The COSO Framework for Internal Control
February 12, 2025
Bureaucracy is not an obstacle to democracy but an inevitable complement to it. Joseph A. Schumpeter The above quote by Schumpeter can call for a heated debate on its relevance and credence. However there is no denying that bureaucracy; since a couple of centuries or so; has been an integral part of the Government, the […]
Oral communication implies communication through mouth. It includes individuals conversing with each other, be it direct conversation or telephonic conversation. Speeches, presentations, discussions are all forms of oral communication. Oral communication is generally recommended when the communication matter is of temporary kind or where a direct interaction is required. Face to face communication (meetings, lectures, […]
Cognitive Psychology is another school of thought which examines the internal processes or cognition and attempts to study the thought processes, memory and the stages involved in cognitive development on a long term basis. The two crucial characteristics of Cognitive Approach which differentiates the Cognitive Psychologists from other schools of thought have been described below: […]
Change is invariable and undeniable. Product lifecycles have shortened. Geographical boundaries are diminishing. Technology advances in the blink of an eye. Time to market has reduced. Delivery time has compressed. Innovation is faster and more frequent. Conformity is dying. Future is already here. How to deal with this? This is the question that’s been on […]
The All Pervasive Technology and the Inevitability of Technology Driven Decision Making Technology is all around us. Wherever we look and whatever we search for, chances are that we cannot escape the overarching and overweening presence of tech in our careers and personal lives. Indeed, technology has become so pervasive that it is impossible for […]
In the previous article, we discussed about the top-down and bottom-up approach which has been created to identify risks. In this article, we will provide an alternate approach. This approach is similar to the bottom-up approach in that it uses process maps to identify risks. However, the way that they look at the process maps and the methodologies used for the identification of risks is quite different.
Risk exposure is defined as a measure of the possibility of future loss which may arise from a specific process or event. Exposure is related to the activities themselves whereas risk is the probability of an adverse event occurring while conducting those activities.
During the natural course of business, companies tend to engage in a lot of activities that increase their exposure to operational risks. Some of these activities have been mentioned below:
If you tried to map operational risk exposure on a risk matrix, it would be mapped in a high impact low probability zone. This means that the probability of any of these events mentioned above happening is very low. However, if it does happen then the impact will be significant.
Operational vulnerabilities on the other hand are low impact, high-frequency events. These events are much more likely to occur and even keep happening in the day-to-day life of any company. However, their financial impact is not that high. Operational vulnerabilities are often defined as the weakest link in any business process.
Defects or shortcomings in the day-to-day processes of the company are referred to as operational vulnerabilities. For instance, it is quite possible that a company may manufacture defective products or sometimes may ship the wrong product to the wrong customer. If these events occur, the company can quickly replace the product and provide the right order to the customer. They can even provide some freebies to ensure customer satisfaction. Hence, the cost will be low. However, these events happen quite often in some companies.
There is always a chance that the information system of a company crashes due to high data load. It is not unheard of for companies to stop functioning for a couple of hours or even a couple of days due to defects in their information systems. The financial impact of such outages is relatively low. However, they tend to happen more frequently
Incompetent personnel is also an operational risk to the business. There are some companies that routinely hire inexperienced people and then train them. In such cases, it is quite possible that the service level of the company may drop because of the inexperienced people providing the service. This is another important operational vulnerability that may cost the company in the long run. It is quite possible that each company may have some silos wherein a small group of people will continue to operate unabated without following the proper risk management protocols.
The goal of operational risk management is to thoroughly assess the exposures and vulnerabilities. Once they have been identified, the goal is to minimize the exposure. It is important to realize that exposures cannot be completely eliminated. However, at the same time, it is important to eliminate the vulnerabilities. Multinational companies spend a lot of their time and money ensuring that their processes are six sigma compliant and are therefore devoid of operational vulnerabilities.
Your email address will not be published. Required fields are marked *