ERM Finals Reviewer
ERM Finals Reviewer
ERM Finals Reviewer
1. Choose 9 main topics per member. Put your name in red letters beside the topic to
claim (ex: MAIN TOPIC [ALLI] )
2. For the exam guide, please refer to this link
3. Topics listed in this reviewer are already condensed based on the exam guide.
4. MAIN TOPICS are in bold and capital letters.
5. DEADLINE: May 20, Monday, 11:59 PM
———
[TOPIC 7] One of the benefits of having a formal ERM process is Accountability, that is,
clarity on who will be on top of these risks.
[TOPIC 8] COSO has stated that organizations that integrate ERM throughout the
organization can realize many benefits, including, but not limited to:
COSO has stated that organizations need to identify the best framework for optimizing
strategy and performance in order to integrate ERM throughout the organization to achieve
benefits, including
1. Qualitative Risk Assessment Methods - do not have specific numerical or financial data
associated with the risk of loss, but organizations still can identify the risk of loss associated
with these events.
Types/ Examples:
b. Earnings at risk - show how a particular event will cause earnings (or cash flow)
to vary around an expected amount. (Cash flow at risk is a very similar method.)
c. Sensitivity analysis - can show how events such as a change in interest rates or
a delay in a product introduction can affect earnings or cash flow at risk.
d. A common risk measure is Value at Risk (VaR). This measure indicates potential
loss by a firm due to its trading activities.
AVOIDANCE
● Risk is avoided when the organization refuses to accept it. The exposure is not
permitted to come into existence. This step is accomplished by simply not engaging
in the action that gives rise to risk.
● High Likelihood, High Impact = Avoidance
REDUCTION
● Sometimes called as risk retention.
● Conscious risk retention takes place when the risk is perceived and not transferred or
reduced. When the risk is not recognized, it is unconsciously retained—the person
retains the financial risk without realizing that he or she is doing so.
● Voluntary risk retention is when the risk is recognized, and there is an agreement
to assume the losses involved.
● Involuntary risk retention occurs when risks are unconsciously retained or cannot
be avoided, transferred, or reduced.
● High Likelihood, Low Impact = Reduction
TRANSFER
● Risk may be transferred to someone more willing to bear the risk.
● The transfer may be used to deal with both speculative and pure risk.
● Low Likelihood, High Impact = Transfer
● Examples:
○ Hedging is a method of risk transfer accomplished by buying and selling for
future delivery so that dealers and processors protect themselves against a
decline or increase in market price between the time they buy a product and
sell it.
○ Pure risks may be transferred through contracts, like a hold-harmless
agreement where one individual assumes another's possibility of loss.
○ Insurances
SHARING
● Distributing or transferring the risk among various parties.
Risk identification seeks to identify as many threats as possible without evaluating them.
Internal Risk Factors
• Communication methods
• Risk assessment activities
• Appropriateness of internal control activities
• Labor relations
• Training and capability of the employees
• Degree of supervision of employees
• Operational risks
• Financial risks
• Strategic risks
Tools, diagnostics, and processes that may be used to support risk identification include:
• Brainstorming
• Interview
• Checklists
• Flowcharts
• Scenario analysis
• Value chain analysis
• Business process analysis
• Systems engineering
• Process mapping
• Computed cash flow at risk
• Projected earnings at risk
• Projected earnings distributions
• Projected EPS distributions
Risk assessment is the process of analyzing the potential effects of identified risks. Risks are
analyzed, considering likelihood and impact, as a basis for determining how they should be
managed.
1. Impact. The effect the risk occurrence would have on the organization's objective if it were
to occur. For example, what loss would happen if a particular risk factor occurred and was
not detected and corrected?
2. Likelihood. The probability or chance that the risk actually will occur.
In the risk prioritization step, the overall set of identified risk events, their impact
assessments, and their probabilities of occurrences are "processed" to derive a
most-to-least-critical rankorder of identified risks.
a) Risk Appetite
The degree of uncertainty an entity is prepared to accept in pursuit of its objectives.
b) Risk Tolerance
The degree, amount, or volume of risk impact that an organization or individual will
withstand
c) Risk Threshold
The level of uncertainty or impact at which a stakeholder will have a specific interest.
Below the risk threshold, the stakeholder will accept the risk. Above the risk threshold, the
stakeholder will not accept the risk.
Risk response involves reducing risks to an acceptable level by employing the ARATS.
The purpose of this is to address how risk will be monitored. This includes verifying
compliance with the risk response decisions by ensuring that the organization implements
the risk response measures (and any information security requirements), determines the
ongoing effectiveness of risk response measures, and identifies any changes that would
impact the risk posture.
