No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Featured

Finally! An Alternative to Risk Matrices

Overcoming the Limitations of Traditional Risk Assessment

by Alex Sidorenko
July 1, 2019
in Featured, Risk
risk meter

While heatmaps (or risk matrices) are still considered one of the most popular tools for risk assessment, plenty of research has brought to light their various methodological and psychological limitations; they may actually lead to worse decisions than doing no risk analysis at all. Alex Sidorenko outlines the alternatives.

OK, the title is obviously a joke, because the alternatives (multiple) have been available to anyone willing to learn for over 50 years. But since you clicked, this article will probably change your life for the better.

Wait, do we even need an alternative?

To me, using risk matrices is a question of ethics and professional skills, and it is totally up to the individual risk manager. In that sense, risk matrices are like horoscopes (more in Douglas Hubbard‘s book, “The Failure of Risk Management: Why It’s Broken and How to Fix It”): They are fun, they are easy to understand and they are everywhere, but you probably wouldn’t use them for any meaningful day-to-day life decision – or if you did, you would have the decency to realize it’s no better than a coin toss, and you definitely wouldn’t talk about it at the conferences, calling it best practice.

The flaws are fundamental to the design of risk matrices, and there nothing a risk manager or business analyst can do to make them reliable. All these flaws have been discussed here, in this video by Osama Salah, in this post by David Vose and in dozens of posts I have been making over the years. Additionally, research by Tony Cox and Douglas Hubbard has shown that risk matrices consistently perform worse at measuring and communicating risks than proper quantitative tools.

So what are the alternatives? There are plenty, but for the tool to be any better, the following criteria have to be fulfilled:

  • Risk analysis has to be performed at the time of decision-making, not once a quarter.
  • The results of risk analysis should not be expressed as arbitrary risk levels, but rather as volatility or range or scenarios of the decision/objective itself (with some exceptions; in HSE, for example).
  • The output of risk analysis should have a direct and immediate impact on the decision at hand.

It is also very important to distinguish between two types of risk analysis techniques:

  1. Techniques to better understand the nature of riskto make a decision how to manage it. Usually used when a specific risk is known and significant and management needs to deal with it in a cost-effective manner. These include bow-tie diagrams; FMEA/FMECA; HAZID, HAZMAT and HAZAN; the 5 whys; influence diagrams; and ICAM, etc.
  2. Techniques to better understand how uncertainty affects the decision or objective.Used when making a decision and preparing or approving a strategy, budget, forecast, long-term pricing, etc. and when the risks are not obvious. These include scoring, decision trees, sensitivity analysis, scenario analysis, stress testing and various simulation techniques (agent-based, system dynamics, discrete event).

The application of the techniques above will also depend on the decision complexity, materiality, level of uncertainty and the time and resources available to risk manager:

For Simple Decisions

By far the easiest and the most common way to assign risk to an entity, project, supplier, business unit or piece of equipment is by using a scoring methodology. In fact it is so common that hundreds of companies have been using it without calling it risk management forever:

  • S&P, Moodys, Fitch rating agencies to assign ratings to companies
  • Procurement departments to rank existing suppliers (gold, silver, bronze or blacklisting them)
  • Classifying spare parts or pieces of equipment based on criticality, etc.
  • Banks and corporations to allocate debtors to risk buckets/categories or to classify bad debtors
  • Firefighters classifying buildings into fire risk categories, etc.

Basically, any type of methodology that allows the grading/categorizing of items based on their predetermined characteristics is a better way to communicate risks and to use that information for decision-making. Sometimes it could look like a very simple checklist.

For Decisions on How to Mitigate a Particular Risk

If you are in the situation where you need to determine the best ways to mitigate a specific kind of risk, then a bow-tie diagram or an influence diagram will be very helpful. There are a bunch of techniques that help to visualize the risk by breaking it into components – for example, causes and consequences, as is the case with bow-ties.

