
(C) Reconciling the bank accounts atleast once in a fortnight.
(D) Verifying the voucher obtained from Mr. Kumar with accounts.
(4.4) The best form of control to address the risk of virus attack in the company would be?
(A) Employing an updated packet filter firewall with strict employee access-control
privileges in all the computers.
(B) Scanning all the files with updated anti-virus software before downloading or copying
in all the computers.
(C) Encrypting the data in the portable media devices.
(D) Disabling portable media ports in all the computers.
(4.5) When preparing the RMC as per the suggestion of Ms. Meena, the checklist under Risk
Strategy would most likely include
(A) Business continuity plans and disaster recovery plans established and regularly
tested.
3 Inherent risk description Risk of service providers failing to meet the deadlines
in time schedule
4 Probability rating of the risk 2 out of 10*
5 Impact rating 1 on a scale of five*
6 Risk type Operational risk
7 Control description Manager (Operations) reviews on a periodical basis
whether the service providers adhere to the timeliness
agreed with FTL
8 Control type Detective
9 Control owner Manager (Operations)
10 Control Test steps i) Maintaining and updating the Works Alloted
Register.
ii) Monitor the movement of goods sent by vehicles
and their arrival in the premises on time.
11 Test results Test results showed minor deviations
12 Residual risk rating 2 out of 10*
13 Financial assertion impact Extremely low
14 Name of the system used Monit
15 Sample description of test For the sample reviews performed by the Manager,
done tested and verified whether timely delivery of service
has been made by Service Providers A and B
4.7 The Workings
X1 = (Working capital / Total Assets)
X2 = (Retained Earnings / Total Assets)
X3 = (Earnings Before interest and Taxes / Total Assets)
X4 = (Market Value of Equity / Book Value of Total Liabilities)
X5 = (Sales / Total Assets)
X1 = 10000000 / 210000000 = 0.0476
X2 = 10000000 / 210000000 = 0.0476
X3 = 20000000 / 210000000 = 0.0952
X4 = 20000000 / 60000000 = 0.3333
X5 = 1500000000 / 210000000 = 7.1429
The Formula
Z = 1.2 x X1 + 1.4 x X2 + 3.3 x X3 + 0.60 x X4 + 1.0 x X5
Z = 1.2 x 0.0476 + 1.4 x 0.0476 + 3.3 x 0.0952 + 0.60 x 0.3333 + 1.0 x 7.1429
Z = 0.0571 + 0.0667 + 0.3142 + 0.20 + 7.1429
Z score = 7.7809 (or 7.781)
4.8 Importance of Risk Management:
• Risk Management is one of the important pillars of Governance and arguably the only
tool to deal with business uncertainty. Risk Management is used most successfully
by Fortune 500 and other large companies to sustain and grow their businesses. Risk
management is recognised as an integral component of good management and
governance. It is an iterative process consisting of steps, which, when undertaken in
sequence, enable continual improvement in decision making.
• Risk management is the term applied to a logical and systematic method of
establishing the context, identifying , analysing , evaluating, treating, monitoring and
communicating risks associated with any activity, function or process in a way that
will enable organisations to minimise losses and maximize opportunities.
• Risk management is as much about identifying opportunities as avoiding or mitigating
losses.
• Risk consequences can be fatal to any business. The expenditure of fixing damage
and/or the loss of valued assets or even customers to competition after a catastrophe
can have a significant impact on the bottom line of a business. By identifying and
managing risks entities are able to actively protect value from any potential
catastrophes and save valuable time and money. A risk management plan and system
is there to do more than identify risk, a good system should also quantify the risk,
predict the impact, and put procedures in place to mitigate the risk, or even eliminate
it to the extent possible.
CASE STUDY: 5
Started in 2018, ALCON is a non-banking finance company (NBFC) and is headquartered at
Pune. The company has reported business of INR 500 Crores in FY 2019-20. Currently, ALCON
has few products and operates mainly in rural and semi-urban areas. COVID-19 changed
economic and operational realities have opened new opportunities for the company.
The strategy and finance team has come out with a next five year plan to capitalize the prevailing
situation. The five year business target is INR 1000 Crores and the company also wants to move
into urban areas. However, the expansion strategies also involve operational risk moving into
different territory. In order to address this the company has hired a full time Chief Risk Officer
(CRO). The CRO has informed the Board that considering the expansion strategies of the
company, the application of advanced analytics, including machine learning (ML) and artificial
intelligence (AI), should be a core part of for the management of operational and non-financial
risk. While the Board agrees with the suggestion of the CRO they are skeptical about the
expected return on such investment.
The Board believes with few exceptions, the financial industry is still playing 'catch up' in AI
terms. For many firms, the experimental AI phase is ongoing, with practical use cases still
emerging. They are wondering whether about the timing of using such technologies and would
like more analysis to conclude whether it is the right time to use such tools in the operations.
The CRO made number of presentations in this respect to the Board and explained that Al, at
its heart, is a set of statistical processes and like any other statistical process, it needs to be
understood and managed in the right way. Applied to certain processes, AI techniques can help
to standardize manual, time-consuming tasks and make them more efficient. This way company
would be able to reduce turnaround time (TAT) and also expects to save significant operational
costs. The CRO further clarified that Al's inherently statistical nature is often hidden behind
buzzwords and hype. The CRO believes that ML techniques will play a key role in operational
risk measurement.
Because a complete list of potential operational risks would be enormous and constantly
growing longer as new products and product platforms would be adopted, a necessary first step
in operational risk management is to sort operational risks into several broad categories. In
addition to organizing an unwieldy area of risk management, categorizing operational risks will
also help with subsequent risk measurement and resource allocation decisions. Considering
changes in the business environment of ALCON there would be impact on all risk categories.
However, the Board has directed the CRO to strengthen operational risk framework of the
company first considering its expansion strategy.
The focus on cyber security was not adequate in the past and it has been decided to improve
cyber risk controls especially considering the rising volume of digital business. While the existing
team is familiar with the basics of firewalls, malware and phishing, they are struggling to connect
the technical aspects of cyber security with the people and process risks that operational risk is
designed to monitor and control. Currently however there is no coordination between cyber
security team and operational risk management team. Currently, the cyber security is managed
as third line of defence and it is restricted to the cyber security team only. In a recent past there
were multiple instances of malware attack and the CRO is reviewing the governance and
practices to ensure that such attacks are minimized.
ALCON has currently outsourced number of operations as a part of cost control and capacity
management exercise. At the current size it was found effective but going forward the
management believes that the current level of controls may not be adequate as increased
operational complexities are bound to increase operational and overall risks.
On the basis of above, you are required to answer the following questions:
(5.5) The operational Risk can be divided between people, process, system and external events.
Which of the following is not part of operational risk for ALCON?
(A) Technology risk, Legal and Regulatory Risk
(B) Model Risks
(C) Transaction Risk
(D) Interest Rate Risk (5 x 2 Marks = 10 Marks)
Descriptive Questions
(5.6) (A) What is the difference between Al and ML? (1 Mark)
(B) What are the challenges a typical company like ALCON would face while
implementing AI? (2 Marks)
(C) Considering the nature of business of ALCON, what are the four areas you can
think, where in your opinion AI and ML can be applied? (2 Marks)
(5.7) (A) The CRO has informed to the board that first KRls need to be identified before
implementing RCSA. Do you agree with the suggestion of the CRO? Explain your
answer with reasons. (2 Marks)
(B) Who conducts the RSCA and how it is different from the control assessment? Which
are the two methods you think can be used to implement RCSA? (2 Marks)
(5.8) What processes ALCON should follow before launching new products to address
operational risks? (2 Marks)
(5.9) (A) Cyber security should be treated as another operational risk to be embedded in the
organization's enterprise risk management framework. In your opinion, at what level
of defence (LOD) the cyber security should be considered? (1 Mark)
(B) What would be your three recommendations in order to strengthen operational risk of
ALCON? (3 Marks)
Answer
Multiple Choice Questions
5.1 (A)
5.2 (B)
5.3 (D)
5.4 (D)
5.5 (D)
5.6 (A) Machine Learning a standard software code is characterized by explicit rules that a
computer is supposed to perform. In case, there is a change in the data / situation, a
those metrics that are relevant to the risks that have been identified in the RCSA.
(B) RCSA is conducted by the department or business unit. The scoring of risks and
controls reflects not the view of a third party, but the view of the department or
business.
Two methods form implementing RCSA
(i) Questionnaire method: The questionnaire based approach uses a template to
present standard risk and control questions to participants. The content of the
questionnaire is designed by the operational risk team, usually after intensive
discussions across the firm. Each risk category or business process is analysed
and a list of related risks is prepared.
(ii) Workshop method: For each risk, expected controls are identified workshop
method RCSA is discussed in a group setting, with facilitation from the
operational risk department. Each risk is discussed, and related controls are
scored for effectiveness. Once the controls have been scored, the residual risk
is scored, often on a high-medium-low scale, along with related probabilities.
5.8 The process ALCON should follow before launching new product to address operational
risk are as follows:
• identifying business functions, assets, vulnerabilities and threats;
• assessing the risks of launching new product;
• developing a risk management plan;
• implementing risk management actions, and
• re-evaluating the risks.
5.9 (A) Cyber Security should be considered in Second Line of Defence (LOD).
(B) Following are some of the recommendations in order to strengthen the Operational
Risk of ALCON:
(i) Establishing coordination between Cyber Security team and Operational Risk
Management team.
(ii) Have a better control over outsourcing operations
(iii) Carrying out Business Impact Analysis (BIA).
1.3 Refer to page no 4.8 of ICAI SM (Definition of Risk Culture as per Basel’s principles for the Sound
Management of Operational Risks.
1.4 Answer related to the case study- if carefully read; a bit conceptual; (Mr.Sumit is studying the
intrinsic complexity of the retail store businesses so he would least likely be concerned with
compliance with rules and regulations.)
1.5 Answer related to the case study- if carefully read; a bit conceptual understanding of controls.
Descriptive Questions
1.6- Indirect answer from page 9.15 of the ICAI SM. A bit conceptual though, since you need to relate
the data mentioned in the case study with the concepts that you have understood regarding
Understanding of Controls.
1.7- Manageable practical question from the IPCC chapter concepts. (Sensitivity Analysis).
1.8- Related to the case study. Conceptual understanding of risk action and risk response is required to
frame the answer but still manageable. (Refer page no 2.21 of ICAI SM)
Case Study 2
Multiple Choice Questions:
2.1- Default Payment = Nominal Value of Bond X {100- price of bond after credit Event}
= 4.2 Million
2.3- Related to the conceptual understanding of Pure Risks and Speculative Risk.(Refer page no 1.16-
1.17 of ICAI SM)
Strategic risk is the risk that failed business decisions may pose to a company. Strategic risk is often a
major factor in determining a company's worth, particularly observable if the company experiences a
sharp decline in a short period of time. Due to this and its influence on compliance risk, it is a leading
factor in modern risk management.
A useful subdivision of strategic risks is: Business Risks – Risks that derive from the decisions that
the board takes about the products or services that the organisation supplies. They include risks
associated with developing and marketing those products or services, economic risks affecting product
sales and costs, and risks arising from changes in the technological environment which impact on sales
and production.
Non-business Risks – Risks that do not derive from the products or services supplied. For example,
risks associated with the long-term sources of finance used. Strategic risk levels link in with how the
whole organisation is positioned in relation to its environment and are not affected solely by what the
directors decide. Competitor actions will affect risk levels in product markets, and technological
developments may mean that production processes, or products, quickly become out-of-date.
Descriptive Questions:
2.6- Linked to the case study and understanding the strategic risks and identification of key drivers for
assessing the risk.
2.7- Definition of Reputational risk from page no 1.20 of ICAI SM. For steps to assess reputational risk,
draft the answer based on steps in the risk management cycle given on page no. 3.5 of ICAI SM
2.8- Direct answer from page 3.10 of ICAI SM for the first part. For steps in developing RMF refer to
page no. 7.6 of ICAI SM.
Case Study 3
Multiple Choice Questions:
VAR is used to measure Market risk, liquidity risk, operational risk, etc.
3.2- Refer page no. 8.3 of ICAI SM. (ERM provides reasonable assurance regarding the achievement
of an entity's objectives.)
3.3- Conceptual understanding of ‘ Historical Simulation’. (Refer to page no 121 of Full Batch notes
for further explanation)
By CA Shivam Palan_Target80+RM
Page 317 of 492
Jo Monk Banega Wohi CA Banega
3.4- Concept based. (To learn & understand the concept around read from page no 92 to 96 of Full
Batch notes)
3.5- Conceptual understanding of ‘ Monte Carlo Simulation’ (Refer page no 122 of Full Batch notes or
further explanation)
Descriptive Questions:
3.7- (A) Based on the understanding from the case study; may seek help from page no 8.4 - Keys to
ERM Implementation- Lack of these keys will be an obstacle in implementing ERM
3.8- Concept-based, related to the VAR and methods of measuring it. Page no 5.5 of ICAI SM.
However, one may think of why not other method is not referred in the answer?
Since, Monte Carlo simulation consists of repeatedly simulating the random processes that govern
market prices and rates. Each simulation (scenario) generates a possible value for the portfolio at the
target horizon (e.g., ten days). If we generate enough of these scenarios, the portfolio’s simulated
distribution will converge toward the true, although unknown, distribution. The VaR can be easily
inferred from the distribution. (Refer page no. 122 of Full Batch Notes for further details).
3.9 Direct answer from page no 5.10 for the standard way of Stress Testing. The other two parts are
based on a conceptual understanding of the Stress test process.
Case Study 4
Multiple Choice Questions:
4.1- Refer page no. 5.17 -5.18 of ICAI SM. (Others are indices that can be used for Country Risk
Analysis.)
4.2- Going Concern is the primary and the most important parameter that one should think of first.
Descriptive Questions:
4.6- Format for RCSA given on Page no 9.17. For drafting it, conceptual understanding is required.
ICAI answer has added three new columns, i.e. Financial assertion impact, Name of the system used &
Sample Description of test done. However, it is done based on the details available in the case study; if
you feel in the exam that extra points are available, you can also add the other column provided it is
adding value to the report.
4.7- Practical question on Altman- Z score; Page no. 6.26 ICAI SM.
By CA Shivam Palan_Target80+RM
Page 318 of 492
Jo Monk Banega Wohi CA Banega
Need to read the case study for few details like Sales during 2018-19.
(If you want to practice the advanced level question solve case study 2 of Test 1 given in Complete
Guidance Book)
Case Study 5
Multiple Choice Questions:
5.1- Based on the general understanding of concepts of Chapter 5 & 9 of ICAI SM.
Descriptive Questions:
5.6-(A) Direct answer from page 9.33 (about Machine Learning) and 9.35 (about Artificial Intelligence)
of ICAI SM. (It is a long answer and has too much content in the book. Try to cover as many points
from the book you can while writing the answer depending on the time available to score well in such
answers.) Also, try to relate the answer with a case study. {Also, Refer to page no 176 for full batch for
a Better understanding of the topic}
(B) Conceptual and General understanding of the implementation of AI. Refer to page no 177 of Full
Batch notes
(C) General understanding of areas where AI can be applied by the industry. {Refer page no 177 of Full
Batch Notes}
5.7- (A) General Understanding on RCSA and KRI (Refer page no 9.21 of ICAI SM.Hint:- RCSA can
be built using the KRI)
Note that since KRI tells us how risky the activity is, which is well be known after assessment of risk,
i.e. done through RCSA
(B) Conceptual understanding of ‘RCSA and methods of implementation’. (Not given in the book)
5.8- ICAI has drafted the answer based on steps in the risk management cycle given on page no. 3.5 of
ICAI SM.
By CA Shivam Palan_Target80+RM
Page 319 of 492
DISCLAIMER
This Suggested Answer hosted on the website do not constitute the basis for
prepared by the Faculty of the Board of Studies with a view to assist the
answers, if any error or omission is noticed, the same may be brought to the
attention of the Director of Board of Studies. The Council of the Institute is not
published herein.
Further, in the Elective Papers which are Case Study based, the solutions
have been worked out on the basis of certain assumptions/views derived from
the facts given in the question or language used in the question. It may be
possible to work out the solution to the case studies in a different manner
The Question Paper comprises five case study questions. The candidates are required to
answer any four case study questions out of five.
Answers to Multi Choice Questions are to be marked on the OMR answer sheet only.
Answer to MCQs, if written in the descriptive type answer book will not be evaluated.
CASE STUDY: 1
About the Company:
BCSPL, situated in TIDEL Park, Chennai, is providing computer system related services
to offshore major Information Technology (IT) companies. It was established in the year
2015 and has good reputation in its provision of services. BCSPL has 300 staff
consisting of software professional and accounting and administrative staff. At present
Virtual Office Management System (VOMS) is enabled in the laptop computers of about
30% of its staff. BCSPL is thinking of adopting VOMS for the working of its entire staff
members.
VOMS:
VOMS is a service in which a range of functions relating to a company is provided that
facilitates their staff to work remotely by accessing such functionalities through Internet.
The main aim of VOMS is to enable the staff members to seamlessly connect to the
computing services of BCSPL irrespective of the time and geographical distance. BCSPL
proposes to approach a cloud services provider to hold the data on cloud and run cloud-
based software services.
New Proposal:
To accomplish, expanding VOMS to 100% of its staff, SPL proposes to buy good quality
laptops and provide them to the remaining members of the staff.
