BaselII Opl Risk WP
BaselII Opl Risk WP
Self-Assessment Module 14
Key Risk Indicator Collection Module 16
Statistical Analysis 18
Scenario Analysis 19
Summary 20
About Hyperion 21
Regulators Board OR Committee OR Managers Business Managers
Introduction
The management of specific operational risks in financial institutions is not a new practice.
What is new is the emergence of operational risk as a comprehensive process to manage the
increased complexity in financial institutions. The increasing number of high-profile operational
risk cases1 has left no doubt in the minds of bank managers and regulators that risk systems
and risk-adjusted performance measures are potentially unreliable if they ignore operational
risk. Shareholders, employees, rating agencies, equity analysts and other stakeholders are
demanding focused operational risk information. Operational risk management is no longer
the poor cousin on the risk management catwalk.
Regulators, including the Basel Committee on Banking Supervision, have firmly thrust opera-
tional risk management onto center stage by imposing, for the first time, an explicit operational
risk capital charge to support their “soundness in banking” objective under what has become
known as the Basel II framework, due to be implemented in just over two years.2
Regulators recognizing both the importance and the embryonic nature of operational risk
management relative to the more developed credit risk and market risk disciplines, have
wisely introduced a carrot and stick approach. Regulators noted the nature of operational risk
management with its limited metrics, multiple causal and contributory factors, and variety
of event types. They have now devised a framework and a system of regulatory incentives to
encourage boards of directors and senior management to develop industry best practice opera-
tional risk systems. Sophisticated operational risk management requires less bank capital under
the new regulatory regime, and is now a key differentiator and a major source of competitive
advantage. Bank managers can therefore generate a better return to shareholders by adopting
robust operational risk management solutions.
At a recent operational risk conference in New York, Roger Cole, a member of the Federal
Reserve Board of Governors and chairman of the Risk Management Group of the Basel
Committee on Banking Supervision, said:
“To address the difficulties presented by the very nature of the risk, the designers
of operational risk measurement frameworks have to be more innovative, take
bigger steps into new territory, and be willing to step away from traditional (and
comfortably familiar) techniques than their counterparts in the credit and market
risk arenas. Tremendous creativity and insight have been brought to bear on the
issue of operational risk management.”
1
Barings and Daiwa (1995), Morgan Grenfell (1997), FNB Keystone, Rep Nat NY and Superior Bank (2001), J.P.Morgan Chase, Allied
Irish Banks and Bank of America (2002)
2
The Basel II framework is a new process that determines the amount of risk capital financial institutions are required to hold as a
result of business risks undertaken. It is due to be implemented in 2006. However, banks must have processes in place by 2004 to
meet Basel II stipulations. 1
Reporting
Processes • Loss Event and Risk Indicators
• Self-Assessment • Event Analysis
Economic Profit
• Data Collection • Risk Maps
Operational risk management solutions offer value far beyond an opportunity to reduce
regulatory capital. Operational risk management solutions provide bankers with a comprehen-
sive process that will enable them to understand, quantify and manage operational risk in
a structured manner, thus adding to the bottom line. A comprehensive solution includes a
framework for managing operational risk, a method of documenting and correcting the
weaknesses in business processes and an efficient reporting suite that will deliver tailored
relevant information to all levels throughout the organization. Best-practice operational risk
management solutions demand a comprehensive structured approach with dedicated
resources, both human and technical. Boards of directors are realizing with increasing concern
that investment in operational risk management solutions are inevitable and the sooner the
process begins, the sooner the rewards from the investment can be achieved.
The deadline for Basel II is fast approaching and banks will need to have made substantial
progress by the end of the current financial year if they are going to meet the exacting
timetable. Firms who have not already made substantial progress on Basel II preparations
will find it increasingly difficult and expensive to catch up as scarce resources become even
scarcer as the deadline gets nearer.
