SlideShare una empresa de Scribd logo
1 de 22
Presented By ManmeetThapar - 49  VishruthaMaarar - 20 ArtiGada - 03 DeepavaliVankalu - 04 SiddheshParab - 16 RammaniGupta - 10
Contents
What is Operational Risk A form of risk that summarizes the risks a company or firm undertaken when it attempts to operate within a given field or industry.  Operational risk is the risk that is not inherent in financial, systematic or market-wide risk. It is the risk remaining after determining financing and systematic risk, and includes risks resulting from breakdowns in internal procedures, people and systems.
Contd……………… Operational risk can be summarized as human risk; it is the risk of business operations failing due to human error.  Operational risk will change from industry to industry, and is an important consideration to make when looking at potential investment decisions. Industries with lower human interaction are likely to have lower operational risk.
What is Operational Risk The Basel Committee defines operational risk as: ‘’The risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.’’  Credit risk or market risk is not a part of operational risk. 
Why Manage Operational Risk Operational risk can kill financial institution. Credit and market risk are now well known and understood and therefore more likely to merely wound. Operational risk is pervasive complex & dynamic unlike market and credit risk which tend to be isolated in the specific areas of the business. Operational risk pervades all business entities, hiding in wings , waiting to surface.
Advantages
Causes of Operational Risk Causes
Causes of Operational Risk Internal Processes People Contd……..
Causes of Operational Risk
Types Of Operational Risk Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution, Delivery and Process Management Case Study – SBI- IT Related
Types Of Operational Risk Internal Fraud Unauthorised activity , theft of fraud that involves atleast one internal party. Eg: intentional ,misreporting of positions  Unauthorised undertaking of transactions  Insider trading Theft  Robbery Forgery
contd….. External Fraud External fraud refers to theft or fraud carried out by a third party outside the organisation. Eg Computer hacking damage and  theft of information
Contd…… Employment Practices and Workplace Safety This category refers to events relating to employee relations , safe working environment and discrimination. E.g.:  Employee compensation claims  Wrongful termination. Violation of health and safety rules  Discrimination claims  Harassment
Contd…… Clients, Products and Business Practices Operational losses in this category arise from a failure to meet an obligation to a client or from the nature or design of a product. eg misuse of confidential client information Money laundering Product defects Exceeding client exposure limits
Damage to Physical Assets This category accounts for losses as a result of disaster and other events. Eg: Natural disaster Terrorism  Vandelism Contd……….
Contd……. Business Disruption and System Failures Hardware and software failures telecommunication problem Utility outages and disruption
Contd… Execution, Delivery and Process Management This category covers risk events related to transaction processing or process management , trade counter parties and vendors. Eg: Miscommunication Data entry errors Accounting errors  Unapproved accesses given to client account Vendor disputes Outsourcing
Case Studies 1SBI – IT Related SBI, UK’s Treasury operations use the Reuters 3000 dealing system.  Dealers negotiate and confirm various deals . Deals were posted manually into the banking application. Risk of error prone entries, missed out deals, lack of suitable and timely checks & verification and inability to ascertain accurately counter party dealing limits. Requirement : ‘Straight through Processing’ from Reuters dealing server to the Misys-Equation platform to minimise operational risk.
Solution Technologies such as  Microsoft Windows 2000 server,  Access database, IBM MQ series, Misys Meridian middleware and IBM AS/400.
The process can be categorized as follows: • Electronic capture of deals via Reuter Ticket Output Feed (TOF).• Deal data processing with data validation and writing to database.• Deal data mapping, formatting and posting to Misys Equation using Meridian Middleware/IBM MQ Series.• Secure and user-friendly interface to monitor flow of deal data, correct any exceptions and review status of posting into Misys Equation.• Intelligent use of Reuters Current Interest Feed (CIF) to retrieve counter- party dealing limits and actual exposures from the Equation banking system and displaying the same back to the dealers.
Operational Risk

Más contenido relacionado

Similar a Operational Risk

ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational riskUjjwal 'Shanu'
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Managementbanerjeerohit
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTERRaj Kumar
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamSatyanandan Atyam
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Saras Singh
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Proofpoint
 

Similar a Operational Risk (20)

ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational risk
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyam
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 

Más de ITM Institute, Mumbai (Sion Br.) (7)

Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
 
Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
 
Omega Watch industry
Omega Watch industryOmega Watch industry
Omega Watch industry
 