Security concerns of BCSPL:
With the increase in cyber-attacks and the important and confidential nature of the data
being handled, BCSPL is very much concerned about the possible compromise of the
data. Cyber-attack may happen in the form malicious software attacks, hacking, phishing,
ransomware attacks etc. The staff may not be thoroughly aware in the security aspects of
the system. Mr. Peter, BCSPL's IT manager suggested to implement robust security
(B) Significant expansion of operations can strain controls and increase the risk of a
breakdown in controls.
(C) New personnel may have the same focus on understanding of internal controls.
(D) Incorporating new technologies into information systems may change the risk
associated with internal controls.
(1.2) Which of the following is an internal risk threat metric about the cyber-risk that BCSPL
may face in its proposal to implement VOMS in all the computer systems?
(A) The number IT system requests emanating from unidentified IP addresses.
(B) The number of IT controls that have been self-certified as working correctly.
(C) The number of IT security incidents reported by similar organisations in the past one
year.
(D) The number of social engineering attempts reported within BCSPL.
(1.3) Mr. Peter's suggestion is an example of:
(A) risk control
(B) risk avoidance
(C) risk transfer
(D) risk retention
(1.4) The proposal of BCSPL would have an impact on the stakeholders and while taking such
decision, the management least likely would consider:
(A) Information about the internal and external environment.
(B) Recognition of risk and opportunity.
(C) Deploying scarce resources and recalibrates activities to changing circumstances.
(D) Risk of legal liability for damages accruing to customers.
(1.5) Before approving the term loan, if the banker 'performs an inadequate check on KYC of
BCSPL and assuming that a violation is committed by BCSPL, it would be known as:
(A) Regulatory Risk
(B) Credit Risk
(C) Sanction Risk
(D) Control Risk (5 x 2 Marks = 10 Marks)
Descriptive Questions
(1.6) Suggest some best practices to address the data privacy and cyber-security risks in the
VOMS proposed to be implemented by BCSPL. (6 Marks)
(1.7) Explain the risk management techniques that Mr. Kishore would suggest to BCSPL.
(5 Marks)
(1.8) Discuss the integrating of risks in the strategic planning process of BCSPL. (4 Marks)
Answer
Multiple Choice Questions
1.1 (C)
1.2 (A) or (B)
1.3 (A) or (D)
1.4 (A) or (D)
1.5 (A)
Descriptive Questions
1.6 Following are some best practices to address the data privacy and cyber-security risk
Identification of risk areas. Whether it is own or outsourced network, internet,
individual computers, mobile devices etc. Prioritization of resources and effort can
be managed accordingly.
Adequately restricting access to systems is the common way to prevent cyber risk;
this is done by password protection at various levels, from common user to
administrator level.
Encryption solutions on individual computers is also done in a manner that if lost,
the unauthorised entity cannot download the data into an external storage device.
There are several technology solutions that create an adequate firewall of the
organisation’s systems to protect them from hacking from outside.
A regular vulnerability testing of the firewall and periodic review to upgrade it is one
of the main tasks of the information security manager. Detection of a test -attack is
very important part of the preventive mechanism; an attacker may attempt to cause
a minor violation to test the organisation’s network security before causing a major
incident.
A response strategy to a cyber-attack incident is also important as part of risk
management. The measures to prevent or mitigate customer disputes, legal
indemnities, assess and minimize the financial impact of a cyber -attack, and
governance over decision making and investments to restore the system
functionalities to its secure state, are all important considerations. The root cause of
these incidents and the impact have to be adequately documented.
Alternative Answer
Best practices to address the data privacy and cyber-security risks:
Disabling removable devices in the laptops: The connecting ports and removable
media such as use of pen drives are to be disabled in the laptops. The users are not
allowed to install any software and access restrictions are to be in place for visiting the
Internet sites.
Use of security measures: The data must be encrypted during transmission.
Strong firewall and anti-virus software to be installed with periodic updating of
patches and updates.
Securing home networks: The staff must be instructed to ensure that their home
networks, in which they would be using the company provided laptops, are secured.
Periodical updating of security policies: Data security policy, network policy,
Internet usage policy, user security policy etc., must be periodically reviewed,
updated and such updated policies must be timely communicated to the staff.
Personal Device Protocol: The staff are going to use company's devices that are
connected to company's network through secured Virtual Private Network (VPN).
With the increase in number of devices connected, there must be a strong
authentication mechanism. Personal devices of the staff must never be allowed to
access the VPN. Use of personal emails in the corporate network should be
discouraged.
Usage of video conferencing faculties: Before selecting and implementing the
services for video conferencing to be utilised, adequate study must be performed.
There is a risk of data piracy with the use of weaker software.
1.7 Techniques that would be suggested by Mr. Kishore:
The Risk Enabled and Managed organisations uses the following techniques.
Technique Description
Risk Questionnaires Designed to identify the relevant risks and create risk
history
Flow Charts with Designed to identify operational risks embedded in the
Risk Flags Processes
Identify Controls to Recognize controls and test their adequacy and operative
manage risks Effectiveness
Risk Event Maps Identify potential events that can have a significant impact
on business to avoid negative surprises
CASE STUDY: 2
About DHSS:
BHSS is running classes for higher secondary education in Madurai, Tamil Nadu since
1995. It is following rules and regulations, syllabus and examination of Tami Nadu Board
of Higher Secondary Education (TNBHSE) under Department of Education, Government
of Tamil Nadu. The school is famous for its teaching and coaching and has produced
many state level rankers. The toppers got admission into prestigious engineering a nd
medical colleges on merit. For the academic year, the school had a total strength of 1200
students.
BHSS School Core Committee (BSCC):
BSCC, consisting of twelve committee members, is running the school. It met in April 2020
and discussed the various aspects of the pandemic situation affecting the functioning of the
school and its teaching and coaching activities. Mr. Pandian is the Chairman of BSCC. The
following issues were discussed at the meeting:
New Mode of Teaching: Because of the present pandemic situation, the students may not
be able to attend the school. Therefore, it has been decided to teach the students online
through Internet.
A committee, viz., Online Teaching Committee (OTC) is to be formed consisting of 5
teachers and 2 committee members, to help in preparing and testing the teaching
materials and conducting online classes to students. The online learning module would
be named Bright Digital Learning Module (BDLM).
Necessary technology infrastructure is to be created for running the online classes such
as buying suitable computers, software, audio-video (AV) equipment, printers and high-
speed Internet data connection and devices. Besides the above, latest anti -virus software
and suitable firewall mechanism are to be installed to prevent virus attack and hacking
attempts.
It was also decided to conduct online examination for the students at frequent intervals.
The examination content would be created by the respective class teachers and
supervised by the OTC members.
Training to teachers and students: Sufficient training on the preparation of teaching and
examination contents to be given as well as training to be given on the delivery of content
as well as handling the A V equipment.
The teachers who are not familiar with computers are to be additionally trained.
A technical support team will be made ready who will support not only the teachers
handling the online classes but also the technical queries received from the students.
Suitable dashboards would be displayed in the interface of BDLM.
Online Class Fee Collection: It is initially decided to collect ` 1,000 per month from each
student as online class fee.
It is to be ensured that the online classes are to be commenced on-time. Periodic
updates would have to be given to each parent's registered mobile number and / or email
account.
BSCC members are aware that when hosting BDLM online, BHSS would face a variety of
Internet Security Risks (ISR). Each aspect in the online BDLM can be a possible target of
cyber-attack.
Adoption of Enterprise Risk Management (ERM) approach:
In pursuant to the discussions, the BSCC members decided to study and adopt risk
management strategies and practices throughout the operations of BHSS. They would
like to engage in the process of assessing risk and acting in such a manner, or
prescribing policies and procedures, to avoid or minimize loss associated with such risk.
BSCC members are considering the option to prepare a list of possible risks and the
proposed treatment of such risks.
Projection of Risks:
BSCC members developed hypotheses based on financial projections and estimated a
possibility of 30% in failing to achieve the projected collections if there is a fall in 25% in
admission of students to the online classes. Different scenarios were analysed and
calculations were made on the sensitivity of the projections by changing the assumed
parameters, such as, the number of students who might enrol for various courses, fee
collection from each student, the duration of the course etc.
Bank Loan Proposal:
The committee estimated a capital expenditure of ` 60 Lakhs and decided to approach
Cholan Bank Limited (CBL) for a term loan of ` 50 lakhs repayable in 5 years and a
working capital loan of ` 10 Lakhs. The members of BSCC offered to give their personal
lands and buildings as collateral to the proposed loans and would act as guarantors of
the loans. The market value of the collateral offered is ` 2 crores. BHSS did not have any
previous loans either with the bank or from others.
You are required to answer the following questions:
Multiple Choice Questions
Choose the most appropriate answer from the given options:
(2.1) Which one of following most likely would be of some help to BHSS, if ERM approach is
adopted?
(A) To define the risk appetite of the organization.
(B) Align annual performance goals with risk identification and management.
(C) To assess the company's risk profile, risk appetite and key areas of risk.
(D) Define & develop risk policies, procedures, processes & other documentation as
required.
(2.2) The primary objective of Risk Treatment methodology proposed to be adopted by BHSS
would be to:
(A) Give a response to risks.
(B) Ease the pressure from parents and students.
(C) Comply with the guidelines relating to the pandemic situation issued by the
Government.
(D) Conduct periodic risk assessments.
(2.3) In the hypotheses developed by BSCC members, there might be a risk of acceptance of
hypotheses and the associated projections that should have been rejected. Such a
situation is best known as:
(A) Design Level Error
(B) Transaction Level Error
(C) Type I Error
(D) Type II Error
(2.4) Which of the following would not be considered as an inherent risk for the ISR that would
be faced?
(A) Identity Theft
(B) Inadequate Content
(C) Impersonation
(D) Inadequate Authentication
(2.5) By introducing BDLM, BHSS is attempting to convert negative risk events into positives
by creating a focussed group of experts who brainstorm on breakthrough proposals that
could help BHSS move in a positive direction. This contemporary phenomenon is
commonly referred to as
(A) Incident Analysis
(B) Scenario Analysis
(C) Idea Funnel
(D) Risk Heat Maps (5 x 2 Marks = 10 Marks)
Descriptive Questions
(2.6) Discuss the risks that would be faced by BHSS in the current pandemic situation and the
proposed introduction of BDLM. (6 Marks)
(2.7) Explain the credit risk components that CBL would consider with specific reference to the
loan proposal of BHSS. (5 Marks)
(2.8) Briefly explain the difference between Scenario Analysis and Sensitivity Analysis.
(5 Marks)
Answer
Multiple Choice Questions
2.1 (B)
2.2 (A)
2.3 (D)
2.4 (B)
2.5 (C)
Descriptive Questions
2.6 Risks that would be faced by BHSS:
1. Financial Risk:
There may be insufficient inflow of funds, if required number of students do not
join which would cause great strain on the financial operations of BHSS.
2. Liquidity Risk:
If sufficient fees collections are not received from the students, there would be
a liquidity problem and the same may prevent BHSS from paying the loan dues
within time.
3. Market Risk:
There are adverse changes in the present conditions due to pandemic
situation. This would pose a risk to BHSS.
4. Operational Risk:
The external conditions prevailing in the current pandemic situation would
have an impact on the day-to-day operations of BHSS.
5. Strategic Risk:
The decision to adopt online teaching by BHSS is a strategic one. Failure of
strategies will adversely impact the business objectives and attainment of the
goals.
6. Regulatory Risk:
The Government may change the pandemic guidelines and policies to be
followed by the schools from time-to-time, such as, changes in maximum
amount of fees to be collected, maximum hours per day for conducting the
online classes etc. Any changes ln the rules and regulations which may have
a negative Impact on the activities of BHSS can be classified under this risk.
7. Reputation Risk:
If the quality of the online teaching is not up-to the mark, BHSS's reputation
may go down and this will pose a risk
8. Staffing Risk:
The staff may not be experienced to handle the newly proposed online
teaching system.
9. Technology Risk:
The technology used in the online teaching may have to be changed with the
changing technologies and this would impose additional cost to BHSS.
10. Business Continuity Risk:
If in case, the online teaching system is hacked, BHSS may not be able to
continue the operations and necessary backup and recovery controls should
be in place.
11. Information (data security) Risk:
Risk of unauthorised data access to the online teaching system as BHSS
heavily would depend on information technology. Unauthorised data access
might lead to theft of resources painstakingly created by BHSS.
12. Security Risk:
BHSS's system may be hacked and this might pose a risk to BHSS.
13. Governance Risk:
lf the management of the school is improperly conducted, there would arise
governance risk.
Alternative Answer
The various types of risks that will be faced by BHSS during the pandemic tine and
introduction of DDLM are as follows:
(i) Maintenance Cost of huge infrastructure: Since now there is a remote possibility of
starting of physical classes for long period, the cost of maintenance of such
infrastructure may continue for longer period.
(ii) Loss of Revenue: Since due to the situation of uncertainty, there may be a fall in the
registration of new entrants.
(iii) Teacher’s Salary: Despite the fact that there may be no physical classes, BHSS has
to pay salary to the current teaching staff in order to retain them.
(iv) Poor Results: Due to uncertainty in conducting of Entrance Examinations it might be
possible that some selected students who have been prepared by Institute may not
produce the good result as expected.
(v) New IT infrastructure: Funds shall be needed to create new infrastructure.
(vi) Cyber Risk: Since the system will be connected to students on pan India basis there
is risk of cyber risk.
(vii) Integrity of Examination system: Since practice examination shall be conducted
online, the integrity of same shall be a big issue and it will be bit difficult to judge the
performance of students.
2.7 The credit risk components that CBL would consider with specific reference to the loan
proposal of BHSS are as follows:
(i) Default Risk – This risk means the missing a payment obligation (of principal or
interest or both). Default Risk can be measured by probability of default. It depends
on credit worthiness of a borrower which in turn depends upon various factors such
as management of organization, size of business, strength and reputation of
promoters etc.
CBL would check credit worthiness of the committee members who are offering
collaterals for the loans and reputation of them and of BHSS.
(ii) Exposure Risk – This implies the uncertainty associated with future level or amount
of risk. In other words, this risk is mainly associated with unexpected action of other
party say prepayment of loan before due date or request for refund of deposit
before due date.
The bank may even ask BHSS to repay the loan in full before the due date if the
performance of BHSS is not satisfactory in the future.
(iii) Recovery Risk – This risk is related to recoveries in the event of default, which in
turn depends upon various factors such as quality of guarantee provided by
borrower, and other surrounding circumstances. This risk can be minimized through
Collateral and Third-Party Guarantee. However, existence of these two risk
management tools also carries risk.
In the proposed loan, the members of BSCC offered to give their personal lands
and buildings and the market value of the same is Rs. 2 Crores.
(iv) Collateral Risk: Although collateral reduces the credit risk but it happens only if
collateral can be sold at a significant value. The quickness in realization of collateral
depends upon its nature and prevailing market conditions. In normal course, fixed
asset collateral normally carries low realizable value than cash collateral. However,
if in buoyant market say in case of a property even a fixed asset in the form of a
house property carries a higher value.
With the use of collateral, the credit risk becomes twofold:
(a) Uncertainty related to access it and disposing encumbrances which may be
legal in some cases.
CBL will ensure that the collaterals offered by the committee members of
BSCC do not have any encumbrance.
(b) Uncertainty related to the value realizable from the collateral which may be
subject to various factors.
It would be ensured by CBL that the assets offered as collateral have the
capability of easily salability in the event of default of BHSS in the loan
repayments.
(v) Third Party Guarantee Risk: This collateral is a kind of simple transfer of risk on
Guarantor and in case guarantor defaults then risk again comes back to lender.
CBL would ensure that the Committee members who are the guarantors for the
loan have sufficient assets to cover the loan. For this purpose, CBL would obtain
and scrutinize the financial statements of the Committee members.
2.8 Sensitivity analysis and Scenario analysis both help to understand the impact of the
change in input variable on the outcome of the project. However, there are certain basic
differences between the two.
Sensitivity analysis calculates the impact of the change of a single input variable on the
outcome of the project viz., NPV or IRR. The sensitivity analysis thus enables to identify
that single critical variable that can impact the outcome in a huge way and the range of
outcomes of the project given the change in the input variable.
Scenario analysis, on the other hand, is based on a scenario. The scenario may be
recession or a boom wherein depending on the scenario, all input variables change.
Scenario Analysis calculates the outcome of the project considering this scenario where
the variables have changed simultaneously. Similarly, the outcome of the project would
also be considered for the normal and recessionary situation. The variability in the
outcome under the three different scenarios would help the management to assess the
risk a project carries. Higher deviation in the outcome can be assessed as higher risk
and lower to medium deviation can be assessed accordingly.
Scenario analysis is far more complex than sensitivity analysis because in scenario
analysis all inputs are changed simultaneously considering the situation in hand while in
sensitivity analysis only one input is changed and others are kept constant.
CASE STUDY: 3
About the Company
Blue Hospital (BH) is a reputed chain of hospitals located in the National Capital Region
(NCR). The BH package of services includes: inpatient hospital delivery services, outpatient
ambulatory services, home health, drug rehabilitation and alcohol treatment and retail services
including diagnostic, laboratory, sports medicine, rehabilitation and imaging. BH's trauma
center is one of the NCR's busiest. In addition BH operates one of the only air ambulance
services in the region and has its own health insurance company providing health benefits for
its employees and others.
