SlideShare a Scribd company logo
1 of 4
Download to read offline
Article from:
Risk Management
July 2005 – Issue 5
O
perational risk can sometimes be a
broad and elusive concept. A defini-
tion is thus necessary. The accepted
definition within the financial community is to
define operational risk as the risk of direct and
indirect losses resulting from inadequate or
failed internal processes, systems, people or
external events. This is also the definition that
is used by the majority of financial institutions
that estimate the amount of economic capital
required to cover this unexpected conse-
quence of this risk, as mandated by some new
regulatory standards.
However, for internal purposes, institutions
may want to add other risks to the definition of
operational risk in order to satisfy additional
business goals. For example, some institutions
wanttoassessthequalitativeorquantitativeim-
pactsresultingfromeventsaffectingtheirrepu-
tation. Others are measuring strategic impacts
as well. Others are becoming interested in as-
sessing risks that pertain to projects.
These projects can be new products, new geo-
graphiclocations,newventures,overhaulofex-
istingoperations,newITsoftwaredevelopment,
etc. They involve many people, many steps,
many processes, many systems and are affected
by external events. Thus, assessing and manag-
ingthemanyrisksfacedbyanyprojectwillhelp
an organization reduce the likelihood of its fail-
ure and contribute to a better use of its limited
human and monetary resources to the manage-
ment of the most risky ones.
A possible approach to assess the riskiness of a
project is the scorecard approach in risk man-
agement. It has a lot of similarities to traditional
actuarial and underwriting of risk. The first
Operational RiskAssessment in IT Projects
by Michel Rochette
Operational Risk
Michel Rochette, FSA,
MAAA, MBA, is an actuary
specializing in risk man-
agement for CDP Capital in
Montreal, Quebec. He can
be reached at mrochette@
lacaisse.com.
Operational Risk Category Risk Drivers
IT Systems
• Number of providers
• Level of technological reliability
• Technical complexity
• Number of links to existing and future systems
Process and Human
(Direct Implementation)
• Number of providers
• Relative size of the project
• Team diversity
• Length of project
• Definition of roles
• Number of steps in the project
• Team expertise
Process and Human
(Indirect use)
• Number of changes to the processes
• Expertise of the uses of the IT systems
• Number of internal and external users
Credit • Financial capacity of the IT providers
Legal • Number of legal contracts to negotiate
External • External events outside the organization
Table 1
 Page 38
Risk Management  July 2005
component is the identification of operational
risk drivers or risk factors that might cause a
project to fail (see Table 1 on page 38). In other
words, the determination of the factors that ex-
plain the frequency of failure of the project.
These risk drivers are then rated. A similar ap-
proach is done for the likely impacts following
failure—monetary or non-monetary—taking
into account the effectiveness of controls that
are put in place to mitigate its failure. Then, the
riskiness of the project—the project risk
score—is measured as the rated frequency
times the rated impacts net of controls. Then,
depending on the risk tolerance of the organiza-
tion, a decision is made to go ahead or not with
the project and necessary resources are allocat-
ed to manage its resulting risks.
The rest of this article briefly explains such an
approach. It was developed for the assessment
ofoperationalriskforITprojects.Ithasnowbe-
come an integral part of the process to make de-
cisionsaboutITprojectsinmycompany.Infact,
standards like COBIT in IT software develop-
ment usually mandate this analysis.
Thefirstcomponentoftheprojectriskscoreisthe
calculationofthescoreforthefrequency.Itisob-
tainedbyscoringtheriskdriversthatexplainin-
cidents from the IT systems themselves—from
directprocessesrelatedtotheimplementationof
the IT systems, indirect processes related to the
useofthenewITsystems,humanfraud,legalin-
cidents resulting from negotiating IT contracts,
the credit failure of the companies providing the
ITsystemsandotherexternaleventsaffectingthe
projectoverall.
Table 1 on page 38 lists the main risk drivers for
each category of operational risk for the IT proj-
ect. They were chosen because of the fact that
they can be measured easily from the informa-
tion that is usually part of an IT project like the
forecasted budget, the time associated with it,
the number of people involved, etc. Also, they
werecrossreferencedtothemanypublishedar-
ticles on the subject over the years.
Each risk driver was scored as a null, weak,
moderate or high risk (see Table 2). Then, a
number was assigned for calculation purposes.
TheriskscoringreflectsknowledgeoftheITex-
perts and the risk tolerance of the organization,
as well as taking into account the size and scale
of the organization. Over time, these scores will
be translated in probabilities as experience is
accumulated.