Moser Baer
Moser BaerMoser Baer
Moser Baer
 
Asian Paint
Asian Paint Asian Paint
Asian Paint
 
Financial Planning project
Financial Planning projectFinancial Planning project
Financial Planning project
 
Dubai World Crisis
Dubai World CrisisDubai World Crisis
Dubai World Crisis
 

Último

02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure servicePooja Nehwal
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 

Último (20)

02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 

Operational Risk

  • 1. Presented By ManmeetThapar - 49 VishruthaMaarar - 20 ArtiGada - 03 DeepavaliVankalu - 04 SiddheshParab - 16 RammaniGupta - 10
  • 3. What is Operational Risk A form of risk that summarizes the risks a company or firm undertaken when it attempts to operate within a given field or industry. Operational risk is the risk that is not inherent in financial, systematic or market-wide risk. It is the risk remaining after determining financing and systematic risk, and includes risks resulting from breakdowns in internal procedures, people and systems.
  • 4. Contd……………… Operational risk can be summarized as human risk; it is the risk of business operations failing due to human error. Operational risk will change from industry to industry, and is an important consideration to make when looking at potential investment decisions. Industries with lower human interaction are likely to have lower operational risk.
  • 5. What is Operational Risk The Basel Committee defines operational risk as: ‘’The risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.’’ Credit risk or market risk is not a part of operational risk. 
  • 6. Why Manage Operational Risk Operational risk can kill financial institution. Credit and market risk are now well known and understood and therefore more likely to merely wound. Operational risk is pervasive complex & dynamic unlike market and credit risk which tend to be isolated in the specific areas of the business. Operational risk pervades all business entities, hiding in wings , waiting to surface.
  • 8. Causes of Operational Risk Causes
  • 9. Causes of Operational Risk Internal Processes People Contd……..
  • 11. Types Of Operational Risk Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution, Delivery and Process Management Case Study – SBI- IT Related
  • 12. Types Of Operational Risk Internal Fraud Unauthorised activity , theft of fraud that involves atleast one internal party. Eg: intentional ,misreporting of positions Unauthorised undertaking of transactions Insider trading Theft Robbery Forgery
  • 13. contd….. External Fraud External fraud refers to theft or fraud carried out by a third party outside the organisation. Eg Computer hacking damage and theft of information
  • 14. Contd…… Employment Practices and Workplace Safety This category refers to events relating to employee relations , safe working environment and discrimination. E.g.: Employee compensation claims Wrongful termination. Violation of health and safety rules Discrimination claims Harassment
  • 15. Contd…… Clients, Products and Business Practices Operational losses in this category arise from a failure to meet an obligation to a client or from the nature or design of a product. eg misuse of confidential client information Money laundering Product defects Exceeding client exposure limits
  • 16. Damage to Physical Assets This category accounts for losses as a result of disaster and other events. Eg: Natural disaster Terrorism Vandelism Contd……….
  • 17. Contd……. Business Disruption and System Failures Hardware and software failures telecommunication problem Utility outages and disruption
  • 18. Contd… Execution, Delivery and Process Management This category covers risk events related to transaction processing or process management , trade counter parties and vendors. Eg: Miscommunication Data entry errors Accounting errors Unapproved accesses given to client account Vendor disputes Outsourcing
  • 19. Case Studies 1SBI – IT Related SBI, UK’s Treasury operations use the Reuters 3000 dealing system. Dealers negotiate and confirm various deals . Deals were posted manually into the banking application. Risk of error prone entries, missed out deals, lack of suitable and timely checks & verification and inability to ascertain accurately counter party dealing limits. Requirement : ‘Straight through Processing’ from Reuters dealing server to the Misys-Equation platform to minimise operational risk.
  • 20. Solution Technologies such as Microsoft Windows 2000 server, Access database, IBM MQ series, Misys Meridian middleware and IBM AS/400.
  • 21. The process can be categorized as follows: • Electronic capture of deals via Reuter Ticket Output Feed (TOF).• Deal data processing with data validation and writing to database.• Deal data mapping, formatting and posting to Misys Equation using Meridian Middleware/IBM MQ Series.• Secure and user-friendly interface to monitor flow of deal data, correct any exceptions and review status of posting into Misys Equation.• Intelligent use of Reuters Current Interest Feed (CIF) to retrieve counter- party dealing limits and actual exposures from the Equation banking system and displaying the same back to the dealers.