SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Internal Auditors’ Workshop
“Audits as a Risk Management Tool”
A Presentation by Duncan O. Ogutu – Chief Risk Officer
1
 Your name;
 Department/Function/Process and role; and
 Expectations from the workshop
2
 Highly interactive session;
 Global thinking with local application; and
3
Capital Planning and Execution
Effective
delivery of
current
projects
Geothermal
expansion
Capital planning and
execution processes
CP1
CP3
CP2
Regulatory Management
Improve
single buyer
model
Steer
deregulation
process
Build a regulatory structure in
KenGen’s organisation
RG1
RG3
RG2
Operational Excellence
OP1
OP3
Reduce
operational
and
overhead
costs
Optimise
main-
tenance
practices
OP2
Improve operational
processes and structure
Organisational Health
OG1
Performance
management
OG2
Promotion and
succession
planning
OG3
Structure and
Governance
OG4
Annual
planning and
budget
OG5
Innovation and
continuous
improvement
Organisational effectiveness from improved processes, structure and culture
OG6
Information
Technology
Vision:
To be the market leader in the provision of reliable, safe, quality and
competitively priced electric energy in the Eastern Africa region
Strategic pillars
+3000MW
by 2018
4
• Specific expected objectives
• Clarity of risk and the risk management process ;
• Clarity on the role audit & audit process;
• Link between Audit & Risk Management
• Auditors role in risk management process
• Commitment towards a consistent risk consciousness
Objectives
Internal
Control
(mitigation
measures
Risk
Management
6
 Overview of risk management; Risk Management Process
 Overview of Audit
 Audit vs Risk Management
7
Overview of Risk Management
8
© 2011 Deloitte & Touche
“The potential for loss or harm – or the diminished opportunity for gain - caused by
factors that can adversely affect the achievement of a company‟s objectives”
 Risk is the aggregate effect of uncertain events and outcomes on the achievement of
objectives
10
 Objectives: A goal or end result that is to be achieved;
 Uncertainty: Unknown, indefinite or unclear;
 Events: A happening, inside or outside an KenGen (naturally or man-made);
 Outcomes: Results of and contingent upon events (financial or not, tangible or
not); and
 Effects: Consequences of outcomes on the achievement of objectives (favourable
or not)
11
Objective
Uncertain Events
Good
Bad
Uncertain Outcomes
Desirable
Undesirable
Uncertain Effects
Favorable
Unfavorable
12
© 2011 Deloitte & Touche
“Mechanism that creates stability in the organization by enabling the identification,
prioritization, mitigation and measurement of the implications of each decision”
 Key elements of ERM include:
 Adopting consistent and effective risk governance;
 Standardizing the risk management process;
 Aggregating and integrating a view of all risks; and
 Relating risks to business objectives.
14
15
Enterprise: A purposeful undertaking that requires boldness.
Risk: The potential for loss, harm or sub-optimization of gain.
Management: Directing and controlling people, entities and resources for the
purpose of coordinating and harmonizing them towards accomplishing a goal i.e.,
protect existing assets and create future growth.
16
External
factors
External
factors
Identify
risks
Assess &
measure
risksRespond
to risks
Design &
test controls
Sustain &
continuously
improve
Governance
Process
Technology
People
Develop &
deploy
strategies
Monitor,
assure &
escalate
Risk intelligence
to create &
preserve value
 Introduction;
 Before the Three Lines: Risk Management Oversight and Strategy-Setting
 The First Line of Defense: Operational/Process Management
 The Second Line of Defense: Risk Management and Compliance
Functions
 The Third Line of Defense: Internal Audit, External Auditors, Regulators,
and Other External bodies;
 Coordinating The Three Lines of Defense
17
 In twenty-first century businesses, it’s not uncommon to find diverse
teams of internal auditors, enterprise risk management specialists,
compliance officers, internal control specialists, quality
inspectors/assessors, fraud investigators, and other risk and control
professionals working together to help their organizations manage
risk.
 The Three Lines of Defense model distinguishes among three groups
(or lines) involved in effective risk management:
 †Functions that own and manage risks (1st Line):
 †Functions that oversee risks (2nd Line); and
 †Functions that provide independent assurance (3rd Line)
18
 Operational managers own and manage risks. They implementing
corrective actions to address process and control deficiencies.
 Maintain effective internal controls and for executing risk and
control procedures on a day-to-day basis.
 Identifies, assesses, controls, and mitigates risks, guiding the
development and implementation of internal policies and
procedures
 Design and implement detailed procedures that serve as controls and
supervise execution of those procedures by their employees.
 Serves as the first line of defense because controls are designed into
systems and processes under their guidance of operational
management.
 There should be adequate managerial and supervisory controls in
place to ensure compliance and to highlight control breakdown,
inadequate processes, and unexpected events.
19
 In a perfect world, only one line of defense would be needed to
assure effective risk management. In the real world, however, a
single line of defense often can prove inadequate. Management
establishes various risk management and compliance functions to
help build and/or monitor the first line-of-defense controls.
 The responsibilities of these functions vary on their specific nature,
but can include:
 †Supporting management policies, defining roles and
