SlideShare une entreprise Scribd logo
1  sur  15
Risk Management
University of Economics, Kraków, 2012
              Tomasz Aleksandrowicz
operational risk management

                     credit risk definition
        credit bureau and rating agencies
                  credit risk management
operational risk
• risk of loss resulting from inadequate or failed
  internal processes, people and systems or from
  external events
• operational risk is much harder to identify than
  market and credit risk
people risk
•   Employee collusion/fraud
•   Employee error
•   Employee misdeed
•   Employers liability
•   Employment law
process risk
  –   Transaction Risk
  –   Documentation/contract risk.
  –   Operational Control Risk
  –   Model Risk
technology risk
external risk
causes of operational risk
•   Internal fraud
•   External fraud
•   Employment practices and workplace safety
•   Clients, products and business practices.
•   Damage to physical assets.
•   Business disruption and system failures
•   Execution, delivery and process management
3 approaches in banking
key risk indicators
basic indicator approach
• simplest operational risk measurement method
• banks has to hold capital reserves for operational loss
• average income gross income from previous 3 years times
  given percentage (alpha)
• years with negative or zero income excluded
• committee alpha percentage – 15% (represents industry
  average operational risk)




                                                            12
Standardized Approach

• more complex method of operational risk measurement
• banks has to hold capital reserves for operational loss
• three-year average across each of the business lines in each
  year times given percentage (beta)




                                                                 13
standardized Approach – beta factor




                                      14
advanced measurement approach
(AMA)
• comprehensive method based on bank’s internal operational
  risk measurement system
• quantitative and qualitative criteria
• subject of regulatory approval
• bank must be able to demonstrate that its approach captures
  even unlikely events
• minimum five-year observation period of internal loss data
• external data could be used
• high-severity events must be subject of scenario analysis and
  use external data and expert advisory

                                                                  15

Contenu connexe

Tendances

Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?EDR
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditorsminkhollow
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
Internal audit RBIA and Lifecyle approach
Internal audit RBIA and Lifecyle approachInternal audit RBIA and Lifecyle approach
Internal audit RBIA and Lifecyle approachsubbusai82
 
International Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsInternational Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsHernan Huwyler, MBA CPA
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
ORIGINATIONNEXT- Risk Assessment Model
ORIGINATIONNEXT- Risk Assessment ModelORIGINATIONNEXT- Risk Assessment Model
ORIGINATIONNEXT- Risk Assessment ModelCRMNEXT
 
Continuous auditing
Continuous auditingContinuous auditing
Continuous auditingacc626tan
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsIT-Toolkits.org
 
Privacy & Security Controls In Vendor Management Al Raymond
Privacy & Security Controls In Vendor Management   Al RaymondPrivacy & Security Controls In Vendor Management   Al Raymond
Privacy & Security Controls In Vendor Management Al Raymondspencerharry
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk ManagementNabil Hamdulay
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Technology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal ControlTechnology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal ControlZefren Edior
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Use Of Techniques And Technology In Internal Audit
Use Of Techniques And Technology In Internal AuditUse Of Techniques And Technology In Internal Audit
Use Of Techniques And Technology In Internal AuditManoj Agarwal
 
Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous AuditingTianli Xie
 

Tendances (20)

Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditors
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Risk Based Audit Approach
Risk Based Audit ApproachRisk Based Audit Approach
Risk Based Audit Approach
 
Internal audit RBIA and Lifecyle approach
Internal audit RBIA and Lifecyle approachInternal audit RBIA and Lifecyle approach
Internal audit RBIA and Lifecyle approach
 
International Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsInternational Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 Audits
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
ORIGINATIONNEXT- Risk Assessment Model
ORIGINATIONNEXT- Risk Assessment ModelORIGINATIONNEXT- Risk Assessment Model
ORIGINATIONNEXT- Risk Assessment Model
 
Language of business
Language of businessLanguage of business
Language of business
 
Continuous auditing
Continuous auditingContinuous auditing
Continuous auditing
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Privacy & Security Controls In Vendor Management Al Raymond
Privacy & Security Controls In Vendor Management   Al RaymondPrivacy & Security Controls In Vendor Management   Al Raymond
Privacy & Security Controls In Vendor Management Al Raymond
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Technology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal ControlTechnology Auditing, Assurance, Internal Control
Technology Auditing, Assurance, Internal Control
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Use Of Techniques And Technology In Internal Audit
Use Of Techniques And Technology In Internal AuditUse Of Techniques And Technology In Internal Audit
Use Of Techniques And Technology In Internal Audit
 
Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous Auditing
 

En vedette

Steren+rm 7+y+rm-8
Steren+rm 7+y+rm-8Steren+rm 7+y+rm-8
Steren+rm 7+y+rm-8emhir
 
YouGO! Magazine 2/2011
YouGO! Magazine 2/2011YouGO! Magazine 2/2011
YouGO! Magazine 2/2011YouGO!
 
Winner Automotive Group Ads
Winner Automotive Group AdsWinner Automotive Group Ads
Winner Automotive Group AdsStacey Inglis
 
MedicinMan January 2012 Issue
MedicinMan January 2012 IssueMedicinMan January 2012 Issue
MedicinMan January 2012 IssueAnup Soans
 
How to Search Thai Digital Database
How to Search Thai Digital DatabaseHow to Search Thai Digital Database
How to Search Thai Digital DatabaseGritiga Soothorn
 
5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!
5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!
5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!PR Digital Comunicação
 
James Metcalfe's April Real Estate Update
James Metcalfe's April Real Estate Update James Metcalfe's April Real Estate Update
James Metcalfe's April Real Estate Update James Metcalfe
 
四驱赛车
四驱赛车四驱赛车
四驱赛车zust
 
MedicinMan 1st Anniversary Special July 2012 Issue
MedicinMan 1st Anniversary Special July 2012 IssueMedicinMan 1st Anniversary Special July 2012 Issue
MedicinMan 1st Anniversary Special July 2012 IssueAnup Soans
 

En vedette (20)

Steren+rm 7+y+rm-8
Steren+rm 7+y+rm-8Steren+rm 7+y+rm-8
Steren+rm 7+y+rm-8
 
YouGO! Magazine 2/2011
YouGO! Magazine 2/2011YouGO! Magazine 2/2011
YouGO! Magazine 2/2011
 
Winner Automotive Group Ads
Winner Automotive Group AdsWinner Automotive Group Ads
Winner Automotive Group Ads
 
Rm 02
Rm 02Rm 02
Rm 02
 
MedicinMan January 2012 Issue
MedicinMan January 2012 IssueMedicinMan January 2012 Issue
MedicinMan January 2012 Issue
 
How to Search Thai Digital Database
How to Search Thai Digital DatabaseHow to Search Thai Digital Database
How to Search Thai Digital Database
 
5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!
5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!
5 Táticas para Tornar seu Marketing no Instagram mais Efetivo!
 
James Metcalfe's April Real Estate Update
James Metcalfe's April Real Estate Update James Metcalfe's April Real Estate Update
James Metcalfe's April Real Estate Update
 
Sales Management
Sales ManagementSales Management
Sales Management
 
Tarea
TareaTarea
Tarea
 
Elvis Presley Vol 04
Elvis Presley Vol 04Elvis Presley Vol 04
Elvis Presley Vol 04
 
Sylvia Maisano
Sylvia MaisanoSylvia Maisano
Sylvia Maisano
 
四驱赛车
四驱赛车四驱赛车
四驱赛车
 
Stricklin Mini Portfolio
Stricklin Mini PortfolioStricklin Mini Portfolio
Stricklin Mini Portfolio
 
基礎動畫的類型
基礎動畫的類型基礎動畫的類型
基礎動畫的類型
 
MedicinMan 1st Anniversary Special July 2012 Issue
MedicinMan 1st Anniversary Special July 2012 IssueMedicinMan 1st Anniversary Special July 2012 Issue
MedicinMan 1st Anniversary Special July 2012 Issue
 
Ah konete !
Ah konete !Ah konete !
Ah konete !
 
POSOBIE
POSOBIEPOSOBIE
POSOBIE
 
Fisokuhle Profile
Fisokuhle ProfileFisokuhle Profile
Fisokuhle Profile
 
Engagor introduction
Engagor introductionEngagor introduction
Engagor introduction
 

Similaire à Rm 11

Operational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvasOperational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvasTreat Risk
 
Risk Based Approach to Auditing Financial Statements.pptx
Risk Based Approach to Auditing Financial Statements.pptxRisk Based Approach to Auditing Financial Statements.pptx
Risk Based Approach to Auditing Financial Statements.pptxhesnib
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxAbraraw Zerfu
 
Basel Committee Norms on Capital Adequacy and other important factors
Basel Committee Norms on Capital Adequacy and other important  factorsBasel Committee Norms on Capital Adequacy and other important  factors
Basel Committee Norms on Capital Adequacy and other important factorsDr. Jose A V
 
Operational risk management (2)
Operational risk management (2)Operational risk management (2)
Operational risk management (2)Ujjwal 'Shanu'
 
CM Introduction 081414
CM Introduction 081414CM Introduction 081414
CM Introduction 081414aidanc5
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk pptNehaKamboj10
 