In arriving at the definition, the regulators recognized that the exact approach for operational
risk management that a bank chooses “will depend on a range of factors, including its size
and sophistication and the nature and complexity of its activities.” Notwithstanding individual
3
Para 607 Consultative Document April 2003 from Basel Committee of Banking Supervision
4
Deutsche Bank defines operational risk as the potential for incurring losses in relation to employees, project management, contractual
specifications and documentation, technology, infrastructure failure and disasters, external influences and customer relationships.
2
differences, the new regime demands clearly documented strategies and oversight by the board
and senior management, a strong operational risk culture and internal control culture5 (includ-
ing, among other things, clear lines of responsibility and segregation of duties), effective
internal escalation and reporting, and contingency planning.
The complex nature of operational risk is due to the dynamic environment in which the risk
occurs. This environment includes the interaction of five key areas:
• People
• Process
• Systems
• Business strategy
• Business environment
Business Strategy
Process
People Systems
Operational risk does not occur in a vacuum; no single failure will ever result in an operational
risk loss. The challenge is to work out the contributory factors.
5
Operational risk culture is the combined set of individual and corporate values, attitudes, competencies and behavior that determine a
firm’s commitment to and style of operational risk management.
3
People Risk
This is perhaps the most dynamic of all sources of operational risk. Internal controls are often
blamed for operational breakdowns, whereas the true cause of many operational losses can be
traced to people failures. Every CEO has argued that people are the most important resource
in his or her bank, yet the difficulty in measuring and modeling people risks has often led
management to shy away from the problem when it comes to evaluating this aspect of opera-
tional risk. Operational risk losses can occur due to worker compensation claims, violation of
employee health and safety rules, organized labor activities and discrimination claims. People
risks can also include inadequate training and management, human error, lack of segregation,
reliance on key individuals, lack of integrity, honesty, etc. In a people risk case, the Financial
Services Authority (FSA) fined ABN Amro £900,000 in April 2003 for “serious compliance fail-
ures.” According to the FSA, the compliance environment within a financial institution is a fun-
damental protection against the spread of poor standards of conduct. ABN Amro failed to
provide adequate resources for its compliance function, which resulted in the absence of robust
compliance. In July 2003, JP Morgan Chase agreed to pay €135 million and Citigroup agreed
to pay €120 million to the Securities and Exchange Commission for their roles in Enron’s
manipulation of its financial statements.
The changing nature of banking – with many bank branches evolving into sales outlets –
is leading to a general reduction in banking skills and, in some cases, bank competencies.
This changing environment needs to be accompanied by higher awareness of what can go
wrong and provision of risk mitigation techniques to reduce the possibility of surprises and
income volatility.
Process Risk
Unexpected volumes of new business can be a source of operational risk. There are numerous
examples of new product launches that either failed or were seriously compromised due to the
bank not being able to cope with the demand for its new product. In the flurry to get to market,
key processing requirements were overlooked. Remedial action is usually very costly both in
terms of time, money and goodwill.
Systems Risk
6
Washington Post, February 8, 2003
4
a new financial model. As a result, Provident was forced to subtract $70.3 million from earnings
statements released in the previous six years. The error was described by the chief financial
officer as a “dumb mistake – not intentional fraud.” Nonetheless, at least nine requests for class
action lawsuits have been filed.
The banking history is littered with cases where merger strategies have gone horribly wrong
and integration problems far exceeded the expected benefits of integration. In the 1980’s and
early 1990’s many European banks sought their fortunes by buying into the U.S. market only to
find that the crisis in the residential real estate market and the economy generally forced them
to reverse their strategies.
Banks tend to have the least control over this source of operational risk yet it still needs to be
managed. Business environment risk can arise from unanticipated legislative changes such as
consumer affairs, physical threats such as bank robberies, terrorist attacks, natural disasters
and financial report changes. The most striking example of environmental risk is the effects of
the terrorist attack in New York in September 2001. In addition to the personal devastation
caused, the insurance industry now puts the financial cost of these event at almost €100bn.