responsibilities, and setting goals for implementation.
 †Providing risk management frameworks, Identifying known and
emerging issues.
 †Identifying shifts in the organization’s implicit risk appetite.
20
 Assisting management in developing processes and controls to
manage risks and issues.
 †Providing guidance and training on risk management processes.
 †Facilitating and monitoring implementation of effective risk
management practices by operational management.
 †Alerting operational management to emerging issues and
changing regulatory and risk scenarios.
 †Monitoring the adequacy and effectiveness of internal control,
accuracy and completeness of reporting, compliance with laws
and regulations, and timely remediation of deficiencies.
21
 Internal auditors provide the governing body and senior
management with comprehensive assurance based on the highest
level of independence and objectivity within the organization.
 This high level of independence is not available in the second line of
defense.
 Internal audit provides assurance on the effectiveness of governance,
risk management, and internal controls, including the manner in
which the first and second lines of defense achieve risk management
and control objectives.
 The scope of this assurance, which is reported to senior management
and to the governing body, usually covers:
22
FIRST LINE OF DEFENSE SECOND LINE OF
DEFENSE
THIRD LINE OF
DEFENSE
Risk Owners/Managers Risk
Control/Compliance
Risk Assurance
Operating management Limited independence
Reports primarily to
management
Internal audit
Greater independence
Reports to governing
body
23
24
25
26
The Risk Management Process
27
 At the end of the session the participant will understand how to;
 Identify risk;
 Measure risk;
 Select a risk response;
 Develop mitigating strategies;
 Report on risk; and
 Sustain the risk management process.
28
Level 2 – Risk Management
Capabilities
29
30
Governance: Board roles and responsibilities, internal audit and risk management
functions, tone at the top, risk management policies such as risk appetite and tolerance,
the code of ethics, and delegation of authority.
People: This pillar focuses on management capabilities and related risks such as having
the right number of people, with the right training and awareness.
Process: Includes core operational and infrastructure business processes necessary to
run the business in an efficient manner, and create and protect value.
Technology: This pillar establishes capable systems to analyze and communicate risk
information throughout the organization and enable risk intelligent decision-making
and timely response
Competition Security Attacks
Identify
risks
Assess &
measure
risks
Respond
to risks
Design &
test controls
Sustain &
continuously
improve
Governance
Process
Technology
People
Develop &
deploy
strategies
Monitor,
assure &
escalate Riskintelligence
tocreate &
preserve value
Level 3 – Risk Management Steps
31
32
Strategies to ensure:
Revenue growth sustained;
Asset efficiency maximised;
Operating margins managed; and
Stakeholder expectations met.
Strategic objectives need to be cascaded throughout the
organization.
How is this being done at KenGen ?
How does it tie in to the G2G Transformation Strategy?
33
© 2011 Deloitte & Touche34
• Internal and external risks that can compromise achievement of KenGen‟s objectives.
• Risks to both future growth objectives and existing assets.
• Consider scenarios and chain of events rather than isolated incidents.
35
KenGen risk categories:
Governance;
Strategy and planning;
Operations and infrastructure;
Finance;
Compliance; and
Reporting.
36
37
Define the risk factors to be used as a basis for risk ranking:
Impact factors: financial, stakeholders, reputation, legal/regulatory, speed of
onset;
Vulnerability factors: Control effectiveness, speed of response, complexity, rate
of change and external factors.
Impact and vulnerability can be assessed in terms of high, medium/moderate, and
low.
38
Risk is a function of
impact and Vulnerability,
and the consideration of controls inplace.
RISK = Impact x likelihood
Consider the existing controls to
mitigate the identifiedrisks.
Therefore
Controls do not always completely
eliminate the risks, therefore, the
remaining risk after considering
controls is referred to as Residual Risk
Residual Risk = Impact x Vulnerability
or (likelihood – Controls)
Vulnerability The
extent to which an
event is likely to
occur considering
the existing
controls.
Impact
The effect that a
risk will have in the
organisations
should it
materialise.
Inherent Risk
Lack of understanding of the
system functionality
resulting in inaccurate and
incomplete reporting
information.
Existing Controls
• System training
• Qualifiedpersonnel
• User reference guide
• Helpdesksupport
Residual Risk
Considering the controls, the
likelihood of the risk occurring
becomes low, thus the residual
risk (vulnerability) rating is low.
Example
39
40
Avoid risk
Divest, prohibit, stop, screen or eliminate the risk event.
Certain
project activities may have too much associated risk and as
such a decision is taken not to enter into or continue with the
activities.
Manage risk
Reduce the risk impact, risk vulnerabilityor both in a cost
effective manner, so that the risk exposure is reduced.
Transfer risk
Reduce risk likelihood or impact by transferring or
otherwise
sharing a portion of the risk.
Accept risk
Risk mitigation or risk management resources are not
allocated
to the risk.
41
Risk Category Risk Response
Very High Manage/Avoid/ Enhance Risk Mitigation
High Manage/Avoid/Enhance Risk Mitigation
Medium Transfer/ Monitor/ Measure for Cumulative Impact
Low Accept/ Retain/ Redeploy Resources
42
KenGen
43

Contenu connexe

Tendances

Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
Eneni Oduwole
 
A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...
Hassan Zaitoun
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk management
rejoysirvel
 
A Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingA Presentation on Risk Based Auditing
A Presentation on Risk Based Auditing
Amar Deep Ghimire
 
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONOPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
Frackson Kathibula-Nyoni
 
mr neeraj - day 1 - compliance
mr neeraj - day 1 - compliancemr neeraj - day 1 - compliance
mr neeraj - day 1 - compliance
Neeraj Verma
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
Paul Hunt
 

Tendances (18)

COSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORECOSO Vs ERM - NMIMS INDORE
COSO Vs ERM - NMIMS INDORE
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Coso erm frmwrk
Coso erm frmwrkCoso erm frmwrk
Coso erm frmwrk
 
A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk management
 
A Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingA Presentation on Risk Based Auditing
A Presentation on Risk Based Auditing
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
Risk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and ImplementationRisk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and Implementation
 
Coso erm
Coso ermCoso erm
Coso erm
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Risk management standard_030820
Risk management standard_030820Risk management standard_030820
Risk management standard_030820
 
Dubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs KhooDubai Nov08 Erm Gs Khoo
Dubai Nov08 Erm Gs Khoo
 
ERM overview
ERM overviewERM overview
ERM overview
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATIONOPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
OPERATIONAL RISK MANAGEMENT FRAMEWORK PRESENTATION
 
mr neeraj - day 1 - compliance
mr neeraj - day 1 - compliancemr neeraj - day 1 - compliance
mr neeraj - day 1 - compliance
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 

En vedette

EY FSO Internal Audit Services_final
EY FSO Internal Audit Services_finalEY FSO Internal Audit Services_final
EY FSO Internal Audit Services_final
Vincent Jorna
 
IIA NL IAF.combining functions
IIA NL IAF.combining functionsIIA NL IAF.combining functions
IIA NL IAF.combining functions
Michel Kee
 
Five Lines of Assurance A New ERM and IA Paradigm
Five Lines of Assurance  A New ERM and IA ParadigmFive Lines of Assurance  A New ERM and IA Paradigm
Five Lines of Assurance A New ERM and IA Paradigm
Tim Leech
 
Weygandt kieso kimmel_ch08_fraud_internal control and cash
Weygandt kieso kimmel_ch08_fraud_internal control and cashWeygandt kieso kimmel_ch08_fraud_internal control and cash
Weygandt kieso kimmel_ch08_fraud_internal control and cash
Tanjina Rahman
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls Monitoring
CaseWare IDEA
 
Pp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and controlPp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and control
Erwin Morales
 
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
rahmatmoelyana
 
Internal controls Purchasing, inventory,
Internal controls Purchasing, inventory,Internal controls Purchasing, inventory,
Internal controls Purchasing, inventory,
Rose Hubbell
 

En vedette (20)

Best Practices in Model Risk Audit
Best Practices in Model Risk AuditBest Practices in Model Risk Audit
Best Practices in Model Risk Audit
 
EY FSO Internal Audit Services_final
EY FSO Internal Audit Services_finalEY FSO Internal Audit Services_final
EY FSO Internal Audit Services_final
 
Portifólio de patrocínio Global Risk Meeting 2011
Portifólio de patrocínio Global Risk Meeting  2011Portifólio de patrocínio Global Risk Meeting  2011
Portifólio de patrocínio Global Risk Meeting 2011
 
IIA NL IAF.combining functions
IIA NL IAF.combining functionsIIA NL IAF.combining functions
IIA NL IAF.combining functions
 
Five Lines of Assurance A New ERM and IA Paradigm
Five Lines of Assurance  A New ERM and IA ParadigmFive Lines of Assurance  A New ERM and IA Paradigm
Five Lines of Assurance A New ERM and IA Paradigm
 
Weygandt kieso kimmel_ch08_fraud_internal control and cash
Weygandt kieso kimmel_ch08_fraud_internal control and cashWeygandt kieso kimmel_ch08_fraud_internal control and cash
Weygandt kieso kimmel_ch08_fraud_internal control and cash
 
MASSI Consultoria e Treinamento - Consultoria especializada em Controles Inte...
MASSI Consultoria e Treinamento - Consultoria especializada em Controles Inte...MASSI Consultoria e Treinamento - Consultoria especializada em Controles Inte...
MASSI Consultoria e Treinamento - Consultoria especializada em Controles Inte...
 
Governanca corporativa e controles internos - Boas práticas nas pequenas e mé...
Governanca corporativa e controles internos - Boas práticas nas pequenas e mé...Governanca corporativa e controles internos - Boas práticas nas pequenas e mé...
Governanca corporativa e controles internos - Boas práticas nas pequenas e mé...
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls Monitoring
 
MATERA MVAR - Gestão de Controles Internos e Riscos Operacionais - Modelo FUNCEF
MATERA MVAR - Gestão de Controles Internos e Riscos Operacionais - Modelo FUNCEFMATERA MVAR - Gestão de Controles Internos e Riscos Operacionais - Modelo FUNCEF
MATERA MVAR - Gestão de Controles Internos e Riscos Operacionais - Modelo FUNCEF
 
Como aplicar o COSO para SOX e Controles Internos
Como aplicar o COSO para SOX e Controles InternosComo aplicar o COSO para SOX e Controles Internos
Como aplicar o COSO para SOX e Controles Internos
 
Second line of defense - advantages and set up
Second line of defense - advantages and set up Second line of defense - advantages and set up
Second line of defense - advantages and set up
 
Coso internal control integrated framework
Coso internal control   integrated frameworkCoso internal control   integrated framework
Coso internal control integrated framework
 
Pp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and controlPp the three lines of defense in effective risk management and control
Pp the three lines of defense in effective risk management and control
 
Governance, Risk Management, and Internal Control
Governance, Risk Management, and Internal ControlGovernance, Risk Management, and Internal Control
Governance, Risk Management, and Internal Control
 
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
 
Upgrading Risk Management and Internal Control in Your Organization
Upgrading Risk Management and Internal Control in Your OrganizationUpgrading Risk Management and Internal Control in Your Organization
Upgrading Risk Management and Internal Control in Your Organization
 
Internal controls Purchasing, inventory,
Internal controls Purchasing, inventory,Internal controls Purchasing, inventory,
Internal controls Purchasing, inventory,
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
Effective Internal Controls (Annotated) by @EricPesik
Effective Internal Controls (Annotated) by @EricPesikEffective Internal Controls (Annotated) by @EricPesik
Effective Internal Controls (Annotated) by @EricPesik
 