Forexample,thescoreassociatedwiththenum-
ber of providers was determined based on the
following scale.
Once all risk drivers were scored, the overall
riskiness for the frequency was calculated sim-
ply by averaging all risk scores. It would also be
possible to weigh more some risk drivers, and
theaveragescorecouldbefurtheranalyzedsep-
arately for each risk category.
The second component of the project risk score
is the calculation of the score for the monetary
impacts from potential incidents in each risk
category (see Table 3 on page 40).
Again,asimilarapproachtothefrequencycom-
ponent was followed. The impact for each com-
ponent of risk was estimated as a percentage of
the relevant IT budgets.
To determine the overall riskiness related to the
impacts of the project and to add some conser-
vatism, all monetary impacts were simply
summed. We didn’t take into account non-mon-
etaryimpactforthetimebeing.Then,reflecting
past expert knowledge and the risk tolerance of
the organization, the overall impact of the IT
projectwasscoredonascaleofnull,weak,mod-
erate and high risk (see Table 4 on page 40).
Risk Management
Issue Number 5 • July 2005
Published by the Society of Actuaries
475 N. Martingale Road, Suite 600
Schaumburg, IL 60173-2226
phone: (847) 706-3500
fax: (847) 706-3599
www.soa.org
This newsletter is free to section members.
A subscription is $15.00 for nonmembers.
Current-year issues are available from the
Communications Department. Back issues
of section newsletters have been placed in
the SOA library and on the SOA Web site:
(www.soa.org). Photocopies of back issues
may be requested for a nominal fee.
2004-2005 SECTION
LEADERSHIP
Editor
Ken Seng Tan, ASA
University of Waterloo
Waterloo, Ontario
Canada N2L3G1
phone: (519) 888-4567 xt. 6688
fax: (519) 746-1875
e-mail: kstan@uwaterloo.ca
Council Members
Douglas W. Brooks, FSA
Charles L. Gilbert, FSA
John J. Kollar, FCAS
David Ingram, FSA
Beverly Margolian, FSA
Hubert B. Mueller, FSA
Frank P. Sabatini, FSA
Ken Seng Tan, ASA
Fred Tavan, FSA
Shaun Wang, ASA
Society Staff Contacts
Clay Baznik, Publications Director
cbaznik@soa.org
Newsletter Design
Joe Adduci, DTP Coordinator
Facts and opinions contained herein
arethesoleresponsibilityofthepersons
expressing them and should not be
attributed to the Society of Actuaries, its
committees,theRiskManagementSection
or the employers of the authors. We will
promptly correct errors brought to our
attention.
This newsletter was printed on recylcled
paper.
Copyright © 2005 Society of Actuaries.
All rights reserved.
Printed in the United States of America.
July 2005  Risk Management
Risk Driver Score
No provider Null (0)
1 provider Weak (1)
2 to 3 providers Moderate (2)
More than 3 providers High (3)
Table 2: Example of the Risk
Scale of a Risk Driver
Number of Providers
continued on page 40 
Page 39 
And as actuaries are familiar, an overall risk
scoreiscalculatedastheproductofthefrequen-
cy and impact score. Then, for internal commu-
nication purposes, instead of talking in terms of
expected averages, the IT project risk score has
beencommunicatedaswordsusingthefollowing
scale (see Table 5).
So far, 14 IT projects in 2005 have been ana-
lyzed using this new approach. More than one
third of the IT projects had a risk score that
ranked above moderate. Given these risk
scores, more resources in project management
were allocated to these respective projects, re-
sulting in a better allocation of the firm’s re-
sources and, indirectly, economic capital.
Some refinements are under way, like integrat-
ing the effectiveness of controls—control
score—inthisprocess.Thisisparticularlyrele-
vant given the interest firms have in certifying
their financial statements under the new SOX
regulatory standard. Also, it is envisioned that a
more refined risk assessment will be developed
as loss data is accumulated, which will allow us
to be able to statistically measure some of these
components.
Finally, this has been an interesting project to
demonstrate to different groups in my company
how my actuarial background, along with the
knowledge developed over the years in the field
of risk management, could help it better assess
and manage the operational risk resulting from
IT projects. 3
Operational Risk Assessment in
IT Project
 continued from page 39
Risk Management  July 2005
Operational Risk
Total Monetary Impacts (Exposure) Score
Less than $50,000 Null (0)
Between $50,000 and $100,000 Weak (1)
Between $100,000 and $250,000 Moderate (2)
More than $250,000 High (3)
IT Project Risk Score Score
0 Null
Between 1 and 3 Weak
Between 4 and 7 Moderate
More than 7 High
Operational Risk Category Monetary Impacts
IT systems Budget for the IT equipment and software
Process and Human
(Direct implementation)
Budget for the internal and external human
employees and consultants
Process and Human
(Indirect use)
50% of the total IT budget
Credit 50% of the the budget of the IT providers
Legal 1% of the total IT budget
External 1% of the total IT budget
Table 3
Table 4: Risk Scale for the Monetary Impact
Table 5: Risk Scale for the IT
Project Risk Score
 Page 40