New competitive threats such as faster delivery channels, new products, new entrants and the
ever-increasing rationalization of the banking industry are driving banks to become much more
nimble-footed. The flexibility required to remain in the game leads some banks to take short-
cuts that eventually expose them to some new source of operational risk.
This framework is based on ten sound practices for the management and supervision of
Operational Risk.7 In parallel, the regulators are at the final stages of a process for determining
the amount of capital that a bank must provide in order to underpin the unique operational
risks within its organization. Final rules are expected in late 2003.
The capital requirements are set out in a paper known as the New Basel Accord or Basel II. 8
Basel II deals with the capital adequacy requirements, supervisory framework and reporting
7
See paper developed by the Basel committee called “Sound Practices for the Management and Supervision of Operational Risk,”
February 2003, available at http://www.bis.org/
5
requirements relating to the wider risk-taking aspects within banks including credit risk, market
risk and operational risk.
Ten Sound Practices for the Management and Supervision of Operational Risk
(Developed by the Bank of International Settlements)
Risk Management
4. Identity and access operational risk in new and existing products, activities, processes and
systems. Includes self-assessment, risk indicators and risk mapping
5. Processes to monitor operational risk or losses by senior management and board
6. Policies and procedures to control and mitigate risks; operational risk progress towards
stated objectives
7. Contingency and business continuity plans
Role of Supervisors
Role of Disclosure
Principle 1: The board of directors should be aware of the major aspects of the bank’s operational
risks as a distinct risk category that should be managed, and it should approve and periodically
review the bank’s operational risk management framework. The framework should provide a
firm-wide definition of operational risk and lay down the principles of how operational risk is to
be identified, assessed, monitored and controlled/mitigated.
8
Published by the Basel Committee on Banking Supervision, April 2003, available at http://www.bis.org/
6
Principle 2: The board of directors should ensure that the bank’s operational risk management
framework is subject to effective and comprehensive internal audit by operationally independent,
appropriately trained and competent staff. The internal audit function should not be directly
responsible for operational risk management.
Principle 3: Senior management should have responsibility for implementing the operational risk
management framework approved by the board of directors. The framework should be consis-
tently implemented throughout the whole banking organization, and all levels of staff should
understand their responsibilities with respect to operational risk management. Senior manage-
ment should also have responsibility for developing policies, processes and procedures for manag-
ing operational risk in all of the bank’s material products, activities, processes and systems.
Principle 4: Banks should identify and assess the operational risk inherent in all material products,
activities, processes and systems. Banks should also ensure that before new products, activities,
processes and systems are introduced or undertaken, the operational risk inherent in them is sub-
ject to adequate assessment procedures.
7
Principle 5: Banks should implement a process to regularly monitor operational risk profiles and
material exposures to losses. There should be regular reporting of pertinent information to senior
management and the board of directors that supports the proactive management of operational risk.
Principle 6: Banks should have policies, processes and procedures to control and/or mitigate mate-
rial operational risks. Banks should periodically review their risk limitation and control strategies
and adjust their operational risk profile accordingly using appropriate strategies, in light of their
overall risk appetite and profile.
• Special emphasis on new activities, products and markets, and geographically distant outlets
• Examination of risk mitigation tools such as insurance
• Disaster recovery plans for critical processes
• Examine potential deficiencies in third-party vendor products
Principle 7: Banks should have in place contingency and business continuity plans to ensure their
ability to operate on an ongoing basis and limit losses in the event of severe business disruption.
Principle 8: Banking supervisors should require that all banks, regardless of size, have an effec-
tive framework in place to identify, assess, monitor and control/mitigate material operational
risks as part of an overall approach to risk management.
• Ensure operational risk management frameworks are consistent with complexity of the indi-
vidual bank
• Responsibility to encourage deficient banks to take appropriate action
Principle 10: Banks should make sufficient public disclosure to allow market participants to assess
their approach to operational risk management.