Similaire à ISO Internal Auditors Workshop_Final Version

2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk
Dr Darren O'Connell AGIA
 
Risk Assessment and Internal Control 7 Key Strategies.pdf
Risk Assessment and Internal Control 7 Key Strategies.pdfRisk Assessment and Internal Control 7 Key Strategies.pdf
Risk Assessment and Internal Control 7 Key Strategies.pdf
RT Compliance
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
Prashant Jain
 
WHATs NEW IN RISK ASSESSMENT
WHATs NEW IN RISK ASSESSMENTWHATs NEW IN RISK ASSESSMENT
WHATs NEW IN RISK ASSESSMENT
Fred Travis
 
Case Study - Leveraging Risk Management for Future Growth - Published Final Copy
Case Study - Leveraging Risk Management for Future Growth - Published Final CopyCase Study - Leveraging Risk Management for Future Growth - Published Final Copy
Case Study - Leveraging Risk Management for Future Growth - Published Final Copy
Kevin Fryatt
 

Similaire à ISO Internal Auditors Workshop_Final Version (20)

Risk Management and Risk Transfer
Risk Management and Risk TransferRisk Management and Risk Transfer
Risk Management and Risk Transfer
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk
 
Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal Audit
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling Techniques
 
Risk Assessment and Internal Control 7 Key Strategies.pdf
Risk Assessment and Internal Control 7 Key Strategies.pdfRisk Assessment and Internal Control 7 Key Strategies.pdf
Risk Assessment and Internal Control 7 Key Strategies.pdf
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Risk Intelligence
Risk IntelligenceRisk Intelligence
Risk Intelligence
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
GP for Risk Management product sheet
GP for Risk Management product sheetGP for Risk Management product sheet
GP for Risk Management product sheet
 
project risk management
project risk managementproject risk management
project risk management
 
WHATs NEW IN RISK ASSESSMENT
WHATs NEW IN RISK ASSESSMENTWHATs NEW IN RISK ASSESSMENT
WHATs NEW IN RISK ASSESSMENT
 
ERM ppt.pptx
ERM ppt.pptxERM ppt.pptx
ERM ppt.pptx
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniques
 
Internal Audit And Internal Control Presentation Leo Wachira
Internal Audit And Internal Control Presentation   Leo WachiraInternal Audit And Internal Control Presentation   Leo Wachira
Internal Audit And Internal Control Presentation Leo Wachira
 
Case Study - Leveraging Risk Management for Future Growth - Published Final Copy
Case Study - Leveraging Risk Management for Future Growth - Published Final CopyCase Study - Leveraging Risk Management for Future Growth - Published Final Copy
Case Study - Leveraging Risk Management for Future Growth - Published Final Copy
 
Risk management
Risk managementRisk management
Risk management
 
Internal Controls Topic 2.ppt
Internal Controls Topic 2.pptInternal Controls Topic 2.ppt
Internal Controls Topic 2.ppt
 