More Related Content

What's hot

Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Doreen Loeber
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guideAstalapulosListestos
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guideAstalapulosListestos
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthGrant Thornton LLP
 
Management summary presentation
Management summary presentationManagement summary presentation
Management summary presentationIT Strategy Group
 
Cyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance MarketsCyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance MarketsJay Kesan
 
Relative risk benchmarking enabling better decision making for managing infor...
Relative risk benchmarking enabling better decision making for managing infor...Relative risk benchmarking enabling better decision making for managing infor...
Relative risk benchmarking enabling better decision making for managing infor...IAEME Publication
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guideAstalapulosListestos
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
The four horsemen of IT project doom -- kappelman
The four horsemen of IT project doom -- kappelmanThe four horsemen of IT project doom -- kappelman
The four horsemen of IT project doom -- kappelmanLeon Kappelman
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
Data Analytics for Auditors Data Analytics Software
Data Analytics for Auditors Data Analytics Software Data Analytics for Auditors Data Analytics Software
Data Analytics for Auditors Data Analytics Software Jim Kaplan CIA CFE
 
Governing risk from decision-making learning algorithms (DMLAs)
Governing risk from decision-making learning algorithms(DMLAs)Governing risk from decision-making learning algorithms(DMLAs)
Governing risk from decision-making learning algorithms (DMLAs)Anca Georgiana Rusu
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot SpotsRon Steinkamp
 

What's hot (19)

2005_SIA_BCP_Conf
2005_SIA_BCP_Conf2005_SIA_BCP_Conf
2005_SIA_BCP_Conf
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guide
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growth
 
Management summary presentation
Management summary presentationManagement summary presentation
Management summary presentation
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
 
Cyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance MarketsCyber Risk Assessment to Empower Cyber Insurance Markets
Cyber Risk Assessment to Empower Cyber Insurance Markets
 
Relative risk benchmarking enabling better decision making for managing infor...
Relative risk benchmarking enabling better decision making for managing infor...Relative risk benchmarking enabling better decision making for managing infor...
Relative risk benchmarking enabling better decision making for managing infor...
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guide
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
The four horsemen of IT project doom -- kappelman
The four horsemen of IT project doom -- kappelmanThe four horsemen of IT project doom -- kappelman
The four horsemen of IT project doom -- kappelman
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Data Analytics for Auditors Data Analytics Software
Data Analytics for Auditors Data Analytics Software Data Analytics for Auditors Data Analytics Software
Data Analytics for Auditors Data Analytics Software
 
Governing risk from decision-making learning algorithms (DMLAs)
Governing risk from decision-making learning algorithms(DMLAs)Governing risk from decision-making learning algorithms(DMLAs)
Governing risk from decision-making learning algorithms (DMLAs)
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
 

Similar to Assess IT Project Risk with Operational Risk Scorecard

The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachProtected Harbor
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Marc S. Sokol
 
31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeet31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeetijaprr_editor
 