9
Basic Indicator Approach
Again, gross income is a proxy measure but in this case it is broken out by eight standard busi-
ness-lines each, with a different beta factor to calculate capital.
• Total capital is the sum of the product of the relevant gross income and the beta factor.
• Banks, at the national supervisor’s discretion, may be permitted to substitute an alternative
measure in the case of retail and commercial banking. In this case, the volume of outstanding
loans will be multiplied by the beta factor and the result multiplied by 3.5%. This method,
known as the alternative standardized approach (ASA) was introduce to eliminated double
counting of risks.
• In order to qualify for the standard approach, a set of minimum entry standards is required.
• More exacting quantitative and qualitative entry standards are required before a bank is permit-
ted to qualify as an advanced measurement approach bank. These are set out in Para 626 to
636 in the Third Consultative Paper published by the Basel Committee in April 2003.
• The Basel Committee does not prescribe an exact capital required methodology under the
advanced measurement approach. An attempt was made to develop a prescriptive formula
(known as the internal measurement approach) but this was abandoned in April 2003 as it was
not risk-sensitive enough. Banks are encouraged to develop their own methods provided the
measure calculates capital that covers both expected loss and unexpected loss. The industry
is gravitating to a method known as the loss distribution approach.
10
Loss Distribution Approach
• Under this approach, banks will calculate two distributions: one for frequency and one for
severity
• Frequency distributions are usually binomial, negative binomial or poisson
• Event severity distributions are wider in choice: log normal, Pareto, Weibull or
inverse Gaussian
• A compound distribution is calculated using Monte Carlo simulation
• Estimate the mean and the 99.9 percentile from the resulting distribution
( =1 year Value at Risk)
• Mean is Expected Loss
• Difference between 99.9 percentile Value at Risk and Expected Loss = Unexpected Loss =
Capital charge
While many institutions will begin with either the basic indicator approach or the standardized
approach, the loss distribution approach is emerging as the consensus best practice approach
for a number of reasons.
• The Basel Committee has moved away from a previously mooted approach called the
internal measurement approach on the grounds that it is not now deemed to be sufficiently
credible. This leave the loss distribution approach as the front-runner under the advanced
measurement approach.
• The loss distribution approach is theoretically the most robust method developed to date.
Although it is more complex than the other approaches, it is likely to provide the most
efficient use of economic capital, particularly with institutions that have the resources to
implement it.
• When implemented, the loss distribution approach will reduce expected losses and volatility
of earnings, and allow identification of causal factors for operating losses.
• The loss distribution approach provides a framework for addressing extreme outcomes.
It also allows comparisons of investment controls and reduces distortions in decision making
and performance evaluation that can happen if the capital attributable to operational risk is
crudely measured or omitted.
11
An Operational Risk Management
Framework
Loss Management Setup
Loss Event
Reporting and
Analysis
Self-Assesment
Process
Collect Loss
Continous Improvement
Event Data
Process Gap
Analysis
Collect and
Monitor KRIs
Assessment
Figure 5 depicts the entire operational risk management process. It includes an initial setup
stage, an assessment stage, a process improvement stage and, finally, a loss management stage.
The setup stage involves detailing the institution’s risk appetite, developing high-level policy
and allocating resources. This is a top-down process, conducted at board of director and senior
management level.
At the assessment stage, specific operational risks are identified and assessed for broad policy
compliance/acceptability. This is very much a bottom-up exercise. The most common strategy
takes the form of an internal self-assessment exercise where local business managers identify
and score risks associated with their business.9 The diverse nature of operational risk demands
that the self-assessment exercise be conducted in a structured forum and it is essential that a
mechanism be available to record the outcome in a “firm-wide” consistent fashion. Most banks
start the self-assessment process with a structured workshop where senior business managers
and their key support staff identify key risks to the achievement of business goals.10 These key
risks (up to 50 per business unit) are then ranked in order of importance and they are (subse-
quently) subjectively scored on two dimensions: likelihood and severity.11 Each of the (50) risks
needs to be classified and mapped to the Basel II risk event types for subsequent reporting
under the capital adequacy rules. The process of classifying and mapping the risks needs to be
carried out and stored in a structured manner. In addition to recording the business risks, risk
managers need to record and classify key risk indicators. Key risk indicators need to be mapped
to the identified risks to provide management with an early warning mechanism of future risk.