ISO Internal Auditors Workshop_Final Version

  • 1. Internal Auditors’ Workshop “Audits as a Risk Management Tool” A Presentation by Duncan O. Ogutu – Chief Risk Officer 1
  • 2.  Your name;  Department/Function/Process and role; and  Expectations from the workshop 2
  • 3.  Highly interactive session;  Global thinking with local application; and 3
  • 4. Capital Planning and Execution Effective delivery of current projects Geothermal expansion Capital planning and execution processes CP1 CP3 CP2 Regulatory Management Improve single buyer model Steer deregulation process Build a regulatory structure in KenGen’s organisation RG1 RG3 RG2 Operational Excellence OP1 OP3 Reduce operational and overhead costs Optimise main- tenance practices OP2 Improve operational processes and structure Organisational Health OG1 Performance management OG2 Promotion and succession planning OG3 Structure and Governance OG4 Annual planning and budget OG5 Innovation and continuous improvement Organisational effectiveness from improved processes, structure and culture OG6 Information Technology Vision: To be the market leader in the provision of reliable, safe, quality and competitively priced electric energy in the Eastern Africa region Strategic pillars +3000MW by 2018 4
  • 5. • Specific expected objectives • Clarity of risk and the risk management process ; • Clarity on the role audit & audit process; • Link between Audit & Risk Management • Auditors role in risk management process • Commitment towards a consistent risk consciousness
  • 7.  Overview of risk management; Risk Management Process  Overview of Audit  Audit vs Risk Management 7
  • 8. Overview of Risk Management 8
  • 9. © 2011 Deloitte & Touche “The potential for loss or harm – or the diminished opportunity for gain - caused by factors that can adversely affect the achievement of a company‟s objectives”
  • 10.  Risk is the aggregate effect of uncertain events and outcomes on the achievement of objectives 10
  • 11.  Objectives: A goal or end result that is to be achieved;  Uncertainty: Unknown, indefinite or unclear;  Events: A happening, inside or outside an KenGen (naturally or man-made);  Outcomes: Results of and contingent upon events (financial or not, tangible or not); and  Effects: Consequences of outcomes on the achievement of objectives (favourable or not) 11
  • 13. © 2011 Deloitte & Touche “Mechanism that creates stability in the organization by enabling the identification, prioritization, mitigation and measurement of the implications of each decision”
  • 14.  Key elements of ERM include:  Adopting consistent and effective risk governance;  Standardizing the risk management process;  Aggregating and integrating a view of all risks; and  Relating risks to business objectives. 14
  • 15. 15 Enterprise: A purposeful undertaking that requires boldness. Risk: The potential for loss, harm or sub-optimization of gain. Management: Directing and controlling people, entities and resources for the purpose of coordinating and harmonizing them towards accomplishing a goal i.e., protect existing assets and create future growth.
  • 16. 16 External factors External factors Identify risks Assess & measure risksRespond to risks Design & test controls Sustain & continuously improve Governance Process Technology People Develop & deploy strategies Monitor, assure & escalate Risk intelligence to create & preserve value
  • 17.  Introduction;  Before the Three Lines: Risk Management Oversight and Strategy-Setting  The First Line of Defense: Operational/Process Management  The Second Line of Defense: Risk Management and Compliance Functions  The Third Line of Defense: Internal Audit, External Auditors, Regulators, and Other External bodies;  Coordinating The Three Lines of Defense 17
  • 18.  In twenty-first century businesses, it’s not uncommon to find diverse teams of internal auditors, enterprise risk management specialists, compliance officers, internal control specialists, quality inspectors/assessors, fraud investigators, and other risk and control professionals working together to help their organizations manage risk.  The Three Lines of Defense model distinguishes among three groups (or lines) involved in effective risk management:  †Functions that own and manage risks (1st Line):  †Functions that oversee risks (2nd Line); and  †Functions that provide independent assurance (3rd Line) 18
  • 19.  Operational managers own and manage risks. They implementing corrective actions to address process and control deficiencies.  Maintain effective internal controls and for executing risk and control procedures on a day-to-day basis.  Identifies, assesses, controls, and mitigates risks, guiding the development and implementation of internal policies and procedures  Design and implement detailed procedures that serve as controls and supervise execution of those procedures by their employees.  Serves as the first line of defense because controls are designed into systems and processes under their guidance of operational management.  There should be adequate managerial and supervisory controls in place to ensure compliance and to highlight control breakdown, inadequate processes, and unexpected events. 19
  • 20.  In a perfect world, only one line of defense would be needed to assure effective risk management. In the real world, however, a single line of defense often can prove inadequate. Management establishes various risk management and compliance functions to help build and/or monitor the first line-of-defense controls.  The responsibilities of these functions vary on their specific nature, but can include:  †Supporting management policies, defining roles and responsibilities, and setting goals for implementation.  †Providing risk management frameworks, Identifying known and emerging issues.  †Identifying shifts in the organization’s implicit risk appetite. 20
  • 21.  Assisting management in developing processes and controls to manage risks and issues.  †Providing guidance and training on risk management processes.  †Facilitating and monitoring implementation of effective risk management practices by operational management.  †Alerting operational management to emerging issues and changing regulatory and risk scenarios.  †Monitoring the adequacy and effectiveness of internal control, accuracy and completeness of reporting, compliance with laws and regulations, and timely remediation of deficiencies. 21
  • 22.  Internal auditors provide the governing body and senior management with comprehensive assurance based on the highest level of independence and objectivity within the organization.  This high level of independence is not available in the second line of defense.  Internal audit provides assurance on the effectiveness of governance, risk management, and internal controls, including the manner in which the first and second lines of defense achieve risk management and control objectives.  The scope of this assurance, which is reported to senior management and to the governing body, usually covers: 22
  • 23. FIRST LINE OF DEFENSE SECOND LINE OF DEFENSE THIRD LINE OF DEFENSE Risk Owners/Managers Risk Control/Compliance Risk Assurance Operating management Limited independence Reports primarily to management Internal audit Greater independence Reports to governing body 23
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. The Risk Management Process 27
  • 28.  At the end of the session the participant will understand how to;  Identify risk;  Measure risk;  Select a risk response;  Develop mitigating strategies;  Report on risk; and  Sustain the risk management process. 28
  • 29. Level 2 – Risk Management Capabilities 29
  • 30. 30 Governance: Board roles and responsibilities, internal audit and risk management functions, tone at the top, risk management policies such as risk appetite and tolerance, the code of ethics, and delegation of authority. People: This pillar focuses on management capabilities and related risks such as having the right number of people, with the right training and awareness. Process: Includes core operational and infrastructure business processes necessary to run the business in an efficient manner, and create and protect value. Technology: This pillar establishes capable systems to analyze and communicate risk information throughout the organization and enable risk intelligent decision-making and timely response Competition Security Attacks Identify risks Assess & measure risks Respond to risks Design & test controls Sustain & continuously improve Governance Process Technology People Develop & deploy strategies Monitor, assure & escalate Riskintelligence tocreate & preserve value
  • 31. Level 3 – Risk Management Steps 31
  • 32. 32 Strategies to ensure: Revenue growth sustained; Asset efficiency maximised; Operating margins managed; and Stakeholder expectations met. Strategic objectives need to be cascaded throughout the organization. How is this being done at KenGen ? How does it tie in to the G2G Transformation Strategy?
  • 33. 33
  • 34. © 2011 Deloitte & Touche34 • Internal and external risks that can compromise achievement of KenGen‟s objectives. • Risks to both future growth objectives and existing assets. • Consider scenarios and chain of events rather than isolated incidents.
  • 35. 35 KenGen risk categories: Governance; Strategy and planning; Operations and infrastructure; Finance; Compliance; and Reporting.
  • 36. 36
  • 37. 37 Define the risk factors to be used as a basis for risk ranking: Impact factors: financial, stakeholders, reputation, legal/regulatory, speed of onset; Vulnerability factors: Control effectiveness, speed of response, complexity, rate of change and external factors. Impact and vulnerability can be assessed in terms of high, medium/moderate, and low.
  • 38. 38 Risk is a function of impact and Vulnerability, and the consideration of controls inplace. RISK = Impact x likelihood Consider the existing controls to mitigate the identifiedrisks. Therefore Controls do not always completely eliminate the risks, therefore, the remaining risk after considering controls is referred to as Residual Risk Residual Risk = Impact x Vulnerability or (likelihood – Controls) Vulnerability The extent to which an event is likely to occur considering the existing controls. Impact The effect that a risk will have in the organisations should it materialise. Inherent Risk Lack of understanding of the system functionality resulting in inaccurate and incomplete reporting information. Existing Controls • System training • Qualifiedpersonnel • User reference guide • Helpdesksupport Residual Risk Considering the controls, the likelihood of the risk occurring becomes low, thus the residual risk (vulnerability) rating is low. Example
  • 39. 39
  • 40. 40 Avoid risk Divest, prohibit, stop, screen or eliminate the risk event. Certain project activities may have too much associated risk and as such a decision is taken not to enter into or continue with the activities. Manage risk Reduce the risk impact, risk vulnerabilityor both in a cost effective manner, so that the risk exposure is reduced. Transfer risk Reduce risk likelihood or impact by transferring or otherwise sharing a portion of the risk. Accept risk Risk mitigation or risk management resources are not allocated to the risk.
  • 41. 41 Risk Category Risk Response Very High Manage/Avoid/ Enhance Risk Mitigation High Manage/Avoid/Enhance Risk Mitigation Medium Transfer/ Monitor/ Measure for Cumulative Impact Low Accept/ Retain/ Redeploy Resources
  • 42. 42