1. Create
2. Redesign
3. Restructure
4. Expand
5. Diversify
6. Take Advantage
SITUATIONS REGARDING RISK EXPLOITATION AND RISK AVERSE [ALLI] [can’t find
so ni-differentiate na lang]
Risk exploitation means taking actions to ensure that an opportunity will happen or have a
greater impact. For example, if you have a chance to win a new contract, you may exploit it
by offering a competitive price, delivering a high-quality proposal, and negotiating favorable
terms.
Risk averse is the tendency of people to prefer outcomes with low uncertainty to those
outcomes with high uncertainty, even if the average outcome of the latter is equal to or
higher in monetary value than the more certain outcome. For example, a risk-averse investor
might choose to put their money into a bank account with a low but guaranteed interest rate,
rather than into a stock that may have high expected returns, but also involves a chance of
losing value.
Risk ranking is a risk assessment that relies on qualitative, usually subjective, estimates of
likelihoods and consequences. It avoids the technical demands of more formal techniques
and may use quantitative information where it is available.
PROBABILITIES (WITH COMPUTATION) [ALLI] [Topic 2]
Assessing risk generally involves the use of probabilities. For example, if there is a
40% chance that a company will suffer a 1,000,000 loss and a 60% chance that the
company will suffer a 300,000 loss, the expected loss can be estimated as 580,000 ((4 ×
1,000,000) + (.6 x 300,000)]. Determining the estimated amounts and their probabilities
involves experience, information, and judgment.
c. Mean time between failure (MTBF) – the average time between failures of a
critical components, systems, or processes within an organization. This helps
monitor the reliability and performance of assets/systems/processes in an
organization.
Example: The average time between system failures or downtime events. By utilizing
MTBF as a KRI in inventory management, organizations can identify vulnerabilities,
prioritize maintenance efforts and implement proactive measures to minimize the risk
of equipment failures, system downtime, and disruptions in inventory operations.
The definitions provided by different sources on KRI and KPI are constantly
overlapping and sometimes the same. But in the use of the RAT template, KPI is the
actual performance seen or realized by the immediate personnel in the specific area
or department of the organization while KRI is derived from the reports of the
performance evaluation producing a quantified result.
● Risk appetite is the amount of risk that an organization is willing to seek or accept in
the pursuit of long-term objectives. - Institute of Risk Management (2011)
● Risk appetite is the amount and type of risk that an organization is willing to pursue or
retain. -International Organization for Standardization Guide 73 (2009)
● Risk appetite is The amount of risk that an organization is prepared to accept, tolerate,
or be exposed to at any point in time. – Orange Book (2004)
● Risk appetite is the e level of risk that is acceptable to the board or management. This
may be set in relation to the organization as a whole, for different groups of risks, or
at an individual risk level.- Chartered Institute of Internal Auditors (2005)
Another definition comes into focus: Risk appetite is the level of risk that the organization
is willing to take in its value creation activities, particularly in its investing activities. In
which, value creation refers to the process of generating additional worth or benefit for
stakeholders through various activities such as innovation, efficient operations, and strategic
decision-making.
b) Corporate Risk Appetite - Chosen risk appetite and risk tolerances need to be
reviewed and approved by the senior management.
c) Business Unit And Department Risk Appetite - Risk appetite and risk tolerance
decisions made at the corporate level will determine targets and project portfolios that
will be chosen on the business unit or department level based on the project risk and
return comparison.
e) Risk Appetite Process - The risk appetite process itself needs to be documented and
continuously reviewed to make sure that it meets the needs of an organization. A
sample process can include four steps: setting the risk appetite, embedding it,
continuous risk mitigation, and reviewing the risk appetite.
COMMON RISK LANGUAGE [GAB]
[TOPIC 3]
Common Risk Language refers to a standardized set of terms, definitions, and
concepts used to communicate risks within an organization. Having a Common Risk
Language ensures that everyone involved in risk management processes speaks the same
language when discussing risks and their potential impacts.
● In developing a risk definition, avoid using words that are already mentioned in
the risk.
● Avoid a definition that is wordy and not clear.
● The risks below are usually perceived to be the same.
● Avoid combining two risks
[TOPIC 4 pg 13]
[TOPIC 8 pg 29]
While risk is a general concept, it can be broken down into numerous sub-concepts that help
define and understand what the risk is. The following are a few of the most common types of
risk:
1. Business risk—The possibility that an organization either will have a lower profit
than expected or will experience a loss instead of a profit.
2. Hazard risk—The risk that the workplace environment or a natural disaster can
disrupt the operations of an organization.
