Topic 1. Scope of Risk Identification
Topic 2. Top-Down Risk Identification Tools
Topic 3. Bottom-Up Risk Identification Tools
Topic 4. Scenario Analysis Best Practices
Top-Down: Initiated by senior management and cascaded to business units and processes.
Bottom-Up: Business units assess their own risks locally.
Top-down: Begins at board level → business units → business processes.
Bottom-up: Focuses on risks specific to each unit or function.
Effective risk identification supports profitability and loss prevention.
The collection of risks identified forms part of the bank’s overall risk inventory—or alternatively, its risk register or risk universe.
Q1. In the context of risk identification, which of the following items is most likely to be considered a vulnerability?
A. Principal regulator.
B. Critical third parties.
C. Stand-alone IT systems.
D. Main drivers of revenue.
Explanation: C is correct.
Q2. The chief risk officer (CRO) at a local bank is more in favor of an assessment of operational risk at a more local and detailed level. Which of the following risk identification tools is the CRO least likely
to recommend?
A. Risk wheel.
B. Process mapping.
C. Analysis of near misses.
D. Risk and control self-assessment.
Explanation: A is correct.
Examples include natural disasters, global pandemics, major cyberattacks, and major business disruptions.
Regulatory Guidance
Q3. Which of the following statements regarding scenario analysis workshops and brainstorming sessions at a large bank is most accurate?
A. The assumptions used in scenario analysis can only be based on real-life data.
B. The facilitators of the workshops and sessions should be taken from the board of directors and senior management.
C. The participants in the workshops and sessions should be taken from a full range of seniority levels within the dierent business units.
D. The most common procedure is to withhold a “preparation pack” of documents from participants and distribute them after the generation phase to minimize any bias introduced to the sessions.
Explanation: A is correct.
Topic 1. Operational Risk Taxonomies
Topic 2. Custom Taxonomies
Topic 3. Operational Riskdata eXchange (ORX) Taxonomy
Topic 4. ORX Taxonomy: Level 1 and Level 2 Risks
Topic 5. Taxonomies for Causes, Impacts, and Controls
Topic 6. Taxonomies for Causes
Topic 7. Taxonomies for Impacts
Topic 8. Taxonomies for Controls
Q1. Regarding the Basel taxonomy of operational risks for banks and the Level 1 category of internal fraud, which of the following items would most appropriately be included at Level 3?
A. Insider trading.
B. Theft and fraud.
C. Unauthorized activity.
D. Losses due to acts of a type intended to defraud.
Explanation: A is correct.
Figure 44.6 illustrates the overall relationship, with the encircled portion representing the actions steps to be taken based on the causes of the risks and controls that are available.
Impacts are classified at Level 1 as direct financial (losses or remediation), indirect financial, and non-financial
Preventive: Preventive controls are proactive in nature and used to minimize the chance of risks occurring by directly addressing the likely causes.
Example: An edit check (e.g.,must be five digits in length) to reduce data entry errors.
Detective: Detective controls come into play during or after the event in hopes of minimizing any negative impacts.
Example: A periodic reconciliation of transactions for accuracy (e.g., two independent amounts should “balance”).
Corrective: Corrective controls try to minimize or fix errors going forward so that they are not repeated in the future.
Example: Training sessions and sharing of “best practices.”
Directive: Directive controls consist of guidance, processes, and training that are provided while performing duties to minimize the risk of error.
Example: Detailed and step-by-step instructions on how to perform a specific process.
Q2. An investor records its investments on its internal systems and reconciles them with the investment listing on the brokerage statement each month. This reconciliation is best described as a:
A. corrective control.
B. detective control.
C. directive control.
D. preventative control.
Explanation: B is correct.
A reconciliation is meant to detect an error as soon as possible so that it can be subsequently corrected, if needed. In that regard, the reconciliation is best described as a detective control. The reconciliation is not a corrective control as the reconciliation itself does not correct the error.