This is very helpful to switch on system 2 thinking and to overcome at least some of the cognitive biases. The bow-ties are pretty basic and should be in every risk managers arsenal. FMEA, FMECA, fault trees, 5 whys and ICAM investigation techniques are very similar in principle. Their main objective is to write down possible components of a risk, reminding us not to forget important sources or consequences, even though they may not be obvious at first.

I used bow-ties a lot; once I was even childish enough to present it to the CEO (ex-deputy Prime Minister of the country). That obviously didn’t go down well. So, it’s probably best to use them as internal analysis tools rather than a communication tool. My personal secret with bow-ties is to always have at least seven causes and seven consequences and at least three second-level causes and consequences on each branch. That way, we definitely switch from S1 to S2 and improve our chances of finding a solution.

For Any Decision Involving Numbers (Wait, That’s Most of Them)

For the rest of the cases, it is actually more important for us not to understand the significance of each individual risk but rather how uncertainty in general affects our decision, KPI or objective. Nassim Taleb calls it f(x). They also call it f(x) in operations research. That means we should be more interested in the effect of risk on something rather than the level of risk itself.

To my surprise, the message above is actually very difficult (almost impossible) for the risk managers to digest.

This is what I call risk management 2 – using risk analysis as a decision-making tool. Since the idea to use risk management as a decision-making tool is much older than the idea to use risk management as an element of corporate governance, all we need to do is to open any good book on decision science or probability theory to find the tools.

Let’s repeat. Here are just some of the common techniques – some more than 50 years old – ranked from simple to difficult:

  • Decision trees or influence diagrams
  • Scenario analysis
  • Stress testing
  • Simulation modeling techniques

The irony is that while many risk management departments have been using heatmaps to rank risks, other business units have been using proper risk analysis techniques forever without calling it risk management. Doctors have been using decision trees; investment professionals using sensitivity analysis; finance using scenarios; and pharma companies, geologists and weather forecasters using simulation modelling forever.

For Big and Important Decisions

This one is simple: If the decision is complex and the stakes are high, use simulation modelling or better.


*Author’s note: Thank you Damir Ramazanov, Group Project Risk Manager, ERG for helping with the article and providing quality review. 

This article was originally shared on the Risk Academy blog and is republished here with permission.


Tags: Risk Assessment
Previous Post

Automating Multiple Compliance Frameworks: Is It Too Complex?

Next Post

How to Make Really Tough Calls

Alex Sidorenko

Alex Sidorenko

Alex Sidorenko is a risk expert with over 15 years of private equity, sovereign wealth fund risk management experience across Australia, Russia, Poland and Kazakhstan. In 2014, Alex was named the Risk Manager of the Year by the Russian Risk Management Association. As a VP at the Institute for Strategic Risk Analysis in Decision Making, Alex is responsible for risk management consulting, training and certification across Russia and CIS. Alex is the co-author of the global PwC risk management methodology, the author of the risk management guidelines for SME (Russian standardization organization), risk management textbook (Russian Ministry of Finance), risk management guide (Australian Stock Exchange) and the award-winning training course on risk management (Best Risk Education Program 2013, 2014 and 2015).

Related Posts

credit score gauge

Sales at All Costs? Unified Credit Risk Management Can Squash Bad Deals Before They Happen

by Matthew Debbage
March 15, 2023

The collapse of a business doesn’t usually happen all at once. There are warning signs. Late payments, legal filings and...

risk tunnel

From Regulation to Volume, There Is No Light at the End of the Data Privacy Tunnel

by Jim DeLoach
March 15, 2023

Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions. An underpinning...

red flag warnings

Fostering Risk Transparency in the Organization

by Jim DeLoach
November 9, 2022

Serious risks to your company’s financial and reputational health probably aren’t going to walk up and introduce themselves. Protiviti’s Jim...

NAVEX regional whistleblowing hotline benchmark report_f

Navex 2022 Regional Whistleblowing Hotline Benchmark Report

by Corporate Compliance Insights
November 9, 2022

Explore benchmark data and regional comparisons for Europe, APAC, North America and South America. Regional Benchmark Report 2022 Regional Whistleblowing...

Next Post
red on blue illustration of cow in crosshairs

How to Make Really Tough Calls

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT