Common mistakes in a structured risk register

Introduction

Every time my company, Crest Advisory Africa (Pty) Ltd, are appointed to review the risk process which includes the Risk Management Framework, The Risk Management Guidelines, the various risk criteria and the risk registers, we are encountering interesting challenges.

The challenges are multiple, and it rocks the foundations of the risk management discipline.

The article below will address some of these challenges and then we will provide you with the best possible guideline to apply in your own environment.

Challenges encountered with Risk Registers

Risk Registers are the final working paper you will have of the risk process implementation. If the risk register template is incorrect or lacking, the risk facilitation process is gravely affected.

We have encountered this in many companies, on many levels, from Board Level, with sometimes the Audit and Risk Committee (ARC) driving this, the Executive Committee with a lot of knowledge around the table and further, the Departmental Committees and Departmental Sub Committees, mostly the sub structures of the primary department.

The following table represent you with the typical layout of a risk register (landscape format) and challenges encountered:

Typical Challenges in Risk registers

Challenge

Description

Risk Identification Phase

Unique Ref No

路 We are always looking for Unique reference numbers.

路 A Strategic Risk cannot have the same number as a Departmental risk and an Operational Risk Cannot have the same number as an Operational Risk.

路 These numbers are extremely important for Analysis purposes

路 Without numbers, your various risks on the various levels of the organisation are going to be contaminated with different data sets.

路 Make it Unique, such as

o SO used for Strategic Objectives, numbered from 001

o Departmental Objectives could be using the following naming convention:

o Operations: OPE

o Maintenance: MAI

o Finance: FIN

o Supply Chain: SCM

o Etc.

路 Usually in the Excel based Risk Registers we receive to work from, does not have unique reference numbers. I suggest the following naming convention

o SO-001-2024

No Strategic Objectives available

路 This is a critical departure point of any risk register.

路 If the strategic objective is not connected to the risk, why would you spend your time and everybody鈥檚 time to analyse a risk which has no impact

路 The strategic objectives drive the very existence of the business for which me, you and everyone else work and earn our living

路 This is a critical oversight.

No Departmental Objectives

路 Yes, No Departmental Objectives.

路 These Objectives are mostly documented in Performance Agreements or Output Agreements.

路 And the incumbent most of the time is of the opinion that this is private between him / her and the upper echelons of the company.

路 This is their performance, which has been agreed upon between the company, driving the Strategic Objectives.

路 Thus, the risk registers we receive start with Risk Identified. Just there, originating from where? Affecting what in the core business of the company, or the core business of the incumbent, and how do you align your performance with the performance of the risks you have been delegated to manage?

路 Even if there can be a Departmental objective allocated to the risk, the alignment with the Strategic objective is not there and no link could be correlated.

路 Thus, the Department is an Island, and the incumbent is the captain of his own ship, of the Governor of his own Island.

路 Never ever in business.

No Operational Objectives

路 The same as the Strategic and Departmental Objectives.

路 I want to state that this is not the fault of the Operational Incumbent, but the lack of Leadership, top down.

路 Thus, the poor leadership that drives the non-existing Strategic, Tactical Objectives, culminate in the silo implementation of Operational Risk Management.

Risk description

路 As a result of the absence of Objectives, the Risks are as wide and far apart as the gates of hell, Yes of Hell and not Heaven.

路 Everything goes through it, and everyone is of the opinion that their Risk Identification is spot on. But, measured against what?

路 The Objectives naturally.

路 So, the risk Identification is most of the time as lot of words, which do not create an uncertainty on any level of Objective.

Causal Factor or Contributing Factor (CF)

路 This is one of the most critical sections during the Risk Identification Process.

路 The Golden threat must run through from Strategic Objectives to where it ends up on the specific level, whether Strategic, Tactical, Operational or Project.

路 The causes will also be used as the starting point during the analysis phase of the risk implementation process.

路 So, if the model used is faulty here, the outcome or result with have a number of faults.

Consequences

路 Just remember, Consequence means: Outcome of an event (3.3.11) affecting objectives (3.1.2) (See ISO 31073: 2022)

路 Consequences are usually documented in five (5) broad business environments namely:

o Strategic

o Financial

o Operational

o Legal

o Reputational

路 Without a proper analysis of the consequences, the impact will not be realised

Estimated Monetary Value: Inherently (EMV-i)

路 Wow, never heard of this.

路 Many other company and Boards are also surprised.

路 Everything is business is Financial and Risk Management is a step closer to providing the Risk Owner with a Business Costing analysis.

路 If the Inherent (EMV-i) must be determined to ensure you know what the financial impact on the business objectives is.

路 What is the Residual (EMV-r)? and how was this determined, aligned with the controls implemented and assessed.

路 Then the last EMV is EMV-a. This is part of the Treatment of the risks. Remember, you as the risk owner are actually asking the management to open the company wallet. IS you don鈥檛 know what you are asking, do you think management will volunteer for you funds?

Inherent Risk Rating (IRR)

路 This is in every Risk Register.

路 This is usually represented of a number of the Consequence and the Likelihood.

路 And this process steals the time in risk facilitation. Why is everyone so entangled in Inherent Risk Rating (IRR). It does not contribute anything to the risk profile.

路 Please see the article regarding Internal Control Effectiveness (ICE) and the other article on the P2ST2 Methodology.

Risk Analysis Phase

Risk Owner

路 Risk Owners are usually in a Risk Register as part of the Treatment Phase.

路 This is where the Risk Owner is allocated tasks.

Management Controls

路 Risk Registers usually has some kind of Management Controls incorporated into the Risk Register.

路 But what we encounter so many times, is that the Management Controls are listed from 1 to a maximum 5 controls, and all of them usually Processes.

路 These 鈥渃ontrols鈥 does not address the Causal Factors / Contributing Factors (CF) as listed during the Risk Identification phase.

路 It is just a random list of perceived controls.

路 This is not an analysis of a risk; this is listing of something to fill the space.

路 There is no systematic process to the analysis process.

路 We usually need to explain the CAA P2ST2 process, agree on using it and from there, analyse the CF one by one and systematically.

路 Please see the article regarding Internal Control Effectiveness (ICE) and the other article on the P2ST2 Methodology.

Control Details

路 List the specific control, with the correct name, whether it is a People Control, a Process Control, a System Control, a Tool Control or Technology Control.

路 These controls will in the further analysis across the company be used as the Control Universe. Thus, if you have a different name for the control, you are going to create a huge challenge pertaining to the Data Integrity of the Control Universe.

Evidence

路 This is for ever lacking.

路 People want to talk controls, but they cannot list it

路 All the resources are available, but nothing can be produced.

路 This cannot be the validation process the Risk Managers or Chief Risk Officers (CRO) are accepting.

路 The Risk register is the starting point for a Risk Based Audit (RBA) and the evidence must be explicit and validated.

路 I suggest the following to be included in the evidence column:

o Name of the P2ST2

o Reference no

o Date of Issue

o Approval

o Validity Period

路 With this, Risk Management starts to be a valid tool for any manager and especially for the Internal Auditors (IA).

路 As a CRO, you are the standard of the knowledgebase in your organisation.

Control Owner

路 List this here for the specific risk.

路 The Control Owner (CO) must know that his performance is linked and monitored on various hierarchical levels.

路 This will drive performance across the business.

Risk Evaluation Phase

Internal Control Effectiveness (ICE)

路 Ahh, the ICE.

路 This is my favourite.

路 Each control must be separately assessed against a valid and detail Internal Control Effectiveness (ICE) Criteria. (Criteria is defined as: terms of reference against which the significance of risk (3.1.1) is evaluated (ISO 31073: 2022)

路 Some companies have nothing here, Others has some sort of attempt that they have started using. But it seems as if all these companies are using the ICE to cover their performance. It must be so vague that nobody can keep you accountable.

路 This is wrong and against the integrity of the discipline, the Code of Conduct, the risk management intention, etc.

路 According to me, as a strong believer in the Six Hat Theory of De Bono, the Black hat is Judgement. The above methodology borders on Fraud.

路 The correct way to determine the ICE, is through an anonymous process such as voting, but simple that you can obtain percentages.

路 Each Control are evaluated separately by the audience who has knowledge of the process, whether they are implementers or receivers of the service. This percentage score is listed against the specific Management Control (MC).

路 The average of all these scores is your overall ICE, or as we call it, your Level of Assurance (LoA).

路 Where a risk has been evaluated below 70%, or as determined by your overall Risk Appetite and Tolerance Statement, each of those risks must be treated.

Residual Risk (RR)

路 Everyone has some form of Residual risk (RR) in their Risk registers.

路 Let鈥檚 just take a step back. What is Residual Risk (RR)?: It is: risk (3.1.1) remaining after risk treatment (3.3.32)

路 It is always for us a question; how you arrived at that and how can you validate it to ensure that it is verifiable, repeatable and validated.

路 By using the Likelihood and Consequence process of determining IRR and the same process for RR.

路 This always has to me measured against some kind of ethical model. Please refer to the Cooper's decision-making model

路 As a simple test, we are using the Level of Risk (LoR) determined during the IRR. Make a calculation of the average of your ICE in the risk register. This is your LoA.

路 DO the calculation, please.

o Take the LoA and multiply this with the IRR (Usually out of 25).

o Let鈥檚 say the combined LoA was 85 and the balance is 15, multiply this with 25.

o You will get 21.25, thus a 21 on the Risk Matrix.

o Minus the 21.25 from 25 and you will get 3.75 or 15%, thus 4 on the Risk Matrix.

o This is your RR or Level of Risk (LoR).

If you are off by 5%, this is usually the norm, then your results are invalid and needs to be redone.

Estimated Monetary Value: Residually (EMV-r)

路 This is not in the risk registers.

路 With the LoR determined, calculate the EMV-r.

路 Take the LoR and multiply the 15% with your EMV-i.

路 You will get the Risk Exposure, calculated in monetary value.

路 This is your EMV-r.

路 And this is what the business, is defending.

Risk Treatment Phase

<70% Risks

路 This is not in the Risk registers.

路 Every risk must be treated to be at least 70%>

路 Aligned with the underperforming Management Control complete the following which will be detailed below.

Risk Treatment Options

路 Usually this is in there.

路 But no specifics regarding the different choices to be made.

路 There are risk treatment options which needs to be used:

o Treat

o Transfer

o Tolerate

o Terminate

o Take Opportunity

路 A definite choice must be made.

Action Steps

路 Usually this is in there.

路 This must be an actionable task, which can be tracked and traced with a specific deliverable.

Estimated Monetary Value: Actions (EMV-a)

路 Usually this is in there.

路 What are the costs of the actions to improve the ICE of the underperforming Management Controls?

路 This must bring the RR / LoR down.

路 You can obtain immediate approval for this is you know what you are asking. We are imprinting the following statement: What is your ask?

路 If you cannot quantify this, you have missed the opportunity.

Due Date

路 Usually this is in there.

路 This is self-explanatory

Responsible Person

路 Usually this is in there.

路 This is self-explanatory

Due Date failure and Escalation

路 This is not in the Risk registers.

路 This is the biggest frustration for consultants, and I am of the opinion from CRO鈥檚 as well.

路 As the Risk Registers are done every 3 months, you see the non-compliance and the non-delivery of these tasks.

路 And the new norm for the past 5-7 years, is, so when can you finalise this. And so, it repeats for 2-3 cycles.

路 This is an absolute No-No.

路 If the Risk Owner cannot complete the task, he needs to apply to the Risk Committee he reports to for extension, as per a normal motivational application.

路 The Chairperson of that committee must apply his mind and determine, will this create uncertainty on the objectives of the company and was these really valid reasons, why should you take up time during a Risk assessment process to address this poor performance.

路 If the Chairperson is not convinced, the application is denied, and full record must be kept. You are the custodian of the Companies Objectives, and this is business critical matters.

路 If this is repeated, then the question is, is this risk owner a repeat offender? If so, discipline steps need to be taken.

Comments

路 The only comments in a risk register is an official extension with documented evidence to support it.

Conclusion

A Risk Assessment is a structured process of risk identification, risk analysis and Risk evaluation. Followed by risk treatment and monitoring of the risk process.

But it is actually so much more. This is an official record, to the highest committee of the company as the overview of the status and health of the company. Through this process, one need to provide assurance.

But if the Risk Model is flawed, there is a huge knock-on effect on everything, and the validity and integrity of the risk process is challenged.

Risk Management results which are verifiable, repeatable and validated is the basis of protecting the Company Objectives, on every level.

These articles are steadily proceeding through the structure of a Risk Register and how to optimise the risk management process as a trusted process within the Strategic Management ecosystem of any company.