Review of Risk Management Function
BH's risk management function had been outsourced to a single firm named RLM for
approximately eight years. Immediately after joining BH as a Chief Ris k Officer (CRO), Ms.
Sana commissioned an independent assessment of the risk management function as she was
uncertain whether outsourcing model was an effective risk management structure for BH. The
Board has asked Ms. Sana to do her own assessment also of the existing risk management
practices after reviewing the findings of that independent study from the outside firm. The
Board has also asked the CRO to consider Delphi and Bow-Tie techniques of risk analysis.
Observations made by CRO
1. The studies suggested that the circumstances that led to the initial outsourcing decision
no longer existed. Also, BH had grown considerably in size and complexity to warrant
both a high level of direct accountability by a senior leader and their own team and a
strategic approach to the management and mitigation of risks. Another issue these
processes uncovered was that the outsourcing model was less effective in proactive data
mining and trend analysis that could be used to create actionable risk and quality
initiatives to prevent or mitigate risk events in the future.
2. BH did not have a forum to look across the organization to assess interrelated risks and
potential impact on the organization or how multiple risks could correlate.
3. The CRO is also concerned that Business Continuity Plan (BCP) is not properly
implemented in the organization. Also, employees think that there is no difference
between Enterprise Risk Management (ERM) and BCP. One of the Audit Committee of
Board (ACB) members has remarked that ERM approach and the business impact
analysis approach are very similar and there is no difference.
4. The CRO has flagged the fact that risk culture within BH must improve and there is no
narrative approach of risk management in place for those risks which can not be
adequately or accurately reflected by a numeric or quantitative method. Therefore, while
developing new risk management approach narrative approach to risk management must
be considered especially considering the nature of business of BH.
Action plan
After a presentation to the Board by the CRO, BH began a three-step approach to reestablish
a risk management function in the organization and create a strategic approach to
management of risks.
Step one was laying the groundwork or a design-build phase to create the foundation for a
high functioning internal risk management department including adding the necessary
business intelligence data structure.
Step two was the introduction into the organization of an ERM framework and the
establishment of an Enterprise Risk Committee (ERC) at the highest level of the organization.
It was determined that an advisory group of executives should serve together as a
coordinating body to look at diverse risks to the organization from whatever source. The
advisory group shall be called ERC and is chartered to look more expansively and from a
strategic point of view at risks in order to understand the inter-relatedness and cumulative
impact on the organization. Further, the selection of key individuals who will form part of the
ERC will be based on a broad parameter to be developed by the CRO after taking inputs from
a consultant and after obtaining approval of the Board. They will meet regularly not only to
continually reassess the critical risks faced by the hospital but also to report on progress in
each of the initiatives that is associated with critical risk.
Step three is focused on the maturation of the ERM approach to risk identification and
management at a strategic level as well as the expansion of and integration of ERM principles
throughout the organization.
Multiple Choice Questions
Choose the most appropriate answer from the answer options:
(3.1) Which one of the following is incorrect with respect to ERM?
(A) It is a process effected by an entity's board of directors, management and other
personnel.
(B) It is applied in strategic setting and across the enterprise.
(C) It manages risk to be within risk appetite.
(D) It provides complete assurance regarding the achievement of entity's objective.
(3.2) What are some examples of internal drivers of an organization's risk culture?
(A) Resource allocation and risk attitude
(B) Risk appetite and risk tolerance
(C) Employee records
(D) All of the options
(3.3) The Delphi Technique is a method that attempts to move a group of experts toward a
consensus opinion. When using the Delphi technique in practice which one of the
following is incorrect?
(A) Each individual expert in the group is asked a question. The answer that each
expert develops individually after consulting the others in the group is reported to
the entire group.
(B) Each individual expert in the group is asked a question. The answer that each
expert develops individually without consulting the others in the group is reported to
the entire group.
(C) The question reported at group level is posed again separately to the expert, who is
instructed to consider revising their response based on the results that were
reported to the group.
(D) The question and response cycle continues for a predetermined number of rounds
or until a consensus is achieved.
(3.4) Which one of the following is incorrect about the bow-tie technique?
(A) The purpose of the Bow-tie technique is to demonstrate that sources of risk can
lead to events that have consequences.
(B) The event shown in the centre of the bow-tie would be listed in terms of the
component of the organization that is impacted by the event. These components are
people, premises, processes and products
(C) The Bow-tie technique cannot be only used to illustrate the four types of controls
namely preventive, detective and corrective but not directive.
(D) The Bow-tie technique can be used m many ways, including the representation of
opportunity risks.
(3.5) Which one of the following is not correct in reference to the sound risk culture in a
company?
(A) At all level of the organisation understand and appreciate the positive and negative
results that a risk event can bring.
(B) An appropriate risk reward balance consistent with the risk appetite is achieved
when taking on risks.
(C) An effective system of controls commensurate with the scale and complexity is
properly put in place.
(D) Previous mistakes are not considered while shaping the right risk actions.
(5 x 2 Marks = 10 Marks)
Descriptive Questions
(3.6) While recommending selection of individuals in the ERC, if you were hired as a
consultant, what should be the three broad parameters? (3 Marks)
(3.7) Would you agree with the view that there is no difference between ERM and BCP?
Provide reasoned answer. (3 Marks)
(3.8) How could a Narrative Approach be used to better identify and assess risks that are not
easily quantified? (4 Marks)
(3.9) Outsourcing of services has its place in risk management. What are the five key issues
you would consider to make sure that what has been outsourced meets the continuing
needs of the organization and is consistent with its strategy, vision and brand promis e?
(5 Marks)
Answer
Multiple Choice Questions
3.1 (D)
3.2 (D)
3.3 (A) or (D)
3.4 (C) or (D)
3.5 (D)
Descriptive Questions
3.6 Broad parameters that an individual in the ERC should possess are as follows:
(i) has a chair who is an independent director and avoids “dual-hatting” with the chair
of the board, or any other committee;
(ii) includes members who are independent;
(iii) includes members who have experience with regard to risk management issues and
practices;
Alternative Solution
The ERC council should be made up of key individuals who
i. understand the strategic direction of the enterprise,
ii. represent most major segments in the enterprise, and
iii. have significant decision-making and budgetary authority to make changes happen.
3.7 Although Business Continuity Plan (BCP) is now an integral part of Operational Risk
Management that can be triggered as part of an overall disruption that is caused by any
or a combination thereof. However, link between BCP and Enterprise Risk Management
(ERM) cannot be denied as ERM is concerned with the risks facing the whole
organization and BCP takes an approach that business continuity arrangements should
be in place.
The BCP approach is to ensure the continuity of operations across the whole
organization and is obviously part of an ERM approach. Hence, BCP can be considered
a part of ERM, but it is not the whole of ERM activity.
The basis of ERM is that the stakeholder expectations and the core processes of the
organization that deliver those expectations are the focus of the risk assessment
process. The continuation of core business processes is also the basis of BCP and the
intention of ERM is to ensure that the core processes are maintained as it is basis of
stakeholder expectations.
However, if we talk about the difference in emphasis while ERM seeks to identify the
risks that could impact the core processes, BCP seeks to identify the critical business
functions that need to be maintained in order to achieve continuation of the business.
Thus, it can be concluded that there is a good deal of similarity between BCP and style of
ERM but both approaches are complementary to each other.
Alternative Solution
Because both approaches are based on the identification of the key dependencies and
functions that must be in place for the continuity and success of the business.
I do not agree with the view that there is no difference between ERM and BCP. ERM and
BCP differ because the former is concerned with the management of the risks that could
impact core processes, whereas BCP is concerned with actions that should be taken to
maintain the continuity of individual activities. The BCP, therefore, has the very specific
function of identifying actions that should be taken after the risk has materialized in order
to minimize its impact. BCP relates to the damage-limitation and cost-containment
components of loss control.
3.8 Narrative Analysis is a process to analyze future events by considering alternative
outcomes or alternative worlds i.e. making scenarios.
Scenario making involves preparing a brief narrative or description of a hypothetical
situation of how a future event or events might turn out or look like.
For each scenario, the management reflects and analyses the potential consequences
and potential causes when analysing risk.
Scenario analysis can be used effectively to identify opportunities for fraud, forecasting,
managing financial risks, etc.
Alternative Solution
Not all risks of an organization easily quantified. Reputation is a good example of a risk
for a hospital like BH that is often viewed as an intangible and therefore difficult to
quantify and best expressed through narrative reporting when numerica l expression can
be unreliable. For hospitals the narrative in risk management could be constructed
similarly to that of medicine.
The first is active listening.
The second is putting into writing what happened, beyond the basics of the incident.
What was the environment at the time, were there emotional Issues that surrounded
the event or incident; and what happened in the days, weeks, or moments that led
to the event?
The third is sharing the narrative with those affected by it whether it is an individual
or an entire organization.
It is a myth that the narrative approach is not just for ex post facto analysis of events.
Narrative can be used to describe critical risks that the organization faces. This is
important to multiple reasons. First, the narrative can more fully explain the problem and
how it might produce loss. Second, many people are more attuned and responsive to
stories because they help individuals to visualize the concept. Third, narratives more
fully describe the circumstances of the organization and may lead management to
understand risk more holistically in association with attitudes, aptitudes, and environment
that may produce or exacerbate losses.
3.9 The various key issues that need to be looked into to ensure that outsourc ing meets the
continuing needs of the organisation and is consistent with its strategy, vision and brand
Clearly defined objective of outsourcing; this has to be brought into the scope of
work;
Contractual documentation to be adequate to ensure the service provider does only
what is assigned and to the standard mutually agreed to by all parties involved;
Legal indemnities to the organisation to be assessed while hiring a service provider;
In agreements where the client and the service provider are in different states or in
different countries, the respective countries’ or states’ laws have to be complied
with;
The BCP of the service provider has to be reviewed.
The operational risk assessment covering regulatory risks, financial risk, financial
reporting risk and other risks as delivery to end customers of the client in case the
service provider fails to deliver for whatever reason.
If technology or its disaster recovery itself is outsourced, all the attention is required
to ensure the business operations work as designed and agreed.
Alternative Solution
Potential impact of outsourcing on end to end processes when making a decision to
outsource?
Need to apply operational risk management and governance practices to
outsourcing arrangements including risk associated with sub-contracting
Identification and assessment of conflict of interest with the service provider
Due diligence of service provider
Adequacy of responsibility and oversight over the outsourcing arrangement
Documentation, exit strategies and BCP
CASE STUDY: 4
OE, the Company is a leading manufacturer of garments headquartered at Delhi. Its
customers are located in Europe and the USA. Major portion (80%) of the revenue is from
export business. OE has borrowed in foreign currency and INR as well.
The Company is exposed to the impact of interest rate changes primarily through its borrowing
activities. The Company's objective is to mitigate the impact of interest rate changes on
earnings and cash flows and on the market value of its borrowings. In accordance with its
policy, the Company targets its fixed-rate debt as a percentage of its net debt between a
minimum and maximum percentage.
As the Company transacts business globally and is subject to risks associated with changing
foreign currency exchange rates. The Company's objective is to reduce fluctuations
associated with foreign currency exchange rate changes in its earnings and cash flow,
enabling management to focus on core business issues and challenges.
The Company enters into option and forward contracts that change in value as foreign
currency exchange rates change, to protect the value of its existing foreign currency assets,
liabilities, firm commitments and forecasted but not firmly committed foreign currency
transactions. In accordance with policy, the company hedges its forecasted foreign currency
transactions for periods generally not to exceed two years within an established minimum and
maximum range of annual exposure. Cross-currency swaps are used by the company to
effectively convert foreign currency-denominated borrowings into INR denominated
borrowings. It's also uses swaption and zero cost collar for hedging purposes.
Despite having a robust risk management practices the management of OE is concerned
about the operating forex exposure. OE has been maintaining risk-register knowing well that a
well-constructed and dynamic risk register is at the heart of a successful risk management
initiative. However, during a risk review process it was uncovered that senior management has
started believing that attending a risk assessment workshop and producing a risk register is a
risk management obligations and therefore no ongoing actions are required.
Further, considering disruption in value chain in the garment business and its strong p resence
in Europe and it has a plan to open a garment manufacturing unit in Birmingham UK which will
be wholly owned subsidiary of OE. The management believes this would reduce delivery time
and hence would help in getting more business. Also the locational advantages enjoyed by
competitors from Turkey can be addressed with this strategy. Recently number of buyers from
Europe has started giving orders to suppliers in Bangladesh due to labour cost advantages
and faster depreciating Bangladeshi Taka. Considering this OE has also plan to open a factory
in Bangladesh.
Multiple Choice Questions
Choose the most appropriate answer from the answer options:
(4.1) Suppose OE issued a callable bond two years ago and it has three more years to go
before the first call date. If interest rates have fallen over the past two years and you
believe rates will not stay this low and that it would be in the firm's best interes t to
lengthen the duration of the liabilities, which of the following is one· potential strategy to
accomplish the objective of lengthening the duration while also securing the lowering
interest rate.
(A) buy a payer swaption
(B) sell a payer swaption
(C) buy a receiver swaption
(D) sell a receiver swaption
(4.2) Which of the following best describes a zero cost collar within the context of interest rate
derivatives?
(A) A zero cost collar is a long (short) position in an interest rate cap and a short (long)
position in an interest rate floor where the cost of the cap (floor) exactly offsets the
revenue from the floor (cap).
(B) A zero cost collar is a long (short) position in an interest rate cap and a short (long)
position in an interest rate floor where the cost of the cap (floor) is less than the
revenue from the floor (cap).
(C) A zero cost collar is a long (short) position in an interest rate cap and a short (long)
position in an interest rate floor where the cost of the cap (floor) is greater than the
revenue from the floor (cap).
(D) A zero cost collar is an option that pays off only if interest rates remain within a
designated range.
(4.3) The modem long-term currency swap can be viewed as:
(A) a spot sale and a forward purchase.
(B) a combination of forward contracts, each of them having zero initial market value.
Answer
Multiple Choice Questions
4.1 (D)
4.2 (A)
4.3 (D)
4.4 (B)
4.5 (C)
Descriptive Questions
4.6 It is not always necessary that exchange rate changes need not always increase the risk
of foreign investment.
If covariance between exchange rate changes and the local market returns is negative
enough to offset the positive variance of exchange rate volatility, changes in exchange
rate can actually reduce the risk of foreign investment.
4.7 The main determinants of a OE’s operating exposure are as follows:
(1) the structure of the markets in which the firm sources its inputs, such as labor and
materials, and sells its products, and
(2) the OE’s ability to mitigate the effect of exchange rate changes by adjusting its
markets, product mix, and sourcing.
The plan to open a factory in Bangladesh is an example of addressing operating forex
exposure.
So far as implication of purchasing power parity for operating exposure is concerned if
the exchange rate changes are matched by the inflation rate differential between
countries, OEs’ competitive positions will not be altered by exchange rate changes and
OE will not subject to operating exposure.
4.8 While financial hedging can be implemented quickly and that too with relatively low costs,
the operational hedges are costly, time-consuming. However, in financial hedging it is
difficult to hedge against long-term, real exposure with financial contracts. Also,
operating hedging is not easily reversible.
The main advantage of currency option contract is that not only option contract provide
hedging against the risk but also allows to take the benefit of move ment in the exchange
rate because of element of choice not an obligation. Option thus provides a hedge
against ex post regret that forward hedger might have to suffer. Thus, hedger can
eliminate the downside risk while retaining the upside potential.
4.9 The purpose of the risk register is to form an agreed record of the significant risks that
have been identified. Also, the risk register will serve as a record of the control activities
that are currently undertaken. It will also be a record of the additional actions that are
proposed to improve the control of the particular risk. Other information about risks will
also be included in the risk register.
Typically, the risk register will cover the significant risks facing the organization or the
project. It will record the results of the risk assessment related to the process, operation,
location, business unit or project under consideration.
There are disadvantages associated with the use of risk registers, including the danger
that the information recorded in the risk register will not be used in a dynamic way. The
risk register could become a static record of risk status, rather than the risk action plan
for the organization.
Alternative Answer
The purpose of Risk Register is as follows:
Risk register is a record of risk, risk assessments; risk mitigation and action plans
prepared by the responsible parties that help to support overall ERM and controls
disclosures reporting process.
Risk register is continuously updated and has columns for risk, causes, consequences,
ownership, inherent risk score, controls, residual risk score, process, action for further
mitigation, action owner, due date, etc.
Typically, the risk register will cover the following:
Risk
Causes
Consequences
Ownership
Inherent risk score
Controls
Residual risk score
Process
Action for further mitigation
Action owner
Due Date
So far as the disadvantage of using Risk Register is concerned it has been seen that
sometimes it becomes a static i.e., a non-living document.
CASE STUDY: 5
About the Company
HC is a leading restaurant company headquartered at Mumbai. It has 500 outlets operating
across India and is listed on both BSE and NSE. As a result of COVID-19 the performance of
the company was not good during first half of FY 2020-21. But the company has now made
started using extensively online mode of order taking, payment and delivery. The operating
model has now been completely revamped. The company has now created data base of
customers which helps in marketing new products This has started showing results but has
also exposed the Company with new risks including cyber risks.
Recent Developments
Recently Company was attacked by malware which affected the operations of the Company
for two days. Cyber security was not an agenda just six month back. But with change in the
operating model this has become one of the key risk of HC. The Board believes that now the
Company will have to invest in cyber security to minimize the possibility of a having a cyber
loss. It is well known that even the companies with the best IT security and highest
expenditure on cyber protection still suffer successful cyber-attacks. However, Companies
need to have contingency plans for managing the financial impact on their balance sheet of a
potential large loss from a cyber-attack. The management is aware that cyber-attacks have
been responsible for many missed quarterly earnings reports, which have been punished by
shareholders, credit providers and business counterparties. It is more expensive in terms of
the interest rates charged to access funds through borrowing after the event has occurred,
particularly if credit ratings have been impaired as a result of cyber -attack.
A recent internal assessment indicates that it is still operating at 60% of the Pre-COVID level
and hence needs further fund for operations.
HC has also acquired a Company named PC which is in food delivery business. The revenue
of the PC has been rising during last two years. PC however is poorly managed and the Board
of HC believes that they can transform it well and this acquisition would create synergy in
terms increase in revenue and saving in the operating costs. The owner would raise the fund
for acquisition from own sources and a private equity investor.
Plans of the Company
Considering the revival of economy, the Company wants to expand by opening 10 more
outlets by the end of March 2021. And for this also it need borrowing which is available under
various scheme announced by the Government of India. The Company has started the
process of making financial analysis of the performance so that the Board is fully aware about
the information being sent to the lenders.
HC has a plan to open few outlets in UK to serve Indian customers. But before committing
huge Capex it wants to make a proper financial viability analysis. The Board members also
want this analysis to cover analysis with respect to parent in order to satis fy the shareholders
of HC.
Actions taken by the Company
The Company has hired a consultant to review entire risk management practices of HC and
suggest suitable and practical solution to make it cyber-resilient. The consultant has been
specifically asked to cover sensitivity analysis, scenario analysis and use of Monte Carlo
Analysis especially considering the high uncertainties in the external environment so that
adequate steps are taken to mitigate the risks.
The Key remark of one of the Board member was: "We believe that risk management
decisions should be based on objective assessments of risk and be as evidence-based as
possible. You should be able to estimate how various security measures and risk mitigation
processes will affect your risk profile and to justify their implementation by how much they will
reduce the risk of unacceptable loss."
The Board has given general guidance with respect to risk tolerance and wants this should
also be covered in the consultant's report. They are aware that some companies may tolerate
the occasional minor loss from cyber-attacks. In fact, it may be too costly relative to the value
to make an organization invulnerable and to prevent any cyber loss occurrence at all. But
most companies want to avoid having a severe loss above a certain threshold, particularly one
that will cause reputation damage, lead to missing earnings targets, materially damage the
balance sheet, trigger a rating downgrade, or threaten the viability of the organization itself.
Multiple Choice Questions
Choose the most appropriate answer from the answer options:
(5.1) HC has the following balance sheet (in INR millions):
Bills Payables 100 Net PPE 1200
Accounts Payable 200 Inventories 300
Accruals 100 Accounts Receivables 400
Total Current Liabilities 400 Cash 100
Long -Term Debt 600 Total Current Assets 800
Equity 1000
Total Liabilities and Equity 2000 Total Assets 2000
HC's Days Sales Outstanding (DSO) on a 365-day basis is 40, which is above the
industry average of 30? Assume that HC is able to reduce its DSO to the industry
average without reducing sales and the Company takes the freed-up cash and uses it to
reduce its outstanding long-term bonds. If this occurs, what will be the new current ratio?
(A) 1.75
(B) 1.33
(C) 2.33
(D) 1.25
(5.2) You have been asked to compare performance of HC with another Company Y. You have
collected the following information:
The two companies have the same total assets.
HC has a higher total assets turnover than Company Y.
HC has a higher profit margin than Company Y.
Company Y has a higher inventory turnover ratio than HC.
Company Y has a higher current ratio than HC.
Which of the following statements is the most correct?
(A) HC must have a higher net income.
(B) HC must have a higher ROE.
(C) Company Y must have a higher ROA.
(D) Company Y must have higher profit margin.
(5.3) Which of the following statements about risk analysis techniques is FALSE?
(A) In sensitivity analysis, the dependent variable is plotted on the y-axis and the
independent variable on the x-axis. The steeper the slope on the resulting line the
less sensitive the dependent variable is to changes in the independent variable.
(B) Sensitivity analysis is incomplete, because it fails to consider the probability
distributions of the independent variables.
(C) In Monte Carlo simulation, probable future events are simulated on a computer
generating estimated rates of return and risk indexes.
(D) Scenario analysis is a risk analysis technique that considers both the sensitivity of
the dependent variable to changes in the independent variables and the range of
likely values of these variables.
(5.4) In the case of PC, at present the investment in working capital is 22% of sales. The
Board of HC believes that it can be reduced that dramatically to 20 % in the first year of
ownership, 18% in the second year and then finally 15% in the third year. This level of
15% will then be the stable level of working capital investment for the business. What is
the acquisition value of this working capital reduction if sales remain constant at INR 100
million per annum and your cost of capital is 10%? (rounded off)
(A) INR 7 million
(B) INR 5.8 million
(C) INR 10.7 million
(D) INR 8 million
(5.5) Broad categories of malware include
(A) 'Virus' - computer code inside a host program.
(B) 'worm' - a stand-alone piece of compiled software as a program that can replicate
itself.
(C) 'Trojan horse' - a program that appears to do one thing but actually does something
different.
(D) All of the options (5 x 2 Marks = 10 Marks)
Descriptive Questions
(5.6) What are risk capacity and risk exposure? Explain the difference between risk exposure,
risk tolerance and risk appetite? (6 Marks)
(5.7) What are the two defining characteristics of cyber-resilient organization?
What is reverse stress testing in case of a cyber-resilient organization? (2 Marks)
(5.8) Discuss the difference between performing the capital budgeting analysis from the parent
firm's perspective as opposed to the project perspective. (3 Marks)
(5.9) Discuss the four types of direct pay out cost if HC suffers from the cyber-attack.
(4 Marks)
Answer
Multiple Choice Questions
5.1 (A)
5.2 (A)
5.3 (A)
5.4 (B)
5.5 (D)
Descriptive Questions
5.6 Risk capacity is the level of risk an organization considers itself capable of absorbing,
based on its earnings power, without damage to its dividend paying ability, its strategic
plans and, ultimately, its reputation and ongoing business viability. It is based on a
combination of budgeted, forecast and historical revenues and costs, adjusted for
variable compensation, dividends and related taxes.
Risk exposure is an estimate of potential loss based on current and prospective risk
positions across major risk categories - primary risks, operational risk and business risk.
It builds as far as possible on the statistical loss measures used in the day-to-day
operating controls. Correlations are taken into account when aggregating potential
losses from risk positions in various risk categories to obtain an overall estimate of the
risk exposure. The risk exposure is assessed against a severe but plausible constellation
of events over say a one-year time horizon to a 95 per cent confidence level or a 'once in
20 years' event.
Risk exposure is the actual risk that the organization is taking and this may not be same
as the risk appetite that the board believes is appropriate for the organization.
Risk appetite is established by the board, which sets an upper boundary on aggregate
risk exposure.
The concept of tolerate is normally concerned with the organization being willing to retain
or tolerate a risk, even if it is higher than the organization would choose to accept. The
other concept is that of risk tolerance. Many organization use risk tolerance in the
engineering sense to represent the range of risk that is broadly acceptable. As with the
engineering use of the word tolerance, risk tolerance zones define the boundaries within
which an organization desires the level of risk to be confined. An organization may have
to tolerate risks that have a current level beyond its comfort zone and its risk appetite.
On occasions, an organization may even have to tolerate risks that are beyond its actual
risk capacity. However, this situation would not be sustainable, and the organization
would be vulnerable during this period.
Risk tolerance relates to a specific or individual risk, rather than the more general
approach represented by risk appetite. Risk appetite refers to the amount and type of
risk that an organization is willing to pursue or retain.
5.7 Defining characteristics of cyber-resilient organization are as follows:
Identification of risk areas: whether it is own or outsourced network, internet,
individual computers, mobile devices etc. Prioritization of resources and effort can
be managed accordingly.
Adequately restricting access to systems is the common way to prevent cyber risk;
this is done by password protection at various levels, from common user to
administrator level.
Case Study 1:
Multiple Choice Questions:
1.1 MCQ deals with the basic understanding of business functions that would give rise to risks. The risk
managers need to know what risk arises or changes due to various circumstances. Refer page no. 7.7.
1.2. Concept based on internal risk threat metric & IT system controls.
1.3 Mr. Peter suggested implementing robust security measures, including installing a firewall,
installing Virtual Private Network (VPN), etc., to counter the increasing security risks.
So, Installing of a firewall acts as Detective control & Corrective control ----> Hence the risk strategy
can be Risk Retention or Risk Reduction.
1.5 KYC is a mandate issued by RBI for all bank customers, and hence a violation of KYC is a
regulatory risk. Refer page no 1.20 for the understanding of Regulatory risk. Also please practice this
type of question from our Complete guidance and Atom book; many questions of this type is covered
there.
Note: Various questions have multiple answers; however, you are supposed to mark only one correct
answer in the exam.
Descriptive Questions
1.6 Mitigation strategies for data privacy and cybersecurity risks are directly given on ICAI module
page no. 9.27.
The alternative answer given is based on understanding the concept; please note the same in some places
since this can be used in other questions.
1.7 Development of ERM is at risk-managed maturity level. The management wants to track the
effectiveness of internal control and implementation of ERM. The same could be done by the techniques
given on page 3.12 of the ICAI module for risk enabled and managed organisations.
Note: For this type of question, refer to the index shared in ATOM Book; it will help you solve all
these questions.
1.8 Integration of risks in the strategic planning process is given on page 4.4 of the ICAI module, and
the same has to be written with examples that correlate to the case study. For this type of question, you
must understand the concepts.
Additional Learning: Please do read about VPN detail given on Full batch notes page no. 173.
2.1 The correct answer is from the advantages of ERM given on page 8.2 from the ICAI module.
2.2 This is a direct question from page 2.21 of the ICAI module.
Design errors are unavoidable in any construction project and can negatively affect cost, schedule and
safety performance.
In statistical hypothesis testing, a type I error is the rejection of a true null hypothesis (also known as a
"false positive" finding or conclusion; example: "an innocent person is convicted"), while a type II error
is the non-rejection of a false null hypothesis (also known as a "false negative" finding or conclusion;
example: "a guilty person is not convicted").
Type I error (false positive): the test result says you have coronavirus, but you actually don’t.
Type II error (false negative): the test result says you don’t have coronavirus, but you actually do.
2.4 Case study Based, also refer to page no 26 of full batch notes to better understand the inherent risk
concept.
2.5 This is a direct question from page 1.18 of the ICAI module. Same question from Our Complete
Guidance Book. Question no 45 page no. 8.
Descriptive Questions
2.6 Types of risks faced in pandemic situations. A similar question is there in the Complete Guidance
Module page 44 (Direct Question from our Book). As the question is for six marks and not mentioned
in the question of how many risks need to be written, you need to write all the types of risk you find.
Note: Always try to relate the type of risk with the question. (ICAI Material first, then Relevant content
from Question). To Practice more of this type of question, refer to page no. 329 to 407 of Complete
Guidance Book.
2.7 Direct question on components of Credit Risks from page 6.2 of ICAI module. Use the ATOM
Book Index to find such types of questions.
2.8 This is a direct question on the differences between Sensitivity Analysis and Scenario Analysis
given in IPCC Module page 8.2.
By CA Shivam Palan_Target80+RM
Page 353 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy Program)
Case Study 3:
3.1 This question is on a basic understanding of ERM objectives. Also, it’s important to note that it’s
very difficult to give complete assurance to anyone.
3.2 Question based on an understanding of risk culture. Read page no 103 of full batch notes.
3.3 Detailed understanding of the Delphi Approach is required to solve this MCQ. This is given in Full
Batch notes page 70. In the ICAI module, it is on page 2.7.
3.4 Detailed understanding of Bow-tie is required to solve this MCQ. Complete details of Bow Tie
Analysis is given in Full Batch notes on page 76.
3.5 Question based on an understanding of risk culture. Read page no 103 of full batch notes.
Note: Most of the questions are directly or Indirectly from our Complete Guidance, ATOM &
Full Batch notes; hence it is highly recommended to watch the lectures of the full batch. If it’s not
possible, at least go through the notes of the same.
Descriptive Questions
3.6 Question is about criteria for selection of members to the Enterprise Risk Committee. (A Bit of
reference of Audit can be given)
3.7 This question is about the conceptual understanding of ERM and BCP. The same is also given in
Full Batch notes page 110.
3.8 Narrative Approach is a term that subsumes a group of approaches that rely on the written or spoken
words or visual representation of individuals. These approaches typically focus on the lives of
individuals as told through their own stories.
3.9 Issues relating to Outsourcing Risk is a direct question from ICAI module page 9.25.
By CA Shivam Palan_Target80+RM
Page 354 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy Program)
Case Study 4:
Multiple Choice Questions:
4.1 OE has a callable bond, and the interest rates are expected to rise, so the company needs to have a
swap agreement where they can pay a fixed rate and receive a floating rate of interest. This can be done
by buying a payer swaption or selling a receiver swaption, but selling the receiver swaption will earn
you a premium, whereas buying a payer swaption needs premium payment.
4.2 A zero-cost collar is a form of options collar strategy to protect a trader's losses by purchasing calls
and put options that cancel each other out. To implement a zero-cost collar, the investor buys an out of
the money put option and simultaneously sells, or writes, an out of the money call option with the same
expiration date.
4.3 You need to analyse all the options given and select which option fits the arrangement of a long
term currency swap.
4.4 A cross hedge is used to manage risk by investing in two positively correlated securities with similar
price movements. Although the two securities are not identical, they have enough correlation to create
a hedged position, providing prices move in the same direction.
Descriptive Questions
4.8 Differences between operating and financial hedging can be written from chapter 11 of SFM and
basic understanding of the above hedging strategies.
4.9 Full Batch notes page 81, understanding about Risk Register.
By CA Shivam Palan_Target80+RM
Page 355 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy Program)
Case Study 5:
Multiple Choice Questions:
5.1. You have to first calculate the accounts receivable using the new receivable turnover ratio. The
difference will be then used to pay off the long term debt; hence the current assets will reduce, and the
current ratio will fall to 1.75.
Daily sales outstanding (DSO): Days sales outstanding (DSO) measure the average number of days that
it takes a company to collect payment for a sale.
DSO on 365 days basis is 40 means, the collection cycle is40 days,& the industry cycle is 30 days. So
if the company moves to Industry average, its AR will be
= (300+300+100)/400
= 1.75
To practice this type of question, refer to Case Study 21 & Case Study 22 of ATOM Book.
5.2 For this type of question, your understanding of the ratios needs to be very strong.
This question is about the interpretation & understanding of the ratios; refer to page no. 186 of full batch
notes or formula sheets which is shared.
5.3 Basic understanding of different risk analysis methods are required to solve this MCQ. Refer to the
concept of sensitivity analysis.
By CA Shivam Palan_Target80+RM
Page 356 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy Program)
5.4
5.5 Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.” Examples of common malware include
viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Descriptive Questions
5.6 The detailed meaning and difference between Risk Capacity, Risk Exposure, Risk Tolerance and
Risk Appetite is given on Page 82 of Full Batch notes. Direct question from our Full batch Notes.
Also, refer to the ICAI standard answer which has been given.
5.7 Defining characteristics of a cyber-resilient organisation is the same as the adequate measures of
mitigating cyber risk on page 9.27 of the ICAI Module.
5.8 Based on an understanding of the subject & topic. (New Type of Question)
5.9 Based on an understanding of the subject & topic. (New type of Question)
By CA Shivam Palan_Target80+RM
Page 357 of 492
Test Series: April 2021
MOCK TEST PAPER
FINAL (NEW) COURSE: GROUP – II
PAPER – 6A: RISK MANAGEMENT
CASE STUDY: 1
ABCD Ltd. is a diversified business group. The consolidated Balance Sheet, Statement of Profit & Loss and
Cash Flow Statement of ABCD Ltd. prepared in analytical format are given below:
Customer Name: ABCD LTD. INR (Rs.) Thousand
31-Mar-18 31-Mar-19
12 months 12 months
BALANCE SHEET
CORE ASSETS
TOTAL FIXED ASSETS (A) 222,301 214,666
TOTAL CURRENT ASSETS (B) 763,428 679,539
TOTAL CURRENT LIABILITIES (C) 395,337 382,908
OPERATING CAPITAL EMPLOYED (A) + (B) – (C) 590,392 511,297
TOTAL NON-CORE/NON CURRENT ASSETS (D) 71,621 70,838
OVERALL CAPITAL EMPLOYED (A) + (B) - (C) + (D) 662,013 582,135
CAPITAL STRUCTURE
Equity Share Capital (Rs. 10 each share) 222,248 222,248
Profit and Loss Account 98,278 61,549
Other Reserves 35,080 36,303
Less: Intangibles -12,112 -9,620
TANGIBLE NET WORTH (E) 343,494 310,480
Minorities 53,422 62,929
Provisions/Other Long Term Liabilities 61,790 56,445
OTHERS (F) 115,212 119,374
EXTERNAL FINANCE (G)
Bank O/D and Short Term Loans 203,307 152,281
OVERALL CAPITAL EMPLOYED (E) + (F) + (G) 662,013 582,135
Contingent Liabilities 101,000 131,977
Capital Commitments 52,500 50,000
10
1.1 A measure that covers the entire following requirement is Altman Z Score.
(i) Quantum of Liquid Assets in relation to the size of the company.