3. Financial risk—The risk that an organization's cash flow will not satisfy the
shareholders' ability to recover the cash invested in the business, particularly when
the organization carries debt.
4. Operational risk—The risk of loss for an organization occurring from inadequate
systems, processes, or external events.
5. Strategic risk—The risk that a company's strategy will not be sufficient for the
organization to achieve its objectives and maximize shareholder value.
6. Legal risk—The risk that litigation (either civil or criminal) can negatively affect the
organization.
7. Compliance risk—The risk associated with the organization's ability to meet rules
and regulations set forth by governmental agencies.
8. Political risk—The risk that political influence and decisions may impact the
profitability and effectiveness of an organization
9. Inherent risk— Broad term for all the risk a firm faces without any controls applied to
business activities or processes.
10. Residual risk—Broad term for the level of risk a firm faces after controls are applied
and assumptions about their effectiveness are made.
11. Liquidity risk - a type of financial risk that refers specifically to a firm's inability to
meet its cash flow needs without affecting the daily operations or financial condition
of the firm
How it works:
1. Identify the Total Number of Tier 1 Risks: Determine the total number of
risks categorized as Tier 1.
2. Apply the Rule: Divide the total number of Tier 1 risks by 3 (n/3). This
calculation provides a guideline for each participant in the Risk
Management Unit (RMU) to select a subset of the most critical risks.
3. Select Top Risks: Each RMU participant can then choose their top n/3
risks from among the identified Tier 1 risks. For example, if there are 30
Tier 1 risks, each participant can select their top 10 risks (30/3).
4. Aggregate Selections: Once all RMU participants have made their
selections, the individual choices are aggregated to identify the most
commonly selected risks, which can then be prioritized for further action
or resource allocation. The n/3 filtering rule helps streamline the decision-
making process by ensuring that each participant's perspective is
considered while focusing on the most critical risks as determined
collectively by the RMU.
5. Alignment with Risk Management Priorities: The selected risks align with
the organization's risk management priorities, focusing on those with the
greatest threat to strategic goals or significant negative impact.
6. Documentation and Communication: The selected subset and rationale
are documented and communicated to stakeholders, ensuring
transparency and accountability.
7. Review and Validation: The selected risks undergo review and validation
by stakeholders to ensure accuracy and alignment with the organization's
risk profile, addressing any concerns through collaborative discussion.
- The event’s causes are listed on the left, while the consequences are
on the right. This method treats each cause and consequence
separately, helping to mitigate the probability of the risk occurring and
limit its impact.
- The bowtie analysis is a tool used to evaluate the risk of specific events,
detailing both the causes and the consequences while focusing on
preventive and mitigative controls.
- Example: a kitchen fire, with the left side outlining the sources of risk
leading to the event, and the right side detailing the consequences
and impacts. The center of the bowtie represents the event itself, with
preventive controls on the left aimed at stopping the event from
occurring and response controls on the right designed to mitigate the
impact should the event occur.
On the left side of the bow-tie, which represents the causes or threats
these threats and prevent the top event (the central risk event) from
occurring. These controls are designed to stop the causes from leading
to the risk.
ORMI
Opportunities for Risk Management Improvement in Controls are
Analysis (BTA):
Consequences
or impacts of the top event. They are depicted on the right side of the
After the top event (the central risk event) occurs, there can be
[TOPIC 3]
Types of Approaches
a. Interrelationship Approach
- considers the interconnection of the different prioritized risks to identify the highly
leveraged risks, or the risks that when the organization manages, will also manage
some other risks. It involves identifying how different risks are connected or
dependent on each other.
b. Direct Approach
- the Chief Risk Officer(CRO) immediately considers the prioritized risks to be the
ones that will go to the treatment stage or where the risk owners will now develop the
risk management strategies and action plans to prevent the risks from happening.
Types:
Description: A common risk management technique involves shifting the potential loss of
an adverse outcome from an individual or entity to a third party. It involves one party paying
another to take responsibility for mitigating specific losses.
Techniques:
1. Reinsure
2. Insure
3. Outsource
4. Contracts
5. Hedge
6. Alliance
RISK MANAGEMENT OPTIONS [GAB]
[TOPIC 5]
Risk Options, also known as risk response, are strategic choices available to
organizations for managing specific risks. These options include risk acceptance,
avoidance, reduction, transfer, or sharing. Chosen risk options form the basis for
developing action plans and implementing risk management strategies.
● Transfer
Risk Acceptance Options TEARS ● Exploit
● Accept/Retain
● Reduce
● Sharing
Additionally, incorporating visual aids such as charts, graphs, and tables can help
illustrate complex data and trends, enhancing the clarity and impact of the report.