Operation var (ama) con0529e
Operation var (ama) con0529eOperation var (ama) con0529e
Operation var (ama) con0529eChipo Nyachiwowa
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Operational Risk Management under BASEL era
Operational Risk Management under BASEL eraOperational Risk Management under BASEL era
Operational Risk Management under BASEL eraTreat Risk
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...samahhamed3
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceSami Benafia
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsNimonik
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingPECB
 

Similaire à Rm 11 (20)

Rm 12
Rm 12Rm 12
Rm 12
 
Operational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvasOperational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvas
 
Risk Based Approach to Auditing Financial Statements.pptx
Risk Based Approach to Auditing Financial Statements.pptxRisk Based Approach to Auditing Financial Statements.pptx
Risk Based Approach to Auditing Financial Statements.pptx
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptx
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
Basel Committee Norms on Capital Adequacy and other important factors
Basel Committee Norms on Capital Adequacy and other important  factorsBasel Committee Norms on Capital Adequacy and other important  factors
Basel Committee Norms on Capital Adequacy and other important factors
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
Six sigma
Six sigmaSix sigma
Six sigma
 
Operational risk management (2)
Operational risk management (2)Operational risk management (2)
Operational risk management (2)
 
CM Introduction 081414
CM Introduction 081414CM Introduction 081414
CM Introduction 081414
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk ppt
 
Operation var (ama) con0529e
Operation var (ama) con0529eOperation var (ama) con0529e
Operation var (ama) con0529e
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Operational Risk Management under BASEL era
Operational Risk Management under BASEL eraOperational Risk Management under BASEL era
Operational Risk Management under BASEL era
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems Auditing
 

Plus de tomkacy

Plus de tomkacy (18)

Rm 10-2
Rm 10-2Rm 10-2
Rm 10-2
 
Rm 10
Rm 10Rm 10
Rm 10
 
Rm 09-v1
Rm 09-v1Rm 09-v1
Rm 09-v1
 
Rm 09
Rm 09Rm 09
Rm 09
 
Rm 8-1
Rm 8-1Rm 8-1
Rm 8-1
 
Rm 8
Rm 8Rm 8
Rm 8
 
Rm 07-v1
Rm 07-v1Rm 07-v1
Rm 07-v1
 
Rm 07-v1
Rm 07-v1Rm 07-v1
Rm 07-v1
 
Rm 06-v2
Rm 06-v2Rm 06-v2
Rm 06-v2
 
Rm 06
Rm 06Rm 06
Rm 06
 
Rm 05-v2
Rm 05-v2Rm 05-v2
Rm 05-v2
 
Rm 05
Rm 05Rm 05
Rm 05
 
Rm 03-v1
Rm 03-v1Rm 03-v1
Rm 03-v1
 
Rm 03
Rm 03Rm 03
Rm 03
 
Rm 02 v2
Rm 02 v2Rm 02 v2
Rm 02 v2
 
Rm 01-last
Rm 01-lastRm 01-last
Rm 01-last
 
Rm 01-last
Rm 01-lastRm 01-last
Rm 01-last
 
Rm 01
Rm 01Rm 01
Rm 01
 

Dernier

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Dernier (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Rm 11

  • 1. Risk Management University of Economics, Kraków, 2012 Tomasz Aleksandrowicz
  • 2. operational risk management credit risk definition credit bureau and rating agencies credit risk management
  • 3. operational risk • risk of loss resulting from inadequate or failed internal processes, people and systems or from external events • operational risk is much harder to identify than market and credit risk
  • 4.
  • 5. people risk • Employee collusion/fraud • Employee error • Employee misdeed • Employers liability • Employment law
  • 6. process risk – Transaction Risk – Documentation/contract risk. – Operational Control Risk – Model Risk
  • 9. causes of operational risk • Internal fraud • External fraud • Employment practices and workplace safety • Clients, products and business practices. • Damage to physical assets. • Business disruption and system failures • Execution, delivery and process management
  • 10. 3 approaches in banking
  • 12. basic indicator approach • simplest operational risk measurement method • banks has to hold capital reserves for operational loss • average income gross income from previous 3 years times given percentage (alpha) • years with negative or zero income excluded • committee alpha percentage – 15% (represents industry average operational risk) 12
  • 13. Standardized Approach • more complex method of operational risk measurement • banks has to hold capital reserves for operational loss • three-year average across each of the business lines in each year times given percentage (beta) 13
  • 14. standardized Approach – beta factor 14
  • 15. advanced measurement approach (AMA) • comprehensive method based on bank’s internal operational risk measurement system • quantitative and qualitative criteria • subject of regulatory approval • bank must be able to demonstrate that its approach captures even unlikely events • minimum five-year observation period of internal loss data • external data could be used • high-severity events must be subject of scenario analysis and use external data and expert advisory 15