Managing IT projects by David Bustin
Managing IT projects by David BustinManaging IT projects by David Bustin
Managing IT projects by David BustinDavid Bustin
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaIJMTST Journal
 
Project Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docxProject Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docxbriancrawford30935
 
IRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET Journal
 
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Mohammed J. Khan
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanEECJOURNAL
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfBob Marcus
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxSUBHI7
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk ManagementGlen Alleman
 
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...Quang Jimmy
 
Workflow, Governance & Reporting
Workflow, Governance & ReportingWorkflow, Governance & Reporting
Workflow, Governance & ReportingSecondFloor
 

Similar to Assess IT Project Risk with Operational Risk Scorecard (20)

The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
 
31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeet31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeet
 
Managing IT projects by David Bustin
Managing IT projects by David BustinManaging IT projects by David Bustin
Managing IT projects by David Bustin
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
 
Ijetcas14 370
Ijetcas14 370Ijetcas14 370
Ijetcas14 370
 
Project Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docxProject Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docx
 
IRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score Indexing
 
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in Oman
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk Management
 
S36169184
S36169184S36169184
S36169184
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
 
Workflow, Governance & Reporting
Workflow, Governance & ReportingWorkflow, Governance & Reporting
Workflow, Governance & Reporting
 
BCI Counting The Cost
BCI Counting The CostBCI Counting The Cost
BCI Counting The Cost
 

More from Michel Rochette

3ceapaffichecommunication2016MR
3ceapaffichecommunication2016MR3ceapaffichecommunication2016MR
3ceapaffichecommunication2016MRMichel Rochette
 
Gestion du risque du compte du fond des changes
Gestion du risque du compte du fond des changesGestion du risque du compte du fond des changes
Gestion du risque du compte du fond des changesMichel Rochette
 
Proposition de la création d'un fond de capital de risque pour l'industrie to...
Proposition de la création d'un fond de capital de risque pour l'industrie to...Proposition de la création d'un fond de capital de risque pour l'industrie to...
Proposition de la création d'un fond de capital de risque pour l'industrie to...Michel Rochette
 
Proposition d'une liste électorale informatisée
Proposition d'une liste électorale informatiséeProposition d'une liste électorale informatisée
Proposition d'une liste électorale informatiséeMichel Rochette
 
L'intérêt public: Étalon de la gouvernance étatique
L'intérêt public: Étalon de la gouvernance étatiqueL'intérêt public: Étalon de la gouvernance étatique
L'intérêt public: Étalon de la gouvernance étatiqueMichel Rochette
 
Assurance-chômage au Canada: propositions de réforme
Assurance-chômage au Canada: propositions de réformeAssurance-chômage au Canada: propositions de réforme
Assurance-chômage au Canada: propositions de réformeMichel Rochette
 
Unemployment Insurance in Canada: proposals for reform
Unemployment Insurance in Canada: proposals for reformUnemployment Insurance in Canada: proposals for reform
Unemployment Insurance in Canada: proposals for reformMichel Rochette
 
Operational and reputation risk: Essential components of ERM-Mandarin
Operational and reputation risk: Essential components of ERM-MandarinOperational and reputation risk: Essential components of ERM-Mandarin
Operational and reputation risk: Essential components of ERM-MandarinMichel Rochette
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionMichel Rochette
 
Operational risk: the new frontier
Operational risk: the new frontierOperational risk: the new frontier
Operational risk: the new frontierMichel Rochette
 
Operational and reputational risk: Essential components of ERM
Operational and reputational risk: Essential components of ERMOperational and reputational risk: Essential components of ERM
Operational and reputational risk: Essential components of ERMMichel Rochette
 
1er colloque étudiant en administration publique
1er colloque étudiant en administration publique 1er colloque étudiant en administration publique
1er colloque étudiant en administration publique Michel Rochette
 
Risk Treatment Standard-ASB
Risk Treatment Standard-ASBRisk Treatment Standard-ASB
Risk Treatment Standard-ASBMichel Rochette
 
Introduction to economic capital
Introduction to economic capitalIntroduction to economic capital
Introduction to economic capitalMichel Rochette
 
Advanced Economic Capital
Advanced Economic CapitalAdvanced Economic Capital
Advanced Economic CapitalMichel Rochette
 
Role of a Chief Risk Officer
Role of a Chief Risk OfficerRole of a Chief Risk Officer
Role of a Chief Risk OfficerMichel Rochette
 
RISK MANAGEMENT OF FX RESERVES
RISK MANAGEMENT OF FX RESERVESRISK MANAGEMENT OF FX RESERVES
RISK MANAGEMENT OF FX RESERVESMichel Rochette
 

More from Michel Rochette (20)

3ceapaffichecommunication2016MR
3ceapaffichecommunication2016MR3ceapaffichecommunication2016MR
3ceapaffichecommunication2016MR
 
Gestion du risque du compte du fond des changes
Gestion du risque du compte du fond des changesGestion du risque du compte du fond des changes
Gestion du risque du compte du fond des changes
 
Proposition de la création d'un fond de capital de risque pour l'industrie to...
Proposition de la création d'un fond de capital de risque pour l'industrie to...Proposition de la création d'un fond de capital de risque pour l'industrie to...
Proposition de la création d'un fond de capital de risque pour l'industrie to...
 
Proposition d'une liste électorale informatisée
Proposition d'une liste électorale informatiséeProposition d'une liste électorale informatisée
Proposition d'une liste électorale informatisée
 
L'intérêt public: Étalon de la gouvernance étatique
L'intérêt public: Étalon de la gouvernance étatiqueL'intérêt public: Étalon de la gouvernance étatique
L'intérêt public: Étalon de la gouvernance étatique
 
Assurance-chômage au Canada: propositions de réforme
Assurance-chômage au Canada: propositions de réformeAssurance-chômage au Canada: propositions de réforme
Assurance-chômage au Canada: propositions de réforme
 
Unemployment Insurance in Canada: proposals for reform
Unemployment Insurance in Canada: proposals for reformUnemployment Insurance in Canada: proposals for reform
Unemployment Insurance in Canada: proposals for reform
 
Operational and reputation risk: Essential components of ERM-Mandarin
Operational and reputation risk: Essential components of ERM-MandarinOperational and reputation risk: Essential components of ERM-Mandarin
Operational and reputation risk: Essential components of ERM-Mandarin
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer function
 
Operational risk: the new frontier
Operational risk: the new frontierOperational risk: the new frontier
Operational risk: the new frontier
 
Operational and reputational risk: Essential components of ERM
Operational and reputational risk: Essential components of ERMOperational and reputational risk: Essential components of ERM
Operational and reputational risk: Essential components of ERM
 
From Risk to ERM
From Risk to ERMFrom Risk to ERM
From Risk to ERM
 
1er colloque étudiant en administration publique
1er colloque étudiant en administration publique 1er colloque étudiant en administration publique
1er colloque étudiant en administration publique
 
Risk Treatment Standard-ASB
Risk Treatment Standard-ASBRisk Treatment Standard-ASB
Risk Treatment Standard-ASB
 
Introduction to economic capital
Introduction to economic capitalIntroduction to economic capital
Introduction to economic capital
 
PPP: Risky proposition?
PPP: Risky proposition?PPP: Risky proposition?
PPP: Risky proposition?
 
Advanced Economic Capital
Advanced Economic CapitalAdvanced Economic Capital
Advanced Economic Capital
 
Role of a Chief Risk Officer
Role of a Chief Risk OfficerRole of a Chief Risk Officer
Role of a Chief Risk Officer
 
RISK MANAGEMENT OF FX RESERVES
RISK MANAGEMENT OF FX RESERVESRISK MANAGEMENT OF FX RESERVES
RISK MANAGEMENT OF FX RESERVES
 
Environmental Risk
Environmental RiskEnvironmental Risk
Environmental Risk
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Assess IT Project Risk with Operational Risk Scorecard