Stakeholders Responsibilities
2. Board Risk Oversight ● Assists the Board in fulfilling its responsibility for
Committee (BROC) oversight of the organization’s risk management
activities.
● Sets the risk appetite of the organization.
● Evaluates the effectiveness of existing risk
management practices, identifies emerging risks,
and recommends appropriate strategies for
mitigating identified risks
5. Chief Risk Officer (CRO) ● Is the champion of the ERM process in the
organization;
● Develops, implements risk management
process, tools and methodologies;
● Analyzes, develops and executes policies and
report risks;
● Submits risk report to the RMET and BROC; and
● Monitors the implementation of the risk
management strategies and action plans.
6. Risk Management Unit ● Composed of the different Risk Leaders and Risk
(RMU) Owners that support the Risk Management
Executive Team (RMET) in the implementation
of the ERM process.
● Suggest to the RMET the development of
additional ERM Policies and other related
guidelines.
● Supervises, supports, and incorporates the ERM
processes across the organization in
coordination with the RMET, Risk Leaders, and
Risk Owners.
● Gathers and evaluates the risk reports provided
by the Risk Leaders and Risk Owners and
monitors the status of risk management
strategies and action plans.
● Ensures tha
● Organizes the sharing of best practices across
the organization
● Supports the Chief Risk Officer (CRO) in
preparing the ERM reports and materials to be
presented to the RMET and the Board Risk
Oversight Committee (BROC)
● Drives the continuous improvement of the
organization’s current ERM Process.
7. Risk Leaders ● Leads the Risk Owners under each identified risk
in the consistent execution and continuous
improvement of the risk mitigation strategies in
the ERM processes.
● Constantly reviews and provides updates in the
behavior of the critical risk and ensures that
emerging risks are identified and included.
● Guides the Risk Owners in making reports to be
forwarded to the CRO and RMET.
1. Judgment
2. Breakdowns
3. Collusion
4. Costs versus Benefits
5. Management Override
PROCESS OF DOING DIVERSIFIED PORTFOLIO [ALLI] [Topic 8/Group 6]
1. Assess Your Risk Tolerance: Determine your comfort level with risk and
investment goals.
2. Asset Allocation: Decide on the right mix of asset classes (e.g., stocks,
bonds, cash) based on your risk assessment.
3. Diversification Within Asset Classes: Within each asset class, choose a
variety of instruments to spread risk.
4. Regular Rebalancing: Periodically adjust your portfolio to maintain the
desired asset allocation.
5. Consider Costs: Be mindful of the costs and fees associated with different
investments.
6. Monitor and Adjust: Keep an eye on market conditions and adjust your
strategies accordingly.
By following these steps, firms can create a robust risk management program that
can withstand various market conditions and help in achieving its financial
objectives. Remember, diversification is not just about spreading investments, but
also about choosing assets that behave differently from one another to reduce
overall portfolio risk.
4. Physical controls - Equipment, inventories, securities, cash, and other assets are
physically secured and periodically counted and compared with amounts shown on control
records.
Type Description
Boards / CEOs and Secretaries who are accountable for the risks
of their organizations are required to attest in the annual report
Annual Report that organizations have risk management processes in place and
Attestation that: (a) These processes are effective in controlling risks to a
satisfactory level and (b) A responsible body or audit committee
verifies that view.
These reports contain a prioritized list of the top 10 to 20 risks
Top Risks / based on consequence and likelihood scores. Typically, these
Strategic Risks include details about the risk, information on key controls and their
effectiveness and additional treatments needed, with time frames.
Contains trends on risks such as which risks are getting worse or
which treatments are reducing risk exposures, risk areas that need
Risk Trends
additional attention, target risk levels for key risks, and
demonstrate trends on the potential success of treatment plans.
A report that sorts risks according to when they were identified
New and / or
making it easier to highlight new risks that may still need to be fully
Emerging Risks
considered and understood.
A report that identifies significant / extreme risks with ineffective
Risk with Ineffective controls, allowing the Board and Executive to identify potential
Controls points of business failure that need urgent interventions or
resource support.
A risk report that groups all risks that have not been allocated to a
Risk Categories / responsible person for follow-up and response, allowing
Risk Types management to identify key risks that are not being effectively
monitored and managed.
Risk Owner / A risk report that filters risks by risk owner. It allows those
Person responsible to view risk treatments that they need to oversee or
Responsible develop.
A report that sorts risks according to due dates for treatment plans
/ responses. It allows Risk Managers, Project Managers and
Risk Treatments
others to identify critical time frames for responding to key risks as
Due or Overdue
well as identify and manage potential delays and/or
non-performance in responding to risk.
1. Financial KRIs
2. Human Resource KRIs
3. Operational KRIs
4. Technological KRIs
The roles and responsibilities of the members in the structure are usually part of the overall
risk management policy and are included in the ERM Manual.
Stakeholders Responsibilities
2. Board ● Assists the Board in fulfilling its responsibility for oversight of the
Risk organization’s risk management activities.
Oversight ● Sets the risk appetite of the organization.
Committe ● Evaluates the effectiveness of existing risk management practices,
e (BROC) identifies emerging risks, and recommends appropriate strategies
for mitigating identified risks
3. Chief ● The ultimate risk executive and is essentially responsible for ERM
Executive priorities, strategies and policies.
Officer ● Heads of the RMET that sets the direction and leads the
(CEO) decision-making as they relate to:
○ Recognition of risk priorities;
○ Alignment of business objectives and risk strategies, action
plans and policies;and
○ Settlement of conflicts regarding ERM strategies and
action plans.
● Ensures that sufficient resources are allocated to pursuing ERM
initiatives, strategies and action plans.
● Reports to the BROC on a regular basis on ERM related matters.
● He is the ultimate “risk owner” of all the critical risks.
6. Risk ● Composed of the different Risk Leaders and Risk Owners that
Managem support the Risk Management Executive Team (RMET) in the
ent Unit implementation of the ERM process.
(RMU) ● Suggest to the RMET the development of additional ERM Policies
and other related guidelines.
● Supervises, supports, and incorporates the ERM processes
across the organization in coordination with the RMET, Risk
Leaders, and Risk Owners.
● Gathers and evaluates the risk reports provided by the Risk
Leaders and Risk Owners and monitors the status of risk
management strategies and action plans.
● Ensures tha
● Organizes the sharing of best practices across the organization
● Supports the Chief Risk Officer (CRO) in preparing the ERM
reports and materials to be presented to the RMET and the Board
Risk Oversight Committee (BROC)
● Drives the continuous improvement of the organization’s current
ERM Process.
7. Risk ● Leads the Risk Owners under each identified risk in the consistent
Leaders execution and continuous improvement of the risk mitigation
strategies in the ERM processes.
● Constantly reviews and provides updates in the behavior of the
critical risk and ensures that emerging risks are identified and
included.
● Guides the Risk Owners in making reports to be forwarded to the
CRO and RMET.
8. Risk ● Has the responsibility for and ownership of the assigned risk and
Owners interrelated risks.
● Actively participates in the risk identification process of the
organization.
● Performs risk prioritization, analysis, development of strategies
and action plans, and coordinates with other Risk Owners
● Assesses and communicates the progress of the risk management
strategies and action plans to the Risk Leaders and CRO.
Example: A small restaurant that’s been doing well, but then a new competitor opens up next
door. To adapt to this change, the restaurant owner might refresh their risk management
approach by reassessing their risk appetite (how much competition they’re willing to handle),
identifying the new risk posed by the competitor, reassessing existing risks like food safety or
staffing issues, and refining their risk mitigation strategies, such as offering new menu items
or improving customer service. This helps the restaurant stay competitive and successful
despite the new challenge.
ERM Reset suggests a more comprehensive overhaul or reevaluation of the entire ERM
program. It may involve starting from scratch or fundamentally redefining the approach to
managing risks within the organization. This could be prompted by significant changes in the
business environment, regulatory requirements, or internal factors that necessitate a
complete reset of the risk management framework.
● This goes a step further and involves a comprehensive overhaul of the entire risk
management framework. Additionally, includes redefining risk tolerance levels,
restructuring risk governance, and sometimes even implementing new technology or
processes to enhance risk management capabilities.
3. Sensitivity Analysis
- Sensitivity analysis involves assessing how changes in input variables or
assumptions impact the outcomes of a decision or project. It helps identify
which factors have the most significant influence on risk and informs
decision-making by exploring various scenarios.
4. SWIFT Evaluation
- SWIFT (Structured What If Technique) evaluation is a systematic method used
to identify and assess potential risks by asking "what if" questions. It
encourages structured brainstorming sessions to explore different scenarios
and their potential consequences, helping organizations anticipate and
mitigate risks effectively.
5. Risk Register
- A risk register is a document used to record and track identified risks
throughout the risk management process. It typically includes information
such as the risk description, likelihood, severity, impact, mitigation strategies,
and responsible parties. The risk register serves as a central repository of
risk-related information for ongoing monitoring and management.