(ii) Profitability of the company reflecting the company’s age and earning power.
(iii) Operating Efficiency apart from tax and leveraging factors.
(iv) Market dimensions that can show up security price fluctuations as a possible red flag.
(v) Total Asset Turnover.
The original Z-score formula was as follows:
Z = 1.2X1 + 1.4X2 + 3.3X3 + 0.6X4 + 1.0X5
X1 = working capital / total assets. Measures liquid assets in relation to the size of the company.
X2 = retained earnings / total assets. Measures profitability that reflects the company's age and
earning power.
X3 = earnings before interest and taxes / total assets. Measures operating efficiency apart fro m tax
and leveraging factors. It recognizes operating earnings as being important to long -term viability.
X4 = market value of equity / book value of total liabilities. Adds market dimension that can show up
security price fluctuation as a possible red flag.
X5 = sales / total assets. Standard measure for total asset turnover (varies greatly from industry to
industry).
For the various figures required in above formula let us reproduce the Balance Sheet as follows:
INR (Rs.) Thousand
Liabilities Amount Assets Amount
Share Capital 222,248 Total Fixed Assets 214,666
Profit & Loss A/c 61,549 Total Current Assets 679,539
Other Reserve 36,303 Total Non-Current Assets 70,838
Less: Intangibles 9,620 310,480
Minorities 62,929
Provision/ Other Long Term 56,445
Loans
Bank O/D and Short Term Loans 1,52,281
Current Liabilities 382,908
9,65,043 9,65,043
Revised Report
To: Board of Directors
From: Chartered Accountant
Date: ------------------
Subject: Grading/ Bucketing of Various Risks
Introduction
This report covers grading/ bucketing of various identified risks.
Grading of various Risks
(1) Stagnant business growth resulting from competition from other airlines.
Although this risk has a high impact but has low probability as investment involved in the Airline
business is very huge. Accordingly, this risk often skips the management’s decision as these type
events cannot be foreseen. Hence, this risk is bucked in the category of ‘High Impact – Low
Probability’.
(2) Aggressive fleet expansion leading to over-capacities.
Since Airline has already ordered 170 aircrafts there is high probability that it will involve financial
commitments and impact will also be high. Hence, this risk is bucked in the category of ‘High
Impact – High Probability’ and it needs immediate and sufficient attention of management.
2
Signed/-
Chartered Accountant
2.2 (A)
2.3 (B)
2.4 (A)
2.5 (B)
2.6 (A)
ANSWERS TO CASE STUDY: 3
3.1 Report to Board of Directors
To: The Board of Directors, ABC Co. Ltd.
From: Chief Risk Officer
Date: 30 April 2021
Subject: Analytical Report on Risks Involved
This analytical report covers the reply on the various concerns raised by the Board of Directors.
(a) What is the type of the risk the Company is subject to?
The risk arising from this lapse is ‘Legal Risk’ or ‘Compliance Risk’ as it is resulting from the
failure to comply with statutory or legal requirements.
(b) Impact on Company’s Performance
The various types of impacts on the company’s performance are as follows:
(i) Bringing bad name and reputation for the Company.
(ii) Over or Under Statement of Profit Loss in Income Statement of Company leading wrong
decisions by the Company itself and external parties.
(iii) Wrong financial position of the Company in the Balance Sheet.
(iv) Due to wrong calculation of profit company may have paid wrong dividend in previous years.
(v) Wrong computation of Cash Flows of the previous years and consequently leading to wrong
budgeting figures.
(vi) Wrong decision based on wrong budgeted figures.
-----------------------------------------------------------------------------------------------
Corrigendum to the Case Study Digest for CA Final Paper 6A Risk Management
(1) In the Case Study 1 on page 1.4 please read the answer of MCQ 1.3 as (d) instead of
(c).
(2) In the Case Study 15 on page No. 15.3 before the Answer please consider the under-
mentioned Exhibits as part of Case Study.
EXHIBIT 1
There is strong evidence to show that the numbers do not give an entirely accurate picture
of the start-up eco system. According to Data Analytics firm, the number of start-up deals,
in fact decreased in 2017 and 2018 from the respective year-ago periods, which read as
follows-
CHART 1-Deal volumes have plummeted, despite the odd high value investment
2016 1764
2017 1621
2018 1366
CHART 2-Fund infusion has gone up, but VCs are mostly targeting well established firms.
(In $bn)
Year Value
2016 5.5
2017 11*
2018 11
*excludes Flipkart
Deal volume has again dropped sharply this year. What is more, even the number of new
start-ups has decreased sharply in the same period with less than 1000 new internet start-
ups being launched in 2017 as compared to more than 6000 in 2016, and this number
EXHIBIT 2
REALITY CHECK
The decline in the overall deal volume and in new start-up formation is linked and is caused
by many factors. One obvious reason is the threat posed by large Chinese and American
internet firms. Whenever an established foreign internet firm- Amazon,Uber and Byte-Dance
are the most prominent examples in this decade-enters a sector, the number of local start-
ups shrink. Usually, there are survivors such as Flipkart, Ola and Share Chat that continue to
thrive. The space for others shrinks dramatically. The American and Chinese internet
companies have huge capital, Tech expertise and the knowledge of how to scale-it is very
hard for a local start –up to compete. There are other reasons also, like network effects, as
internet platforms expand and it becomes difficult for a new, comer to beat incumbents as
long as the latter keep innovating and improving their service. It is also believed that the fall
in deal volume shows that the start-up eco system is starting to become more realistic about
the potential of the consumer market.
EXHIBIT 3
What have improved significantly in the past 4 years is both the quality of entrepreneurs
and the strength of start-up ideas. The average age of founders has increased. It is no
longer kids out of college who are starting up. There are many second time entrepreneurs,
people who have worked at start-ups before, and, in general, founders as a group are far
more serious. The ideas that are emerging are better thought out. These are very healthy
indicators.
This is corroborated by the fact that as many as 70% of founding teams that go on to
receive Series-A-funding have prior experience of working at an internet start-up. The
deeper knowledge and start-up experience of founding teams has also been complimented
by a similar shift in the venture eco system. In the 2015-16 periods, when deal activity was
at its peek, many inexperienced angel investors had poured cash into early stage internet
companies. Most of these bets turned sour and angel investors fled the scene. Early stage
funding is now dominated by a handful of institutional firms, which invest far more
conservatively, which is the single biggest reason contributing to fall in deal volume,
compounded by the fact that the number of prolific venture funds in India has not increased
substantially in the past 3 years.
EXHIBIT 4
While deal volume has dropped sharply over the past 3 years, exits for VCs have, however
touched new highs. In May 2018, Wallmart agreed to pay $16 billion for majority stake in
Flipkart, enriching the latter’s investors such as Tiger Global, Soft Bank, Naspers and Accel.
Secondary share sales between investors, however, have been the main source of start-up
exits ensuring that VCs earned about $2.8 billion in 2017 up from $1.8 billion in 2016,
according to data supplied by Venture Intelligence.
But investors said deal volume may continue declining until Indian start-ups can pull off
successful initial public offerings. That task seems to have become tougher than ever after
the poor market debut in the US of Uber, and the shelved listing of We-Work, Many Indians
unicorns have perceived a growth at all cost strategy, similar to that of Uber and We-Work,
and are nowhere near attaining profitability
(3) In the Case Study 20 on page 20.4 please read the answer of MCQ 20.4 as (b) instead
of (c).
1. Wage Rates
2. Labour Skills
3. Tax rates
4. Transport and infrastructure
5. Size of economy/potential for growth
6. Political stability / property rights
7. Commodities
8. Exchange rate
9. Access to free trade areas.
10. Other Factors
In order to ease the flow of foreign investment in Indian startups, the Government of India in
Consolidated FDI Policy 2017 allowed the foreign venture capital investors to contribute up to 100%
of the capital of startups, be it any sector under the automatic route (no approval needed). Equities or
equity-linked instruments or other debt instruments issued by the startups, investments can be made in
these and if the startups are Partnership for LLP, an investment can be made in capital or profit-sharing.
A very small number of fortunate companies grow according to the model described (and with little or
no "outside" help); the large majority of successful startups have engaged in many efforts to raise capital
through rounds of external funding. These funding rounds provide outside investors with the
opportunity to invest cash in a growing company in exchange for equity or partial ownership of that
company. When you hear discussions of Series A, Series B and Series C funding rounds, these terms
refer to this process of growing a business through outside investment.
There are other types of funding rounds available to startups, depending upon the industry and the level
of interest among potential investors. It's not uncommon for startups to engage in what is known as
"seed" funding or angel investor funding at the outset. Next, these funding rounds can be followed by
Series A, B and C funding rounds, as well as additional efforts to earn capital as well, if appropriate.
Series A, B and C are necessary ingredients for a business that decides to bootstrap or merely surviving
off of the generosity of friends, family and the depth of their own pockets, will not suffice.
Before exploring how a round of funding works, it's necessary to identify the different participants.
First, the individuals are hoping to gain funding for their company. As the business becomes
increasingly mature, it tends to advance through the funding rounds; it's common for a company to
begin with a seed round and continue with A, B and then C funding rounds.
On the other side are potential investors. While investors wish for businesses to succeed because they
support entrepreneurship and believe in those businesses’ aims and causes, they also hope to gain
something back from their investment. For this reason, nearly all investments made during one or
another stage of developmental funding is arranged such that the investor or investing company retains
By CA Shivam Palan_Target80+RM
Page 421 of 492
partial ownership of the company. If the company grows and earns a profit, the investor will be rewarded
commensurate with the investment made.
Before any round of funding begins, analysts undertake a valuation of the company in question.
Valuations are derived from many different factors, including management, proven track record, market
size and risk. One of the key distinctions between funding rounds is the valuation of the business and
its maturity level and growth prospects. In turn, these factors impact the types of investors likely to get
involved and the reasons why the company may be seeking new capital.
#Startup exit strategies: acquisition, M&A and IPO. Or is it better to ‘milk the cow’?
The main exit strategy for startups is to sell the company to a bigger one for a profit. The same goes
for investors.
15.1. Why ICAI has not written the type of risk in the Risk Scenario?
Whenever it is asked to write the risk scenario, you are supposed to write the type of risk and detail
about that risk.
15.2 to 15.6 All are direct MCQs which is related to the case study.
By CA Shivam Palan_Target80+RM
Page 422 of 492
Case Study 16 of ICAI Digest:
By CA Shivam Palan_Target80+RM
Page 423 of 492
Case Study 17 of ICAI Digest:
17.1 Includes identification of the type of risk which is faced by the company.
17.2 IT is difficult to identify which risk score method ICAI has used to identify the risk:
There are total of 4 type of methods through which we can decide the Measurement of likelihood
scale and consequence scale.
However, in the current question, it is difficult to identify which method ICAI has used to decide the
Measurement of Likelihood and Consequence scale.
However, you can use the Likelihood & Consequence method given on Page no. 21 & 22 of the Full
batch.
18.1 Includes identification of the type of risk which is faced by the company.
18.2
First Understand what is RMF?
A risk management framework (RMF) is the structured process used to identify potential threats to an
organisation and to define the strategy for eliminating or minimising the impact of these risks, as well
as the mechanisms to effectively monitor and evaluate this strategy.
Suggest a Risk management Framework: ICAI has written a summary of Chapter 2 in short.
By CA Shivam Palan_Target80+RM
Page 424 of 492
TAKING YOU CLOSER TO
YOUR DREAM JOB
or Call
Scan This
9022720882
Page 425 of 492
DISCLAIMER
This Suggested Answer hosted on the website do not constitute the basis for evaluation of the
student’s answers in the examination. The answers are prepared by the Faculty of the Board of
Studies with a view to assist the students in their education. Alternate Answers have been
incorporated, wherever necessary. While due care is taken in preparation of the answers, if any
error or omission is noticed, the same may be brought to the attention of the Director of Board
of Studies. The Council of the Institute is not in anyway responsible for the correctness or
Further, in the Elective Papers which are Case Study based, the solutions have been worked
out on the basis of certain assumptions/views derived from the facts given in the question or
language used in the question. It may be possible to work out the solution to the case studies
5. Improving risk management framework is the key agenda for the board and the CFO has
been authorized to take external help in this respect.
ACTIONS TAKEN ON THE DIRECTIONS GIVEN BY THE BOARD
1. Considering the various issues raised by the regulators and the board, the CFO hired a
risk management consulting firm. The risk management consultant has advised for the
development of a risk management framework and Risk Appetite Statement (RAS) in order
to articulate AML's risk position on all key risks including human health and the
environment in contaminated environments. He further advised that by developing a risk
management framework, AML would be able to state its accepted level of risk relating to
managing the environmental audits it conducts and would be conscious when making
decision to either accept or manage risk more effectively and efficiently.
2. The consultant has also advised to express risk appetite into number of key areas to align
with statutory responsibilities and strategic objectives of AML. In addition to this, the
consultant also wants AML to focus on 'soft elements' identified by them that would
influence the risk appetite. In a nutshell, he advised to define risk capacity in order to
ensure that AML is remaining within constraints implied by its regulatory obligations, state
its risk appetite and specific desires to achieve AML's objectives and distinguish limits and
thresholds for its key risk categories and dimensions.
3. The internal auditors have suggested that issues relating to breaches by end users are to
be addressed more appropriately in the information security policy especially covering end
user computing (this refers to computing facilities made available to users based on the
business requirements for accessing and/or processing the information independently),
internet and email usages.
Multiple Choice Questions
Choose the most appropriate answer from the answer options:
(1.1) Risk appetite, (2) risk capacity, (3) risk target, (4) risk tolerance and (5) risk limits are
closely associated in risk management. Which one of the following arrangement shows the
correct sequence in risk management in practice?
(A) 1-2-3-4-5
(B) 2-1-4-3-5
(C) 3-1-2-5-4
(D) 4-1-3-2-5
(1.2) Which one of the following is incorrect about the strategic risks?
(A) Unique to the organization.
(B) Damaging to the entire organization.
Answer
Multiple Choice Questions
1.1 (B)
1.2 (D)
1.3 (B)
1.4 (C)
1.5 (D)
Descriptive Questions
1.6 Following are the ‘soft’ elements that influence the risk appetite of an organization:
• Risk attitude – This can be described as an organization's or individual's attitude
towards risk-taking. One's attitude may be described as risk averse, risk-neutral, or
risk-seeking.
• Risk culture – Risk culture as the norms of behaviour for individuals and groups
within an organization that determine the collective ability to identify and understand,
openly discuss and act on the organizations current and future risk.
(Or)
Risk culture means that all levels of the organisation from the junior most to the Chief
Executive understand and appreciate the positive and negative results that a risk
event can bring.
(Or)
Risk culture is “the combined set of individual and corporate values, attitudes,
competencies and behaviour that determine a firm’s commitment to and style of
Operational Risk Management.”
• Risk perception – Belief (whether rational or irrational) held by an individual, group,
or society about the chance of occurrence of a risk or about the extent, magnitude,
and timing of its effect(s).
1.7 Viewing strategic risks as dynamic processes in an organization ensures:
❖ Treatment of root cause analysis rather than use of temporary methods to fix the
symptoms.
❖ Anticipating the emerging risks.
❖ Focusing on areas of high importance.
❖ Converting challenges into opportunities.
1.8 While framing the policy on Management of Litigation, the following factors should be
considered for negotiating settlement by AML so that operational risk arising from litigation
can be minimized:
• Merits of the claims,
• SWOT analysis of the case,
• Costs of litigation
• Opportunity cost of settlement.
• Ensuring proper due diligence before entering into a contract.
• Clearly identifying each and every term of the contract
1.9 General Requirements
(a) Sign a confidentiality agreement for non- disclosure of confidential data.
(b) No use of information assets for personal use and non-job related activities without
authroisation in writing.
(c) Non recording or processing of information that knowingly infringes any patent or
breaches any copyright.
(d) Responsibility for protecting the information assets against unauthorized access and
misuse.
Internet Use
To ensure that while browsing/downloading/uploading/accessing any information through
internet facility available to employees on computing devices the security policy of Alpha
is not violated.
E-mail
To ensure the company provided electronic mail facility is not misused and users owning
the email account will be completely responsible for emails originated from their accounts.
No official data/documents can be sent using public email unless authorization for the
same is taken.
Alternative Solution
Points to be considered for information security relating to end users in general and
particularly for internet and e-mail usages are as follows:
General usage:
(i) End users are expected to adhere to the organisation’s Code of Conduct that has a
significant section on confidentiality and protection of data, broadly covering
information security aspects.
(ii) End users must undergo the mandatory training depending on their roles and
exposure.
(iii) Installation of software without the proper permission in the computer systems or
laptops of company should be prohibited.
(iv) Frequently changing the passwords.
Internet usage:
(i) Internet should be used responsibly and productively. The use should be for job
related work and use for personal purpose should not be permitted.
(ii) The equipment, services and technology used for internet are property of the firm and
hence the traffic and data accessed should monitored at regular intervals.