  • 2. O perational risk can sometimes be a broad and elusive concept. A defini- tion is thus necessary. The accepted definition within the financial community is to define operational risk as the risk of direct and indirect losses resulting from inadequate or failed internal processes, systems, people or external events. This is also the definition that is used by the majority of financial institutions that estimate the amount of economic capital required to cover this unexpected conse- quence of this risk, as mandated by some new regulatory standards. However, for internal purposes, institutions may want to add other risks to the definition of operational risk in order to satisfy additional business goals. For example, some institutions wanttoassessthequalitativeorquantitativeim- pactsresultingfromeventsaffectingtheirrepu- tation. Others are measuring strategic impacts as well. Others are becoming interested in as- sessing risks that pertain to projects. These projects can be new products, new geo- graphiclocations,newventures,overhaulofex- istingoperations,newITsoftwaredevelopment, etc. They involve many people, many steps, many processes, many systems and are affected by external events. Thus, assessing and manag- ingthemanyrisksfacedbyanyprojectwillhelp an organization reduce the likelihood of its fail- ure and contribute to a better use of its limited human and monetary resources to the manage- ment of the most risky ones. A possible approach to assess the riskiness of a project is the scorecard approach in risk man- agement. It has a lot of similarities to traditional actuarial and underwriting of risk. The first Operational RiskAssessment in IT Projects by Michel Rochette Operational Risk Michel Rochette, FSA, MAAA, MBA, is an actuary specializing in risk man- agement for CDP Capital in Montreal, Quebec. He can be reached at mrochette@ lacaisse.com. Operational Risk Category Risk Drivers IT Systems • Number of providers • Level of technological reliability • Technical complexity • Number of links to existing and future systems Process and Human (Direct Implementation) • Number of providers • Relative size of the project • Team diversity • Length of project • Definition of roles • Number of steps in the project • Team expertise Process and Human (Indirect use) • Number of changes to the processes • Expertise of the uses of the IT systems • Number of internal and external users Credit • Financial capacity of the IT providers Legal • Number of legal contracts to negotiate External • External events outside the organization Table 1  Page 38 Risk Management  July 2005
  • 3. component is the identification of operational risk drivers or risk factors that might cause a project to fail (see Table 1 on page 38). In other words, the determination of the factors that ex- plain the frequency of failure of the project. These risk drivers are then rated. A similar ap- proach is done for the likely impacts following failure—monetary or non-monetary—taking into account the effectiveness of controls that are put in place to mitigate its failure. Then, the riskiness of the project—the project risk score—is measured as the rated frequency times the rated impacts net of controls. Then, depending on the risk tolerance of the organiza- tion, a decision is made to go ahead or not with the project and necessary resources are allocat- ed to manage its resulting risks. The rest of this article briefly explains such an approach. It was developed for the assessment ofoperationalriskforITprojects.Ithasnowbe- come an integral part of the process to make de- cisionsaboutITprojectsinmycompany.Infact, standards like COBIT in IT software develop- ment usually mandate this analysis. Thefirstcomponentoftheprojectriskscoreisthe calculationofthescoreforthefrequency.Itisob- tainedbyscoringtheriskdriversthatexplainin- cidents from the IT systems themselves—from directprocessesrelatedtotheimplementationof the IT systems, indirect processes related to the useofthenewITsystems,humanfraud,legalin- cidents resulting from negotiating IT contracts, the credit failure of the companies providing the ITsystemsandotherexternaleventsaffectingthe projectoverall. Table 1 on page 38 lists the main risk drivers for each category of operational risk for the IT proj- ect. They were chosen because of the fact that they can be measured easily from the informa- tion that is usually part of an IT project like the forecasted budget, the time associated with it, the number of people involved, etc. Also, they werecrossreferencedtothemanypublishedar- ticles on the subject over the years. Each risk driver was scored as a null, weak, moderate or high risk (see Table 2). Then, a number was assigned for calculation purposes. TheriskscoringreflectsknowledgeoftheITex- perts and the risk tolerance of the organization, as well as taking into account the size and scale of the organization. Over time, these scores will be translated in probabilities as experience is accumulated. Forexample,thescoreassociatedwiththenum- ber of providers