Self-assessment and identification of key risk indicators are not one-time exercises. Management
needs to identify processes that contain excessive risk and those that contain high, but accept-
able risk, on an ongoing basis.
The process improvement stage entails making a decision on whether to retain or mitigate risk.
The decision is usually taken only after some cost benefit analysis is performed, often requiring
operational modeling. Once a decision is taken to reduce operational risk, a remedial action
9
See scenario analysis further on in this paper.
10
Identification of key risks usually involves a prior process of identifying business goals and the key business processes (or critical suc-
cess factors) that are required to deliver the goals.
11
Likelihood could for instance be Almost certain, Likely, Possible, Unlikely and Rare while Severity will depend on the nature of the risk
12 e.g. Financial classifications could run through Catastrophic, Significant, Moderate, Minor, Minimal.
plan needs to be assigned to designated individuals and its progress needs to be tracked. Unless
the remedial action plans are interfaced with the self-assessment solution, the process of track-
ing action plan progress becomes cumbersome.
Finally, a loss management stage takes place. This stage involves monitoring the ongoing level
of key risk indicators, and recording individual loss events (to at least the level of detail
required by Basel II). It requires management to analyze and report actual losses in a manner
that focuses action on areas that need immediate attention. The analysis of actual losses is also
used to validate the results from the self-assessment process by identifying areas where the
level of loss events does not correlate with the self-assessment results. Loss event data will be
used to validate the relevance of key risk indicators on a regular basis. Where possible, the two
processes (key risk indicators and loss events), should be performed on a single platform.
Finally, the loss event data (which includes both internal and external data) is used to calculate
the operational value at risk and hence the Basel II capital requirement. Banks need an efficient
solution to gather and store loss events/key risk indicators. The information must be easily
accessible and reportable in a way that enables business owners to manage loss events from
“discovery to resolution.”
In summary, integrated operational risk management requires a solution that facilitates self-
assessment, tracks key risk indicators, captures loss events, performs statistical analysis and
reports to management on the entire operational risk process, including progress towards
agreed operational risk objectives.
The Hyperion solution is based not only on the operational risk experience of the banking
industry, but also on its experience in dealing in operational risk in other fields, such as energy
and insurance. Hyperion started with the basic principles from the wider world of risk manage-
ment, within a framework of risk identification, measurement, management (mitigate and
control or exploit), and an ongoing monitoring process. It incorporated the ten sound practices
as outlined by Basel and developed the process a step further to enable operational risk man-
agers to optimize shareholder value. Following extensive discussions with its partners, banking
customers and regulators, Hyperion has developed the following solutions:
• A self-assessment module
• A key risk indicator collection module
• A loss event collection module
• Statistical analysis and capital calculation
• A scenario analysis module
13
Hyperion Operational Risk Management: From Discovery to Resolution
Hyperion Operational Risk Management offers a platform for the display, monitoring and
management of all operational risk and resulting losses. It draws together the entire universe
of operational risk information and allows users to view tailored reports based on any combina-
tion of self-assessment, key risk indicators, or loss event data. Operational risk can be viewed
and managed by business line, event type, location, severity, timelines, etc. Operational risk
management automatically escalates issues that have exceeded pre-defined thresholds, automat-
ically providing alerts, including e-mail notification to designated managers.
Hyperion’s Operational Risk Management supports management over the entire operational risk
cycle. The system can provide risk strategy maps and accountability maps. It can also create
initiatives that support and track agreed-upon remedial action plans from initial discovery to
the stage where identified issues are finally resolved.
Ongoing internal validation of the information is a unique feature of Hyperion Operational Risk
Management. Users can cross-correlate information from the self-assessment module, the
key risk indicator module and the loss event module to provide senior management with an
ongoing comfort that the three modules are reflecting a uniform message.
Hyperion Operational Risk Management contains a full audit trail that enables users to comply
with best industry standards and regulatory requirements.
Self-Assessment Module
This module is a Web-enabled tool available to all levels of the organization. It facilitates the
collection and storage of key business risks and their scores and key risk indicators and con-
trols for each business process. The module keeps track of absolute risk scores and control
risk scores and automatically links to approved remedial action plans, deliverables and mile-
stones. It supports organizational reporting hierarchies, any number of business processes
and activities.
Figure 6. Self-assessment.
14
For example, managers in the retail division of a bank can use this module to assess the likeli-
hood and severity of credit card fraud. The individual bank determines likelihood and severity
scores, and Hyperion can accommodate any number of calibrations. During a self-assessment
workshop, managers might agree that the likelihood of credit card fraud is “almost certain” but
that the severity might be “moderate.” The combined effects an almost certain/moderate event
will give what is know as an “absolute risk” score After consideration of associated controls
around the process, the likelihood score may be reduced to “likely,” but the severity might still
remain at “moderate.” The combination of likely/moderate will produce a lower risk score this
time known as a “controlled” score. At the same time managers in the wholesale division of the
same bank can use the module to assess the risk of inter-bank trading. In both cases manage-
ment can assess the impact of these very different risks. Senior management, and other inter-
ested parties, for example internal audit or fraud prevention units can monitor progress towards
agreed improvements.
Acceptable Control
Risks
Identified
Risks
Transfer
Unacceptable
Key Risks
Risks
Unidentified
Risks Avoid
After reviewing the initial unit heat chart, management will need to consider countermeasures or
controls. The bank will need to consider the effect on the likelihood and severity of the counter-
measure and re-compute the unit heat chart. If a controlled risk is still not acceptable, it creates a
gap. Management must then decide on its strategy for that risk. It can either reject or accept the
risk. Rejection strategies could include further countermeasures, reduce exposure, avoid or transfer
the risk. Accept strategies could include retention or exploit operational risk. Hyperion’s solution
enables users to automatically drill down from the unit heat chart to the action plans to review
progress and escalate the issue if necessary. This key benefit enables management to view opera-
tional risk in an integrated fashion without having to access separate systems.
15
Once a decision is made to change something as a result of the self-assessment process, it will
need to be implemented. This is supported by initiative tracking, scorecards, risk strategy maps,
risk accountability maps, dashboards and reports within Hyperion Operational Risk Management.
This provides management with relevant and timely information to continuously monitor total
operational risk and to establish process and activity performance goals and targets to meet
operational risk objectives.
Hyperion Operational Risk Management also supports cost benefit analysis and reduction
through its robust operational modeling capability.
In order to measure and monitor the adequacy of the risk management strategies, each business
unit must identify key risk indicators, the “pressure points” where weaknesses can be recognized.
Key risk indicators will validate the effectiveness of the controls or act as an early warning system
to management. If the key risk indicator indicates that a process is falling short of specific targets,
it may highlight an operational issue that needs to be addressed. For example, the level of cus-
tomer complaints may act as a key risk indicator for customer satisfaction while an increase in
transaction errors may indicate inadequate training.
In this module a business or risk manager can record risk indicators that might have been iden-
tified in the self-assessment workshop. The risk indicators in the case of credit card fraud might
be credit authorization system downtime or the number of open customer disputed transac-
tions whereas the risk indicators in the case of inter-bank dealing might be late payment inter-
est charges, the number of outstanding unmatched confirmations or the number of limit breaches.
Key risk indicators are usually performance- or failure-based and can be key performance indi-
cators or key control indicators. Key risk indicators should be relevant, minimally correlated,
measurable and manageable in number. The business risk owner defines the key risk indicators
and acceptable target levels.