(iii) Websites and downloads should be monitoring on regular basis. If required, sites
should be blocked if not meant for useful for company.
Email usage:
(i) E-mail contents should not contain anything which deemed to be offensive. The
language should not also be vulgar or harassing.
(ii) Not to open Spam E-mails.
CASE STUDY - 2
INTRODUCTION
Star Pharma is a leading player in the pharmaceutical industry. It is an integrated global
pharmaceutical company engaged in the development, manufacturing, marketing, sale and
distribution of generic, brand pharmaceutical and over the counter (OTC) products. The
Company competes with different companies depending upon product categories, and within
each product category, upon dosage strengths and drug delivery systems. Such competitors
include the major brand name and generic and OTC manufacturers of pharmaceutical products.
In addition to product development, other competitive factors include product quality and price,
reputation and service and access to proprietary and technical information.
Star Pharma has commercial operations in a number of established international markets with
the opportunity for rapid growth in many emerging markets around the world. The chief operating
officer (COO) believes that a global presence will allow the company to expand revenue base
and manage risk through diversification. The COO and his team is expecting to capitalize on
opportunities for growth within new markets that have opened up after the COVID -19.
The company has set a separate treasury in order to manage the forex risk and is headed by
Chief Financial Officer (CFO). Two employees have been hired to monitor forex positions,
exchange rates and use appropriate hedge products.
Board is fully aware that risk management has become more important because of
increasing stakeholder expectations and the ever-increasing ease of communication. The
Board wants to be confident that risks have been identified and that appropriate steps have
been taken to manage risk to an appropriate level. Also, there is greater emphasis on
accurate reporting of information by organizations, including risk information. In this
backdrop, implementation of enterprise risk management (ERM) is being evaluated. While
the management agrees with the need of ERM they are yet to take decision considering
the cost involved in this decision.
Multiple Choice Questions
Choose the most appropriate answer from the answer options:
(2.1) Control Risk Self-Assessment (CRSA) is a powerful tool that may be used to support ERM.
Which one of the following is incorrect with respect to ERM and CRSA ?
(A) ERM covers all risks whereas CRSA covers specific risks.
(B) CRSA is driven by risk policy whereas ERM is driven by desire for improved
operations.
(C) ERM is mainly risk concepts for entire operations CRSA is mainly workshops on risk
and controls.
(D) CRSA is based on local risk registers whereas ERM is based on corporate risk
reporting system.
(2.2) As a part of the treasury team of AML, the CFO has asked you to do hedging by borrowing
foreign currency, converting it to domestic currency, and investing the domestic currency.
Which one of the following derivatives is close to the above mentioned activities ?
(A) Forward purchase contract.
(B) Option contract.
(C) Interest rate swap.
(D) Currency swap.
(2.3) During the review of receivables, the CFO found that a bill amounting to GBP 10,00,000
was overdue for payment for more than 30 days. The CFO has asked you to verify whether
the overdue bill has been crystallized by the Authorised Dealer by applying correct
exchange rate. Which one of the following is the correct exchange rate for crystallization
of the overdue export bills ?
(A) Bill selling rate
(B) TT selling rate
(C) FC selling rate
Answer
Multiple Choice Questions
2.1 (B)
2.2 (A)
2.3 (B)
2.4 (B)
2.5 (A)
Descriptive Questions
2.6 Suggestions for Vendor Risk Management
(i) Vendor contract should include information security requirements, specific
responsibilities and consequences for unauthorized access to information of the
company.
(ii) Evaluate, assess, approve, review control and monitor the risks and materiality of
vendors and ensure that they are in sync with the information security policy of the
company.
(iii) In the SLA (Service Level Agreement) legal and regulatory requirements including
data protection, intellectual property rights and copyrights should be includ ed.
(iv) SLA shall include confidentiality including background check clause and credentials
of vendor personnel accessing and managing critical data shall be maintained and
monitored.
Alternative Solution
There are several specific aspects that need to be looked into Vendor Risk Management
are as follows:
❖ Clearly defined objective of outsourcing; this has to be brought into the scope of work;
❖ Contractual documentation to be adequate to ensure the service provider does only
what is assigned and to the standard mutually agreed to by all parties involved;
❖ Legal indemnities to the organisation to be assessed while hiring a service provider;
❖ In agreements where the client and the service provider are in different states or in
different countries, the respective countries’ or states’ laws have to be complied with;
❖ The BCP of the service provider has to be reviewed.
❖ The operational risk assessment covering regulatory risks, financial risk, financial
reporting risk and other risks as delivery to end customers of the client in case the
service provider fails to deliver for whatever reason.
❖ If technology or its disaster recovery itself is outsourced, all the attention is required
to ensure the business operations work as designed and agreed.
❖ Works should be allocated to only authorized and approved vendors only.
❖ Vendors should not be allowed to have unauthorized access to data.
2.7 Both the disruption duration and the operational restoration time are basic defining
characteristics of resilience.
A cyber-resilient organization should know just how bad a cyber-attack would need to be
to threaten its viability, or to have its credit rating downgraded. This is called reverse stress
testing. Through systematic reverse stress testing, measures can be developed to protect
a corporation against such unacceptable outcomes.
Alternative Solution
Defining characteristics of cyber-resilient organization are as follows:
• Identification of risk areas: whether it is own or outsourced network, internet,
individual computers, mobile devices etc. Prioritization of resources and effort can be
managed accordingly.
• Adequately restricting access to systems is the common way to prevent cyber risk;
this is done by password protection at various levels, from common user to
administrator level.
• Encryption solutions on individual computers is also done in a manner that if lost, the
unauthorised entity cannot download the data into an external storage device.
• There are several technology solutions that create an adequate firewall of the
organisation’s systems to protect them from hacking from outside.
• A regular vulnerability testing of the firewall and periodic review to upgrade it is one
of the main tasks of the information security manager. Detection of a test -attack is
very important part of the preventive mechanism; an attacker may attempt to cause
a minor violation to test the organisation’s network security before causing a major
incident.
• A response strategy to a cyber-attack incident is also important as part of risk
management. The measures to prevent or mitigate customer disputes, legal
indemnities, assess and minimize the financial impact of a cyber-attack, and
governance over decision making and investments to restore the system
functionalities to its secure state, are all important considerations. The root cause of
these incidents and the impact have to be adequately documented.
Like some institutions failed during global financial crises, this period represented stress
to default scenario. It involves extremely unlikely events which force the companies to think
about the firm’s most serious vulnerabilities and design stress to default scenarios
accordingly.
2.8 Enterprise risk management (ERM) is a strategic business discipline that supports the
achievement of an organisation’s objectives by addressing the full spectrum of its risks and
managing the combined impact of those risks as an inter-related risk portfolio.
❖ Encompasses all areas of organisational exposure to risk (financial, operational,
reporting, compliance, governance, strategic, reputational, etc).
❖ Prioritises and manages those exposures as an inter-related risk portfolio rather than
as individual ‘silos’ of risk.
❖ Evaluates the risk portfolio in the context of all significant internal and external
context, systems, circumstances and stakeholders.
❖ Recognises that individual risks across the organisation are interrelated and can
create a combined exposure that differs from the some of the individual risks.
❖ Provides a structured process for the management of all the risks, whether those risks
are primary quantitative or qualitative in nature.
❖ Seeks to embed risk management as a component in all critical decisions throughout
the organisation.
❖ Provides a means of the organisation to identify the risks that it is willing to take in
order to achieve strategic objectives.
❖ Constructs a means of communicating on risk issues, so that there is a common
understanding of the risks faced by the organisation, and their importance.
❖ Supports the activities of internal audit by providing a structure for the provision of
assurance to the board and audit committee.
❖ Views the effective management of risk as a competitive advantage that contributes
to the achievement of business and strategic objectives.
Alternative Solution for above portion
Enterprise risk management (ERM) is a plan-based business strategy that aims to identify,
assess and prepare for any dangers, hazards and other potentials for disaster – both
physical and figurative – that may interfere with an organization's operations and
objectives.
The various features of ERM are as follows:
• Determining the risk appetite.
• Establishing an appropriate internal environment, including a risk management policy
and framework.
• Identifying potential threats to the achievement of its objectives and assessing the
risk, i.e., the impact and likelihood of the threat occurring.
• Undertaking control and other response activities.
They also agreed to Mr. Shyam's proposal and agreed to be promoters of the company along
with him. They discussed various modalities and procedures involved in commencement of the
company.
DISCUSSIONS OF THE PROMOTERS
(i) They had two alternatives, i.e., to pursue Project X (manufacturing Product A) or Project Y
(manufacturing Product B). The following are the data for both the Projects with five
possible events:
Possible Event Project X Project Y
Cash Flow Probability Cash Flow Probability
(` 000) (` 000)
L 18,000 0.22 28,000 0.25
M 16,000 0.18 25,000 0.19
N 21,000 0.14 29,000 0.16
O 19,000 0.25. 27,000 0.24
P 22,000 0.21 16,000 0.16
(ii) The promoters are very much aware that the activities, whether financial or non-financial,
would get affected by the external environments. They want to have a comprehensive
understanding of the significant factors arid the aspects underlying the same.
(iii) The above referred Act allowed the import of new machinery which can be used in the
manufacturing of the product.
(iv) The promoters are convinced that the risk management is one of the important pillars of
Governance and arguably the only tool to deal with business uncertainty. Risk
management is recognised as an integral component of good management and
governance. It is an iterative process consisting of steps, which, when undertaken in
sequence, enable continual improvement in decision making.
(v) Right from day one, they wanted to go in for the implementation of Enterprise Risk
Management (ERM) which is a tool that assists an organisation in meeting its business
objectives.
(vi) They want to employ a team of internal auditors i) for the audit of internal controls to ensure
that they are meticulously designed and operate efficiently ii) look into the risk governance
framework established by management to confirm that they operate as intended and iii)
monitor constantly the risk management program for its effectiveness and improvements.
(vii) The promoters are also aware that as public limited company of a particular size, it has to
comply with more number rules and regulations than a private limited company especially
in reporting of internal financial controls over financial reporting.
(viii) Today's business is constantly changing and seems to become more complex every day.
Therefore, the decisions of the management involve the recognition of risk and opportunity.
(ix) They also agreed to consider exporting the products manufactured by the proposed
company, after exploring the market feasibility. Few spare parts for imported machinery
will have to be paid in foreign exchange only. Mr. Shyam is made in-charge to handle the
foreign exchange transactions for the same.
(x) The promoters realised the importance of Information Technology (IT) and its pivotal role
in the business. IT is no longer an enabler, but it has now become the driver of business.
(xi) The proposed company, Shyam Polyfibres Limited (SPL) would have to face challenges
such as, i) finding out enough finances to commence and run the company, ii) proper
planning, iii) employing qualified and dedicated workforce, iv) stiff competition etc. The
promoters are aware of these issues and have decided to boldly face and resolve them by
proper planning.
(xii) SPL would use a Risk Monitoring Tool (RMT) to track progress of risk management using
qualitative assessment of probability and impact of risk.
(xiii) In order to predict the sales of the proposed manufacturing of the new product, SPL would
use a computer software that generates thousands of possible outcomes from the
distribution of inputs which are specified by a user.
Multiple Choice Questions
Choose the most appropriate answer from the given options.
(3.1) During the execution of the project of SPL, a new risk was identified, which was not
identified earlier in the Risk Identification exercise. Which of the following would not
potentially enable a new risk to be identified?
(A) Running some trend analysis reports to analyse incidents.
(B) Recording incidents in a register.
(C) Conducting root cause analysis.
(D) Flow-charting the significant business processes.
(3.2) The auditor of SPL is trying to discharge his liability on the company's Inte rnal Financial
Controls over Financial Reporting in an IT environment. He is assessing the strength of
the control environment used in the automated control activities. For ensuring timeliness,
accurate and reliability of the information used in the financial control, the auditor most
likely would focus his attention on the underlying:
(A) Application systems
(B) Operating systems
(C) Financial reports
3.3 (B)
3.4 (C)
3.5 (C)
Descriptive Questions
3.6 To calculate CV first we shall compute Variance and Standard Deviation of each project
as follows:
(i) Calculation of Variance and Standard Deviation of Project X
Expected net cash flow
= (0.22 X18000) + (0.18 X 16000) + (0.14 X 21000) + (0.25 X 19000) + (0.21 X 22000)
= 3960 + 2880 + 2940 + 4750 + 4620
= 19150
Variance ( σ 2 ) = 0.22 [18000 – 19150] 2 + 0.18 [16000 – 19150] 2 + 0.14 [21000 –
19150]2 + 0.25 [19000 – 19150]2 + 0.21[22000 – 19150]2
σ 2 = 290950 + 1786050 + 479150 + 5625 + 1705725
σ 2 = 4267500
Types of Exposures
In the case under consideration, SPL might face following type of exposures in its proposed
transactions.
• Transaction Exposure: This exposure is the impact of setting outstanding obligations
entered into before change in exchange rates but to be settled after the change in
exchange rates.
Since, SPL is planning to export, manufactured products and importing machinery
there may be impact on cash flow as the exchange rate may be changed between the
period when the transaction was initiated and when transaction is settled.
• Economic or Operating Exposure: This exposure relates to change in economic value
of firm due to change in exchange rates. This may be due to change in the demand
of product due to change in exchange rates.
In the case under consideration, since SPL will also export goods, then change in
exchange rates can lead to change in demand of product and hence is exposed to
operating risk.
CASE STUDY - 4
INTRODUCTION
Organic Tea Limited (OTL) is a fast growing chain of tea stores that are typically located close
to places like educational institutions, railway stations and bus stations across India. It has
company-operated as well as licensed stores. Licensed stores generally have a lower gross
margin but a higher operating margin than company-operated stores. Under the licensed model,
OTL receives a reduced share of the total store revenues, but this is more than offset by the
reduction in Company's share of operating costs as these are primarily incurred by th e licensee.
In licensed store operations, OTL leverage the expertise of our local partners and share its
operating and store development experience. Licensees provide improved access to retail
space at strategic locations. Most licensees are prominent retailers with in-depth market
knowledge and access. As part of these arrangements, OTL receives royalties and license fees
from the licensees and it also sells certain kitchen equipment to licensees for use in their
operations. Employees working in licensed retail locations follow the detailed store operating
procedures and attend training classes similar to those given to employees in company -
operated stores.
After the success of tea business, OTL has incorporated a wholly owned subsidiary named
Organic Toys Limited. The management has an ambitious target for this business segment.
OBSERVATIONS ON BUSINESS REVIEW BY THE MANGEMENT
1. OTL depends upon relationships with tea producers, outside trading companies and
exporters for supply of quality tea. The management believes that the supply-chain
management. is one of the key reasons why the Company has been able to reduce
operating costs and improve operating margin and the risk of non -delivery on such
purchase commitments is remote.
2. The management believes that customers choose among tea vendors primarily on the
basis of product quality, service and convenience, as well as price. However there is a
direct competition from large competitors in quick-service restaurant (QSR) sector with
restaurants and other retailers for prime retail locations and qualified personnel to operate
both new and existing stores.
3. Many of information technology systems, such as those we use for our point-of-sale (POS),
web and mobile platforms, including online and mobile payment systems, delivery services
and rewards programs, and for administrative functions, including human resources,
payroll, accounting and internal and external communications, as well as the information
technology systems of licensees and other third-party business partners and service
providers, whether cloud-based or hosted in proprietary servers, contain personal, financial
or other information that are critical for business growth. The board is concerned about a
material breach of information technology systems that result in the unauthorized access,
theft, use, destruction or other compromises of customers' or employees' data or
confidential information of the Company stored in such systems, including through cyber-
attacks or other external or internal methods, it could result in a material loss of revenues
from the potential adverse impact to reputation and brand.
4. The management is aware that cyber attacks can result in enormous business losses -
financial, investor confidence, and corporate image. They can also lead to serious legal
issues, especially when more and more private data are being captured, stored, and
transmitted across the public Internet. These losses and legal challenges can have a small,
short-term impact but more often than not, they have a significant, long-term impact.
According some basics of disaster recovery plan (DRP) is in place but there is no focus on
business continuity plan (BCP).
5. Internal auditors have identified serious lapses in information security system and
procedures. Significant capital investments and other expenditures could also be required
to remedy cyber security problems and prevent future breaches, including costs associated
with additional security technologies, personnel, experts and credit monitoring services for
those whose data has been breached.
6. Earlier, risk management was being supervised by the audit committee of the board (ACB).
However, considering the significant risk Company is facing with a growing business a
separate risk management committee (RMC) has been created. There are few common
members in the RMC and ACB. The RMC has been asked by the board to use 'scenario
analysis techniques' in the key risk area to assess the potential risk. In fact one of the
board members remarked that "scenario analysis was more about potential response and
mitigation than exact probability".
FURTHER DEVELOPMENTS
1. OTL has been banking with PQX Bank for last five years and has become an important
client of the bank. The Company has been borrowing heavily in order to finance its growth.
The track record of servicing debt is very good. In addition to the interest income, the
Company provide a significant amount of fee income. The following financial summary has
been presented to the bank:-
INR
Total sales 140,00,000
Total assets 35,00,000
EBIT 4,00,000
Debt as a percentage of total assets 70%
Capital turnover 10 times
Inventory days 30
Receivable days 1
Payable days 13
Annual sales growth (average, last three years) 120%
Dividend pay-out ratio 20%
2. The management of the Company believes that next year sales will grow by 100%.
Currently the company is using its cash credit limit of INR 5,00,000 and expecting an
increase in the cash credit limits. Term lending is no longer an option, as the Company has
reached the bank's limit of total gearing.