was determined based on the following scale. Once all risk drivers were scored, the overall riskiness for the frequency was calculated sim- ply by averaging all risk scores. It would also be possible to weigh more some risk drivers, and theaveragescorecouldbefurtheranalyzedsep- arately for each risk category. The second component of the project risk score is the calculation of the score for the monetary impacts from potential incidents in each risk category (see Table 3 on page 40). Again,asimilarapproachtothefrequencycom- ponent was followed. The impact for each com- ponent of risk was estimated as a percentage of the relevant IT budgets. To determine the overall riskiness related to the impacts of the project and to add some conser- vatism, all monetary impacts were simply summed. We didn’t take into account non-mon- etaryimpactforthetimebeing.Then,reflecting past expert knowledge and the risk tolerance of the organization, the overall impact of the IT projectwasscoredonascaleofnull,weak,mod- erate and high risk (see Table 4 on page 40). Risk Management Issue Number 5 • July 2005 Published by the Society of Actuaries 475 N. Martingale Road, Suite 600 Schaumburg, IL 60173-2226 phone: (847) 706-3500 fax: (847) 706-3599 www.soa.org This newsletter is free to section members. A subscription is $15.00 for nonmembers. Current-year issues are available from the Communications Department. Back issues of section newsletters have been placed in the SOA library and on the SOA Web site: (www.soa.org). Photocopies of back issues may be requested for a nominal fee. 2004-2005 SECTION LEADERSHIP Editor Ken Seng Tan, ASA University of Waterloo Waterloo, Ontario Canada N2L3G1 phone: (519) 888-4567 xt. 6688 fax: (519) 746-1875 e-mail: kstan@uwaterloo.ca Council Members Douglas W. Brooks, FSA Charles L. Gilbert, FSA John J. Kollar, FCAS David Ingram, FSA Beverly Margolian, FSA Hubert B. Mueller, FSA Frank P. Sabatini, FSA Ken Seng Tan, ASA Fred Tavan, FSA Shaun Wang, ASA Society Staff Contacts Clay Baznik, Publications Director cbaznik@soa.org Newsletter Design Joe Adduci, DTP Coordinator Facts and opinions contained herein arethesoleresponsibilityofthepersons expressing them and should not be attributed to the Society of Actuaries, its committees,theRiskManagementSection or the employers of the authors. We will promptly correct errors brought to our attention. This newsletter was printed on recylcled paper. Copyright © 2005 Society of Actuaries. All rights reserved. Printed in the United States of America. July 2005  Risk Management Risk Driver Score No provider Null (0) 1 provider Weak (1) 2 to 3 providers Moderate (2) More than 3 providers High (3) Table 2: Example of the Risk Scale of a Risk Driver Number of Providers continued on page 40  Page 39 
  • 4. And as actuaries are familiar, an overall risk scoreiscalculatedastheproductofthefrequen- cy and impact score. Then, for internal commu- nication purposes, instead of talking in terms of expected averages, the IT project risk score has beencommunicatedaswordsusingthefollowing scale (see Table 5). So far, 14 IT projects in 2005 have been ana- lyzed using this new approach. More than one third of the IT projects had a risk score that ranked above moderate. Given these risk scores, more resources in project management were allocated to these respective projects, re- sulting in a better allocation of the firm’s re- sources and, indirectly, economic capital. Some refinements are under way, like integrat- ing the effectiveness of controls—control score—inthisprocess.Thisisparticularlyrele- vant given the interest firms have in certifying their financial statements under the new SOX regulatory standard. Also, it is envisioned that a more refined risk assessment will be developed as loss data is accumulated, which will allow us to be able to statistically measure some of these components. Finally, this has been an interesting project to demonstrate to different groups in my company how my actuarial background, along with the knowledge developed over the years in the field of risk management, could help it better assess and manage the operational risk resulting from IT projects. 3 Operational Risk Assessment in IT Project  continued from page 39 Risk Management  July 2005 Operational Risk Total Monetary Impacts (Exposure) Score Less than $50,000 Null (0) Between $50,000 and $100,000 Weak (1) Between $100,000 and $250,000 Moderate (2) More than $250,000 High (3) IT Project Risk Score Score 0 Null Between 1 and 3 Weak Between 4 and 7 Moderate More than 7 High Operational Risk Category Monetary Impacts IT systems Budget for the IT equipment and software Process and Human (Direct implementation) Budget for the internal and external human employees and consultants Process and Human (Indirect use) 50% of the total IT budget Credit 50% of the the budget of the IT providers Legal 1% of the total IT budget External 1% of the total IT budget Table 3 Table 4: Risk Scale for the Monetary Impact Table 5: Risk Scale for the IT Project Risk Score  Page 40