Hyperion’s key risk indicator tool can automatically source indicators from legacy systems or a
central database.
16
Loss Event Collection Module
This is another Web-enabled module available to all organizational business units that is capable of:
• Capturing both internal and external loss events (External loss events will need to be scaled for
both size and complexity of the individual bank in question.)
• Aggregating losses by employee, business unit, legal entity, country, group, as well as loss type
or loss category
• Capturing “near misses” that did not result in any operational loss
• Storing causation factors
• Storing the direct and indirect costs, such as “cost of carry” and remedial costs.
• While the system will capture all operational risk events irrespective of size, it is capable
of reporting only events above an agreed cut-off level
Hyperion’s solution captures not only the minimum loss event data as outlined by the Operational
Risk Implementation Advisory Group, but it also has the flexibility to add more data fields as
banks require.
Using the loss event input module, unit operational risk staff who are responsible for gathering
actual loss events record such details as where and when the loss occurred, how it occurred,
who is responsible for it (and thus correcting the weakness). The module also allows interested
parties to enter comments and issues, including references to other operational risk actions that
might affect this risk type. Risk staff can also record the individual loss amounts, including
details of recoveries, if any. This data is then automatically consolidated with other unit’s data to
create a corporate loss database that can be analyzed centrally.
The module enables banks to take data feeds from internal or external systems and thus facili-
tates the input of external losses (which will need to be scaled) so that a complete relevant loss
database is constructed.
17
Hyperion Operational Risk Management offers the key benefit of single instance reporting –
sending the same report to multiple interested parties, such as audit, compliance, fraud, insur-
ance group, operational risk managers, etc. Authorized interested parties can access the system
to raise issues and give an independent view of progress towards the final resolution of all out-
standing issues. This key benefit enables management to view the key inputs from all relevant
parties in one single source.
Statistical Analysis
In conjunction with our partners Hyperion has developed a statistical model to quantify operational
risk exposure and calculate operational risk capital. The solution includes:
• Supporting all three Basel II measures; Basic Indicator approach, The Standardized Approach
(including the latest proposed Alternative Standardized Approach) and the Advanced
Measurement Approach
• Mapping your organization to the agreed regulatory categories, allowing for internal
reorganizations
• Supporting proprietary and third-party analytical and simulation models for capital calcula-
tions
• Accepting external data and scaling it to any organization using any one of a number of
scaling factors, such as gross income, headcount, administration cost or total compensation
Individual losses are taken from the loss database (including external scaled losses where
appropriate). The losses are then classified by business line and event type according to the
Basel II guidelines. Within Hyperion, there is no restriction on the number of risk classifications
that a bank may use, but it is recommended that risk classifications are mapped to the Basel II
classifications for comparative purposes.
Frequency
74.712.345
of Events
74.603.709
74.457.745
VaR
74.346.957
Calculator
74.344.576 e.g.,
0 1 2 3 4 Monte
•
• Carlo
Simulation
•
Engine
167.245 Severity Mean 99th Percentile
142.456 of Loss Annual Aggregate Loss ($)
123.345
113.342
94.458
0 1 2 3 4
18
Once losses have been classified, two distributions can be calculated: a frequency distribution
and a severity distribution. In the early stages of processing, sufficient data may not be avail-
able to calculate these distributions at business-unit level, and banks may need to run the
analysis at corporate level. When sufficient data are available, the distributions can be calcu-
lated for each business line and event type “cell.”
Finally, Hyperion can calculate a compound distribution or total loss distribution using a
Monte Carlo simulation engine and from this the operational risk capital is calculated.
Like all other components in Hyperion Operational Risk Management, the outputs from a
statistical engine are automatically fed into the reporting module.
Scenario Analysis
Scenario analysis is used to forecast operational losses and the events that caused them based
on the knowledge of business experts. It has both a quantitative and a qualitative aspect.
Scenario analysis can be used to supplement insufficient loss data, to provide a forward-looking
element in the capital assessment, and stress test the capital assessment. The most common
use is to supplement insufficient loss data and can be used at the early stages of operational
risk management.
Scenario analysis can be a top-down or a more detailed bottom-up exercise. The process is
similar to self-assessment; indeed some banks consider scenario analysis as an initial self-
assessment exercise.
19
Summary
Until recently, operational risk was the poor cousin when compared to market risk or credit risk.
High-profile cases have firmly thrust operational risk into the limelight. Both encouraged and
threatened by regulatory developments, the banking industry has at last concentrated on a
structured and comprehensive approach to the management of operational risk. This ongoing
effort is one of the greatest challenges to bank management today. All banks that will be
impacted by the new regulations must begin preparing immediately. This includes ensuring that
operational risk is managed comprehensively and that the bank is capable of demonstrating a
robust solution to the regulators.
Legacy operational risk solutions never existed until recently when a number of software houses
began to develop solutions. Most solutions only provide partial answers to the highly complex
problem of managing a problem that carries such a diverse array of issues.
Business Performance Management is about driving reliable results and strategic focus through-
out the enterprise. Reliable results are a product of clearly communicated targets and actions to
employees, coupled with presenting progress and determining the best course for future
actions. The value of Business Performance Management achieved at a superior level is three-
fold: enhanced competitiveness, increased profitability and business risk reduction.
Financial institutions reviewing solutions meeting the requirements of the Basel II accord
should consider the shared, common goals of Business Performance Management with the
global accord.
Enhanced competitiveness translates to the need for greater agility in the banking marketplace
without increasing operational risk exposure due to an extremely sophisticated control environ-
ment. Equally important, an advantageous competitive position facilitates the lowering of capi-
tal reserve requirements, thus unlocking more capital for additional, incremental means of
revenue generation.
Finally, a financial institution that reduces its business risk with a superior operational risk
environment is rewarded with a higher credit/beta ratings by its investors.
Hyperion, the global leader in Business Performance Management, is the only provider of a com-
prehensive operational risk solution that covers all stages in the cycle. Its four modules, self-
assessment, key risk indicator, loss event and statistical analysis, are all part of an integrated
solution that truly enables banks to fully get their arms around operational risk.
Hyperion Operational Risk Management is built on open standards, making it easy to integrate
with existing third-party tools, databases, and messaging standards. It is designed specifically
to work in mixed-vendor environments. Hyperion offers enhanced scalability and lets financial
institutions roll out the software to as many users as necessary on a bank-defined timeline.
Thus banks can grow their own solutions at their own pace.
Now working as an independent risk consultant from the Invent Centre in Dublin City
University, Padraic specializes in preparing financial institutions for the forthcoming Basel II
regulations in credit and operational risk. He recently published an article in Finance magazine
on the latest CP3 developments and works as consultant with one of the Big Four accounting
firms, assisting them with Basel II diagnostics and strategy.
Padraic Walsh earned a bachelor’s degree in business from University College Dublin and a
master’s in treasury and investments from Dublin City University. He is a member of the
Chartered Association of Certified Accountants.
About Hyperion
Hyperion is the global leader in Business Performance Management software that enables com-
panies to translate strategies into plans, monitor execution and provide insight to improve
financial and operational performance. More than 6,000 customers worldwide use Hyperion's
Business Performance Management family of packaged and tailored applications and its leading
business intelligence platform. Hyperion has a network of more than 330 partners to provide
innovative and specialized Business Performance Management solutions and services.
21
Hyperion Worldwide Headquarters
Hyperion Solutions Corporation
1344 Crossman Avenue
Sunnyvale, CA 94089
Tel: +1 408 744 9500
Fax:+1 408 744 0400
www.hyperion.com
Product Information
Tel: 800 286 8000 (U.S. only)
Consulting Services
E-mail: northamerican_consulting
@hyperion.com
Education Services
E-mail: [email protected]