3. The Company has a small treasury and it has made investment in 1 S listed equity shares
and few mutual funds. The performance of the portfolio is monitored on a regular basis and
the Company has implemented VaR (Value at Risk) techniques in the portfolio
management.
4. PQX Bank has refused to support working capital facility for Organic Toys Limited as the
performance of the company is not good. The management, however, is still going ahead
with expansion by investing own fund mainly using 'over-trading'.
Multiple Choice Questions
Choose the most appropriate answer from the answer options:
(4.1) If the working of the company is showing indicators such as (i) reliance on long term debts;
(ii) offering longer credit period, (iii) higher level of inventory, (iv) rapid decreasing sales
and (v) deteriorating current ratio, which of these indicators are reflections of 'overtrading'
in the context of working capital management?
Alternatively, if 360 days a year are assumed then solution will be as follows:
COGS = ` 2,80,00,000 – ` 8,00,000 = ` 2,72,00,000
Computation of Working Capital
Inventory = (COGS x 30/360) = (2,72,00,000 x 30/360) ` 22,66,667
Receivable = (Sales x 1/360) = (2,80,00,000 x 1/360) ` 77,778
` 23,44,445
Less: Creditors (COGS x 13/360) = (2,72,00,000 x 13/360) ` 9,82,222
Working Capital Requirement ` 13,62,223
Alternative Solution
Step 1 Cash Conversion Period = Inventory days + Receivable days – Payable days
i.e. 30 + 1 - 13 = 18 days.
Step 2 Net working capital to sales ratio = 18/365 = 0.049 (rounded off)
Step 3 The next year additional sales are expected to be ` 1,40,00,000. So the total
expected sales would be ` 2,80,00,000.
Step 4 Taking net working capital to sales ratio computed in step 2 and applying the
same to total expected sales calculated at Step 3, the company will need
` 13,72,000 towards working capital.
Step 5 At present the company is enjoying cash credit limit of INR 5,00,000, the
additional working capital requirement shall be ` 8,72,000 (` 13,72,000 –
` 5,00,000).
4.7 The role of RMC is to lay down risk management policies, procedures and limits while the
role of an ACB is to review their implementation and effectiveness. In this context it is
important to note that the ACB should remain at it supervisory role and that can be
achieved by risk based supervision and they should not act like line function. Simply stated
the responsibility is to identify weak areas and follow it up with the RMC. The ACB also
need to find out if the company has documented identified risk and the related policies and
how it is implemented at ground level.
Alternative Solution
So that there should be no overlap between the roles of members of Risk Management
Committee (RMC) and Audit Committee of the Board (ACB) it is very important that their
roles are clearly defined which are as follows:
Role of RMC
(a) is required to be a stand-alone committee, distinct from the audit committee;
(b) has a chair who is an independent director and avoids “dual-hatting” with the chair of
the board, or any other committee;
(c) includes members who are independent;
(d) includes members who have experience with regard to risk management issues and
practices;
(e) discusses all risk strategies on both an aggregated basis and by type of risk;
(f) is required to review and approve the firm’s risk policies at least annually;
(g) oversees that management has in place processes to ensure the firm’s adherence to
the approved risk policies.
Alternative Solution for above portion – Role of RMC
1. To assess the company’s risk profile, risk appetite and key areas of risk in particular.
2. To recommend to the board and adoption of risk assessment and rating procedures.
3. To articulate the company’s policy for the oversight and management of busines s
risks.
4. To examine and determine the sufficiency of company’s internal processes for
reporting and managing key risk areas.
5. To assess and recommend board acceptable levels of risk.
6. To facilitate development and implementation of a risk management framework and
internal control system.
7. To review the nature and level of insurance coverage.
8. To have special investigation into the area of corporate risk and break downs in
internal control.
9. To review management response to the company auditor’s recommendations.
10. To report the trends on the company’s risk profile, reports on specific risk and the
status of risk management process.
Role of ACB
(a) is required to be a stand-alone committee, distinct from the risk committee;
(b) has a chair who is an independent director and avoids “dual-hatting” with the chair of
the board, or any other committee;
(c) includes members who are independent;
(d) includes members who have experience with regard to audit practices and financial
literacy at a financial institution;
(e) reviews the audits of internal controls over the risk governance framework established
by management to confirm that they operate as intended;
(f) reviews the third party opinion of the design and effectiveness of the overall risk
governance framework on an annual basis.
4.8 The given statement is correct to some extent because grouping scenarios per types of
consequences for organisation help to focus on impact assessment and mitigation action
because ultimate objective of scenario analysis is risk mitigation.
Further, if scenario analysis reveals the breaches in control or risk level beyond the risk
appetite then scenario analysis to plan for further mitigation.
In case results of scenarios analysis are within range of appetite, then no further acti on is
required. In case of scenario seems unlikely firm must plan reaction and mitigation
accordingly.
4.9 Three lines of defence model can be used by any industry with some customisation on
basis of the organisational structure, the complexity of the business processes and
evolving capability of the control awareness.
(1) The First line of defence is the function/department/role that owns the process. They
are supposed to have sufficient governance on the operational risks pertaining to their
areas of responsibility, such as
• Set up required policies govern the area of work,
• Establish process notes, control-steps in the process notes, and methods to
measure the efficacy of the controls,
• Perform the self-assessments and monitoring of risk indicators, etc.
• Examples are, in a financial organisation, the Operations department often has
a detailed set of process notes that assign control steps to designated
individuals, and also a method of measuring / tracking if the controls were
exercised properly.
These tracking / measuring tools could be at varying frequency, being built into a
formal RCSA (Risk Control Self-Assessment) where risks and control efficiency are
highlighted. This line functions closely with the Second line in a collaborative method
which could be formalised in any governance process established by the ORM
Committee.
(2) The Second line of defence is the Operational Risk department, which while being
part of the management framework, sets up, oversees the operational risk
management of the first line of defence. The typical roles played by the second line
of defence are:
• Working with the process owners (first line of defence) to set up the risk and
control matrix.
• Advise / recommend the method and frequency of testing of controls to the first
line of defence, thereby setting up a self-assessment process based on the
RCM.
• Perform risk assessment of new products, services and processes, especially in
instances where new technology is being deployed.
• Review and publish results of the RCSAs and risk assessments, and any
exception reports / Key risk indicators set up in the framework.
• Convene, and report to the ORMC, and report to the Board / Risk Committee of
the Board as well with the necessary updates.
(3) The Third line of defence is Internal Audit; it is independent of management control
and reports to the Audit Committee of the Board.
• An effective internal audit would highlight issues and potential gaps in
processes, which were missed by the first two lines of defence as well. As an
independent vertical, their value addition provides a better insight into the
process from a holistic perspective since they are not directly involved in
managing the process.
• Checking on efficacy of controls that mitigate operational risk, is a key
deliverable of Internal Audit.
• Over last few decades, internal audit has evolved into a concept of Risk Based
Auditing. The term itself refers to an approach where the audit function identified
risks and controls in a very similar fashion as the operational risk methodology,
and then choose to focus their attention and deploy resources on checking the
areas of choice.
Alternative Solution
Based on the information given in the case study under consideration to manage the risks
to the expectations of the Board following are some suggestions:
• The First line of defence is the function/department/role that owns the process. They
are supposed to have sufficient governance on the operational risks pertaining to their
areas of responsibility.
• The Second line of defence is the Operational Risk department, which while being
part of the management framework, sets up, oversees the operational risk
management of the first line of defence.
• The Third line of defence is Internal Audit; it is independent of management control
and reports to the Audit Committee of the Board.
• Identification of risk areas: whether it is own or outsourced network, internet,
individual computers, mobile devices etc. Prioritization of resources and effort can be
managed accordingly.
• Adequately restricting access to systems is the common way to prevent cyber risk;
this is done by password protection at various levels, from common user to
administrator level.
• Encryption solutions on individual computers is also done in a manner that if lost, the
unauthorised entity cannot download the data into an external storage device.
• There are several technology solutions that create an adequate firewall of the
organisation’s systems to protect them from hacking from outside.
• A regular vulnerability testing of the firewall and periodic review to upgrade it is one
of the main tasks of the information security manager. Detection of a test -attack is
very important part of the preventive mechanism; an attacker may attempt to cause
a minor violation to test the organisation’s network security before causing a major
incident.
• A response strategy to a cyber-attack incident is also important as part of risk
management. The measures to prevent or mitigate customer disputes, legal
indemnities, assess and minimize the financial impact of a cyber-attack, and
governance over decision making and investments to restore the system
functionalities to its secure state, are all important considerations. The root cause of
these incidents and the impact have to be adequately documented.
CASE STUDY – 5
INTRODUCTION
Ms. Jamuna is having 10000 sq. feet of vacant land, situated in the heart of Chennai city. She
inherited the above vacant land. She also holds fixed deposits of ` 4 crores in a nationalised
bank.
THE PROJECT
She wanted to construct twelve apartments in the vacant land, keeping one apartment as her
own residence. She is mulling over two options; to let out on rent the eleven apartments for
offices or let out the apartments as "service apartments". There is a famous marriage hall
nearby the vacant land. She expects that there will be demand for the service apartments during
marriage seasons and other functions held in the marriage hall and also, she feels that there
will not be many hassles in the same in (i) collecting rent and (ii) constant attention to the
maintenance of the apartments.
PROJECT FUNDING
She needs a total amount of ` 4.70 crores to construct the apartments. She can utilise the bank
fixed deposits towards construction. For the balance of the amount, she requested her cousin
Mr. Deepak, who is residing in USA, to send a loan which would be repaid to him after 5 years.
She agreed to pay an interest of ` 5 lakhs per annum and the same would be paid to his bank
account maintained in India. Mr. Deepak agreed to send her the amount in US dollars, once she
completes the spending from the closure of fixed deposits.
A month after giving his acceptance, Mr. Deepak told her that as he is tied up urgently with a
financial commitment, he would be requesting his friend Mr. Tony who is a resident of Nigeria
to send Ms. Jamuna 1 lakh US dollars through banking channel. She has to pay an interest
amount every year @ 6% and the repayment of the loan to Mr. De Martin, Mumbai at the end of
five years.
As an alternate to obtaining loan from Mr. Tony, Ms. Jamuna considers the possibility of
obtaining a bank loan. The bank would charge her 9% and she proposes to request the bank to
reduce it to 8%.
REVENUE ESTIMATES
The probability is estimated at 70% occupancy, if let out as apartments and 60% occupancy, if
let out as service apartments. It was expected by Ms. Jamuna that in a worst -case scenario,
she may incur a loss of ` 12 lakhs and ` 10 lakhs in case of letting out as individual apartments
and service apartments respectively.
CONSTRUCTION RELATED ISSUES
For the construction, she approached a qualified engineer-cum-builder and requested him to
provide detailed plans, procedures for getting necessary approval from the concerned
Governmental departments, estimates, stages of project, quality and specification of materials
to be used throughout the construction, details of the supervisors and break -down of payments
to be made by her at various stages. She wanted to have a comprehensive construction
agreement embedding all the details, especially the escalation clause (refers to the provision in
the contract to increase the agreed rates, if the inputs for construction increased beyond a
certain level).
She requested the engineer to periodically appraise her of the situation by holding meetings at
the end of each major activity of the project. She also insisted that the supervisors employed by
the engineer have to report to her about the risky situations and hazards in the construction site
regularly so that precautionary steps could be taken to ensure the safety of the workers.
However, she is sceptical about the skill sets of the workers, as finding and employing skilled
workers has become a tough job.
MAINTENANCE OF RECORDS
Ms. Jamuna is very keen in maintaining meticulous records of the construction. She would also
like to maintain a dairy of events (akin to a risk register), noting down all the events, problems
faced and their corresponding solutions. But she is not fully aware of the risks and vulnerabilities
that she would face during the construction.
She has read somewhere that control risks are often associated with project management. In
these circumstances, it is known that the events will occur, but the precise conse quences of
those events are difficult to predict and control. Therefore, the approach would have to be based
on minimizing the potential consequences of these events. Hence, she wanted to have a list of
specific risks to the project, sorted on their relative importance, and consequences.
Multiple Choice Questions
Choose the most appropriate answer from the given options.
(5.1) A risk may still occur that the apartments may lie vacant or there would be no occupancy
of service apartments, even when there is no significant change in the economy of the
country. This risk may be classified as
(A) Static Risks
(B) Country Risks
(C) General Risks
(D) Opportunity Risks
(5.2) Which of the following risk identification techniques that the supervisors would most likely
use for reporting to Ms. Jamuna on the risky situations and hazards in the construction
site?
(A) Surveys
(B) Direct Observations
Answer
Multiple Choice Questions
5.1 (A)
5.2 (B) or (C)
5.3 (B) or (D)
5.4 (C)
5.5 (D)
Descriptive Questions
5.6 The various factors that can create vulnerabilities and associated risks in the construction
of apartments by Ms. Jamuna are as follows:
(a) Fluctuation of raw material prices: There is always a possibility that the prices of raw
materials may increase. Even though, Ms. Jamuna has to pay only a fixed amount, i f
the prices increase beyond the specified percentage, then she has to pay more as
per the terms of escalation clause in the agreement with the engineer/builder.
(b) Scarcity/quality of materials: Under the proposed contract, the material to be used
should have a high-quality throughout the entire construction. It may so happen that
such material may not be available after a certain stage of the project. The engineer
might use an inferior material, or the construction activity might have to be stopped
till the right material is procured.
(c) Shortage of skilled workers: Finding out the right man for the right job is becoming
difficult. It is not always possible to employ skilled workers as they are very scarce
and also costly to employ. Ms. Jamuna has to choose the engineer/builder with utmost
care, based on the past records which would show that he has not faced shortage of
requisite skilled workers in the past.
(d) Unpredicted weather conditions: Unfavorable or unpredicted weather conditions may
also delay the project. For example, heavy rains during summer months would delay
laying of ceiling concrete. Adequate cushion in the project completion time should be
taken care of.
(e) Changes in laws and regulations: The government may change rules/policy in the
matter of construction industry, including the ongoing constructions in the state. This
may also affect the construction. There might be periodic inspections from the
authorities to ensure that the building construction does not violate the norms.
(f) Safety of workers: Safety of workers is always to be ensured. Safety measures such
as wearing protective helmets, boots, gloves, masks and eye-wear glasses are some
of the examples. In the construction agreement, it must be clearly stated that the
engineer/builder is solely responsible for the safety of the workers.
(g) Environmental pollution: Dust and pollution not only affect the workers but also the
neighbours as well. There might be complaints from the neighbours about the noise,
dust, smoke, etc. Hence sufficient anti-dust and pollution measures are to be taken,
such as, periodic sprinkling of water, avoid using harmful chemicals, controlling the
emission from diesel engines used in the construction sites etc. It is to be made clear
in the agreement that the engineer/builder is responsible for the risk.
Alternative Solution
The factors that can create vulnerabilities and associated risks in the construction of
apartments are as follows:
(i) Since in India marriages are normally season based hence property may remain
vacant for some time.
(ii) Increase in cost of raw material beyond certain level.
(iii) Health and safety of workers at site.
(iv) Shortage of skilled workers.
(v) In case if loan is taken in US $, then foreign exchange rate risk for payment of interest
and repayment of loan.
(vi) The payment of interest and repayment of loan to DeMartin of Mumbai would result
in money laundering activity.
5.7 1. Uncertainty: The lack of complete certainty, that is, the existence of more than one
possibility. The “true” outcome/state/result/value is not known. In this case, Ms.
Jamuna is facing uncertainty whether to let out the building as individual apartments
or as service apartments.
2. Measurement of uncertainty: A set of probabilities assigned to a set of possibilities.
There is a 70% probability that the apartments will be occupied, if it is let out as
individual apartments and 60% occupancy, if let out as service apartments.
3. Risk: A state of uncertainty where some of the possibilities involve a loss,
catastrophe, or other undesirable outcomes.
Ms. Jamuna might face loss in either of the possibilities.
4. Measurement of risk: A set of possibilities each with quantified probabilities and
quantified losses.
In a worst-case scenario, she may incur a loss of `12 lakhs and `10 lakhs in case of
letting out as individual apartments and service apartments respectively.
5. Chief difference between uncertainty and risk
In this sense, one may have uncertainty without risk but not risk without uncertainty.
The measure of uncertainty refers only to the probabilities assigned to outcomes,
while the measure of risk requires both probabilities or outcomes and losses
quantified for outcomes.
Ms. Jamuna cannot take an insurance policy for the uncertainty in choosing the
alternatives, while insurance can be had for perils such as fire, flood, earthquake, etc.
Another point of difference is that uncertainty cannot be transferred, while the risk
can be transferred to an insurance company.
5.8 The amount of US $ 1 Lakh received by Ms. Jamuna from Mr. Tony may be subject to
scrutiny by the bank under Prevention of Money Laundering Act, 2002.
The bank would like to ensure that such amount received by Ms. Jamuna is not out of any
illicit activities/transactions. The bank would go into the nature of receipt of the money, i.e.,
whether it is a loan or a gift of money, terms and conditions of the receipt and also the
details of how the interest and loan is proposed to be repaid. Bank would analyse whether
any provisions of Foreign Exchange Management Act (FEMA) is violated.
Big data analytics can improve the existing process in Anti-Money Laundering (AML)
operations. Its approaches allow for the advanced statistical analysis of structured data,
and advanced visualisation and statistical text mining of unstructured data. These
approaches can provide a means to quickly draw out hidden links between transactions
and accounts and uncover suspicious transaction patterns. Advanced analytics can
generate real-time actionable insights, stopping potential money laundering in its tracks,
whilst still allowing fund transfers for crucial economic and human aid to troubled regions.
Big data technologies can identify incidents, help draw a wider picture, and allow a bank
to raise the alarm before it’s too late.
Risk capacity: the amount and type of risk an organization is able to support in pursuit of its
business objectives.
Risk appetite: the amount and type of risk an organization is willing to accept in pursuit of its
business objectives.
Risk tolerance: the specific maximum risk that an organization is willing to take regarding
each relevant risk.
Risk target: the optimal level of risk that an organization wants to take in pursuit of a specific
business goal.
Risk limit: thresholds to monitor that actual risk exposure does not deviate too much from the
risk target and stays within an organization’s risk tolerance/risk appetite. Exceeding risk limits
will typically act as a trigger for management action.
● Unique to the organization because the strategy, culture, governance structure, and
business and operating models are unique to the organization
● Damaging to the entire organization because a risk involving reputation or the supply chain
in one part of the company may affect other parts.
● Easy to overlook because they often seem irrelevant, unthreatening, or highly unlikely—
and management may believe they are being monitored and managed when they are not.
● Difficult to address with customary risk management methods.
Understanding Uncertainty and Risk in detail. Millions of uncertainties exist in this world. And
out of that set of millions, the uncertainties that matter, constitute a risk. So, uncertainty has a
wider scope, and risk has a narrow one- and risk is a subset of uncertainty.
Uncertainty is something that is out there in the open, i.e.; it exists for any and everyone.
However, that uncertainty becomes a risk, when that uncertainty starts affecting the objectives
of any business organisation, entity or person. So, whichever uncertainty affects our objectives,
that becomes our risk -and that uncertainty we’ll have to manage & monitor – and record it in
the risk register. Also, uncertainty is a risk for one person because of this objective factor but
not for another.
We all do this every day in our professional and personal lives. All organizations do this,
whether formally or informally.
1.4 As AML does not have any formal risk management policy as it faces compliance issues
with regulatory authorities, the best RM framework can be Governance, Risk and compliance;
also, as strategic risk is involved, governance risk comes into play.
1.5 Better the risk management better will be for the company to raise the capital; hence option
A can’t be the answer. Because of risk management in place, we will have a more effective
allocation of resources; hence option B can’t be the answer. Having better risk management
will help the organization to have a better understanding of objective hence option C can’t be
the answer. Decrease inherent risk is purely based on the implementation of controls i.e.,
residual risk hence answer is D.
Refer Page no. 26 of our Full Batch notes for better understanding.
1.7 (Case study Based) Answer needs to be written based on how strategic risk will give the
organization an advantage in a dynamic environment. The same needs to be related to how
strategic risk will help with mounting economic, regulatory, and marketplace pressures and
technology disruption.
Note: For This type of question, you should always see how planning that risk will help the
organization. Also, note that ICAI can ask the same type of question for another risk in the
exam, so be prepared for how you will answer the same.
1.8 In this question, you need to think about how you can minimize the problems that will arise
from the litigation.
1.9 Note: Questions is asking information Security policy for three things a) How the
information can be protected on General level b) Particularly for Internet c) Particularly for
Email usages.
By CA Shivam Palan_Target80+RM
Page 462 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy & Interview Preparation Program)
Case Study – 2
2.1
CRSA Provides a framework for businesses to review, assess and design optimal control
frameworks to manage risks. Control risk self-assessment (CRSA) is a powerful tool that may
be used to support ERM. It is about getting managers and the work team to self-assess their
risk and controls, typically in workshops or facilitated meetings. ERM is the big picture, while
CRSA is one of the tools that can be used to promote good ERM.
The point is that CRSA is not ERM; it is just part of it. Just because the auditor feels there is a
sound CRSA program in place, this does not mean there is bound to be a good ERM process
as a result.
2.2
This is Money Market Cover for receivable– Borrow, Sell, Invest, i.e, .selling foreign currency
forward. However, ICAI has considered a forward purchase contract as a forward sale contract.
2.3
According to sir asnwers should be D; however ICAI has given the answer B need to check the
same with ICAI. TT (Telegraphic Transfer) buying rate indicates the rate at which banks
convert foreign inward remittances to INR. TT Selling rate indicates the rate at which the bank
sends an outward remittance through telegraphic transfer.
2.4 B
Same Question asked in Jan 21 Case study 4 (Q 4.4) page no. 342
2.5 A
Tom Next: The delivery of foreign exchange is to be made on the day next (tomorrow) to the
date of transaction.
Spot Next: Delivery of foreign exchange would take place on the 2nd working day from the
trade date.
2.6 A vendor risk management program reduces the frequency and severity of data breaches,
data leaks, and cyber attacks involving third and fourth parties, protecting sensitive data, PII,
PHI, intellectual property, and ensuring business continuity.
By CA Shivam Palan_Target80+RM
Page 463 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy & Interview Preparation Program)
2.8 Features of ERM page no. 8.3 ICAI Materail + Full Batch Note: 110 😎
2.9 Understanding Based
Case Study - 3
By CA Shivam Palan_Target80+RM
Page 464 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy & Interview Preparation Program)
3.7 Refer Page no. 4.11 ICAI, relate the same with a case study.
3.8 Refer page no. 9.18 to 9.21 of SFM for the type of exposure.
Case Study - 4
4.1 Overtrading arises when a business expands beyond the level of funds available. Overtrade
means an attempt to finance a certain volume of production and sales with inadequate working capital.
If the company does not have enough funds of its own to finance stock and debtors, if it wishes to
expand then it is forced to borrow from creditors and from the bank in the form of overdraft.
● Recovery requirements are developed during the risk assessment phase and include data from
the business impact analysis. You can begin by delineating the key functional areas of your
company and determining the key business processes in each.
● Recovery options are developed for each critical business process or function. Recovery
options must fit within the constraints of the recovery requirement. Otherwise, they should
not be considered as part of the BC/DR process.
By CA Shivam Palan_Target80+RM
Page 465 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy & Interview Preparation Program)
● Existing controls and risk mitigation solutions already in place should be reviewed after
requirements and options are reviewed. In some cases, existing solutions meet BC/DR
requirements; in other cases, existing solutions can be augmented or expanded to meet needs.
In still other cases, no satisfactory controls exist and a solution must be developed.
● Determining the cost, capability, effort to implement, quality, control, safety, and security of
each option under consideration can help you develop a comprehensive risk mitigation strategy
that meets the needs of your company.
4.6
Total Sales = 1,40,00,000
Sales After growth = 1,40,00,000 + 100% of 1,40,00,000
= 2,80,00,000
Estimated Avg. working capital = Net sales * Working capital Turnover Ratio
= 2,80,00,000 * 0.049
= 13,72,000
4.7 Answer needs to be framed based on: ICAI 2.30 & 7.3
4.8 Answer to be framed based on ICAI p.g. 5.12, Full Batch notes page no. 125
By CA Shivam Palan_Target80+RM
Page 466 of 492
Jo Monk Banega Wohi CA Banega
(Building India’s Largest Mentor Buddy & Interview Preparation Program)
Case Study - 5
5.1 Refer page no. 1.17 of ICAI Material, check the definition of static risk: Risk which
occur with no change in the economy are classified as Static Risk.
5.3 If nearby marriage hall is converted into shopping mall it will lead to wrong projection
of cash flows & mainly over estimation of revenues. Economic Risks can be manifested in
lower income or higher expenditures than expected.
5.6 Think & write all the factors that can create vulnerabilities & associated risk in the
construction sector. Can refer to page no. 316 of Complete guidance book for understanding of
how the construction industry works.
5.7 In this case ICAI has used Risk & Uncertainty distinction between proposed by Fouglas
Hubbard given in page no. 1.14 of ICAI Material.
https://camonk.com/s/pages/mentor-buddy-program
https://camonk.com/s/store/courses/description/getting-interview-ready-workshop
By CA Shivam Palan_Target80+RM
Page 467 of 492
Test Series: November 2021
MOCK TEST PAPER
FINAL (NEW) COURSE: GROUP – II
PAPER – 6A: RISK MANAGEMENT
Time Allowed – 4 Hours Maximum Marks – 100
CASE STUDY: 1
You have been recently appointed as Chief Risk Officer of a company which is in Steel Castings business.
Name of the Company is ABC Electro Steel Castings Ltd. [in short, ABC].
You have been told that ABC is fully committed to strengthen its risk management capability on continuous
basis in order to protect and enhance shareholder value. You have been told that the risk management
framework ensures compliance with the requirements of amended Clause 49 of the Listing Agreement. The
framework establishes risk management processes across all businesses and functions of the Company.
These processes are periodically reviewed to ensure that the Management controls risks through properly
defined framework.
You are also made aware that the Company has already undertaken an extensive Risk Management effort
that includes introducing Risk Management Manual, compiling a comprehensive profile of the key risks to
the Company, identifying key gaps in managing those risks and developing preliminary action plans to
address those risks. This effort accomplishes the following goals:
• responds to the Board's need for enhanced risk information and improved mitigation plan;
• provides the ability to prioritize, manage and monitor the risk in the business; and
• formalizes the explicit requirements for assessing risks on an ongoing basis, including an effective
internal control and management reporting system.
You are also given information that the Company uses raw materials to manufacture the steel castings. It is
faced with the threat of pressure on margins on sales. To counter the threat, the Company has taken
various steps which include backward integration which comprises coal mines and iron mines, and
brownfield expansions, e.g. sinter plant, sponge iron plant, coke oven plant, power plant from waste head
recovery. It also set up an R & D to expand its manufacturing capacities with a view to control costs.
You came to know that the Company is ISO-140001-2004 certified and is adhering strictly to the emission
norms applicable for industry.
You are also told that with the thrust given by Government of India on water and water related projects and
with the estimated growth in water requirement, the demand of DI Pipes is expected to grow substantially
and the Company is confident of retaining its market share.
Labour relations have been excellent throughout the year in spite of number of unions. It is the result of
such cordial and harmonious relations that not a single man-day has been lost in the last 8 years. The
Company believes that labour relations will continue to remain excellent.
Descriptive Questions
1.1 In India SEBI casts a lot of responsibilities on Directors of a listed companies regarding Risk Reporting
Explain. (5 Marks)
1.2 In case company plans to acquire any iron ore or coal mining company then what type of this merger
will be called. (2 Marks)
ABC Limited is a public limited company incorporated in the year 2003. It has the registered head office in
Bhubaneswar, Odisha. The Company has iron ore mines situated in five places in the State. The main
business of the Company is extraction and sale of iron ore to many iron and steel industries both inside and
outside states.
The Company has decided to diversify its business in trading of shares. Also, the Company is considering
the possibility of setting up a Non-Banking Finance Company. For these purposes, the Company is in the
process of doing feasibility studies.
Risk Manager
The Company has approached you, being a senior Risk Manager to look into the proposals. The role
performed by you would include:
• To gather regular risk management related information from external and internal sources.
• Identify the problems and provide possible solutions to the various issues arising in the risk
management.
• To effectively manage specific risk circumstances.
• To monitor the risk of Anti-Money Laundering (AML).
• To monitor the investment portfolio and to analyse the unfavourable movements.
• Advise and make recommendations to the management in the matters of identifying the risks and
quantifying the same.
• Help the management in designing and implementing various risk management strategies and their
related processes in the banking & investment portfolio and to suggest improvements.
• Get updated with the advances happening in the relevant software technology.
• Have a detailed understanding and knowledge of the credit, operational and market risks of the
portfolio and also the software tools used to assess them.
• Understand and reduce the exposures in financial risks by using strategies such as hedging, credit
default swap, insurance etc.
• Proactively analyse the market trends for finding out opportunities in expanding the portfolio.
• Adhere to various laws, procedures relating to the financial operations.
Board of Directors
Managing
director
Ajay Kothari
(Finance Manager) Pawan Pandey IT Director Sales & Marketing
(Director) Managers
Jatin
(Manager) HR Manager IT Manager Support Staff
Mohit
(Manager)
HR Analysts IT Analysts
After passing some time, the Board of Directors started realizing that the company is facing liquidity crunch.
Also, the introduction of new compensation plan resulted in unhealthy competition among employees.
Some employees were less willing to provide assistance to struggling co-workers and would prefer to
improve their own productivity. It also promoted an environment of excessive risk – taken by the sales
employees for pursuing short term profits.
The company has a system of identification of risk but only at the functional level and not for processes.
Further these Risks are not communicated among various organization levels.
6
Deposits of the Bank include Term Deposits, Current account and Savings Bank Account.
Advances include Agricultural Advances, Consortium Advances, Advances to Sugar Mills, Housing Loans,
Advance against securities like Shares/ Gold/ NSC’s/ FDs/ Site advance/ Educational Loans, Personal
Loans, Professional Loans, Retail advances, Self employment loans, cash credit facility etc.
Besides these, the Bank also offers services like Issue of Bank Guarantee, Safe deposit lockers, and allied
services.
The Bank comes under the supervision of RBI and needs to report on various aspects relating to operation
to RBI periodically. Bank is also required to put in IT systems in compliance with RBI Guidelines covering
entire area of operations including monitoring of operations on day to day basis, reconciliation of
transactions and closing each day, interbank reconciliations, inter branch reporting etc.
Reserve Bank of India has issued detailed guidelines on implementation of IT systems dating from 2013 to
2019 covering several areas of operation culminating in a master Notification on Comprehensive Cyber
Security Frame Work for Primary (Urban) Cooperative Banks dated 31st December, 2019 including
appointment of Risk Management Committee. Board must consist of Professionals drawn from Banks,
Accountancy, and Legal etc. Source- RBI
Bank had invested in IT systems to take care of their needs and ensure control over operations at Head
Office and Branch Level on day to day basis. With exponential Growth in size and need to comply with RBI
Circulars and reporting requirements besides the Management desires to expand operations to Mobile
Banking, Net Banking, ATM operations etc. there is a need to put in place a robust IT System in place
which will take care of future requirements and meet the Cyber Security Framework to be in place by 2021.
Bank is also keen to put in sound Corporate Governance Structure.
Descriptive Questions
4.1 How Random Loss is measured in banking transactions and what are the factors that affects the
Credit Risk. (9 Marks)
4.2 What are the ground rules to assess the credit risks of customer. (6 Marks)
11
12
1 = 85.4 = 9.241
Year II
X- X X- X (X - X ) 2 P2 (X - X ) 2 ×P2
15 – 29.3 -14.3 204.49 0.1 20.449
20 – 29.3 -9.3 86.49 0.3 25.947
32 – 29.3 2.7 7.29 0.4 2.916
45 – 29.3 15.7 246.49 0.2 49.298
98.61
2 = 98.61 = 9.930
Year III
X- X X- X (X - X ) 2 P3 (X - X ) 2 × P 3
18 – 27.9 -9.9 98.01 0.2 19.602
25 – 27.9 -2.9 8.41 0.5 4.205
35 – 27.9 7.1 50.41 0.2 10.082
48 – 27.9 20.1 404.01 0.1 40.401
74.29
Or
9.241 x 0.909 + 9.930 x 0.826 + 8.619 x 0.751 = 23.075
(8 Marks)
1.4 (B)
1.5 (A)
1.6 (D)
1.7 (D)
1.8 (C)
(2 x 5 = 10 Marks)
CASE STUDY: 2
2.1 Yes, Business Continuity is now an integral part of Operational Risk Management. Any of the risks we
enumerated above, can be triggered as part of an overall disruption that is caused by any or a
combination of the following reasons:
(a) Natural disaster affecting services of either technology solutions and/or the business process
itself; to elaborate, a situation to invoke BCP may exist in a case of natural disaster like flood,
where staff of a company are unable to go to office; or, it may be a combination of situation
where the technology solutions of the company that is required for daily functioning of the
organisation is also not working;
(b) Civic infrastructural failures like essential services of electricity or transport being brough t down
due to terrorist attacks or natural disasters;
(c) Keyman risk due to death or incapacitation of key decision makers in a company leading to
chaos in management of the company;
(d) Failure of one department or function to do their assigned tasks in a case of disruption may
cause the entire process to delivery of the organisation;
(e) In current business scenario, several organisations concentrate their operational activities in one
major operational hub; these organisations are at a higher BCP risk than the ones with
operations in several hubs if they are geared to support each other in a moment of crisis.
(10 Marks)
2.2 Operational Risk originates because of following reasons:
(a) Inadequately defined products and services which may not be compliant to industry regulations,
and/or may be exposed to risk of misspelling;
(b) Inadequately defined policies and processes which would directly adversely impact quality of
controls like checks and balances, segregation of duties as may be required;
(c) Inadequate technology functionality, or infrastructure that exists in any technology supported
environment, which organisations use in respective business operations;
(d) Internal or external crime that takes advantage of gaps in processes for unl awful gain, i.e. fraud;
or Call
Scan This
9022720882